> I'm cleaning a server
> that got badly infected,

I know this doesn't answer the OP, but destroy the server and treat all data as 
compromised. 
Rebuild for a fresh trusted base and attempt to clean the data away from the 
original server..

-- ant

> On 6 Feb 2016, at 23:41, Jesse Nicholson <ascensionsyst...@gmail.com> wrote:
> 
> Where/how can I check on the status of a submission? I'm cleaning a server
> that got badly infected, and while doing so discovered what I believe to be
> a PHP exploit that maldet and clamav don't have definitions for. Virustotal
> also has 0 hits on it. However, I'm sure it's malicious because the main
> function block is double base 64 encoded, everything else that interacts
> with it is salted and random. Decoding the main function block, there
> appears to functions to compress local files and xfer them to unknown
> locations.
> 
> Anyway I've successfully created a definition for it, have nearly 300 hits
> and am curious about following up after I've submitted one sample via the
> website. Never done anything like this before, so looking for
> guidance/advice.
> 
> -- 
> Jesse Nicholson
> _______________________________________________
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
> 
> http://www.clamav.net/contact.html#ml
_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to