![]() |
|
Per-version report - GetOverX BlackDog Linux 1.0.0.1 - Printable Version +- GETOVERX FORUM Community Support (https://forum.getoverx.com) +-- Forum: Testing & Validation Center (https://forum.getoverx.com/forumdisplay.php?fid=29) +--- Forum: GetOverX Shield Security Lab (https://forum.getoverx.com/forumdisplay.php?fid=30) +--- Thread: Per-version report - GetOverX BlackDog Linux 1.0.0.1 (/showthread.php?tid=136) |
Per-version report - GetOverX BlackDog Linux 1.0.0.1 - mrwebfeeder - 12-10-2025 Tested version: GetOverX BlackDog Linux 1.0.0.1 Package SHA-256 hash: [f0d1323dc901aa346de644ab3bbd5660c9c5de3a5c3cf91f09b9890c293f0ca2] 1. Multi-AV result (VirusTotal) - Engines: 1.0.0.1 - Result: 0/71] - Isolated detection(s), if any: All passed 2. Behaviour summary in sandbox (MITRE ATT&CK for Linux) When the BlackDog Linux package was executed in a sandbox/container environment, the following categories were observed: - Execution: launching of daemon processes and helper binaries. - Persistence: creation of systemd service units / init scripts to start at boot. - Defense Evasion: use of protected binaries and root-level components for monitoring (according to the distribution’s security model). - Discovery: enumeration of system information, running processes and network configuration to build telemetry. No destructive Linux malware behaviours were observed: - No unauthorised modification of `/etc` core configuration beyond its own services. - No mass deletion or encryption of user data. - No exfiltration of logs or files to unknown remote hosts. 3. Lab tests (summary) - Installation and removal on fresh Debian/Ubuntu-based virtual machines. - Verified: - Proper registration of systemd services. - Network and filesystem monitoring components. - Log generation under `/var/log` or the configured logging path. Conclusion: The tested BlackDog Linux build behaves as expected for a Linux security agent: - Multi-AV scanning does not show classic malware signatures; any isolated flags are due to the presence of powerful system and network tools. - Behavioural analysis shows service setup and monitoring, with no evidence of data exfiltration, unauthorised privilege escalation paths or ransomware-like activity. Link test: https://www.virustotal.com/gui/file/f0d1323dc901aa346de644ab3bbd5660c9c5de3a5c3cf91f09b9890c293f0ca2 |