SBN

Is D-Link.com.au serving up malware drivers?

Hi guys,

D-Link have firmware drivers on their website, specifically the DSL-502T and DSL-504T that are showing as malware when I upload them to Virus Total to confirm.

Here is the 502T:
http://www.dlink.com.au/tech/Download/download.aspx?product=DSL-502T&revision=REV_A&filetype=Firmware

Here is the 504T:
http://www.dlink.com.au/tech/Download/download.aspx?product=DSL-504T&revision=REV_A&filetype=Firmware

(Be sure to download the  EXE and extract it).

I freely admit I have not tested these drivers out in a test environment (e.g. VM running procmon, or tried reversing them). But the reports from Virus Total are not thrilling:

502T driver report from Virus Total (17/43 vendors):
http://www.virustotal.com/file-scan/report.html?id=72c73d9726f1b6ce626b26ea8086336bdbc1a4fad210b11d977a65542a38b007-1296117635

504T driver also reported infected with 20/43 known A/V products this time:
http://www.virustotal.com/file-scan/report.html?id=80943a9cfd200e66430a54e1b42d6d962a4f0d78c3c558334d4760c3576eff11-1296187981

The 504T sample was also reported on Virus Total back in August 2010 (I have no idea if it made its way back to D-Link though):
http://www.virustotal.com/file-scan/report.html?id=80943a9cfd200e66430a54e1b42d6d962a4f0d78c3c558334d4760c3576eff11-1283127150

Not just tiny vendors either: McAfee, Fortinet, Avast, AVG, VIPRE. Email from the technical support team has referred to them as “no name brands” as well. Very professional guys.

Why I am posting this here? Because I’d like independent testing (ok, I’ll be honest – I lack a Windows VM to test).

I’ve also tried emailing and phoning D-Link technical support since Australia Day. I’ve been told on three occasions that the Anti Virus software attempting to stop me from installing is “normal” and I should “disable my A/V”. I gave them all the steps needed to replicate the fault, asked what processes/checks they made to ensure that the drivers on the site have not been compromised. D-Link told me that this has been raised with their “Technical Support Manager”. Despite a full business day… no response.

Funny, I would have thought someone reporting that your website might well be owned would be serious and warrant a more thorough investigation.

Oh well, I’ll just put this out in the public eye and see what other people find.

Please note, I am not saying that the drivers on the site have been compromised as I cannot say that for certain.

What I am saying however is two files are reporting as malware with a SIGNIFICANT number of anti virus vendors and bears further investigation. When it has been raised with D-Link they seem highly disinterested in pursuing it further.

If anyone wants to take a further look, please post your findings here as I’d be very interested.

Thanks,

– J.

EDIT:
* Double thanks to Julio Canto & @Uglypackets for actually doing the real digging that I should have done. Julio has confirmed with several  AV vendors that this isn’t malware. I guess its safe to call this a day. All the same the whole situation has certainly raised a lot more questions in my mind about how D-Link manage their security:

  • Why would you not escalate potential security quesitons? 
  • Why would you not answer questions about checking that the hash values on the fileserver repository haven’t changed? 
  • Why would you tell your clients to disable A/V?
  • Why would they not want to work with well known A/V vendors to eliminate false positives on their products?

Anyway, thanks guys. I freely admit reversing is not my forte and as much as I want to get into it (got Eldad Elam’s book in my bedroom right now sadly enough) there is no time for me these days.

* Props to GPLama for his suggestion that I run this through Threatexpert.com. Their analysis can be found here and they confirm both samples as malware as well:

DSL-502T:

Publish Post


http://www.threatexpert.com/report.aspx?md5=36f54bb39f8dc1464f743045eeadd0b6

DSL-504T:
http://www.threatexpert.com/report.aspx?md5=2cb3247fae790f79960bc1780cc39e97

*** This is a Security Bloggers Network syndicated blog from /dev/null - ramblings of an infosec professional authored by Jarrod. Read the original post at: http://jarrodloidl.blogspot.com/2011/01/is-d-linkcomau-serving-up-malware.html