On Thu, Dec 08, 2016 at 10:17 AM, Jay Gattuso wrote: > > (1) What's the signature trigger for Win.Trojan.URLspoof-2?
You can find any current signature using <http://clamav-du.securesites.net/cgi-bin/clamgrok> or $ sigtool --find Win.Trojan.URLspoof-2 | sigtool --decode-sigs VIRUS NAME: Win.Trojan.URLspoof-2 TARGET TYPE: ANY FILE OFFSET: * DECODED SIGNATURE: href="{WILDCARD_ANY_STRING}%00@{WILDCARD_ANY_STRING}">{WILDCARD_ANY_STRING}</ -Al- -- Al Varnell Mountain View, CA
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ clamav-users mailing list clamav-users@lists.clamav.net http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users Help us build a comprehensive ClamAV guide: https://github.com/vrtadmin/clamav-faq http://www.clamav.net/contact.html#ml