Messages - BillR [ switch to compact view ]

Pages: [1] 2 3 4next
1
First, a quick thanks to BGM, Mouser, and many other authors who have created useful, or at least interesting, tools for us.

Systemus is a handy dandy system admin tool that BGM created for N.A.N.Y. 2020.  Systemus had problems with false positives from antivirus products.  Just out of curiosity, I ran Systemus through three meta-scanners, Jotti, VirusTotal, and MetaDefender, two days ago just to see what had changed.  The results did improve (fewer presumably FPs), but are far from perfect.

At the end of 2020, I submitted Systemus to a half-dozen-ish vendors, plus a few more later on.  Over the intervening couple of weeks, VirusTotal varied from 23 FPs initially, to 15 minimum, to 17.  BGM reported 23/69 for VT in his response.  I'm not sure why we had different totals, but I can imagine several possibilities (e.g., maybe BGM ran his PE Studio analysis a couple of weeks before his reply in the thread; or maybe he used .exe and I noted .zip, primarily); etc.).  FPs also decreased on Jotti (no details) and MetaDefender (8 to 5) during those few weeks.  Some other person also may have submitted FP requests during that few weeks or the intervening months.  (See end of https://www.donationcoder.com/forum/index.php?topic=48696.msg442731#msg442731 for my comment and BGM's response.)

As several developers noted in that Systemus thread (and many other threads), this can be frustrating: each antivirus false positive is going to discourage users from experimenting with the software, but getting each AV vendor to evaluate each iteration (or even periodic stable releases) is like playing whack-a-mole at the bottom of the deep end of the pool using your nondominant foot with one eye closed and with some moles stuck in the up position. (I'm look at you, Webroot, who didn't actually evaluate/act on Systemus even after I submitted it twice; and you, McAfee in several guises, who has lots of fiddly restrictions; and a few others who make submitting arduous -- only webform with odd fields, only via forum, only via installed AV(!), only by author (not a user), etc. -- or even impossible as far as I can tell).  A couple of reputation-based products aren't (or weren't a couple of years ago) willing to whitelist little known software even after their lab had reversed a FP in the main AV.  Some authors recommend other authors just ignore FPs as too much trouble.

For comparison, these are April 2022 results for Systemus using the same files from my download folder.  The dates here identify the last update to the engine/signatures.

Jotti
.zip (1/14):
Fortinet Apr 8, 2022 W32/PossibleThreat

VirusTotal
.zip (6/59 -- 59 excludes incompatible or nonreporting AVs):
AhnLab-V3    Malware/Win32.Generic.C3986407
Fortinet         W32/PossibleThreat
MaxSecure     Trojan.Malware.300983.susgen
McAfee          Artemis!A5AC6681733F
McAfee-GW-Edition  Artemis!Trojan
Panda           Trj/CI.A
.exe (run today -- 8/68 -- excludes 4 incompatible and 1 nonreporting engine)
Same FPs as above except:
(different) McAfee-GW-Edition  BehavesLike.Win32.Dropper.dh
(added) Palo Alto Networks  Generic.ml
(added) Webroot  W32.Malware.Gen

MetaDefender
.zip (0/35 but infected components flagged -- 35 includes 2 incompatible file type and 1 no result)
.exe (2/35 -- includes 1 no result)
Malware/Win32.Generic   AhnLab   Apr 9, 2022
Malware   Webroot SMD   Apr 8, 202
.dll (1/35 -- includes 1 no result)
Malware   Webroot SMD   Apr 8, 2022

I have no idea how much of the difference from two years ago may be due to FPs being fixed (either proactively or because someone submitted a request), or due to improved engines, or due to pruning because the miniscule installed base is no longer considered relevant (perhaps partially due to user whitelisting).

Note that due to different settings or other differences, "AhnLab" and "McAfee" reported "No Threat Detected" on MetaDefender while alerting on VT.  This is not the first time I've noted a few differences between results for the same engine between these (and other) meta-scanning platforms. VT has a statement somewhere that mentions various reasons VT results may vary from the same vendor's installed product and/or web scanner.  Some of these reasons (plus others) also apply between meta-AV platforms.

My personal impression is that, for the same vendor, VT tends to have more hits (almost always FPs for me) than MetaDefender and Jotti, but I have seen the reverse.

A couple of tools I used to automatically submit likely FPs to selected multiple sites via email were discontinued many years ago.  I saw a few attempts to create something similar, but those weren't maintained (but I haven't looked recently).  TechSupportAlert had a great list but it is not as useful anymore -- especially for FPs.  MetaDefender's knowledge base has an updated list for its vendors (usually email, sometimes web or other) but doesn't explain the restrictions (i.e., address but not content or formatting restrictions).  If jotti or VT has a similar list, I've missed it.  VT really needs a list as some of their vendors/engines are obscure to this English speaker who only dabbles in security occasionally.

2
N.A.N.Y. 2020 / Re: Systemus
« on: December 14, 2020, 05:53 AM »
I submitted Systemus to roughly a half dozen vendors for evaluation (e.g., Microsoft, F-Secure, and G DATA) over two weeks ago.  Approximately -9 +1, then +2 (23 to 15 to 17) on VirusTotal.  -3 (8 to 5) on MetaDefender (BitDefender, Emsisoft, and Avira -- but not on VT despite a "clean" email response; perhaps because VT explicitly uses the no cloud Avira version versus unspecified versions elsewhere).  On MetaDefender only one AV flags the .zip itself however the automaticallys extracted .exe is also still flagged by four more.  Jotti's count decreased as well, although I don't remember the exact original count. 

Webroot never responded with an analysis (and still objects) despite two email responses. 
Microsoft's email says Systemus is clean but installed Windows Defender still objects (despite clearing the cache as requested; so maybe after a reboot), however the VT Defender now passes Systemus.

3
Announce Your Software/Service/Product / Re: SunsetScreen v1.0
« on: September 08, 2016, 12:28 PM »
Summary - v1.25 tested via 3 online meta-AV scanners.  Avira CHANGED from positive to negative, :Thmbsup:  a very positive sign
ClamAV  was split 1 positive, 2 not.  4 other AVs positive.  50+ others null/negative.

A quick update on presumed false positives on SunsetScreen v1.25 released in August 2016, an ever better SunsetScreen.
http://www.skytopia.com/software/sunsetscreen/
---
VirusScan by Jotti
https://virusscan.jotti.org/en-US/filescanjob/a26gj94qsh
1/19 positive (as of Tues., Sept 8 )
ClamAV     Sep 6, 2016      PUA.Win.Packer.SetupExeSection-1   [true of many utility downloads]
---
VirusTotal by Google
https://www.virustotal.com/en/file/b7f7ebb8baf439fe630380a970502945178203e73a3e3064b435015ebc8f5d4f/analysis/1473199738/
2/57 positive (as of Tues., Sept 8 )
Invincea          virus.win32.parite.c                20160830
Rising             Malware.Heuristic!ET (rdm+)   20160906
but note:
ClamAV             [null/negative]                     20160906
Avira (no cloud) [null/negative]                     20160906
---
Metadefender [formerly Metascan-Online] by OPSWAT
https://www.metadefender.com/#!/results/file/88a9d04fba6f48d1b4976adea721c8b3/regular/analysis
3/42 positive (but 5 updating/not available so really 3/37)
(as of Friday, Sept. 2 )
Avira           2219 ms      Sep 02 2016 (4 days ago)         ADWARE/InstallRex.Gen 
Filseclab      8282 ms      Sep 02 2016 (4 days ago)         W32.InstalleRex.L.crhx 
TotalDefense   16 ms      Sep 01 2016 (5 days ago)         Win32/Tnega.JOBKNaC 
but note:
ClamAV       2391 ms      Sep 02 2016 (4 days ago)         [null/negative]
---
Metadefender
2/42 (all engines reporting)
(as of Thursday, Sept. 8 )
Filseclab and TotalDefense remain positive but
Avira is now null/negative, as are the missing 5 engines from last week.
---
Slight differences in results for the same vendor between different online scanners and especially with installed AV products is to be expected (as all three sites say). 
My personal observation is that ClamAV packer warnings are almost pointless while Filseclab and TotalDefense are prone to false positives.  Rising was based on heuristic analysis.

UPDATE - Fixed "Sept. 8)" versus "Sept. 8 )"

4
Sorry I did not make that clear.  The only problem is with scrolling but I have not tested extensively.  @Ath, something along the lines of your guess sounds logical to me, but at a more subtle level as a few other simple snapshots have worked.

5
Anyone else with conflict between HitmanPro.Alert and Screenshot Captor Scrolling Window?
Suggestion for resolution?  Perhaps exclude a different/additional process in HMPA?

I posted the following excerpt yesterday.  (Issue 2 regards LastPass and HMPA encryption conflict.)

http://www.wilderssecurity.com/threads/hitmanpro-alert-support-and-discussion-thread.324841/page-313#post-2545573

Has anyone else encountered conflicts between:
Screenshot Captor and HitmanPro.Alert?

Issue 1: Screenshot Captor (just snipping via scrolling window feature) by DonationCoder and HitmanPro.Alert conflict. I have to stop Screenshot Captor in order to cancel the .Alert warning (canceling many more times might work eventually). Excluding the main process via Exploit Mitigation was not sufficient. (Win7, multiple browsers, .Alert all features except encryption)

To reproduce, install SC trial and show Quick Capture Bar; with browser open to a page that scrolls, click on scrolling window button; loop the error message a few times; cancel snipping request via the tray icon.


Pages: [1] 2 3 4next
Go to full version