On Thu, Dec 08, 2016 at 10:17 AM, Jay Gattuso wrote:
> 
> (1)    What's the signature trigger for Win.Trojan.URLspoof-2?

You can find any current signature using 
<http://clamav-du.securesites.net/cgi-bin/clamgrok>

or

$ sigtool --find Win.Trojan.URLspoof-2 | sigtool --decode-sigs
VIRUS NAME: Win.Trojan.URLspoof-2
TARGET TYPE: ANY FILE
OFFSET: *
DECODED SIGNATURE:
 href="{WILDCARD_ANY_STRING}%00@{WILDCARD_ANY_STRING}">{WILDCARD_ANY_STRING}</



-Al-
-- 
Al Varnell
Mountain View, CA




Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
clamav-users mailing list
clamav-users@lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to