On Tue, 2 Mar 2004 04:14:52 -0800 (PST) [EMAIL PROTECTED] exclaimed: > > > Worm.Bagle.H found in unzipped file. It\'s impossible > > to create signature of encrypted zip file. > > This new infection method is likely to drive us nuts. This is the > password-less workaround I've come up with and your input is appreciated. > > The unix unzip output looks like so: > > $ uvscan -lv virus.zip > Archive: TextDocument.zip > Length Method Size Ratio Date Time CRC-32 Name > -------- ------ ------- ----- ---- ---- ------ ---- > 21150 Stored 21150 0% 03-01-04 19:33 7ac0095f hifrm.scr > -------- ------- --- ------- > 21150 21150 0% 1 file > > Fortunately we can get the file crc w/o actually extracting the file. > Can zip file crc's count as sigs? A quick/crude perl hack to test for > this at the MTA seems to work pretty well: > > if (!open(UNZIP, "-|")) > { > exec("/usr/bin/unzip", '-lv', $file); > } > while (<UNZIP>) > { > if (/7ac0095f/) > { > close(UNZIP); > print "Found the w32nsc/Bagle.H-zip virus !!!\n"; > found_virus(); > } > } > close(UNZIP); > > > Suggestions? There are really easy ways for the virus writer to > circumvent this type of check but until they start utilizing such > strategies, is it possible to include the zip's crc into ClamAV's sigs? > >
Except that I have 3 files, all ID'd the same when unzipped. But they have different CRC's. They all show as stored though.... Length Method Size Ratio Date Time CRC-32 Name -------- ------ ------- ----- ---- ---- ------ ---- 21816 Stored 21816 0% 03-03-04 18:03 b036a836 xooas.exe -------- ------- --- ------- 21816 21816 0% 1 file ~/virus/encrypted$ clamscan xooas.exe xooas.exe: Worm.Bagle.Gen-2 FOUND Length Method Size Ratio Date Time CRC-32 Name -------- ------ ------- ----- ---- ---- ------ ---- 21512 Stored 21512 0% 03-02-04 15:40 5399d9c7 ruqxq.scr -------- ------- --- ------- 21512 21512 0% 1 file ~/virus/encrypted$ clamscan ruqxq.scr ruqxq.scr: Worm.Bagle.Gen-2 FOUND Length Method Size Ratio Date Time CRC-32 Name -------- ------ ------- ----- ---- ---- ------ ---- 21378 Stored 21378 0% 03-03-04 16:31 331840c6 ludkesb.exe -------- ------- --- ------- 21378 21378 0% 1 file ~/virus/encrypted$ clamscan ludkesb.exe ludkesb.exe: Worm.Bagle.Gen-2 FOUND Shawn ------------------------------------------------------- This SF.Net email is sponsored by: IBM Linux Tutorials Free Linux tutorial presented by Daniel Robbins, President and CEO of GenToo technologies. Learn everything from fundamentals to system administration.http://ads.osdn.com/?ad_id=1470&alloc_id=3638&op=click _______________________________________________ Clamav-users mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/clamav-users