R
Roger Wilco
attack/penetration.Ron Reaugh said:YES, the text file itself is and I'd expect a good checker to find and
eliminate it if it was in fact part of a multistepped
A "trojan" is a program - and a text file is not a program - therefore a
text file is not a trojan.
You profess to prefer logic, so there it is.
WRONG, deltree is part of a protected class...the OS itself.
WRONG.
Microsoft (the developers of both "deltree.exe" the OS in question) say
it is an application Just because something is bundled with an OS
doesn't make it a part of that OS.
The WHOLE
goal is protect the OS's integrity and intended functionality.
Don't go off on a tangent - the 'deltree.bat trojan' would be the trojan
even if it first renamed "deltree" to "nulllfile.exe" and contained the
line "nullfile /y c:\windows".
NO, that makes assumptions that a/the standard loading functions are being
used.
I don't understand what you mean here. Standard loading functions help
determine that some filetypes are henceforward executed when invoked -
that is, they are the reason these filetypes are termed executables. You
want "all" files to be scanned for "everything" because you might want
to feed them to an executable which translates and delivers an
executable image to virtual memory without even using standard loading
functions? A textfile, a script file, and "debug.exe" may fit the bill -
but the scriptfile would be the threat and not the textfile.
What if your on-access scanner relied solely on emulation to use
behavioral malware detection? Would you expect it to execute text files
in emulation?
Not relevant.
Invoking would result in execution of content without any further user
interaction, and you say it is irrelevent and that something that is
non-executable (invoking it reasults in nothing happening) is malware?
It is a threat or at least the tracks of a threat or at least a misdirection
from a threat.
I can't disagree with that (after all, it "is" something), I wouldn't
mind too much if an on-demand scan flagged it as damaged or corrupted
malware, but on-access scanners shouldn't waste any time on it.
The file didn't belong there. The file didn't get there by
any ordinary and intended process.
Probably correct.
AVG detected it in real time and not by
any user initiated scan.
So I assumed by your earlier posts. If you had indicated it was flagged
by an on-demand scan I would have thought it a misidentification rather
than strictly a false positive detection. Clearly it "is' something -
just not what it was identified as.
All indications are that there was NO FALSE
positive.
Quite the opposite actually.
All the other circumstances surrounding this seem to support
that.
No they don't, it seems that you don't know what a false positive
detection is. It is not enough that a file looks like the malware it is
identified as, it has to be capable of acting like that malware.
Otherwise, why bother with it.
The fact that the file doesn't fit some parochial definition of a
threat/executable isn't relevant.
The fact that a trojan is an executable program isn't relevent to the
fact that your AV flagged a non-executable as a trojan?
You are too deep in arcana and missing the point.
No, the point is that your "NULL" file is not a trojan - and "you" are
missing that point.