- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
01-06-2021 05:32 AM
Hi team,
I am Cristian, the founder of HydraProxy.com and creator of HydraHeaders, a browser profile management app for Windows.
We launched the HydraHeaders app on the 23rd of December 2020 and as of January 5th 2020, a couple of users signaled that your scan shows our app's executable file (the exe used for running the app, not the installer) as malicious.
VirusTotal scan of installer exe: https://www.virustotal.com/gui/file/08ae48bc9de44bb4720f94e007dadf54a5195a77fd9839eb4d808d40513a1862...
(False Positive) VirusTotal scan of exe file: https://www.virustotal.com/gui/file/0fbd26fbb6eff68a08748fdd95473e6e9880ee168f5b326a99bc1ef038a02419...
Here’s the G Drive link of the installer: https://drive.google.com/file/d/1lWoK9JcR5S-jslO0D_kbofn0ABx7iILI/view?usp=sharing
Here are some technical details of our app:
And here are some useful links:
We would greatly appreciate it if you can consider solving this false positive.
Please let me know if you need further information from our end.
Best regards,
Cristian Timofte
HydraProxy
01-06-2021 07:59 AM
Sample is no longer malicious
01-28-2021 01:06 AM
Hi @tsullivan7
Thank you for your help.
Please note that our update (v 1.1) has been flagged as well.
Here are some useful links:
VirusTotal page:
App landing page:
https://hydraproxy.com/hydraheaders/
Version 1.1 update download link:
https://app.box.com/s/oj2hrtm2fygotzd0ffvpidsz0r7q92od
Could you please consider this for removing the false-positive?
Thank you!
01-28-2021 06:32 AM
If your software continues getting flagged by Wildfire as malicious, it would be advisable to consider what's in the code. Is the code digitally signed? If not you may want to consider this to limit the false positives. One thing Wildfire detected is the sample contacting an IP address info service via HTTP.
This is often used by malware to tailor a message or note to the compromised system in a user's language by geographic IP location. This behavior is also used often used by malware to identify sandboxes to prevent executing in a lab environment.
I've submitted it for a verdict change evaluation.
01-28-2021 06:38 AM
Hi,
Thank you for the quick reply.
Regarding the contacting IP, indeed, the app makes a request at every launch to our server to check for updates. The page it contacts is a simple HTML file with the latest version and the app simply reads the last version number posted on the page and if different from the current version of the app, it informs the user and asks him if he wants to update or not.
Regarding the code signing, even from the first version, we sign the code. We never ship it unsigned.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!