Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Defender detects Raccine as a Trojan #88

Open
atlantsecurity opened this issue Oct 31, 2020 · 11 comments
Open

Defender detects Raccine as a Trojan #88

atlantsecurity opened this issue Oct 31, 2020 · 11 comments

Comments

@atlantsecurity
Copy link

atlantsecurity commented Oct 31, 2020

Capture
I think this is preventing it from running at all, because vssadmin delete /all in powershell did not kill the parent process.

@JohnLaTwC
Copy link
Contributor

After submitting the file to Defender as a FP, Defender now determines the file is clean:
image

@atlantsecurity
Copy link
Author

atlantsecurity commented Nov 1, 2020 via email

@SimonZerafa
Copy link

With version 1.3b this issue has returned 😕

@Neo23x0
Copy link
Owner

Neo23x0 commented Nov 2, 2020

What's the detection name?
What's the signature (security intelligence) version?

@JohnLaTwC
Copy link
Contributor

In general, submitting a file with a False Positive to Defender's reporting portal will ensure a human analyst looks at it. I would include a link to this github repo (and also this page) as context when reporting:
(https://www.microsoft.com/en-us/wdsi/filesubmission)

@atlantsecurity
Copy link
Author

The problem is the presence of vssadmin strings and other indicators inside the file which will always mark it as a malware in most AV engines. There has to be a way past that, but that is the reason.

@JohnLaTwC
Copy link
Contributor

We should be able to move all those detections to Yara now. I wonder if that will eliminate these AV detects since they won't be in the executable anymore.

@Neo23x0
Copy link
Owner

Neo23x0 commented Nov 3, 2020

The YARA feature won't be available on x86 platforms. The internal filters at least provide some kind of protection for these users.
We could encode them base64, like malware authors do. :D

@SimonZerafa
Copy link

SimonZerafa commented Nov 10, 2020

Hi,

Microsoft Defender is triggering on the 1.3.1b download. I can't actually download the file with Google Chrome, refuses to do so with a "Virus Detected" error.

Microsoft Defender is reporting Trojan:Win32/Woreflint.A!cl on Raccine_x86.exe and Trojan:Win32/Woreflint.A!cl on Raccine.zip when the download completes with Mozilla Firefox as the browser.

Security Intelligence version: 1.327.683.0 created on 10th November 2020

Extracting the files in the ZIP to the Raccine program folder results in multiple errors and warning on open files and files in use (Raccine is not running) that I can't be confident the files extracted and overwrote correctly.

As much as this project has great potential until these issues with false positives with Microsoft Defender can be resolved it's dead in the water. I've uninstalled for now to prevent Defender from having constant fits over the files 🤔

P.S. Windows Powershell now refuses to run once Raccine is uninstalled. The file is present but reports as missing when you runt manually from Explorer. Something in the Uninstall routine is broken, as is my Windows install now 🙁

Right. The IEFO options are NOT removed by the uninstaller. The Uninstaller is broken quite badly.

@Neo23x0
Copy link
Owner

Neo23x0 commented Dec 21, 2020

I don't think that the uninstaller is broken.
The only thing that changes on your system and can be reverted easily are the registry patches.

You just have to run the file raccine-reg-patch-uninstall.reg manually, if everything else fails. (due to an Antivirus running amok)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants