Hi Al,

Thank you very much for your reply. I just realized that I was on the wrong
thread though. I meant to ask the reason for the alarms below, or at least
to confirm it's a false alarm, so I can just exclude the files. Do you or
anybody on the list has information on this? Thanks.

Christina

---------- Forwarded message ----------
From: Christina Qian <christina.q...@ayasdi.com>
To: clamav-users@lists.clamav.net
Cc:
Bcc:
Date: Tue, 12 Nov 2019 10:57:27 -0800
Subject: ClamAV false positive
Hi,

We have installed ClamAV on our EC2 hosts. This weekend it started to send
alerts below. Since as far as I know, these tls1.h files were already on
the system for one or two years and no malware alert was ever sent for
them, I wonder whether there is any change on the ClamAV side which causes
it. For example, if YARA.php_malware_hexinject.UNOFFICIAL FOUND rule was
newly added to the rfxn.yara file, etc?

Since I did not keep the old yara file, I couldn't tell. Also, how the yara
file or other files were updated and what's common practise checking
whether the alert is solid or false and how to handle false alerts? Thanks.

/folder_name/jupyter/miniconda2/include/openssl/tls1.h:
YARA.php_malware_hexinject.UNOFFICIAL FOUND
/folder_name/jupyter/miniconda2/pkgs/openssl-1.0.2k-1/include/openssl/tls1.h:
YARA.php_malware_hexinject.UNOFFICIAL FOUND
/folder_name/anaconda2/pkgs/openssl-1.0.2k-1/include/openssl/tls1.h:
YARA.php_malware_hexinject.UNOFFICIAL FOUND


Christina Qian



Christina Qian


On Tue, Nov 12, 2019 at 5:14 PM Al Varnell via clamav-users <
clamav-users@lists.clamav.net> wrote:

> The offending signature was previously posted, along with it's location in
> the daily.hdb section of the daily.cld/.cvd signature database:
>
> [daily.hsb]
> 94d13091a15154471ed3832f3c072567:315:Html.Malware.Agent-7380889-0:73
>
> You should see that it is dropped in the next daily update around eight
> hours from now.
>
> -Al-
>
> On Nov 12, 2019, at 14:05, Christina Qian <christina.q...@ayasdi.com>
> wrote:
>
> Hi Alain,
>
> Thank you very much for your quick response. May I ask what's the
> offending signature, where it located, and how was it removed? Thanks.
>
> Christina Qian
>
>
> On Tue, Nov 12, 2019 at 1:22 PM Alain Zidouemba <azidoue...@sourcefire.com>
> wrote:
>
>> The alert was a false positive, and the offending signature has been
>> removed.
>>
>> Thanks,
>>
>> -Alain
>>
>> On Tue, Nov 12, 2019 at 10:35 AM Maarten Broekman via clamav-users <
>> clamav-users@lists.clamav.net> wrote:
>>
>>> That's a hash signature. My guess is that there's 315 byte file inside
>>> the jar that was marked. The 2.4 version of fop has a 315 byte class file
>>> (PDFColorSpace.class) in it with a different MD5 hash. You might want to
>>> unpack the fop.jar and see if any of the files there match. Chances are
>>> some piece of malware included something similar that got included in the
>>> signature creation process.
>>>
>>> [daily.hsb]
>>> 94d13091a15154471ed3832f3c072567:315:Html.Malware.Agent-7380889-0:73
>>>
>>>
>>> On Tue, Nov 12, 2019 at 10:12 AM Andy Keller <
>>> andykel...@decisionlens.com> wrote:
>>>
>>>> Hi group –
>>>>
>>>>
>>>>
>>>> We’ve had a file (/opt/nessus/var/nessus/report-engine/fop.jar) hitting
>>>> for Html.Malware.Agent-7380889-0 since yesterday. This Apache file hasn’t
>>>> been updated since March 2019 and I’m tempted to say this is a false
>>>> positive (our Nessus server is also completely unreachable from the
>>>> internet), but haven’t seen any traffic on this listserv and Google hasn’t
>>>> helped much. Anybody have any similar hits?
>>>>
>>>>
>>>>
>>>> --
>>>>
>>>>
>>>> *Andy Keller*Director, Information Security and Compliance | CISSP,
>>>> CCSK, Security+ | Decision Lens
>>>> <http://www.decisionlens.com/>andykel...@decisionlens.com
>>>>
>>>> o: (703) 215-8282
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> _______________________________________________
>>>>
>>>> clamav-users mailing list
>>>> clamav-users@lists.clamav.net
>>>> https://lists.clamav.net/mailman/listinfo/clamav-users
>>>>
>>>>
>>>> Help us build a comprehensive ClamAV guide:
>>>> https://github.com/vrtadmin/clamav-faq
>>>>
>>>> http://www.clamav.net/contact.html#ml
>>>>
>>>
>>> _______________________________________________
>>>
>>> clamav-users mailing list
>>> clamav-users@lists.clamav.net
>>> https://lists.clamav.net/mailman/listinfo/clamav-users
>>>
>>>
>>> Help us build a comprehensive ClamAV guide:
>>> https://github.com/vrtadmin/clamav-faq
>>>
>>> http://www.clamav.net/contact.html#ml
>>>
>>
>> _______________________________________________
>>
>> clamav-users mailing list
>> clamav-users@lists.clamav.net
>> https://lists.clamav.net/mailman/listinfo/clamav-users
>>
>>
>> Help us build a comprehensive ClamAV guide:
>> https://github.com/vrtadmin/clamav-faq
>>
>> http://www.clamav.net/contact.html#ml
>>
>
> _______________________________________________
>
> clamav-users mailing list
> clamav-users@lists.clamav.net
> https://lists.clamav.net/mailman/listinfo/clamav-users
>
>
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
>
> http://www.clamav.net/contact.html#ml
>
>
>
> _______________________________________________
>
> clamav-users mailing list
> clamav-users@lists.clamav.net
> https://lists.clamav.net/mailman/listinfo/clamav-users
>
>
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
>
> http://www.clamav.net/contact.html#ml
>
_______________________________________________

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to