On Sun, 2008-10-26 at 10:22 +0100, Robert Schetterer wrote:
> Karsten Bräckelmann schrieb:
> > Recent flood of (German only?) Trojan.Agent malware, partly slipping by
> > ClamAV. So I now am submitting samples where I spot 'em...
> > 
> > By doing so, two questions came up:

[ Yet unanswered sample submission best-practice questions snipped. ]

> Hi Karsten,
> just for may interest, i dont see
> a significant grow of german maleware in mail,
> i use clamav-milter with
> http://www.sanesecurity.com/clamav/
> and i dont know something slipping through
> ( investigated the quarantaine dir )
> on 5 realy big mailserver with over hundert domains ( mostly german )
> an over 3000 mailboxes,

OK, here's a rough sketch, no hard numbers. Also, please note that I am
NOT a mail admin with a lot of users. The numbers below represent pretty
much me, and me only. :)

This started Fri and seems to have ceased by today already. I received
like 40 of these a day, with half of them slipping by ClamAV on Fri.
Usually I don't even get anything near 40 malware mails a *week*. That's
why I believe the term "flood" is justified.

(Talking about malware, attached archives containing Windows
executables, mind you. This does not include the bulk of pestering
phishes. And yes, I do use the SaneSecurity phish sigs.)


> after all it would only be evil if real viri bypass
> but as its some kind of spam ( pishing etc ) its
> checked from spamassassin and marked too in my setups
> perhaps you should tune up antispam features in your mailserver

SpamAssassin is tuned rather well, thanks. :)  In fact, you probably
should know me from the SA mailing list, Robert. ;)

And indeed, all of them scored around 15+, none slipped by SA. This
however is a consequence of using the same botnet. ClamAV still didn't
recognize the malware.


I didn't complain. And my post was not about ClamAV not catching them,
either. I asked about sample submission best-practices and avoiding
unnecessary workload -- which remains unanswered.


> in general to block incoming bots before getting to clamav-antivir stage
> that should raise down the maleware rate in any case

I don't block at SMTP stage for various reasons. One being, that I need
the spam corpus.

Anyway, while this gets slightly off-topic, most of these did hit
Spamhaus XBL (sic) or at least PBL. That might explain why you didn't
see them.


> so where do your info come from ?

Straight from my mail in-stream. :)  Plus some general knowledge about
botnets and their specific, identifying patterns, regarding some of the
statements above.


-- 
char *t="[EMAIL PROTECTED]";
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;i<l;i++){ i%8? c<<=1:
(c=*++x); c&128 && (s+=h); if (!(h>>=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}

_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to