Here's the VirusTotal page on this file
<https://www.virustotal.com/#/file/e23900b00ffd67cd8dfa3283d9ced691566df6d63d1d46c95b22569b49011f09/detection
 
<https://www.virustotal.com/#/file/e23900b00ffd67cd8dfa3283d9ced691566df6d63d1d46c95b22569b49011f09/detection>>
and it does show that ClamAV detects it as Win.Trojan.Agent-6641267-0 which was 
just added yesterday by daily - 24829 and is a MD5 hash:
[daily.hsb] 
704d491c155aad996f16377a35732cb4:126976:Win.Trojan.Agent-6641267-0:73

so yes, ClamAV should catch it already.

-Al-

On Sat, Aug 11, 2018 at 04:04 AM, Alessandro Vesely wrote:
> Well, in this case ClamAV supports YARA enough to get:
> 
> ~/tmp$ clamscan -d keymarble.yara keymarble-dummy
> keymarble-dummy: YARA.rsa_modulus.UNOFFICIAL FOUND
> 
> ----------- SCAN SUMMARY -----------
> Known viruses: 1
> Engine version: 0.100.0
> Scanned directories: 0
> Scanned files: 1
> Infected files: 1
> Data scanned: 0.00 MB
> Data read: 0.00 MB (ratio 0.00:1)
> Time: 0.006 sec (0 m 0 s)
> 
> 
> The question is whether one should copy keymarble.yara to /var/lib/clamav/, 
> on a production server where ClamAV is used to scan email. It is useless if 
> ClamAV catches keymarble already.  It is also useless/harmful if $n is a 
> bogus string.
> 
> More basic question:  Is ClamAV staff monitoring US-CERT's alerts, and 
> updating ClamAV database on good rules?
> 
> I'd also appreciate generic opinions about US-CERT.  I'm not a careful 
> analyst, so maybe I'm wrong, but it seems to me they are getting weaker and 
> weaker, since about 2013, when they changed alert message format (introducing 
> html and dropping pgp).  For example, last year's TA17-293A[*] would have 
> blocked any file containing the string "icon.png"...
> 
> Best
> Ale
_______________________________________________
clamav-users mailing list
clamav-users@lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to