- Apr 17, 2020
- 542
I can't find much information or a good review when doing a search.
Please provide comments and solutions that are helpful to the author of this topic.
Coding is my passionforeach (Process process2 in Process.GetProcessesByName(Path.GetFileNameWithoutExtension(file)))
{
Application.DoEvents();
process2.Kill();
Thread.Sleep(100);
}
return "JS.Droppper.Trojan";
This is a false positive. It is an antimalware program but not malware.Is flagged by ESET
With Little help from MT community this may become something good don't you think?This is a false positive. It is an antimalware program but not malware.
I decoded the signature DB it ships with. What MAV does is computing the fuzzy hash of files and compare that to a database containing 22302 fuzzy hashes and signature names.
View attachment 263234
This is a blocklist database but with fuzzy hashes instead of a cryptographic ones (which are more commonly used by AV software). 22302 blocklisted hashes are not much. The big AVs have several million blocklist entries, so it is a different magnitude here. Those blocklist entries of the big AV companies are additionally to their other signatures like pattern and behaviour based detections.
Additionally to this signature db there is one very false positive prone heuristic detection for JS malware (the snippet that was posted above) that checks the presence of at least 1 in 9 different strings for files ending with .html, .htm, .hta, or .chm.
So to sum this up, it is not fraud, it is not malware, but it also doesn't have notable detection capabilities.
This is a false positive. It is an antimalware program but not malware.
I decoded the signature DB it ships with. What MAV does is computing the fuzzy hash of files and compare that to a database containing 22302 fuzzy hashes and signature names.
View attachment 263234
This is a blocklist database but with fuzzy hashes instead of a cryptographic ones (which are more commonly used by AV software). 22302 blocklisted hashes are not much. The big AVs have several million blocklist entries, so it is a different magnitude here. Those blocklist entries of the big AV companies are additionally to their other signatures like pattern and behaviour based detections.
Additionally to this signature db there is one very false positive prone heuristic detection for JS malware (the snippet that was posted above) that checks the presence of at least 1 in 9 different strings for files ending with .html, .htm, .hta, or .chm.
So to sum this up, it is not fraud, it is not malware, but it also doesn't have notable detection capabilities.
Do you advise me to test it in video or is it useless because the database is quite small?
Another false positive (?).
I am fully aware of the fact it blocked the official site.I personally would not bother. It doesn't even detect EICAR.
That's their official website. It is also the site they download the most current version and signature databases from.
With Little help from MT community this may become something good don't you think?
I've been wondering what would it be if all MT members that are work together on one single anti-malware solution. With all of this knowledge and experience... I think if someday this happens it would be something good and extraordinary.Yes, sure. Everything has to start somewhere.
There is a reason that most of the small companies license other engines like Bitdefender's and add their own engine and protection modules on top of that. It provides a solid protection basis as long as there are not enough people and own technologies to carry the weight.