Hollows Hunter: False positives or not? #81
-
First off: hasherezade, thank you for your continued work on these incredible tools! Not sure if this is the right place to post this. So about 2/3 weeks ago I ran hollows hunter on my system, to my surprise it immediatly started dumping what I thought was legitimate software, in this case Blizzard's Battle.net. After uploading the dumped executables to virustotal I was surprised to see that a couple detections were shouting Meterpreter. I thought at first that either the application itself had been exploited, however that seems very unlikely in such a controlled environment. Another possibility would have been that my slightly out of date system got exploited by other means and meterpreter was injected into 3 of the the Chromium Embedded Framework processes "Battle.net". https://bazaar.abuse.ch/sample/5b9468610fd9202fc249242ea524a78b617fb1db1bd20191ffb3743f9ff6bfa7/ Now I am not sure what to think of this, clearly a majority of AV solutions are triggered by these. Following a couple weeks later, I uninstalled Battle.net completely, including the deletion of all caches.
Now this time, AV Products don't seem to detect Meterpreter anymore, instead a majority of them seem to find a "Razy" variant. https://bazaar.abuse.ch/sample/d223a2adc450e8e4b4d02e94b805268e182a4b38451b344003a535be0ad4dfe6/ I wonder what is going on here, these seem to be an awful lot of detections for a false positive. Dynamic analysis does not seem possible and at first glance I didn't see anything too suspicous in the disassembly. Mostly Blizzard related strings. Could this be related to some form of Anti-Cheat software provided by Blizzard? Or are these indeed malicious? |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 2 replies
-
Hi! Sure it is a good place to ask such questions, and you are most welcome! I reviewed your files briefly, and they look to me legitimate, yet they do have some anomalies that make them look malware-like for some products. The fact that reinstalling the product didn't help, only support this. For the second set of files, I also see that some (yet lesser) AV products again detected it as Meterpreter (i.e. Kaspersky here ) so it must contain something that trigger this pattern, yet I would assume it is a false positive. Regarding PE-sieve/HollowsHunter - I can tell you what exactly was the feature that triggered the detection if you can upload the JSON reports in addition to the detected samples. |
Beta Was this translation helpful? Give feedback.
Hi! Sure it is a good place to ask such questions, and you are most welcome!
I reviewed your files briefly, and they look to me legitimate, yet they do have some anomalies that make them look malware-like for some products. The fact that reinstalling the product didn't help, only support this. For the second set of files, I also see that some (yet lesser) AV products again detected it as Meterpreter (i.e. Kaspersky here ) so it must contain something that trigger this pattern, yet I would assume it is a false positive.
Regarding PE-sieve/HollowsHunter - I can tell you what exactly was the feature that triggered the detection if you can upload the JSON reports in addition to the detected s…