Thanks for the info. I've run the scan on the body file and headers
file and get:

LibClamAV debug: Initializing phishcheck module
LibClamAV debug: Phishcheck: Compiling regex: ^
*(http|https|ftp:(//)?)?[0-9]{1,3}(\.[0-9]{1,3}){3}[/?:]? *$
LibClamAV debug: Phishcheck module initialized
LibClamAV debug: Skipping signature Email.Phishing.DblDom-72 @ main.ndb:54219
LibClamAV debug: Module PHISHING On
LibClamAV debug: Cleaning up phishcheck
LibClamAV debug: Freeing phishcheck struct
LibClamAV debug: Phishcheck cleaned up

The mail has been quarantined though - I don't have the .eml file.
I've scanned the hf and df files.


2009/4/29 Török Edwin <edwinto...@gmail.com>:
> On 2009-04-29 11:43, Greg McCarthy wrote:
>> I've upgraded to 0.95.1 and have a few mails that are getting
>> quarantined as Phishing.Heuristics.Email.SpoofedDomain
>>
>> How do I go about checking for spoofed domains in the email headers?
>> Its quite possible that the domain has been spoofed but I would like
>> to just double check?
>
> You should look at the body of the mail, not the headers (headers in an
> email can be easily forged, so they're usually not to be trusted anyway).
>
> You can use clamscan --debug to find out why ClamAV considers the email
> phishing, the output should be similar to the following:
>
> $ clamscan --debug /path/to/emailfile.eml 2>&1|grep -i phish
> LibClamAV debug: Initializing phishcheck module
> LibClamAV debug: Phishcheck: Compiling regex: ^
> *(http|https|ftp:(//)?)?[0-9]{1,3}(\.[0-9]{1,3}){3}[/?:]? *$
> LibClamAV debug: Phishcheck module initialized
> LibClamAV debug: Skipping signature Email.Phishing.DblDom-72 @
> main.ndb:54219
> LibClamAV debug: Module PHISHING On
> LibClamAV debug: Phishcheck:Checking url
> http://fake.example.com->banksite-example.com
> LibClamAV debug: Phishcheck:URL after cleanup:
> http://fake.example.com->banksite-example.com
> LibClamAV debug: Phishing: looking up in whitelist:
> http://fake.example.com:banksite-example.com; host-only:0
> LibClamAV debug: Phishcheck:host:.banksite-example.com
> LibClamAV debug: Phishcheck:host:.fake.example.com
> LibClamAV debug: Phishing: looking up in whitelist:
> .fake.example.com:.banksite-example.com; host-only:1
> LibClamAV debug: Phishcheck: Phishing scan result: URLs are way too
> different
> LibClamAV debug: found Possibly Unwanted:
> Phishing.Heuristics.Email.SpoofedDomain
> /path/to/emailfile.eml: Phishing.Heuristics.Email.SpoofedDomain FOUND
>
> In this case the reason is that the 2 domains are different (the former
> is the URL real target of the hyperlink, the latter is the URL as shown
> to the user).
>
> Best regards,
> --Edwin
>
>
>
> _______________________________________________
> Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
> http://www.clamav.net/support/ml
>
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to