Full Disclosure mailing list archives

Re: POS#1 Self-Executing HTML: Internet Explorer 5.5 and 6.0


From: Valdis.Kletnieks () vt edu
Date: Tue, 11 Nov 2003 10:11:40 -0500

On Tue, 11 Nov 2003 11:05:08 +0100, Feher Tamas <etomcat () freemail hu>  said:
Fully self-contained harmless *.exe:
CAUTION: back up notepad.exe before opening
http://www.malware.com/self-exec.zip 

Kaspersky Antivirus says:
TrojanDropper.VBS.Inor.i

I wouldn't call this malware harmless. Please remove it!

This all depends on exactly how Kaspersky detected the self-exec.

If it's triggering off the attack vector, then anything that uses the
same attack vector will false-positive as that malware.

(And yes, I know all the standard "but the detection engine is more
sophisticated yadda yadda yadda".  Think about the issue of detecting
a polymorphic virus while guaranteeing that you *don't* false-positive
on other things that happen to have similar code in them - particularly
if the attack vector is the defining feature of the malware......)

It's fairly reasonable for Kaspersky to say "anything with this sequence
of bits is almost certainly up to no good, and it's probably FooBlonker".
The only time this goes astray is if a researcher publishes a POC where
the "no good" is limited to a "Hi there" pop-up or similar non-damaging
payload....

Attachment: _bin
Description:


Current thread: