So earlier, I loaded http://www.avast.com/eng/download-avast-home.html earlier, to grab the URL to paste in a forum to help some Norton trialware victims.
When I closed it, I saw it was making a request to a URL on the ssl-hints.netflame.cc domain name.
Being a naturally curious person, I looked into that domain and found two things:
it’s part of fireclick.com which Avast appears to use for their web analytics
it contains this interesting file hxxp://ssl-hints.netflame.cc/Fc/FcPred.class , which freaks Avast out if you try to open it.
So, uh… what’s going on here? Is it a false positive, or is Avast’s web analytics provider hosting malware on the side?
For reference, this is what Avast thinks of it:
A Virus Was Found!
There is no reason to worry, though. avast! has stopped the
malware before it could enter your computer. When you click on the
"Abort connection" button, the download of the dangerous file will
be canceled.
File name: hxxp://ssl-hints.netflame.cc/Fc/FcPred.class
Malware name: Other:Malware-gen
Malware type: Virus/Worm
VPS version: 090113-1, 01/13/2009
Maybe the problem is not a file but an encrypted code in the homepage? ???
Please, do not post live link to malware or false positives in the forum… edit to hxxp for instance.
Dump the contents of your IE cache -
Start → settings → control panel → Internet options →
delete files
Dump the contents of the Mozilla FireFox Cache { if you use FireFox }
Tools → Options → Privacy → Cache → Clear
Dump the contents of your Sun Java cache -
Control panel → Java applet → cache → clear
or
Control panel → Java applet → general → settings →
delete files
Re-scan your system using your anti virus software,
The old results had 4 matches, the new ones have 3, so one AV doesn’t think this is dangerous anymore.
Also note that Kaspersky does not flag it as dangerous.
All of this seems fairly consistent with a false positive getting slowly fixed in individual AV products.
Firstly as far as I’m aware avast doesn’t use “fireclick.com which Avast appears to use for their web analytics” but uses google-analytics and possibly akamai.net.
I use firefox with NoScript and they are the only ones I see in the main avast.com site. Now I don’t know where you gathered the information from but all http traffic on port 80 goes through the avast web shield to be scanned (probably why avast freaked out as you say). So if you see that attributed to the web shield, it is only the localhost proxy filter and not what originated the communication.
Thanks for the update I didn’t look at that page just a couple of others and NoScript showed what scripts were on the page.
I can’t see why they would have the document write in that form, perhaps to avoid html interpreting the script word so they use ‘scr’+‘ipt’. I have to admit when I see this I wonder why too.