On Thu, Nov 15, 2012 at 4:25 PM, McGranahan, Jamen <
jamen.mcgrana...@vanderbilt.edu> wrote:

> OK, I'm stumped as to why clamav-milter did not catch this virus. It was
> from this address, being masked as from UPS:
>
> rowanhorst...@live.ca<mailto:rowanhorst...@live.ca>, masked as
> customerdesk_upsdeliveryservi...@ups.com<mailto:
> customerdesk_upsdeliveryservi...@ups.com>
>
> Nov 14 14:13:33 XXXXXX sendmail[13983]: qAEKDT7f013983: from=<
> rowanhorst...@live.ca<mailto:rowanhorst...@live.ca>>, size=3297, class=0,
> nrcpts=1,
> msgid=<ca5501cdc2ac$e6c228e0$a87b5229@customerdesk_upsdeliveryservices>,
> proto=ESMTP, daemon=MTA, relay=[41.82.123.168]
> Nov 14 14:13:33 libdig10 sendmail[13983]: qAEKDT7f013983: Milter insert
> (1): header: X-Virus-Scanned: clamav-milter 0.97.6 at xxxx.xxxx.edu
> Nov 14 14:13:33 libdig10 sendmail[13983]: qAEKDT7f013983: Milter insert
> (1): header: X-Virus-Status: Clean
>
> It actually missed it on two servers. Thankfully our network security
> caught it before it went out. Here's what they detected the virus as:
>
> "It was detected as Blacole.OZ (Blackhole rootkit stuff).
> Incident Name: Blacole.OZ
> File: Invoices-14-2012.htm"
>
> Jamen McGranahan
> Systems Services Librarian
> Vanderbilt University LIbrary
> Central Library
> Room 811
> 419 21st Avenue South
> Nashville, TN 37214
>
> _______________________________________________
> Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
> http://www.clamav.net/support/ml
>

Good question. Any chance you can submit the attachment to us by using the
"Submit a file" link on www.clamav.net?

Dave R.

-- 
---
Dave Raynor
Sourcefire Vulnerability Research Team
dray...@sourcefire.com
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to