V
Virus Guy
The file in question was located here:
http://www.media-codec.com /v4 /mediacodec-v4.143.exe
It is still available at that location.
The file is 71,456 bytes, and is UPX packed. It has a digital
signature of "KAS NET" according to the file properties.
When unpacked with UPX: http://upx.sourceforge.net, the resulting file
is 83,232 bytes and has no digital signature attribute. Previous
scanning by Jotti had indicated that this file was packed with
PE_PATCH and UPACK.
In any case, I submitted both the original file (71kb) and the
UPX-unpacked version (83kb) to the now-working Virus Total website.
The following AV software found nothing in both files:
Avast, AVG, Cat, Clam, DrWeb, E-trust Inoculate, E-trust-vet, Ewido
F-prot, McAfee, Norman, Sophos, Symantec, TheHacker, UNA
The following detected something ONLY in the original (packed) file:
AntiVir: TR/Dldr.Zlob.HQ.1
Avira: TR/Dldr.Zlob.HQ.1
BitDefender: Trojan.Downloader.Zlob.HQ
Ikarus: Trojan.Favadd
Panda: Suspicious file
The following detected the same thing in BOTH files:
Fortinet: W32/Zlob.LJ!dldr
Kaspersky: Trojan-Downloader.Win32.Zlob.lj
NOD32v2: Win32/TrojanDownloader.Zlob.LD
VBA32: Trojan-Downloader.Win32.Zlob.lj
Note that there is no over-lap between the above 2 groups in the
name/identifier used, but there is considerable similarity within the
groups. For example AntiVir, Avira and BitDefender use the term
"Zlob.HQ", while Fortinet, Kaspersky, and VBA32 use "Zlob.LJ".
Conclusions:
1) Many hi-profile AV software is not detecting any threat in these
files. Either they are deficient, or the files are clean and
this is a false alarm.
2) The AV software that signaled a positive detection only in the
first (packed) file but not the unpacked file must not have
the ability to unpack PE_Patch and /or UPACK'd files, and the
only thing that can account for their positive detection of the
first file is that they are relying on MD5 (or equivalent) hash.
http://www.media-codec.com /v4 /mediacodec-v4.143.exe
It is still available at that location.
The file is 71,456 bytes, and is UPX packed. It has a digital
signature of "KAS NET" according to the file properties.
When unpacked with UPX: http://upx.sourceforge.net, the resulting file
is 83,232 bytes and has no digital signature attribute. Previous
scanning by Jotti had indicated that this file was packed with
PE_PATCH and UPACK.
In any case, I submitted both the original file (71kb) and the
UPX-unpacked version (83kb) to the now-working Virus Total website.
The following AV software found nothing in both files:
Avast, AVG, Cat, Clam, DrWeb, E-trust Inoculate, E-trust-vet, Ewido
F-prot, McAfee, Norman, Sophos, Symantec, TheHacker, UNA
The following detected something ONLY in the original (packed) file:
AntiVir: TR/Dldr.Zlob.HQ.1
Avira: TR/Dldr.Zlob.HQ.1
BitDefender: Trojan.Downloader.Zlob.HQ
Ikarus: Trojan.Favadd
Panda: Suspicious file
The following detected the same thing in BOTH files:
Fortinet: W32/Zlob.LJ!dldr
Kaspersky: Trojan-Downloader.Win32.Zlob.lj
NOD32v2: Win32/TrojanDownloader.Zlob.LD
VBA32: Trojan-Downloader.Win32.Zlob.lj
Note that there is no over-lap between the above 2 groups in the
name/identifier used, but there is considerable similarity within the
groups. For example AntiVir, Avira and BitDefender use the term
"Zlob.HQ", while Fortinet, Kaspersky, and VBA32 use "Zlob.LJ".
Conclusions:
1) Many hi-profile AV software is not detecting any threat in these
files. Either they are deficient, or the files are clean and
this is a false alarm.
2) The AV software that signaled a positive detection only in the
first (packed) file but not the unpacked file must not have
the ability to unpack PE_Patch and /or UPACK'd files, and the
only thing that can account for their positive detection of the
first file is that they are relying on MD5 (or equivalent) hash.