Skip to content

VirusTotal flags android-mic_2.1.8_x64-setup.exe as malicious (6 detections)Β #88

@Anjaneekumar

Description

@Anjaneekumar

🐞 VirusTotal flags android-mic_2.1.8_x64-setup.exe as malicious (6 detections)

Hi there πŸ‘‹ β€” thank you for this amazing project! I noticed some antivirus detections on the latest Windows installer and wanted to report them respectfully in case it helps others assess the file's safety.


πŸ§ͺ VirusTotal Summary

  • File name: android-mic_2.1.8_x64-setup.exe
  • Scan URL: VirusTotal Link
  • Detections: 6 / 72 vendors flagged the file
  • Sample detections:
    • Backdoor.Convagent – VBA32
    • Win64.Trojan.Agent.C6QPJK – GData
    • Win32.Outbreak – Ikarus
    • Others reported as grayware or suspicious confidence-based flags

Most major engines (Microsoft, Bitdefender, Kaspersky) marked it as clean β€” this may be a false positive, but I wanted to confirm with you.


🧩 File Metadata

Field Value
SHA-256 ff12e9b2fc33f2af598add59405fe83e7696284da64013ddf99f701a6d88d419
MD5 4a0d6e2c5c57f4c1ceeec852cc315398
File Size 8.26 MB
Build Time 2023-07-02 02:09:43 UTC
File Type Win32 EXE (Nullsoft Installer)
Digital Signature ❌ Not signed

🧠 Behavior Analysis (Yomi, CAPE, etc.)

  • Detected anti-analysis activity (detect-debug-environment, checks-user-input)
  • Drops multiple .dll files (UserInfo.dll, nsis_tauri_utils.dll) to %TEMP% folder β€” common in NSIS but may raise AV heuristics
  • Creates registry entries under HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\AndroidMic
  • DNS lookups to Microsoft/Office domains (e.g., mira-tmc.tm-4.office.com) β€” likely system background activity
  • Flags associated with MITRE ATT&CK techniques for Execution, Defense Evasion, Persistence and Credential Access (though may be broad categorization)

🌐 Relations Summary

Contacted Domains

Domain Detections Notes
mira-tmc.tm-4.office.com 0/94 Microsoft Teams
svc.ha-teams.office.com 0/94 Microsoft
www.microsoft.com 0/94 Standard telemetry

Bundled/Dropped Files

File Type Detections
android-mic.exe Main binary 2/72
uninstall.exe Uninstaller 4/72
nsis_tauri_utils.dll NSIS plugin 2/72
UserInfo.dll, StartMenu.dll Installer UI 1–2/72

πŸ™ Request for Clarification

Would it be possible to:

  1. Confirm whether these detections are false positives?
  2. Provide a signed version of the installer (if feasible)?
  3. Offer SHA256 hashes alongside future releases to aid verification?

Thanks again for your great work β€” this tool has so much potential, and I'd love to help others trust it even more. Let me know if I can contribute further!

See attached image for reference.

Image

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions