...ok,had some fun with it,if I can call it this way...
Digging through my personal archive of packers,I though it wouldn't hurt,
to check a few on them (for one more time...) on VirusTotal/Jotti.
I submitted one called Morphnah Beta 2:
it's from the same russian guy,that had written Pohernah,called Kas...
Pohernah is detected nowadays by a few AVs,
at least the packer itself,didn't bother checking packed samples...
Morphnah Beta 2 was released about 3-4 months ago...wanna see today's results?
Check the attached .pdf in the end of my post...
So,what do we see here...a complete failure

Except Webwasher,which gives a "Win32.Malware.gen!94" result.
But wait...I'll come to this "successful" result also...
Now you think,ok,maybe the AV companies didn't get that sample...
nop,I've personally submitted it at least 3-4 times in VirusTotal and Jotti,
from the moment it came to my hands,ie.just a few days after it was released in public.
It has even been submitted to specific AV companies,again,more than a couple of times...
Not to mention how many skiddies must have submitted it over there,for their own reasons...
Then,I decided to submit another one,called LHPack,from BlackLogic team.
Their site is down since long time.Wanna learn more about them?
Check out this nice paper in the following site,
called "Traffic Threat Analysis:85.255.113.174 and blacklogic.net",
http://craigchamberlain.dreamhosters.com/Nice guys,hah?

Ok,back to LHPack and VirusTotal results,again,check the second attachment below...
And note that even if there was an excuse for Morphnah Beta 2,
say of the type..."it's a fairly new sample. and that's why it gets missed"...
(yeah,only...4 months old,and also spread in almost every script kiddie forum),
this latter one is more than 1 year and 6-7 months old...
Checked it?Good...maybe it happened you noticed a few similarities?

What do we see here?Complete failure once again...
and more specifically,we got exactly the same results:
WebWasher once again gives a "Win32.Malware.gen!94" result.
Now,as far as regarding the single one "successful" detection,
the one from the WebWasher product...
nop,it doesn't have say the super-advanced heuristics...
quite the contrary,they just chose the..."easy" way of doing things:
packed executable = infected executable.
Do you want further proofs about it...results/tests/whatever?
Well,there's not another .pdf attachment here...just a so-called "exercise for the reader":
just pack notepad.exe with plain old good UPX...(I used v3.01),then upload it VirusTotal...
