Giter Site home page Giter Site logo

edd13mora / backdoredhdmimaybe Goto Github PK

View Code? Open in Web Editor NEW
7.0 1.0 0.0 7.37 MB

An in-depth analysis of a suspicious HDMI adapter, exploring its potential as either a backdoored device or a poorly coded gadget. A cautionary tale for hardware security enthusiasts.

backdoredhdmimaybe's Introduction

Alternate Text

Is this a BackD00red HDMI?

An investigative dive into a perplexing HDMI adapter that raises more questions than it answers. Through hands-on analysis, online research, and digital forensics, this article examines the odd behavior of an HDMI-to-USB adapter that might be more than meets the eye. Whether it's a backdoor or simply bad coding, the journey uncovers multiple red flags that warrant attention. A must-read for anyone interested in hardware security.

The beginning

So there I was, sitting in the office, when a teammate came up to me. She told me she'd bought a new HDMI adapter, but something was off. Rather than functioning like a typical HDMI, it was detected as a USB storage device and prompted her to install some sort of .exe file for a driver.

What piqued my interest was the price. She bought this adapter from Amazon for just $16. Usually, that's the cost of a good, reliable piece of hardware—not the cheap ones that don't even work! Intrigued, I asked if I could borrow it to investigate further. While I'm not a malware analysis specialist, I am a hacker at heart, and I couldn't resist the urge to delve deeper into this mystery.

To start, I did a bit of research to see if anyone else had encountered HDMI adapters that behaved like USB drives. There weren't many results, but one article caught my eye. Did I just infect my Win-10 computer with malware? - virus infection cybersecurity | Ask MetaFilter

It talked about the possibility of the HDMI being backdoored, and the kicker? It was the exact same HDMI adapter we had. I also compared the product reviews, and they were consistent with what the article mentioned.

Next, I plugged the HDMI into my Windows testing machine, and—nothing. No detection, no functionality; it was as if the piece was broken. But then, I had an idea. Maybe the adapter needed a more 'common' setup to show its true colors. So, I grabbed another computer and plugged in the HDMI. Voila! It was detected as a USB drive.

Alternate Text

The content of the drive had files for multiple operating systems: Windows, Mac, and Android. Additionally, there were two PDF readme files—one in English and another in Chinese. That last bit was particularly intriguing.

Alternate Text

Why include a Chinese-language readme? Was this device provided by a Chinese company? Time to do some OSINT. My first clue was the sticker on the device's packaging. It had details about the vendor:

Alternate Text

Company Name: Zhou's Jade Star UG Address: Brunnenallee 11A, 14478 Potsdam, Germany Phone: +49 179 7962788 Email: [email protected]

The first oddity that stood out was the unprofessional email address. A Gmail account for a business? That doesn't exactly scream 'reliable company,' does it? You'd think any reputable business would invest in a more professional email domain to uphold its image.

As for the address, it's listed as Potsdam, Germany—not China. However, this could merely be the distributor's address rather than that of the actual manufacturer. Upon searching for Zhou's Jade Star UG, I found that they had multiple products listed across various platforms, including eBay and Amazon.

Alternate Text

At this point, I found myself at a crossroads: who really produced this device? To get to the bottom of this, I turned my attention to the mysterious .exe file that was part of the HDMI's 'features.' Oh, and another thing—I noticed that when the HDMI was plugged in, my computer's sound output was hijacked. Even though my headphones were set as the default audio device, the HDMI took precedence.

After observing the unusual behavior of this HDMI adapter, I felt it was crucial to dig deeper into the included .exe file named "ms display multidev v1.0.0.18.0." First, I opened the readme file, and to my astonishment, it explicitly instructed users to disable or uninstall antivirus software. That's quite a red flag, isn't it?

Alternate Text

Curious, I Googled the .exe file's name, and what I found was even more intriguing. Not only does the program have a GitHub repository, but it also drew suspicions on Reddit, where someone questioned whether it was a form of malware.

Alternate Text

This Reddit user had even gone the extra mile, scanning the file on two platforms: VirusTotal and Hybrid-Analysis.

Alternate Text

The results were inconsistent. While VirusTotal reported the file as clean, Hybrid-Analysis flagged it as malicious.

Alternate Text Alternate Text

Returning to the GitHub repository, I noticed that all the descriptions were in Chinese. Stranger still was the "Issues" section, populated with unanswered questions about the suspicious nature of this .exe file. Most perplexingly, the repository hosted the executable without any source code. Numerous issues were open, querying the legitimacy of this software, yet none had been addressed to this day.

Alternate Text Alternate Text Alternate Text

Motivated to uncover more, I decided to rescan the questionable .exe file on VirusTotal. This time, two antivirus vendors flagged it. While false positives are a possibility, especially from lesser-known vendors, what was more concerning were the relations tab results. The file had contacted several flagged IP addresses, and its "Execution Parents" field raised further red flags. One such IP, 13.107.4.50, had significant associations with various types of malware.

Alternate Text Alternate Text

I also ran a scan of the .exe file using the AnyRun project, and the findings were unsettling. The installation process revealed the publisher's name as "Ultrasemi Technology Development," which had no apparent connection with the German company we stumbled upon earlier.

Alternate Text Moreover, the software attempted to load an unsigned driver a significant security concern.

Alternate Text

AnyRun rated the software as malicious, highlighting its use of numerous unknown DLL files. All of this for an HDMI device? Seems unlikely.

Alternate Text

My next step was to look into this new player, Ultrasemi Technology Development. A Google search led me to their website.

Alternate Text Alternate Text

The site was in Chinese, which made sense of the Chinese readme file. Their GitHub repository was distinct from the one where the suspicious .exe file was uploaded and appeared abandoned.

Alternate Text

The products they were selling primarily revolved around drive hardware. Intriguingly. Alternate Text they also had a section dedicated to USB displays, showing how to install a program named "USMDisplay_windows.exe"—a different name than our initial "MSDisplay_MultiDev_v1.0.0.18.0.exe." Could it be a new version? That's yet to be determined Alternate Text

Conclusion

While I can't definitively say whether this peculiar HDMI device is connected to malicious actors, its behavior is anything but ordinary. The journey through this labyrinth of oddities leaves us with two likely scenarios: either we're dealing with a backdoored device or the handiwork of inept developers who have resorted to unconventional coding to make a subpar gadget compatible with modern operating systems. In either case, my advice is simple: steer clear of such hardware.

backdoredhdmimaybe's People

Contributors

edd13mora avatar

Stargazers

HackerJackec0p4t7  avatar Héctor avatar Chase avatar b3ng0x avatar Omar El Houmadi avatar  avatar Jakom avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.