GETOVERX FORUM Community Support
Per-version report - GetOverX BlackDog Linux 1.0.0.1 - Printable Version

+- GETOVERX FORUM Community Support (https://forum.getoverx.com)
+-- Forum: Testing & Validation Center (https://forum.getoverx.com/forumdisplay.php?fid=29)
+--- Forum: GetOverX Shield Security Lab (https://forum.getoverx.com/forumdisplay.php?fid=30)
+--- Thread: Per-version report - GetOverX BlackDog Linux 1.0.0.1 (/showthread.php?tid=136)



Per-version report - GetOverX BlackDog Linux 1.0.0.1 - mrwebfeeder - 12-10-2025

Tested version: GetOverX BlackDog Linux 1.0.0.1
Package SHA-256 hash: [f0d1323dc901aa346de644ab3bbd5660c9c5de3a5c3cf91f09b9890c293f0ca2]

1. Multi-AV result (VirusTotal)
- Engines: 1.0.0.1
- Result: 0/71]
- Isolated detection(s), if any:
 All passed

2. Behaviour summary in sandbox (MITRE ATT&CK for Linux)
When the BlackDog Linux package was executed in a sandbox/container environment, the following categories were observed:
- Execution: launching of daemon processes and helper binaries.
- Persistence: creation of systemd service units / init scripts to start at boot.
- Defense Evasion: use of protected binaries and root-level components for monitoring (according to the distribution’s security model).
- Discovery: enumeration of system information, running processes and network configuration to build telemetry.

No destructive Linux malware behaviours were observed:
- No unauthorised modification of `/etc` core configuration beyond its own services.
- No mass deletion or encryption of user data.
- No exfiltration of logs or files to unknown remote hosts.

3. Lab tests (summary)
- Installation and removal on fresh Debian/Ubuntu-based virtual machines.
- Verified:
  - Proper registration of systemd services.
  - Network and filesystem monitoring components.
  - Log generation under `/var/log` or the configured logging path.

Conclusion:
The tested BlackDog Linux build behaves as expected for a Linux security agent:
- Multi-AV scanning does not show classic malware signatures; any isolated flags are due to the presence of powerful system and network tools.
- Behavioural analysis shows service setup and monitoring, with no evidence of data exfiltration, unauthorised privilege escalation paths or ransomware-like activity.

Link test:
https://www.virustotal.com/gui/file/f0d1323dc901aa346de644ab3bbd5660c9c5de3a5c3cf91f09b9890c293f0ca2