-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Avast detects virus in ltchiptool-v4.6.0.exe #10
Comments
same with windows defender |
Same with Bitdefender on both 4.5.1 and 4.6. |
All versions show multiple malware threats on VirusTotal web site. v4.6.0 shows 25 detections, some older versions show fewer detections. |
See #8. We don't know what is causing these detections. They are obviously false-positives - the project is fully open source, you can compile it yourself if you want. We do not have a fix for this issue. It is not planned to work on this, as it's near-impossible to find out what exactly makes the AV software classify it as malware. |
Re See #8: Ah yes, sorry I didn't look in the closed issues section. Thanks for that. |
Sorry to say, but #8 is not a solution, really. |
I understand your point, but I'm trying to explain that there is nothing we can do. Antivirus programs detect behavioral patterns of the software, which they may consider malicious, even if they aren't. Unfortunately, we don't know what exactly triggers the detection, and there is no way to find out - if there was, malware makers would have an easy job. It might even be completely unrelated to ltchiptool itself, and caused by some dependency. Version 4.2.3 did NOT trigger AV software (as checked on virustotal). However, when I compiled 4.2.3 again, when 4.4.1 was the latest version and the problem appeared, this freshly compiled version was already flagged as malware. I have compared what dependencies were updated in the meantime, and checked what code differences were added (and checked GitHub issues of those projects to find similar malware detections). Nothing found. I know that this might not be desirable for many people. You're free to use the PyPI version, checkout directly from GitHub, or even review the entire codebase to look for malware. If you're really concerned - use a virtual machine. Just know, that there is no "NOT A MALWARE" button on GitHub, and we can't fix an issue if we can never know what causes it. |
Sorry, I may have been updating my post while you already replied; thank you for being so quick. |
I have submitted ltchiptool to the Avast whitelist, and they have accepted it and removed false positive reputation. They say it might take some time until the changes propagate. Hopefully it will also apply to other AV software. |
Sounds good; thank you; let's hope so.
If not, maybe submit it to wherever else is easy.
…________________________________
From: Kuba Szczodrzyński ***@***.***>
Sent: October 12, 2023 2:01 PM
To: libretiny-eu/ltchiptool ***@***.***>
Cc: CataCluj ***@***.***>; Comment ***@***.***>
Subject: Re: [libretiny-eu/ltchiptool] Avast detects virus in ltchiptool-v4.6.0.exe (Issue #10)
I have submitted ltchiptool to the Avast whitelist, and they have accepted it and removed false positive reputation. They say it might take some time until the changes propagate. Hopefully it will also apply to other AV software.
—
Reply to this email directly, view it on GitHub<#10 (comment)>, or unsubscribe<https://github.com/notifications/unsubscribe-auth/AH72F576DFG576JCEHCE3HLX7BEB3ANCNFSM6AAAAAA5QMSM4A>.
You are receiving this because you commented.Message ID: ***@***.***>
|
Chrome and Brave browser do not even allow downloading it. They just delete as dangerous! |
Send the newest 4.7.0 to Avast as well for whitelisting... :/. |
Good news! |
I'm not sure if a URL scan actually scans the file because of the below:
It's MUCH better than in the past, but if you actually upload the file you still get 9 flags, including Avast, which is strange.
4.6.0 still shows 15 flags, but NOT Avast.
Maybe submitting 4.7.0 to Avast will result in fewer positives.
Anyway, I am satisfied there's no real malware; it would still help if this were somehow resolved.
You'd think future versions would show clean if same libs are used; it's ridiculous!
[cid:810072ee-6708-4772-b0ec-53eb616020e7]
…________________________________
From: CSSMWX ***@***.***>
Sent: November 3, 2023 6:20 AM
To: libretiny-eu/ltchiptool ***@***.***>
Cc: CataCluj ***@***.***>; Comment ***@***.***>
Subject: Re: [libretiny-eu/ltchiptool] Avast detects virus in ltchiptool-v4.6.0.exe (Issue #10)
Good news!
When the the actual link to the file
https://github.com/libretiny-eu/ltchiptool/releases/download/v4.7.0/ltchiptool-v4.7.0.exe
is entered at
[url]https://www.virustotal.com
the results are nearly all virsu free meanwhile.
Thanks kuba2k2 for getting in touch with Avast et al, and your hard work!
—
Reply to this email directly, view it on GitHub<#10 (comment)>, or unsubscribe<https://github.com/notifications/unsubscribe-auth/AH72F54VIOT7GKQKAWLO3ADYCTOQHAVCNFSM6AAAAAA5QMSM4CVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMYTOOJSGMZTSOJYGU>.
You are receiving this because you commented.
|
Not sure if this helps anyone, but the file is primarily flagged because it uses crypto libraries found in many other malicious files. I will link the summary report for 4.10.1 for anyone elses perusal. https://www.joesandbox.com/analysis/1367809/0/html I dont see anything that would make it malicious in the report, just alot of similarities to malicious trojans / stealers / malware, because of the py crypto libraries. I am certainly not a professional malware researcher, but my job typically requires that I do some malware investigation. |
Are crypto libraries needed for a chip loader tool? |
"crypto" here is for cryptography, not currency. They aren't needed specifically for the flashing portion, but they are needed for the analyzing portions (like UPK2ESPhome). |
I know what crypto is. |
Then don't use it? Nobody is forcing you to. Tuya's storage partition is encrypted with cryptography. LTChipTool uses the reverse method of that to decrypt it and make it human/tool readable. |
There is no need to be like that. It makes one think you don't like inquiring minds for some reason :-) |
ltchiptool is a universal package used by LibreTiny - the GUI is just a part of it. The core contains utilities for flashing the chips, as well as generating binaries from ELF files (that part is used by LibreTiny during compilation). This requires the crypto libraries, for example Beken's OTA is AES encrypted. Tuya storage data, used by UPK2Esphome is also AES encrypted. So, even if we could get rid of the binary generation part, UPK would still require crypto. ltchiptool is a whole toolset for dealing with the LibreTiny/tuya-cloudcutter ecosystem. We're not planning on writing separate flashing tools, because it's just easier to make plugins for ltchiptool and use its set of utilities and libraries. And yes, we are replacing Tuya FW. But in order to have something to replace it with, we need to generate a YAML by UPK2Esphome, which needs crypto as said above. That being said, millions of programs use cryptography for various reasons - whether it's data security, connection encryption, or even logging in or hashing. We may never know why do AV programs have issues with that. The truth is, you can write a simple, secure application using cryptography, or you can write a file-stealing malware or disk-encrypting ransomware without cryptography. |
You were not inquiring, you're making blanket statements and complaining about how something open source isn't exactly as you like it.
You very clearly did. You specifically said you didn't understand it, and that it should only do the simplest thing you understand of it.
Again, no. When explaining what things were doing, you just said it wasn't needed.
Then you should fully understand what cryptography is for if you've ever written anything related to security.
As mentioned, this is a tool that does more than just write a binary. This tool is to help make Tuya devices function better without Tuya software, and being able to determine how Tuya configured those devices is part of that process, and decrypting the data they encrypted it also a part of that process.
Yes, and to help people do that, LTChipTool is trying to help generate the most feature complete firmware it can. Not everyone knows how to write their own ESPHome configuration files. It's great if you do, but you're not every user. The majority need more than an empty non-functional base firmware.
To make the devices functional. ESPHome doesn't magically make the device function just by placing it on a microcontroller.
No, ESPHome is not encrypted at the firmware level. But that doesn't mean noone needs the things included with this tool. |
V4.11.2 is up to 30 detections out of the 72 total that virustotal scans with. |
I'm sorry, but there is nothing we can do. Read my replies here: |
The exe is detected as containing Win64:Evo-gen trojen. Couldnt find any other cases with quick google search.
Avast 23.8.6078 (build 23.8.8416.794)
Definition database: 231002-0
The text was updated successfully, but these errors were encountered: