[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: Valdis.Kletnieks at vt.edu (Valdis.Kletnieks@...edu)
Subject: POS#1 Self-Executing HTML: Internet Explorer 5.5 and 6.0
On Tue, 11 Nov 2003 11:05:08 +0100, Feher Tamas <etomcat@...email.hu> said:
> >Fully self-contained harmless *.exe:
> >CAUTION: back up notepad.exe before opening
> >http://www.malware.com/self-exec.zip
>
> Kaspersky Antivirus says:
> TrojanDropper.VBS.Inor.i
>
> I wouldn't call this malware harmless. Please remove it!
This all depends on exactly how Kaspersky detected the self-exec.
If it's triggering off the attack vector, then anything that uses the
same attack vector will false-positive as that malware.
(And yes, I know all the standard "but the detection engine is more
sophisticated yadda yadda yadda". Think about the issue of detecting
a polymorphic virus while guaranteeing that you *don't* false-positive
on other things that happen to have similar code in them - particularly
if the attack vector is the defining feature of the malware......)
It's fairly reasonable for Kaspersky to say "anything with this sequence
of bits is almost certainly up to no good, and it's probably FooBlonker".
The only time this goes astray is if a researcher publishes a POC where
the "no good" is limited to a "Hi there" pop-up or similar non-damaging
payload....
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 226 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20031111/a2665e25/attachment.bin
Powered by blists - more mailing lists