Things I have tried
I really like the concept of obsidian, so i tried to download it but i have a habit of scanning everything just to make sure it’s safe. What i found was the obsidian windows .exe itself was clean but it had a spiderbanner.dll file which was flagged by 1 antivirus, so i looked into it more and found it was connecting to multiple external IPs which i think are certificate checks but in Crowdsourced IDS rules i found:
Matches rule ET EXPLOIT Possible CVE-2020-11899 Multicast out-of-bound read from
Emerging Threats Open Rulesets
Attempted Administrator Privilege Gain
View rule View matches
Matches rule SURICATA IPv4 padding required from Suricata Decoder Events
Generic Protocol Command Decode
View rule View matches
Matches rule ET POLICY Reserved Internal IP Traffic from Emerging Threats Open
Rulesets
Potentially Bad Traffic
View rule View matches
Matches rule SURICATA zero length padN option from Suricata Decoder Events
Generic Protocol Command Decode
View rule View matches
Matches rule ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer
Overflow from Emerging Threats Open Rulesets
A Network Trojan was detected
View rule View matches
Matches rule PROTOCOL-ICMP IPv6 multicast neighbor add attempt from snort
Misc activity
View rule View matches
Matches rule DELETED BAD TRAFFIC Non-Standard IP protocol from snort
Detection of a non-standard protocol or event
View rule View matches
Matches rule DELETED BAD-TRAFFIC same SRC/DST from snort
Potentially Bad Traffic
View rule View matches
Matches rule PROTOCOL-DNS SPOOF query response with TTL of 1 min. and no
authority from snort
Potentially Bad Traffic
View rule View matches
Matches rule PROTOCOL-ICMP PING Windows from snort
Misc activity
View rule View matches
Matches rule PROTOCOL-ICMP Unusual PING detected from snort
Information Leak
View rule View matches
Matches rule SERVER-OTHER MRLG fastping echo reply memory corruption attempt
from snort
Misc Attack
View rule View matches
Matches rule PROTOCOL-ICMP Echo Reply from snort
Misc activity
The
Matches rule ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer
Overflow from Emerging Threats Open Rulesets
A Network Trojan was detected
line was making me nervous, i tried looking for what exactly spiderbanner.dll is but i had no luck
What I’m trying to do
I’m trying to find, what exactly spiderbanner.dll is and why is it connecting to external IPs?
What does the
Matches rule ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow from Emerging Threats Open Rulesets
A Network Trojan was detected
mean?
Edit
I was digging for answers and in my research what i found was: it was a NSIS plugin made for installation, and it is used quite a lot.
While it is not clear why it would connect to those IPs being such a small plugin and with no certificates for it to connect and verify stuff even if they are from Microsoft.
I think the Devs of obsidian don’t have to do anything with it, which i am making clear here as it is my responsibility to do so, since it sounds like i am accusing (which i wasn’t) but yea i can see that.
Don’t worry i will find why that dll is connecting to those IPs as i am trying to contact it’s original creator soon.
In the end we all want a better program with privacy.