The alert with the signature Doc.Dropper.Agent-6447876-0 is not a false
positive. The signature alerted on a Microsoft Word document. The hash for
that document is
f614c9664f566becb3bdf5a52027088407a3a73d5de8f2a5ec1da2b47438d156.

The Word document has a macro that launches powershell, downloads an
executable and runs it.

On Thu, Feb 15, 2018 at 2:05 PM, Kris Deugau <kdeu...@vianet.ca> wrote:

> I've had a customer reporting problems sending a supposedly all-text
> (likely actually multipart text+html with no hand-added attachments)
> triggering this signature.
>
> Since it's a hash I'm baffled by what it might be misfiring on in a
> legitimate more-or-less text-only message.
>
> I don't yet have a copy of the message that actually triggered this
> signature, and after finally getting a couple of empty test messages they
> are of course scanning clean.
>
> Can anyone give any more detail on what kind of file or file component
> this is matching on?  All I can see is that it's in daily.hsb, so beyond
> the fact that it is a hash of either the whole file or a component of a
> Word document containing macros I have no idea what it is, and whether it's
> really a FP or not.
>
> -kgd
> _______________________________________________
> clamav-users mailing list
> clamav-users@lists.clamav.net
> http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users
>
>
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
>
> http://www.clamav.net/contact.html#ml
>
_______________________________________________
clamav-users mailing list
clamav-users@lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to