You do understand that KAV's "new technology" relies on reading the
password in the email message? Otherwise, it takes far too much
computer time to unencrypt the password. So which method do you think
NAV used? Did you Save the zip attackment to a test folder and scan it
on-demand so that NAV didn't have access to the message body? If so,
how long did it take for NAV to actually unencrypt the password and
find the Bagle infested file within?
I'd guess it would use one of the following methods:
1) Scan the .zip itself for sig match (i.e. no extraction)
2) Scan the .zip content for Win32PE header (heuristic)
3) Extract the .zip using pwd from msg, as you suggest
4) Extract the .zip using guessed pwds (i.e. known-to-be-used)
F-Prot now uses method (2) to heuristically detect risky files inside
pwd-protected .zip; requires .zip with no compression. Method (1)
works if the archive is "boilerplate" or always created the same way
using the same engine and parameters of the same content.
New malware variants now defeat (3) by using inline graphic files to
show the password in a way that's less easy to be machine-read, much
as many web sites seek to defeat automated access.
Education on the (new) significance of password-encrypted archives is
the only way to address this, really. It's just one of those cynical
counter-intuitive things, like "never ask a spammer to 'unsubscribe' "
Jeez, greedy humans are making the 'net a kak place :-(
--------------- ----- ---- --- -- - - -
If you're happy and you know it, clunk your chains.