mzreveal shows disguised executables

Discussion in 'other anti-malware software' started by flatfly, Nov 4, 2014.

  1. Rmus

    Rmus Exploit Analyst

    I have never seen this exploit in the wild -- just read articles about it, such as the ones I cited. You might email the author to see if he has an example.

    With proper protection in place, I can't see that RTLO is any more dangerous than the old double-extension trick, where the true (last) extension does not show if Windows is configured to hide certain file extensions.

    To test, I renamed a trojan.exe to financials.pdf.exe. With file extensions hidden, I pretended to be tricked into opening it:

    extension_exe.jpg

    -rich
     
  2. MrBrian

    MrBrian Registered Member

    Method #2 at Insert Unicode characters via the keyboard? worked for me on Win 7. The character code to use is 202E.

    AppLocker stopped the exe with RTLO from executing. Also, Avast Free didn't allow this character in a filename.
     
    Last edited: Nov 9, 2014
  3. WildByDesign

    WildByDesign Registered Member

    Just wanted to mention that, with regards to RLO, Software Restriction Policies work effectively as well. I just tested this thoroughly. SRP determines that the underlying file/code is executable and thus blocks it.
     
  4. treehouse786

    treehouse786 Registered Member

    thanks for clarifying Rmus
     
  5. J_L

    J_L Registered Member

    Thanks for the explanation Rmus and MrBrian.
     
  6. Rmus

    Rmus Exploit Analyst

    That is good to know. Thanks for testing. Did you make a screen shot of the Applocker message? I would like to see what it looks like.

    -rich
     
  7. Rmus

    Rmus Exploit Analyst

    You both are welcome!

    ----
    rich
     
  8. MrBrian

    MrBrian Registered Member

    I didn't but it was the standard "This program is blocked by group policy" message.

    @Rmus and J_L: you're welcome :).
     
  9. Rmus

    Rmus Exploit Analyst

    OK, thanks!

    -rich
     
  10. Rmus

    Rmus Exploit Analyst

    That is good to know. Good old reliable SRP!

    ----
    rich
     
  11. MerleOne

    MerleOne Registered Member

    Hi,
    The download link for MZReveal seems off ? Any mirror ?
    Thanks.
     
  12. flatfly

    flatfly Registered Member

    A new version should be released shortly. (I've been testing it last night.)

    Edit: apparently you can get an early download link by following the developer's Twitter account @HexAtomium and requesting the new version by DM (private message)
     
    Last edited: Nov 11, 2014
  13. MerleOne

    MerleOne Registered Member

    Thanks !
     
  14. flatfly

    flatfly Registered Member

    The link is now up again.
    The updated version can now show full file paths, and automatically saves results in a "MZreveal.log" file.
     
  15. MerleOne

    MerleOne Registered Member

    Thanks. Now Avast reports it as a malware a refuses to save it.
     
  16. Tarnak

    Tarnak Registered Member

    Confirmed. :)

    ScreenShot_MzReveal_latest_01.gif ScreenShot_MzReveal_latest_02.gif ScreenShot_MzReveal_latest_03.gif
     
  17. flatfly

    flatfly Registered Member

    Looks like a false positive to me. I will inform the developer about it. Perhaps it should be reported to Avast as well. What is the detection name you are getting?
     
  18. MerleOne

    MerleOne Registered Member

    Will try again and let you know.
     
  19. CloneRanger

    CloneRanger Registered Member

    @ flatfly

    Thanx for helping with getting the LOG file included, & the updates.
     
  20. flatfly

    flatfly Registered Member

    Version 1.11 is available! List of changes (got this info from @hexatomium):

    - a bug causing some files to go undetected has been fixed
    - performance enhancements in the scanning routine
    - fewer AV false positives (hopefully)
    - first build with ASLR and DEP memory protection
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice