Wikiposts
Search
Computer/Internet Issues & Troubleshooting Anyone with questions about the terribly complex world of computers or the internet should try here. NOT FOR REPORTING ISSUES WITH PPRuNe FORUMS! Please use the subforum "PPRuNe Problems or Queries."

Slow Anti-Virus signatures....

Thread Tools
 
Search this Thread
 
Old 3rd Oct 2014, 11:43
  #1 (permalink)  
Thread Starter
 
Join Date: Aug 2002
Location: Earth
Posts: 3,663
Likes: 0
Received 0 Likes on 0 Posts
Slow Anti-Virus signatures....

The following fairly unscientific test may interest some of you.

Over the last 72 hours I received a number of zero-day viruses fresh from the wild. What has interested me is the state of play in virus signatures being created by the vendors....

Commercial vendors F-Secure and Avira were the quickest in analysing my file and pushing out new definitions .... they did so within 2-3 hours of me submitting the file. The rest of the vendors had updates by the end of the day, except for all the freebie providers Avast, AVG, Malwarebytes etc. who didn't release updates until the afternoon of the next day.

Interestingly enough, for two of my files, little known Vietnamese AV company CMC already had definitions.....

But what's more interesting is the current state of play, I've just re-analysed the original file from the 1st of October .....

The following vendors all have definitions :
AVG,‪Ad-Aware,‪Avast,‪Avira,‪Baidu-International,‪BitDefender,‪CMC,‪ESET-NOD32,‪Emsisoft,‪F-Secure,‪Fortinet,‪GData,‪Ikarus,‪Malwarebytes,‪McAfee,‪Micro World-eScan,‪NANO-Antivirus,‪Norman,‪Panda,‪Qihoo-360,‪Sophos

But the virus still goes undetected in the following :
AVware,‪AegisLab,‪Agnitum,‪AhnLab-V3,‪Antiy-AVL,‪Bkav,‪ByteHero,‪CAT-QuickHeal,‪ClamAV,‪Comodo,‪Cyren,‪DrWeb,‪F-Prot,‪Jiangmin,‪K7AntiVirus,‪K7GW,‪Kaspersky,‪Kingsoft,‪McAf ee-GW-Edition,‪Microsoft,‪Rising,‪SUPERAntiSpyware,‪Symantec,‪Tenc ent,‪TheHacker,‪TotalDefense,‪TrendMicro,‪TrendMicro-HouseCall,‪VBA32,‪VIPRE,‪ViRobot,‪Zillya,‪Zoner


So I guess the old story remains with unsolicited attachments .... caveat emptor. Looks like the virus writers are currently temporarily ahead in the game at the moment....
mixture is offline  
Old 3rd Oct 2014, 13:01
  #2 (permalink)  
 
Join Date: Jan 2008
Location: Timbuktu
Posts: 962
Likes: 0
Received 0 Likes on 0 Posts
Hmm. Interesting. I would have thought Kaspersky with dodgy Russian heritage would be quicker off the mark
What kind of attachments / files are we talking about? Dodgy PDFs? Or something that can be filtered by an email server e.g. .exe or .bin or something?
Booglebox is offline  
Old 3rd Oct 2014, 13:13
  #3 (permalink)  
Thread Starter
 
Join Date: Aug 2002
Location: Earth
Posts: 3,663
Likes: 0
Received 0 Likes on 0 Posts
I would have thought Kaspersky with dodgy Russian heritage would be quicker off the mark
Yes, Kaspersky surprised me too ! Normally they're first off the post, well ahead of anyone else (or a close second to F-Secure who have an excellent Scandinavian team).

What kind of attachments / files are we talking about? Dodgy PDFs? Or something that can be filtered by an email server e.g. .exe or .bin or something?
Compressed files (rar format, which in itself is fairly unusual to see, but looks like a new way to get past people who just scan zip format). Inside the compressed file is an exe. The exe installed a trojan virus that is a keylogger.

I'm guessing the rar must be self-expanding because not many people will have rar extractors installed (unless newer versions of Windows natively support rar ? its been a while since I tried).

One of the files I looked at leaves the following traces of its presence in the registry....

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\ Applets\Wordpad
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\ Applets\Wordpad\IP
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\ Applets\Wordpad\Options
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\ Applets\Wordpad\RTF
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\ Applets\Wordpad\Settings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\ Applets\Wordpad\Text
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\ Applets\Wordpad\Word6
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\ Applets\Wordpad\Write

The background process makes lookups to domain names that start with :
stahltech
jotoocourt
test.quimall
okmax
(I have omitted the domain suffixes)

Last edited by mixture; 3rd Oct 2014 at 13:45.
mixture is offline  
Old 3rd Oct 2014, 16:13
  #4 (permalink)  
Hippopotomonstrosesquipidelian title
 
Join Date: Oct 2006
Location: is everything
Posts: 1,826
Likes: 0
Received 0 Likes on 0 Posts
You're doing copypasta from the sophos.com website and I claim my 5 pounds.
Bushfiva is offline  
Old 3rd Oct 2014, 16:18
  #5 (permalink)  
Thread Starter
 
Join Date: Aug 2002
Location: Earth
Posts: 3,663
Likes: 0
Received 0 Likes on 0 Posts
You're doing copypasta from the sophos.com website and I claim my 5 pounds.
Actually no. The copy/paste of the reg/domain values was from a malware analysis system I uploaded the malware to and which is run by a company that has doodly squat to do with Sophos.

As I said, before I reported it to Sophos & others, their software did not detect the malware.

So there. I'll have 5 squid please.
mixture is offline  

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are Off
Pingbacks are Off
Refbacks are Off



Contact Us - Archive - Advertising - Cookie Policy - Privacy Statement - Terms of Service

Copyright © 2024 MH Sub I, LLC dba Internet Brands. All rights reserved. Use of this site indicates your consent to the Terms of Use.