New virus but Nod don't find it.

Discussion in 'NOD32 version 2 Forum' started by guilijan, Jul 6, 2006.

Thread Status:
Not open for further replies.
  1. guilijan

    guilijan Registered Member

    Joined:
    Jun 25, 2006
    Posts:
    206
    Point to Kaspersky then.-
     
    Last edited by a moderator: Jul 8, 2006
  2. Marcos

    Marcos Eset Staff Account

    Joined:
    Nov 22, 2002
    Posts:
    14,456
    At any rate, detecting these xored files may give a false impression that NOD32 missed them though it's not true.
     
  3. Stefan Kurtzhals

    Stefan Kurtzhals AV Expert

    Joined:
    Sep 30, 2003
    Posts:
    702
    BTW, decryption of such XORed PE-EXE files will be added to AntiVir's engine aswell, as there was quite a few malware recently that uses this (droppers).

    Bitdefender also decrypts them on-the-fly.

    As for detecting such samples, all antivirus programs are reporting malware in archives such as ZIPs aswell. So it's merely malware in a container, nothing new.
     
  4. NOD32 user

    NOD32 user Registered Member

    Joined:
    Jan 23, 2005
    Posts:
    1,766
    Location:
    Australia
    - in this case the benign encrypted storage of malware some choose to add detection for, but isn't the real threat still only the software that decrypts and causes it to execute, not the un-executable lump of data that does nothing on it's own?

    Protecting against real threats is a good thing, but is there an application that let's XORed files be accessed directly like we all can do with an archive?

    What I'm wondering is, are all files having the resultant of XOR tested or just a select few?
     
    Last edited: Jul 9, 2006
  5. FirePost

    FirePost Registered Member

    Joined:
    Jul 29, 2005
    Posts:
    213
    It would seem a simple matter to change to a better encryption method. That prevents detection for already found viruses and would remove the chance of malware doing the same. Yes. I realize unpacked quarantine files would be redetected and placed back, but that is a vicious cycle of unpack -> quarantine ->unpack.
    No confusion to the user when another AV comes along and refinds the virus.
     
  6. Defenestration

    Defenestration Registered Member

    Joined:
    Jul 17, 2004
    Posts:
    1,108
    This is most definitely not a FP, as Schouw has said. Just as AV's will detect malware within a ZIP archive, they also detect malware packed by other means. Some AV's, like KAV, just have more comprehensive unpacking abilities.

    The fact that the file cannot be run/executed is irrelevant with regards to the on-demand scanner. It's the real-time scanner than needs to concern itself with whether a file can be run/executed.

    Most AV's have an option to disable unpacking of files during a scan.
     
  7. NOD32 user

    NOD32 user Registered Member

    Joined:
    Jan 23, 2005
    Posts:
    1,766
    Location:
    Australia
    Sure.
    I've got no problem with AV's notifying of a containers contents (taken on board further information to that which I originally had available) - even though IMPO for NOD32 Quarantine files (or any AV quarantine files so long as they are stored benignly) there is no useful purpose served for the end user to have them identified as a potential threat. If checking for an XOR-ed result of an NFI* file, why not prepend or append the threat name with 'Probably NOD32 Quarantine File' - it would sure reduce the confusion that is caused by other products reporting them...just a thought.

    Kind of reminds me of the customer who had his PC infected with 'cookies'....


    *sorry - NQF
     
    Last edited: Jul 10, 2006
  8. SSK

    SSK Registered Member

    Joined:
    Nov 28, 2004
    Posts:
    976
    Location:
    Amsterdam
    Lets turn it around and simply say that ESET could use another way of encrypting their quarantined files, instead of expecting other AV's to use potentially dangerous exclusion methods of the quarantine store... :D
     
  9. NOD32 user

    NOD32 user Registered Member

    Joined:
    Jan 23, 2005
    Posts:
    1,766
    Location:
    Australia
    It's been the NQF way for a long time now - any method of storing could be decrypted.

    Who expects other AV's to us a potentially dangerous exclusion method?

    Cheers :)
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.