Article 5KKP6 Downloaded Linux iso distro file with vulnerabilities

Downloaded Linux iso distro file with vulnerabilities

by
hexaferrum
from LinuxQuestions.org on (#5KKP6)
Hello world!
Weeks ago, I downloaded the newest version of Kali Linux distribution https://cdimage.kali.org/kali-2021.2...ller-amd64.iso to a cloud directory in the Windows 10 operating system. Burned the iso image into a DVD and later installed the distribution within the hypervisor for a virtual machine.

When I was done with the installation, I deleted the iso file from the cloud storage, which was difficult to delete from the graphic interface window. Then, I used the command line, navigated up to the target directory, and delete the whole directory.

After that, I reviewed the recycle bin to see that it was empty.
Randomly days later, I ran a vulnerability scanner within Windows, Microsoft Defender. Selected to run the full scan option.

The program found malware on the PC. The strange thing was that the file was not easily visible. It was in a hidden directory called $Recycle.bin.
I used the windows safe mode booting and the command line to delete the file.
I skipped a part, and you might ask why he used safe mode booting and command line to delete the file?

Microsoft Defender was unable to remove the malware detected, even with command-line execution with administrative privileges.

After deleting the file in safe mode and returning to the normal Windows booting, I reran a full system scan with Microsoft Defender. No threats found! Success!

Concerned that I could not deobfuscate the detected threats, I verified that other antivirus and malware scanners check the system before the file deletion. The other antivirus did not detect the reported threat by Windows Defender.

The following are modified snapshots of the malware detected.
Quote:
-------------------------------------------------------------------------
TrojanDropper:PowerShell/Cobacis.B

containerfile: C:\Users\OneDrive - Bellevue University\Documents\KaliLinux\kali-linux-2021.2-installer-amd64.iso

file: C:\Users\OneDrive\Documents\KaliLinux\kali-linux-2021.2-installer-amd64.iso->pool\main\m\metasploit-framework\metasploit-framework_6.0.45-0kali1_amd64.deb->data.tar.xz->(xz)->./usr/share/metasploit-framework/vendor/bundle/ruby/2.7.0/gems/rex-powershell-0.1.90/data/templates/to_mem_rc4.ps1.template
--------------------------------------------------------------------------
Quote:
-------------------------------------------------------------------------
Exploit:HTML/IFrameBO.gen

containerfile: C:\$Recycle.Bin\$R3438UV.iso

file: C:\$Recycle.Bin\$R3438UV.iso->pool\main\e\exploitdb\exploitdb_20210206-0kali1_all.deb->data.tar.xz->(xz)->./usr/share/exploitdb/exploits/windows/remote/612.html->(IframeBO)
--------------------------------------------------------------------------
Quote:
--------------------------------------------------------------------------
Exploit:SWF/CVE-2015-5122

containerfile: C:\$Recycle.Bin\$R3438UV.iso

file: C:\$Recycle.Bin\$R3438UV.iso->pool\main\m\metasploit-framework\metasploit-framework_6.0.30-0kali1_amd64.deb->data.tar.xz->(xz)->./usr/share/metasploit-framework/data/exploits/CVE-2015-5122/msf.swf
--------------------------------------------------------------------------
Quote:
--------------------------------------------------------------------------
Exploit:Win32/CVE-2010-0822

containerfile: C:\$Recycle.Bin\$R3438UV.iso

file: C:\$Recycle.Bin\$R3438UV.iso->pool\main\m\metasploit-framework\metasploit-framework_6.0.30-0kali1_amd64.deb->data.tar.xz->(xz)->./usr/share/metasploit-framework/data/exploits/CVE-2010-0822.xls
--------------------------------------------------------------------------
Quote:
--------------------------------------------------------------------------
Exploit:Java/CVE-2012-1723

containerfile: C:\$Recycle.Bin\$R3438UV.iso

file: C:\$Recycle.Bin\$R3438UV.iso->pool\main\m\metasploit-framework\metasploit-framework_6.0.30-0kali1_amd64.deb->data.tar.xz->(xz)->./usr/share/metasploit-framework/data/exploits/CVE-2008-5353.jar->msf/x/PayloadX.class

file: C:\$Recycle.Bin\$R3438UV.iso->pool\main\m\metasploit-framework\metasploit-framework_6.0.30-0kali1_amd64.deb->data.tar.xz->(xz)->./usr/share/metasploit-framework/data/exploits/CVE-2012-1723.jar->cve1723/Attacker.class

file: C:\$Recycle.Bin\$R3438UV.iso->pool\main\m\metasploit-framework\metasploit-framework_6.0.30-0kali1_amd64.deb->data.tar.xz->(xz)->./usr/share/metasploit-framework/data/exploits/CVE-2012-1723.jar->cve1723/Confuser.class

file: C:\$Recycle.Bin\$R3438UV.iso->pool\main\m\metasploit-framework\metasploit-framework_6.0.30-0kali1_amd64.deb->data.tar.xz->(xz)->./usr/share/metasploit-framework/data/exploits/CVE-2012-1723.jar->cve1723/ConfusingClassLoader.class
--------------------------------------------------------------------------
  1. Do you know why the distribution produces the malware results?
  2. Should I be concerned about the system security state after the actions performed?
  3. Have you come across the same issue?
  4. What is your takeaway from this post?
  5. Can you recommend something else?
Posted the questions and content in anyways that refer to an unlisted distribution within the Linux distro forum list. I am okay with that. Is not a complaint.

For your answers, comments, feedback, I appreciate you.

Thanks,

latest?d=yIl2AUoC8zA latest?i=K58LAze3TY0:BtYW66P_v1s:F7zBnMy latest?i=K58LAze3TY0:BtYW66P_v1s:V_sGLiP latest?d=qj6IDK7rITs latest?i=K58LAze3TY0:BtYW66P_v1s:gIN9vFwK58LAze3TY0
External Content
Source RSS or Atom Feed
Feed Location https://feeds.feedburner.com/linuxquestions/latest
Feed Title LinuxQuestions.org
Feed Link https://www.linuxquestions.org/questions/
Reply 0 comments