[tor-bugs] #8430 [Tor bundles/installation]: PyInstaller binaries detected as malware

Tor Bug Tracker & Wiki blackhole at torproject.org
Thu Mar 7 22:18:40 UTC 2013


#8430: PyInstaller binaries detected as malware
--------------------------------------+-------------------------------------
 Reporter:  dcf                       |          Owner:  erinn
     Type:  defect                    |         Status:  new  
 Priority:  normal                    |      Milestone:       
Component:  Tor bundles/installation  |        Version:       
 Keywords:                            |         Parent:       
   Points:                            |   Actualpoints:       
--------------------------------------+-------------------------------------
 This is a summary of discussion about malware detection that happened
 mostly in email.

 Blog comment showing VirusTotal analysis for `obfsproxy.exe` from the
 2.4.7-alpha-1 flashproxy+pyobfsproxy bundles. The purported malware
 detected is variants of "Backdoor/Win32.Swrort.gen."
 https://blog.torproject.org/blog/combined-flash-proxy-pyobfsproxy-browser-
 bundles#comment-18759
 https://www.virustotal.com/en/file/b9c9357a2923520fbcecd1044e0aa58a323d4d3c94c08799415b61c0cfbe31b6/analysis/1361218309/

 The bundles being detected as malware were built by Alex. David
 independently built his own and they had similar malware results. A
 trivial "hello, world" executable built by David had similar malware
 results.
 David's `obfsproxy.exe`:
 https://www.virustotal.com/en/file/cdabf1ca98becd88392cd8249047efb3802d4142e922f04b23acbda6d08872ab/analysis/
 David's `hello.exe`:
 https://www.virustotal.com/en/file/147eed31da492c98b0908f208e74be1c36136edbee81708a5940d11e3cd10760/analysis/

 We traced the issue to PyInstaller upstream. This is their ticket for the
 "Swrort" detection.
 http://www.pyinstaller.org/ticket/603

 Alex and David built new 2.4.10-alpha-2 bundles
 ([http://cs.mcgill.ca/~aallai2/bundles/2.4.10/ Alex],
 [https://people.torproject.org/~dcf/flashproxy/ David]) using PyInstaller
 commit
 [https://github.com/pyinstaller/pyinstaller/commit/555e9f7f6fbaccaeb024c658fcb96e199f4a3b0d
 555e9f7f], which has a fix for the antivirus issue 603. (The 2.4.7-alpha-1
 binaries were built with the PyInstaller 2.0 release.) However, they now
 test positive for different malware ("Gen:Variant.Strictor.20210").
 Alex `pyobfsproxy.exe`:
 https://www.virustotal.com/en/file/9a12fc0773e939c246ff2269f930ce1e3cf903ddb81810e4f10d924da6c37e2d/analysis/
 David `pyobfsproxy.exe`:
 https://www.virustotal.com/en/file/5f2675b7d19d412c47655203273e2babc07ce1be31521a80ba9d579b70b07e15/analysis/

 Binaries from Nmap built with py2exe do not show any malware detection.
 Here is `ndiff.exe` from http://nmap.org/dist/nmap-6.25-setup.exe:
 https://www.virustotal.com/en/file/fee79b95d1e4439ce7b0a676943e5551c2cca56b72a0954ec206897c683676db/analysis/
 Alex is testing py2exe to see if it works for the pluggable transports
 bundles.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/8430>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list