I’ve had three users report browser cache files indicating 
Swf.Exploit.CVE_2015_3102 infection.  All were logging into PayPal at the time.
<https://www.paypal.com/us/cgi-bin/webscr?cmd=_account>
ClamXav Forum topic: <https://www.clamxav.com/BB/viewtopic.php?f=1&t=4169>

Since I was unable to replicate it with my setup I asked one of them to submit 
the file to VirusTotal
<https://www.virustotal.com/en/file/c9d1856cfddc24fc3c51e5cc023c2cb4575b38a2140a39123438276d18b8561e/analysis/1439865575/>
where only ClamAV identified it as infected and the file details indicate:
> Commonly abused SWF properties
> - The studied SWF file makes use of ActionScript3, some exploits have been 
> found in the past targeting the ActionScript Virtual Machine. ActionScript 
> has also been used to force unwanted redirections and other badness. Note 
> that many legitimate flash files may also use it to implement rich content 
> and animations.
> - The flash file uses methods of the ExternalInterface class to communicate 
> with the external host of the Flash plugin, such as the web browser.
> - The flash file seems to embed javascript code. In combination with the 
> ExternalInterface class usage, this code might be trying to modify the DOM of 
> the parent URL embedding the file.

They also uploaded it to your "Report False Positive" page.  The MD5 should 
have been 5d024cc615e2b1c35ce9b2cce77ef481

-Al-
-- 
Al Varnell
Mountain View, CA




Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to