Closed Cra5hedC0w closed 2 years ago
From https://docs.securityonion.net/en/2.3/download.html:
If you download our ISO image and then scan it with antivirus software, it is possible that one or more of the files included in the ISO image may generate false positives. If you look at the antivirus scan details, it will most likely tell you that it alerted on a file in SecurityOnion\agrules\strelka\yara. This is part of Strelka and it is being incorrectly flagged as a backdoor when it is really just a Yara ruleset that looks for backdoors. In some cases, the alert may be for a sample EXE that is included in Strelka but again a false positive.
The location of the malware does not match what your documentation is stating in terms of location. Again, the locations indicated are
securityonion-2.3.170-20220922\docker\registry\v2\blobs\sha256\cf\cfa02abcd83b08b03a34044f8a8c0c9319c75df85b028914e2ceeeda679b4a52\root.cache\pip\http\1\c\e\c\b\speakeasy\winenv\decoys\x86\default_exe.exe
and
\securityonion-2.3.170-20220922\docker\registry\v2\blobs\sha256\cf\cfa02abcd83b08b03a34044f8a8c0c9319c75df85b028914e2ceeeda679b4a52\usr\local\lib\python3.8\dist-packages\speakeasy\winenv\decoys\x86\default_exe.exe
If these correspond to Strelka locations on install, then disregard.
Please see the final sentence:
In some cases, the alert may be for a sample EXE that is included in Strelka but again a false positive.
In this case, speakeasy\winenv\decoys\x86\default_exe.exe
is a sample EXE that is included in Speakeasy which is part of Strelka.
For more information about Speakeasy, please see: https://pypi.org/project/speakeasy-emulator/
AV detects trojan in .170 ISO. Virustotal confirms this as well.
VT: https://www.virustotal.com/gui/file/6bdb83059b0e9896b60e1b844d0b7ef3ae9cee611bcbeb6135b5cc3cb00863a7/detection
Location of file: securityonion-2.3.170-20220922\docker\registry\v2\blobs\sha256\cf\cfa02abcd83b08b03a34044f8a8c0c9319c75df85b028914e2ceeeda679b4a52\root.cache\pip\http\1\c\e\c\b\speakeasy\winenv\decoys\x86\default_exe.exe
Also located here: \securityonion-2.3.170-20220922\docker\registry\v2\blobs\sha256\cf\cfa02abcd83b08b03a34044f8a8c0c9319c75df85b028914e2ceeeda679b4a52\usr\local\lib\python3.8\dist-packages\speakeasy\winenv\decoys\x86\default_exe.exe
Can the authors confirm/deny, or provide any guidance on this?