TIP: Click on subject to list as thread! ANSI
echo: alt-comp-anti-virus
to: ALL
from: DUSTIN
date: 2014-10-31 18:33:00
subject: Re: Malware detection by

Virus Guy  wrote in
news:m319ak$kuh$1@speranza.aioe.org: 

>> because of the packer used is pretty lame ...
> 
> Yet it's clear by these and other papers that the AV/AM industry
> relies heavily on packer characterization as a primary method of
> malware detection.

It can be considered a heuristic activity if the packer isn't known 
to be used for mainstream, but is used for protecting malware. Some 
packers are only developed for that purpose. I have no issue with 
software that locks onto them. 

It's likely the software is protecting your box from an unknown 
malware sample if it sees a packer that's primarily known for malware 
sample protection and isn't used by the majority of legit software 
authors. it'll be rare that you find some oddball packer on a legit 
program these days. Most authors already know the packer isn't going 
to stop somebody who's seriously wanting to reverse engineer your 
proggy.

> were custom packers. Amazingly, some of the clean ?les were packed
> with these custom packers 

See? even in 2008 it was already rare that you'd find a clean file 
(legit file) packed with a custom packer. 
 
> One packer to rule them all: 

No such critter. Originally, packing served another legitimate 
purpose. To try and prevent your software from being reverse 
engineered. Hell, I helped beta test protexcm years ago. Excellent 
program; it would set off many heuristic alarms though. [g]
 
> These techniques were implemented by an advanced, dedicated
> packer, which is an approach commonly taken by malware developers
> to evade detection of their malicious toolset. Two brand new
> packing methods were developed for this cause. By combining
> several evasion techniques, real-world malicious executables with
> a high detection  rate were rendered completely undetected to the
> prying eyes of Antivirus products.  

Ayep.
 
> Two new methods of packing executables were developed, one of
> which turned out to be very efficient in evading all current 
> Antivirus products without the use of emulation, which is the
> ‘Resource packer'. A myriad of anti-emulation checks were 
> implemented and tested demonstrating the capacity to bypass all
> the existing engines, while also demonstrating the robustness and
> efficiency of this protection measure in detecting new and
> evolving threats. 

This isn't a new method. The author is stealing the work from vxers 
and crackers of days long gone by. resource packing isn't HIS work, 
here people.

 
> It is however clear that for the moment, a bullet proof Antivirus
> solution is still yet to come despite the significant advances
> that some of these solutions have made.  

yet to come is false hope. :)



-- 
If you can read this, Thank a teacher.
If you're reading it in english, Thank a soldier!


--- NewsGate v1.0 gamma 2
* Origin: News Gate @ Net396 -Huntsville, AL - USA (1:396/4)

SOURCE: echomail via QWK@docsplace.org

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.