That description of the file's purpose and reason for existing helps us to understand your concern, but as you've realized it does nothing to change anything I described in my earlier post.
The reason that older files like your own might tend to be detected is that most modern software that's widely distributed today is digitally signed, since it's impossible to insure the integrity of any file that doesn't contain one of these.
That's also why such files can often trigger a false positive detection, since the lack of a signature today leads security software like Microsoft's Defender to immediately consider such a file suspect.
During the period when I performed vulnerability scans for financial institutions among others, a malicious code vulnerability was once detected via an open port contained on an Automatic Teller Machine device located on a small bank's dedicated network reserved for these. After I urgently notified the bank's personnel, the investigation performed by their ATM vendor discovered this detection was due to something that got embedded within the code operating these ATM devices while being configured.
I never confirmed with the bank whether the malware involved was truly active on the ATM or the open port was the only symptom, but this was a case where such malicious code was included to at least some extent in the installation of a 3rd-party device.
However, since as I discussed the NAS itself doesn't operate using Windows and in fact uses their own proprietary DiskStation Manager (DSM) operating system, the only point at which any true malware might become active is once downloaded to a Windows client.
For that reason, I'd personally consider such a detection found within the NAS as nothing more than a sanity check rather than truly effective protection and treat it exactly the way you have.
I also started my career with some schooling in minicomputers, though I had previously built my own microprocessor based computer and most of my programming experience was using assembly language on early Intel 8-bit microprocessor based systems. Any software that's still around targeted for such outdated or specialized devices might be highly susceptible to false positive detection, since it often contained code intended to directly access hardware like the early BIOS software I wrote for many of those systems.
Rob