Comment by piecerough

2 years ago

Tell us more about "I don't aee anything suspicious". How exactly do you know it's not a binary that hashes all your files using a key and asks for btc to revert?

Open in hex/text editor, scroll through and look for anything suspicious like network, crypto, obfuscated sections (major red flag), strange strings, etc. The #1 most reliable sign of malware is if it's unusually large and packed/obfuscated, but this isn't.

The guy even has his full name and contact info in there.

This is harmless.

If you don't trust me you could upload to an online malware multiscanner (which tends to invite false positives, but better than nothing).

  • It's not about whether this particular announcement, with these particular executables, is trustworthy or not.

    It's about the whole process of regularly downloading and running executables uploaded by individuals to a BBS-type forum being unimaginable in most other parts of the software world, and violating every security "best practice" written about in the past 30 years.

    I know that this is how things were once done everywhere. But that was a long time ago.

    • Are we even in the same universe?

      The vast majority of the world still downloads and runs executables uploaded by individuals, albeit perhaps not on a bulletin board or forum (most of those have been killed and replaced by social media).

      6 replies →

  • A lot of malware just waits for a while and the opens another file (or a pastebin) and downloads the payload from somewhere else. A small executable without anything dodgy in it means nothing.

    • without anything dodgy

      I said there weren't any network APIs either (whose presence in an application like this would definitely be a red flag.)

      If you say their presence can be obfuscated, then let it be known that obfuscation is also very obvious in a binary and another red flag.

      1 reply →

  • It is still possible that the author's machine had a virus and the executable got infected without the author's knowledge. I too trust the author in that matter, but that's irrelevant here.

There are libraries that would be useful for cryptography that you wouldn’t likely need in an audio codec. If the binary imports those libraries, it may be visible with a bit of prodding.

  • Unless they are statically linked.

    Or the binary uses executable compression.

    Or obfuscated dynamic loading.

    Or about a million other techniques that can thwart dependency analysis, and which have been well-known for decades.

    • And precense of those things is basically the first thing any malware heuristic looks at. Why are you so emphatically stating them as if they are news?

      1 reply →