text
stringlengths
0
1.99k
It's actually
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
followed by up to 60 bytes of restricted white-space characters. The allowed
white-space characters are
Space
Ctrl-Z
Tab
CR
LF
So?
What if...
Space = 0b, Ctrl-Z = 1b, 60 bits per file, 7.5 bytes
EICAR is now a steganography vehicle
Maybe a bit fancier
Space %*1*00000
Ctrl-Z %0*1*1010
Tab %00*1*000
CR %001*1*01
LF %0010*1*0
All five characters have one bit in a unique position Four bits in a
nibble, decoder becomes simpler
60 bits is not enough?
Space = 0b
Ctrl-Z = 1b
Tab = 10b
CR = 11b
120 bits per file, 15 bytes
But wait!
There's more!
Any subset of the five characters can represent the zero bit The rest can
represent the one bit
EICAR as *OLIGOMORPHIC* steganography vehicle!
"hello world" (*)
0D200A080D080A1A081A0A1A1A0A080D201A0D0808201A1A201A1A202020200A
1A20200D201A1A2020080D1A08081A200A0A080D1A0A0D
SHA256
6a154634b1be7df212863e486b2b1d0cb842e72c3baef941b1054e50fc08b993
(*) 5-bit text-encoding, one special character; tab/cr/lf=0, space/ctrl-z=1
Or "hello world"
08200A0D0A0D081A08200A1A1A0A0A0A20200D0D08201A1A201A201A201A2008
1A1A1A0D2020201A20080820080A1A20080A0A0D20080D
SHA256
f982fa69f04053060d82aece78df2dbf10b2fcf86e842ffe44fbc287f4f4b92c
Or "hello world"
0A200D0A0A0D0D1A0A1A0A1A1A080D0D20200A0D0D1A201A1A1A1A20201A1A0D
202020081A1A201A1A0D08200D0D1A1A0D080A081A0D08
SHA256
09258537fe9ea0105831873c4fbe8d000e54491fdfe446d7d353544c7b4cf334
The encoder
s=[" ","\x1a"," "]
c=["\t","\r","\n"]
t=""
for(x=0;x<text.length;x++) {
q=text.charCodeAt(x,1)&31
if(!q)q=31
for(b=32;b>>=1;)
t+=((q&b)?s:c)[Math.floor(Math.random()*3)]
}
return t
Multiple EICAR files mean more data File naming can define data ordering
1) Create the files on disk
2) Trigger a scan
3) Detections will include the unique file hash
The *anti-malware engine* will leak the data The files never have to leave
the disk
Noisy? Yes
But it only has to work once