On Feb 1, 2014, at 1:44 PM, Alex <mysqlstud...@gmail.com> wrote:

> Hi,
> 
> On Sat, Feb 1, 2014 at 5:32 AM, Al Varnell <alvarn...@mac.com> wrote:
>> 
>> On Jan 31, 2014, at 5:26 PM, Alex <mysqlstud...@gmail.com> wrote:
>> 
>>> Hi,
>>> 
>>> I found another false-positive, this time with
>>> Heuristics.Phishing.Email.SpoofedDomain and I'd like help in figuring
>>> out what domain within the email it thinks is spoofed.
>>> 
>>> I've pasted the email here:
>>> 
>>> http://pastebin.com/S7XkCg9a
>>> 
>>> Any ideas greatly appreciated.
>> 
>> LibClamAV debug: Phishcheck:host:.ems1.aeroplan.com
>> LibClamAV debug: Phishing: looking up in whitelist: 
>> .ems1.aeroplan.com:.www.tdcanadatrust.com; host-only:1
>> LibClamAV debug: Looking up in regex_list: 
>> ems1.aeroplan.com:www.tdcanadatrust.com/
>> LibClamAV debug: Lookup result: not in regex list
>> LibClamAV debug: Phishcheck: Phishing scan result: URLs are way too different
>> LibClamAV debug: found Possibly Unwanted: 
>> Heuristics.Phishing.Email.SpoofedDomain
> 
> I don't understand what this means. How did you generate this? Where
> did the tdcanadatrust.com come from?

running clamscan --debug against the file.  
http://www.tdcanadatrust.com/tdvisa/agreements appears several times in the 
body of the message but links to 
http://ems1.aeroplan.com/a/l.x?t=icholbpbeophbeocnlmimpbc&M=1&L=2&v=4.


-Al-
-- 
Al Varnell
Mountain View, CA




_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq
http://www.clamav.net/support/ml

Reply via email to