A few days ago, I sent Bitdefender a not-so-important malware (embedded redirector script in a HTML) that was only being detected by ESET.
BD analyst created a bad sha1/sha256/similar hash based signature (So did Avast). I sent them the same sample with a different hash and asked them to create a proper signature. But again they created a hash-based signature.
Two days later I saw that they finally created a proper signature but they previous two hash-based signature were still present in their database.
Yesterday, sent an email to their support asking their analysts to remove those two useless signatures and today in the morning, received a reply that the signatures will be removed and just now checked that they have indeed removed them
View attachment 284642
View attachment 284641
BTW, many products create basic hash-based signatures for not-so-prevalent samples. Very common for McAfee (mostly cloud based), Norton and some Chinese and other low-quality copy-cat VT detection products, moderately common for Avast, Avira, Microsoft Defender, less common for Bitdefender, very rare for Kaspersky, extremely rare for ESET (All based on my experience only).