We found some files which is not identified by avast as malware files, but if we upload to the virustotal the results of those files identified as Win32.Banker (eSafe Antivirus).
in your report…AVIRA detected it…but in the latest report avira seems to have removed the detection…IT SEEMS LIKE FALSE POSITIVE…it may not be malware…
Anyway,
Send the password protected sample to virus@avast.com
Hello,
file with sha 256 = 9B931F1C298D67A23D1B34622856BF18457F84DBD0313825859A4D7D40F9308D is only patched notepad with added section, which is filled with zeros.
File with sha 256 = A2FBB3C38FD98F9BCE3FC0ED64035B342063F9C765CBE0EC97D48068EB0B7946 has only added zeros to end of file (also notepad).
I got this samples from the customer NAS HDD, since they mentioned to me at yesterday that after installed with Avast on their network detected a lot of malware such as : sality, stuxnet and Kalacha.
Today i will go to their office again, and analysis also scanning for each their user PC one by one.
According to avast antivirus detection those uploaded files identified as Win32:Kukacka which is this kind of malware trying to transformed file became .exe format and infected file system and disable security applications.
Thanks for your summary result, anyway i have tried to delete whole notepad file in .exe format but those files still listed on our customer NAS HDD. Beside in notepad.exe format, also listed on DOS command format.
Each time we open to the folder which is contains those files, avast always give notification that those files infected “Win32:Patched-ACI [Trj] or Win32.Banker”
I am not sure whether those files came from another users from network or their NAS HDD still infected with those kinds malware?
If they haven’t been updating and patched against this vulnerability, they can easily be reinfected. The hole has been there since 2009 as you have read from the links in my post,