lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: Valdis.Kletnieks at (
Subject: POS#1 Self-Executing HTML: Internet Explorer 5.5 and 6.0 

On Tue, 11 Nov 2003 11:05:08 +0100, Feher Tamas <>  said:
> >Fully self-contained harmless *.exe:
> >CAUTION: back up notepad.exe before opening
> > 
> Kaspersky Antivirus says:
> TrojanDropper.VBS.Inor.i
> I wouldn't call this malware harmless. Please remove it!

This all depends on exactly how Kaspersky detected the self-exec.

If it's triggering off the attack vector, then anything that uses the
same attack vector will false-positive as that malware.

(And yes, I know all the standard "but the detection engine is more
sophisticated yadda yadda yadda".  Think about the issue of detecting
a polymorphic virus while guaranteeing that you *don't* false-positive
on other things that happen to have similar code in them - particularly
if the attack vector is the defining feature of the malware......)

It's fairly reasonable for Kaspersky to say "anything with this sequence
of bits is almost certainly up to no good, and it's probably FooBlonker".
The only time this goes astray is if a researcher publishes a POC where
the "no good" is limited to a "Hi there" pop-up or similar non-damaging
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 226 bytes
Desc: not available
Url :

Powered by blists - more mailing lists