Hacker News new | past | comments | ask | show | jobs | submit login

Here you go https://www.virustotal.com/file/1fc14ab461828afd34f92c69e34d...

Edit: someone posted results for .exe file inside the .zip, which are a bit different (it seems like some antiviruses don't try to unpack it?), but then deleted the comment. Here's the link for .exe: https://www.virustotal.com/file/2a9c7a16cdb3c3f2285afaf61072...




Given what its doing and how it's doing it then those virus alerts listed are understandable and if anything I'd have to say kudo to panda AV for being the most honest about it. Probably breaking the PE and the CRC checksum aspects would get it flagged as it has in some and the html/exe flagging is also explained as well having read thru how it works.

Still impressive stuff and also given the use of undocumented opcodes and x86 foo it does raise a new question:

Given some VM's will fail on some of the instructions instead of running on bare metal, is it possible to have a virus that will only trigger on bare metal or VM machines thru use of undocumented op codes and the like.

Non the less a wonderful definition in hacking in its truest sence and educational on undocumented OP codes and how for some things you cant beat pure assembly for fun and jollys.


My corporate proxy chokes on it too.

An error occurred while performing an ICAP operation: File decompression/decode error; File: CorkaMIX.zip; Sub File: No file name available; Vendor: Kaspersky Labs; Engine error code: 0x00050000; Engine version: 8.1.8.79; Pattern version: 120801.124000.8311194; Pattern date: 2012.08.01 12:40:00




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: