So, first I'll explain how I came across this. I wanted to download Golden Eye: Source on my main home PC. I think that its really amazing that its just a mod, its really incredible. But like anything I download on to my PC, I decided to look into it before downloading. I did the normal googling too see how credible it is. For this part it came up clean and I was going to download it today. While downloading the installer( from Moddb ) I decided to run Golden Eye's site though VirusTotal to see what came up. The clean links I sent were: "
https://geshl2.com/" and "geshl2.com/" respectfully. Then I found that they are both lead me to "
www.geshl2.com/". This lead to an automated report of all the files downloaded from "
www.geshl2.com/". 5 files were listed, one of them being "GoldenEye_Source_5.0.0_to_5.0.6_patch.exe". Getting a detection ratio of 4/67. I decided to download the file from both Moddb and GameStand. Both gave the same results.
The AV Engines that detected it were:
- Antiy-AVL: Trojan[Exploit]/EXE.CVE-2016-0099.Generic
- Bkav: HW32.Packed.969A
- Baidu: Win32.Trojan.WisdomEyes.16070401.9500.9751
- McAfee-GW-Edition: BehavesLike.Win32.Vopak.tc
I looked up each one of the basic diagnosis given to it. I was relieved to find out that they were all associated with false positives. I decided to go back and look at the community score for it and saw that there was one post by a HybridAnalysis. I looked though there report of it and it shed a lot more light on the issue.
We will now be looking at the HybridAnalysis report filed August 28th 2017. The link to the Hybrid report will be give below, along with the virustotal links. Please check then out for your self.
The report begins with a Risk Assessment. Stating:
- Spyware: Accesses potentially sensitive information from local browsers
- Persistence: Writes data to a remote process
- Fingerprint: Reads the active computer name, Reads the cryptographic machine GUID, and Reads the windows installation date
Interpret that as what you will. It then moves on to the more detail matters of Malicious Indicators, on which there was 4. It goes on to say that it had a 9% detection rate, which as of writing this has gone down to 5%. The main thing I want to focus on is that it says that a .dll file was found in the installer. That .dll being UAC.dll, which on doing some quick research found a lot of malware reports. It also lists two other malicious indicators but I didn't think I needed to list all of them. Then it goes onto Suspicious Indicators. There were 20 Suspicious Indicators, you can go and read about them as for the sake of time will not be listing them. Another thing that worried me was it making changes to internet explorer. Here one example: "%LOCALAPPDATA%\Microsoft\Internet Explorer\Recovery\High\Active\{F5857E24-8B77-11E7-ACF3-0A00270556D5}.dat".
Now your probably wondering why I care if the patch has malware? I'm looking to install Golden Eye: Source, not the patch. I trust The GoldenEye: Source team, but I feel that this issue lies with the installer. The patch installer and the Mod installer share the same installer. And I feel like this is a problem with the installer. Though that is my theory.
To end this off I decided to submit my patch installer and see a new report. So far Malicious Indicators when down to 1. Still the UAC.dll.
I really would like an explanation. And if this is a problem with the installer could the devs fix it?
VirusTotal Site Report:
https://www.virustotal.com/gui/file/2e500e0d1b5be7572ac3d5fa9a4f80b62c8eac081ac26ba63ae8c2ebe1633084/detectionHybrid-Analysis:
https://www.hybrid-analysis.com/sample/2e500e0d1b5be7572ac3d5fa9a4f80b62c8eac081ac26ba63ae8c2ebe1633084?environmentId=100My Hybrid-Analysis:
https://www.hybrid-analysis.com/sample/2e500e0d1b5be7572ac3d5fa9a4f80b62c8eac081ac26ba63ae8c2ebe1633084