Makerfabs / Project_Touch-Screen-Camera

104 stars 26 forks source link

ScreenShotSender.exe found with a virus. #13

Open gz-jgale opened 1 year ago

gz-jgale commented 1 year ago

<html xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:dt="uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns="http://www.w3.org/TR/REC-html40">

Date/Time | Infected File/Object | Security Threat | Result | Scan Type | File Path -- | -- | -- | -- | -- | -- 12/14/2022 (Wed) 1:20 | ScreenShotSender.exe | TROJ_GEN.R002C0PL422 | Cleaned | Scheduled Scan | C:\Users\gz-jgale\Makerfabs_ESPTFT35CA\Project_Touch-Screen-Camera-master\Project_Touch-Screen-Camera-master\example\ESP32_ScreenShotReceiver-master\

lovyan03 commented 1 year ago

Executable files containing communication functions are relatively easy to be misidentified as viruses. The source code is disclosed, so you can build it yourself.

gz-jgale commented 3 months ago

@lovyan03,

You may have had a virus that got in at compile time and made it into the compiled exe that is saved in the repo assets that does not represent the source code intentions. This was flagged again in my company IT scans when I downloaded the files again.

https://www.virustotal.com/gui/file/b13acb37085877c86596a004a823ce084ca72bbb5b9825210add38fc9f12393b/detection

Here is the trigger being flagged -- Matches rule Python Initiated Connection by frack113 at Sigma Integrated Rule Set (GitHub)

Adversaries may attempt to get a listing of services running on remote hosts, including those that may be vulnerable to remote software exploitation