Hot Take Malicious website escaping secure dns

The update button leads to download a malware that's based on Node.js (the most popular JavaScript runtime environment).
ESET didn't block the malware download source site like Kaspersky, but the main malicious file was detected after extraction.
View attachment 293470
I did not have the guts to try clicking on "update"; just checked if any security vendor or layer could flag the website as malicious, especially I looked like malicious.
 
I uploaded the zip file to VT and it showed no detection

I am seeing many of these fake updaters lately, there were heuristics built in to the early versions of Orion Malware Cleaner, later on renamed that detected this activity.

The detection was Orion:AppImpersonator

475FBB23-FC1D-4504-94FF-5F4DC29338E8.jpeg