- Content source
- https://youtu.be/UXxCikwej8Q
Impressive detection by Symantec; the last time was tested, missed several JS samples.Symantec found a few more malwares than AVg , but AVG is much more lite. . . almost same protection.
A malicious code of classic clickfix attack, copied and pasted into notepad, saved as cmd file, checked by VT: only Symantec could detect.
View attachment 295197
A malicious code of classic clickfix attack, copied and pasted into notepad, saved as cmd file, checked by VT: only Symantec could detect.
View attachment 295197
No .a at end so no signature just uds detection.
What uds stands for?No .a at end so no signature just uds detection.
What uds stands for?
Is not VT is signature-based? Which explains why it was not detected by K on VT, meanwhile it was detected by K on KTIP.
Malware Hashes (UDS) - a set of file hashes detected by Kaspersky Lab cloud technologies (UDS stands for Urgent Detection System) based on a file's metadata and statistics (without having the object itself). This enables the identification of new and emerging (zero-day) malicious objects that are not detected by other methods.
Is not hashes part of signature detection?Malware Hashes (UDS)
dynamic analysis environment in vt and opentip might not be same. KOTIP dynamic analysis min. takes 3 minutesIs not hashes part of signature detection?
If not signature, how can explain absence of detection on VT by K, while it was detected on KTIP by dynamic analysis?
Symantec detection on VT was heuristic detection (just as the one of K which appeared later on); Symantec detection on VT appeared long before VT behavioral analysis finishes which by the way detected nothing.dynamic analysis environment in vt and opentip might not be same. KOTIP dynamic analysis min. takes 3 minutes
A malicious code of classic clickfix attack, copied and pasted into notepad, saved as cmd file, checked by VT: only Symantec could detect.
View attachment 295197
If I have VM, I would try running it to find out if MD can detect post-execution.It is likely to be detected by the likes of Bitdefender at runtime, ESET via memory scan, etc.
I'll try checking later at night but by that time MD would probably create a signature.If I have VM, I would try running it to find out if MD can detect post-execution.
I will follow the its VT timeline to see if things are going to change again.I'll try checking later at night but by that time MD would probably create a signature.
A malicious code of classic clickfix attack, copied and pasted into notepad, saved as cmd file, checked by VT: only Symantec could detect.
View attachment 295197