Since the password has to be included for the victim to be able to
decrypt, it ought to be possible to automatically find the password in
the email. Of course, eventually the criminals will start hiding the
password in some way that a human can easily find it, but non-AI
automation can't.


On Tue, 22 Dec 2020 03:46:13 -0800
Al Varnell via clamav-users <clamav-users@lists.clamav.net> wrote:

> When you submit it, be sure to include the password so that the ClamAV 
> signature team can properly asses it and provide a hash signature for the zip 
> file.
> 
> -Al-
> 
> > On Dec 22, 2020, at 03:32, Alessandro Vesely via clamav-users 
> > <clamav-users@lists.clamav.net> wrote:
> > 
> > Hi all,
> > 
> > 
> > today I received a message with an encrypted zip attachment.  I saved the 
> > attachment and loaded it to VirusTotal, where no scanner detected anything:
> > https://www.virustotal.com/gui/file/2cef2c979e60c1e2892e6a494814dd65db14c2076102279e6e74737d36c115a5/detection
> > 
> > Then I unzipped the file using the password given in the message text, 
> > uploaded the only extracted file and got plenty of VBA / W97M malware:
> > https://www.virustotal.com/gui/file/99b352442e1351334d5e68e7f12469dc7f2790e6ae44b05be7dcd03739211f1f/detection
> > 
> > I spare reporting this malware to ClamAV, as it seems hopeless to me.  Am I 
> > wrong?
> > 
> > 
> > Best
> > Ale  

_______________________________________________

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to