We encourage you to read the full report, but below you can find some of the main findings:
- Ten percent of the top 1,000 Alexa domains have distributed suspicious samples.
- 0.1 percent of legitimate hosts for popular apps have distributed malware.
- 87% of the more than one million signed malicious samples uploaded to VirusTotal since January 2021 have a valid signature.
- In a growing social engineering trend, 4,000 samples either executed or were packed with legitimate apps installers.
- There has been a steady increase in the number of malware visually mimicking legitimate applications, with Skype, Adobe Acrobat, and VLC comprising the top three.
- 98% of samples, including legitimate installers in their PE resources, were malicious.
To help stop cyberattacks that rely on the malware that VirusTotal can track, we provide below the technical details that support our conclusions presented in the report.
Abusing legitimate domains to distribute malware
Execution Parents
Compressed Parents

Malware visually disguised as legitimate software
Exploiting valid certificates
Conclusions
Happy hunting!
Appendix I
Example on how to use VirusTotal’s API to find suspicious execution parents of software distributed through a legitimate domain:
import requests
import json
import urllib
headers = {
“Accept”: “application/json”,
“x-apikey”: ” # VT API key
}
def get_execution_parent(file_hash):
“””Returns file parents with more than 5 detections in VT.
Args:
file_hash: str, file to check.
“””
url = f’https://www.virustotal.com/api/v3/files/{file_hash}/execution_parents’
while url:
response = requests.get(url, headers=headers)
response.raise_for_status()
data = response.json()
for item in data[‘data’]:
try:
positives = item[‘attributes’][‘last_analysis_stats’][‘malicious’]
if int(positives) > 5:
print(f'{item[“attributes”][“sha256”]} – {positives}’)
Except KeyError:
continue
if ‘links’ in data and ‘next’ in data[‘links’]:
url = data[‘links’][‘next’]
else:
url = None
def get_files_with_execution_parent(target_domain):
“””files found itw in a given domain having execution parent.
Args:
target_domain: str, domain to check
“””
url = ‘https://www.virustotal.com/api/v3/intelligence/search’
while url:
response = requests.get(url, headers=headers, params={‘query’: f’entity: file have: execution_parents itw: {target_domain}’})
response.raise_for_status()
data = response.json()
for item in data[‘data’]:
get_execution_parent(item[‘attributes’][‘sha256’])
if ‘links’ in data and ‘next’ in data[‘links’]:
url = data[‘links’][‘next’]
else:
url = None
target_domain = ‘target.legit-domain.com’
print(f’Checking suspicious execution parents for files downloaded from:{target_domain}’)
print(f’ [sha256] – [AV positives]’)
get_files_with_execution_parent(target_domain)
Source: https://blog.virustotal.com/2022/08/deception-at-scale.html