Desktop Mascot Engine

Desktop Mascot Engine

Daleth Jun 27, 2018 @ 3:17am
Care to explain?
I noticed dme.exe making some strange connections:

[06.27 12:05:27] dme.exe *64 - testwebhostforbuy.000webhostapp.com:80 close, 83 bytes sent, 842 bytes received, lifetime 00:05

[redacted info due to the sensitive nature of the links posted]


Thanks, have a great day!~


I'd like anybody reading this post to read all the way to the 6th comment because the developers handled this really well and they did not intend for any wrong doing.
Last edited by Daleth; Jun 27, 2018 @ 5:34am
Originally posted by GamerzDan:
Originally posted by Daleth:
Alrighty thank you very much. I really appreciate you guys being on top of this. I know I was a bit salty in the first post and I do appologize for that. :)

No, thank you instead for reporting this backdoor and opening our eyes that we now need to check/sniff network activity as well along with VirusTotal checks before pushing out new update.

Also, we found the asset causing it. It was RTVoice Pro unity asset. No idea why or from where it was doing it (most probably its .dlls).
Right now I have no idea why its doing it or anything, but we are removing that asset from our project and pushing out a patch fix right now.

RTVoice was the inbuilt TTS (text to speech) synthesizer we were using for that AI Assistant demo (welcome message) when DME starts.

Will disable the AI Assistant welcome message for now and use GCM or Watson's TTS system instead in a new update next week.
-------------------

Again, thank you for reporting this and sorry that something like this happened in the first place. We just hope it did not cause any harm to any of our userbase.

Also, I would like to request you to remove all of the links you listed except for a link/mention to the hostname/domain. Many of those links have personal/private information about someone's PC, most probably from people who got malwared by some other asset or cause.
There is also private login information for someone's FB and Unity account in one of those links/files.

We have just sent an email to that user alerting him about his account(s) and a link to this report for detailed report.

Again, to inform other users, none of our user base should have been affected or harmed by this since the network call being made was to some broken/unavailable script. But for sake of caution, just scan your PC(s) once.

PS: Do not remove this topic now, it should stay now for sake of transparency and clarifications.
< >
Showing 1-13 of 13 comments
GamerzDan  [developer] Jun 27, 2018 @ 4:00am 
That is totally weird and I can assure you its not something we have done, are doing or even anything related to our code.
Can you please let us know the steps you took to get that kind of data or such ?

DME does not use or connect to any web service for any reason. It doesn't even require a internet connection to run (online services are planned for AI Assistant but right now it doesnt make any online connection anywhere).

Is it possible that your system has malware and if you can check in Malwarebytes Antimalware program ?
Just tried sniffing dme.exe for web sockets and connections and 0 results on our end.


PS: We are not douchebags and will obviously be not removing the topic. We will however request you to delete it yourself once the issue has been solved/clarified to your satisfaction.
Last edited by GamerzDan; Jun 27, 2018 @ 5:46am
Daleth Jun 27, 2018 @ 4:53am 
Thanks for the speedy reply!
I uploaded it to virustotal and it has been scanned before making me assume it's not a copy that was modified by potential malware on my computer (I just installed this today btw, I'd like to take a moment and say I truly appreciate this program it's really cool!)
https://www.virustotal.com/en/file/b55b563f1efe9cd64ea470b35c82ac0ad635601e0bc00e1bb46477561ecd365a/analysis/1529660150/
it appears to be clean, I think the one hit in there is a false positive.

I did upload it to a sandbox scanner, but it won't be complete for a few minutes, here is the link for when it is complete:
https://www.hybrid-analysis.com/sample/b55b563f1efe9cd64ea470b35c82ac0ad635601e0bc00e1bb46477561ecd365a/5b3379ef7ca3e1632a2d44f3
Here is some aditional checksum information: https://i.imgur.com/CRgUtUM.png
I also would like to note that I caught this because I use a program called proxifier, it just redirects connections to a proxy and logs their traffic -- not the data transmitted though.

If you need anything else let me know!
GamerzDan  [developer] Jun 27, 2018 @ 5:03am 
Originally posted by Daleth:
Thanks for the speedy reply!
I uploaded it to virustotal and it has been scanned before making me assume it's not a copy that was modified by potential malware on my computer (I just installed this today btw, I'd like to take a moment and say I truly appreciate this program it's really cool!)
https://www.virustotal.com/en/file/b55b563f1efe9cd64ea470b35c82ac0ad635601e0bc00e1bb46477561ecd365a/analysis/1529660150/
it appears to be clean, I think the one hit in there is a false positive.

I did upload it to a sandbox scanner, but it won't be complete for a few minutes, here is the link for when it is complete:
https://www.hybrid-analysis.com/sample/b55b563f1efe9cd64ea470b35c82ac0ad635601e0bc00e1bb46477561ecd365a/5b3379ef7ca3e1632a2d44f3
Here is some aditional checksum information: https://i.imgur.com/CRgUtUM.png
I also would like to note that I caught this because I use a program called proxifier, it just redirects connections to a proxy and logs their traffic -- not the data transmitted though.

If you need anything else let me know!

Yep we always scan all our builds on virtustotal and in-system cleaners before pushing them out. So this is definitely not a malware or something wrong in the build or code, as we searched and proof-checked both for the IPs and hostnames and found none.

Yet we have also confirmed your claims to be true via Windows Process Monitor, the .exe file does seem to be making network calls to that host.
In particular, it is making calls to 2 unknown IPs (ip.addr == 145.14.144.136 || ip.addr== 145.14.144.66), the .136 is that webhost one for which you provided URLs.

We are now deep sniffing the network via Wireshark to isolate where its making the calls from, its definitely not us, so our guess is its one of the Unity Assets/Plugins were using (even more strange if true as that would mean Unity does not QC or test assets before allowing them on their store).

Also, from what we have gathered so far, the calls seems to be harmless and some kind of "ping" requests. They are not sending or receiving any data, and the file they are calling seems to be broken/unavailable.

Will update the post in a couple of minutes.
Daleth Jun 27, 2018 @ 5:09am 
Alrighty thank you very much. I really appreciate you guys being on top of this. I know I was a bit salty in the first post and I do appologize for that. :)
A developer of this app has indicated that this post answers the original topic.
GamerzDan  [developer] Jun 27, 2018 @ 5:31am 
Originally posted by Daleth:
Alrighty thank you very much. I really appreciate you guys being on top of this. I know I was a bit salty in the first post and I do appologize for that. :)

No, thank you instead for reporting this backdoor and opening our eyes that we now need to check/sniff network activity as well along with VirusTotal checks before pushing out new update.

Also, we found the asset causing it. It was RTVoice Pro unity asset. No idea why or from where it was doing it (most probably its .dlls).
Right now I have no idea why its doing it or anything, but we are removing that asset from our project and pushing out a patch fix right now.

RTVoice was the inbuilt TTS (text to speech) synthesizer we were using for that AI Assistant demo (welcome message) when DME starts.

Will disable the AI Assistant welcome message for now and use GCM or Watson's TTS system instead in a new update next week.
-------------------

Again, thank you for reporting this and sorry that something like this happened in the first place. We just hope it did not cause any harm to any of our userbase.

Also, I would like to request you to remove all of the links you listed except for a link/mention to the hostname/domain. Many of those links have personal/private information about someone's PC, most probably from people who got malwared by some other asset or cause.
There is also private login information for someone's FB and Unity account in one of those links/files.

We have just sent an email to that user alerting him about his account(s) and a link to this report for detailed report.

Again, to inform other users, none of our user base should have been affected or harmed by this since the network call being made was to some broken/unavailable script. But for sake of caution, just scan your PC(s) once.

PS: Do not remove this topic now, it should stay now for sake of transparency and clarifications.
Daleth Jun 27, 2018 @ 5:37am 
Hey! I edited my post, is it fine as it is? also you quoted that post in your post, so yeah.

It's totally ok I really appreciate the way you handled this, it shows professionalism and good will.

Maybe make a statement in the next update post about this if there proves to be a virus involved.

Thank you very much!
GamerzDan  [developer] Jun 27, 2018 @ 5:45am 
Originally posted by Daleth:
Hey! I edited my post, is it fine as it is? also you quoted that post in your post, so yeah.

It's totally ok I really appreciate the way you handled this, it shows professionalism and good will.

Maybe make a statement in the next update post about this if there proves to be a virus involved.

Thank you very much!

Yep, have edited my quote as well and have sent a copy of it to our main email as a reference. Have just emailed those other people who were affected by something unrelated to us as well.
Jackalope_908 Jun 27, 2018 @ 5:46am 
And THAT, my friends, is how you demonstrate yourself as a good and responsible software developer, that actually pays attention to the concerns of their customer base.

Well done. ^_^
GamerzDan  [developer] Jun 27, 2018 @ 5:07pm 
Just to update, we are still finishing up the patch update to push it through. It got delayed by a couple a couple of hours due to the Animation Motion Feature we were working on and the new experimental rendering engine (huge performance boost,half the cpu usage).
We were in middle of working on those changes, so currently wrapping up things to prepare the patch build and will include the motion animation feature in it.
koksjusz Feb 7, 2019 @ 9:25am 
Hey, one of our players have reported same address blocked by BitDefender. We don't however use "RTVoice Pro" or any similar Unity Store assets, and after network analysing builds (also using mentioned Windows Process Monitor), we have failed to found any unexpected network traffic.

Can You confirm the issue was with "RTVoice Pro"? Is there a chance your builds back then were done as "development builds" and tried to connect to Unity Profiler?
GamerzDan  [developer] Feb 13, 2019 @ 2:02am 
Originally posted by koksjusz:
Hey, one of our players have reported same address blocked by BitDefender. We don't however use "RTVoice Pro" or any similar Unity Store assets, and after network analysing builds (also using mentioned Windows Process Monitor), we have failed to found any unexpected network traffic.

Can You confirm the issue was with "RTVoice Pro"? Is there a chance your builds back then were done as "development builds" and tried to connect to Unity Profiler?

It was fixed once we removed RTVoice Pro and it was definitely not Profiler or anything related to Unity or legit, as we checked the link and files available on it at that time and they were key loggers and login details of some random users (FB accs, etc,).

So it was surely a plugin causing it (in out case RTVoice Pro).
What I would advice is remove any and all plugins or assets you are using (in a test build or GIT commit) and see if it fixed it, then add them back 1 by 1.

We researched around later on and found this keylogger or injector was a problem common in nulled/cracked/pirated assets.
koksjusz Feb 13, 2019 @ 11:28am 
Originally posted by GamerzDan:
It was fixed once we removed RTVoice Pro and it was definitely not Profiler or anything related to Unity (...) What I would advice is remove any and all plugins or assets you are using (in a test build or GIT commit) and see if it fixed it, then add them back 1 by 1.

The issue is we can't detect any unexpected behaviour (and we're using exact methods You've described), we've failed to replicate the malicious connection on our systems, and as far as we can tell there is no call to the malicious IP/domain.

We don't use any binary assets (Except for Steam.NET) and no part of compiled code from external libraries is related nor allows networking. So either the malware has complex trigger behaviour (be it OS, IP location or some other variable) or it's capable of hijacking other processes - however, both cases seems possible, but not very likely.

On other hand, Unity is using a multicast broadcast to 225.0.0.222 for remote profiling. We believe this connection address can be hijacked, either by DNS spoofing or malicious host file edit, as the local/callback IP ranges are often misconfigured and susceptible to attacks. That would at least explain why we can't replicate the issue.

So in your case, removing the files of the plugin from Assets directory stopped the connections from happening, and in your opinion - the vector was a .unitypackage file?
GamerzDan  [developer] Feb 14, 2019 @ 12:21am 
Originally posted by koksjusz:
Originally posted by GamerzDan:
It was fixed once we removed RTVoice Pro and it was definitely not Profiler or anything related to Unity (...) What I would advice is remove any and all plugins or assets you are using (in a test build or GIT commit) and see if it fixed it, then add them back 1 by 1.

The issue is we can't detect any unexpected behaviour (and we're using exact methods You've described), we've failed to replicate the malicious connection on our systems, and as far as we can tell there is no call to the malicious IP/domain.

We don't use any binary assets (Except for Steam.NET) and no part of compiled code from external libraries is related nor allows networking. So either the malware has complex trigger behaviour (be it OS, IP location or some other variable) or it's capable of hijacking other processes - however, both cases seems possible, but not very likely.

On other hand, Unity is using a multicast broadcast to 225.0.0.222 for remote profiling. We believe this connection address can be hijacked, either by DNS spoofing or malicious host file edit, as the local/callback IP ranges are often misconfigured and susceptible to attacks. That would at least explain why we can't replicate the issue.

So in your case, removing the files of the plugin from Assets directory stopped the connections from happening, and in your opinion - the vector was a .unitypackage file?

Yes, and also to note, in our case the connection was to a hostname/domain/url and not a IP, so it was easier to trace back to that particular asset.
If its a IP in your case and not a specific URL/hostname, then perhaps its something else and/or a botnet on the user's PC and unrelated to Unity.
< >
Showing 1-13 of 13 comments
Per page: 1530 50