I’ve been drawing some conclusions why some very similar trojans are not detected by avast even if the signature of one of them has been included in the database.
I believe the quality of the service team of analysts is not the best. I have noticed that the detection of trojans bankers by Avira AntiVir is much better than avast. I wonder if it would be the choice by analysts of the line of code that does not accurately characterize the malware.
The names of malware identified by analysts avast are not accurate (example the name “Win32: Malware.gen” given the trojans bankers).
As far as naming is concerned, there is absolutelys no standard or rule how to name them. Companies could name them “Malware/Virus” or even just “Threat” and that’s it. To 99% of ppl, names of the malware families don’t mean a thing. If it’s Banker or Virut, only one thing is in comon. They want it off their computer.
As for everything else you complained about, i cannot really comment that. Only ALWIL programmers/analysts can answer you to that…
I feel the same way, the name isn’t an issue, what is, is that it is detected as I mentioned in the other topic.
The win32:Malware-gen is a generic detection designed to catch multiple occurrences of a type of malware, so long as it makes the detection, the name given is totally unimportant as there is no standardisation/convention in malware naming.
You will see this when you do a virustotal check and you will see the many different aliases given in detections across the 42 different scanners.
I don’t care about Avira…!
If you want maximum detection rate use Emsisoft AM.
But I guess we (users of avast) all like it to be the best and imo it is the best AV, otherwise I (and many others) wouldn’t use it…!! Nevertheless, as already said, don’t fully rely on it, protect your browser at first level and get a second opinion with an antimalware like Mbam or A²…
asyn
From our internal testing it seems that in day 0, the best AV gives you maximally 60-70% protection by the signatures. This is not an excuse, this is an explanation why you may see what you see. I could as well show you many samples missed by antivirus X, in the very same way.
Nomenclature does not exist, and while you’re getting 50 000 new samples a day, it’s nonsense to spend time and resource with naming something which will be extinct tomorrow. Also, from our tests it sometimes seems like these names are assigned by random generator. 8)
Well the point being made is ‘detection by signature’ with a signature for every detection. So with the generic detection, win32:Malware-gen in this case it can detect hundreds/thousands of variants of malware.
Now that Nomenclature doesn’t specifically identify ‘banker’ or other specific malware family name (as in the OPs concern) it just detects it as malware. The important thing is that it detects it and not the Nomenclature given to the detection.
So the use of generic and heuristics to detect zero day/new variants is playing a greater part in detection as it is almost impossible to keep up with the volume of 50,000 new malware per day if you are going to try and give them all a specific Nomenclature or malware family name rather than win32:malware-gen, etc.
I believe Kubec just wanted to say that it’s necessary to react quickly - and detect the stuff.
Thorough analysis and attempts to use a great name for the detection… isn’t doable.
If you want to go to suspicious sites, just prepare to be infected anyway and make the precautions as backups and not storing anything even moderately sensitive on your machine. And I specifically said by “signatures”. But there are also generic protections and layered protections.
See the typical chained scenario of today:
Porn site → malicious js → malicious pdf → malicious downloader → malicious binaries.
Don’t go to such porn site.
Don’t use vulnerable apps.
Have antivirus with layered protection.
And then - who cares if avast! does not detect one of the downloaded malicious binaries, when the porn site is blocked and we detect the js and pdf?
It’s very hard to evaluate the real-world performance of an AV solution when we don’t (and I suspect we can’t) test the whole chain and prove if the user is protected. The tests on VT and such don’t prove anything, but the ability of the engine to detect it by the signature.