Replies: 1 comment
-
It's a false positive. I submitted a report and here's the response I received: Every version is also tested when released on Chocolatey (latest results, 0/67). |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hi everyone, how's it going?
I'm looking for help with a funny case involving the Windows-compiled binary of Vale version 3.9.4. This file is part of the zip package "vale_3.9.4_Windows_64-bit.zip" (SHA1: 381B26C3CE38F676FDA25FFDA48995029058696C), which contains the binary in question, "vale.exe" (SHA1: aebddb4d103cad04c5ade3cbb0641ea1830f0da4).
The case: The company I work for has a security policy that requires the analysis of any application requested by employees before allowing installation and/or use on workstations. While the static analysis of vale.exe did not result in any detections by endpoint protection solutions, the dynamic analysis conducted by the Crowdstrike Falcon sandbox matched a YARA rule (win_kronos_g0) related to the Kronos malware family.
After some research, I found what seems to be the rule in question:
According to the sandbox analysis (available at this link), the detection occurred in a file called sample.bin. However, I couldn't confirm if it is part of the Vale binary package.
I would like the community's help to identify if this is indeed a real detection or a false positive.
Below are the reference links related to the analysis process:
Falcon Hybrid Analysis - vale_3.9.4_Windows_64-bit.zip: https://www.hybrid-analysis.com/sample/722ec61fa60b282010021cb50d128d3e1aadd6bba1e3f7f8963e00fb8c919b6d
Falcon Hybrid Analysis - README.md: https://www.hybrid-analysis.com/sample/fbdc869fb6ae1a95940b58e2b1b37ab27baeebecf13071314c42987a1c6008cf
Falcon Hybrid Analysis - vale.exe: https://www.hybrid-analysis.com/sample/8ee37be0bef5fdf52420ebf35f5abfecd75033a14f991acc13dbeb57e704b570
Falcon Hybrid Analysis - Detailed vale.exe sandbox analysis: https://www.hybrid-analysis.com/sample/8ee37be0bef5fdf52420ebf35f5abfecd75033a14f991acc13dbeb57e704b570/679cfe695302d7aaf70a67cc
Malpedia reference for Kronos: https://malpedia.caad.fkie.fraunhofer.de/details/win.kronos
Other relevant data about the binary were found when analyzed with filescan.io, available at the link: https://www.filescan.io/uploads/679d2a56414c56eb9503d015/reports/dd87938a-5862-429e-97bf-d10e4f14af46/overview
Thank you in advance for any help in understanding this behavior.
Thanks!
Beta Was this translation helpful? Give feedback.
All reactions