Can confirm. Win.Malware.Generic-9937882-0 was dropped from the daily CVD
earlier today.

On Mon, Jan 31, 2022 at 8:54 AM Maarten Broekman via clamav-users <
clamav-users@lists.clamav.net> wrote:

> Looks like the signature was dropped already because sigtool doesn't find
> it anymore after I updated the databases through freshclam.
>
> --Maarten
>
> On Mon, Jan 31, 2022 at 7:58 AM Al Varnell via clamav-users <
> clamav-users@lists.clamav.net> wrote:
>
>> Well yes, the fact that it was the only scanner would be an indicator of
>> at least a possible False Positive.
>>
>> Next a check to see when that signature was added shows that it was just
>> yesterday and further that it was dropped today, so clearly an indication
>> that it was found to be incorrect. Updating your daily signature database
>> should eliminate the finding and you can get back to more important work.
>>
>> And if step three were necessary, I would take a look at the signature
>> itself to see if it’s focused enough. Here’s what it looks like:
>>
>> sigtool -fWin.Malware.Generic-9937882-0|sigtool --decode-sigs
>> VIRUS NAME: Win.Malware.Generic-9937882-0
>> TDB: Engine:81-255,Target:1
>> LOGICAL EXPRESSION: 0&1&2&3&4
>>  * SUBSIG ID 0
>>  +-> OFFSET: ANY
>>  +-> SIGMOD: NONE
>>  +-> DECODED SUBSIGNATURE:
>> Expected to find a command ending in '.exe' in shebang line: %ls
>>  * SUBSIG ID 1
>>  +-> OFFSET: ANY
>>  +-> SIGMOD: NONE
>>  +-> DECODED SUBSIGNATURE:
>> Terminating quote without starting quote for executable in shebang line:
>> %ls
>>  * SUBSIG ID 2
>>  +-> OFFSET: ANY
>>  +-> SIGMOD: NONE
>>  +-> DECODED SUBSIGNATURE:
>> Expected terminating double-quote for executable in shebang line: %ls
>>  * SUBSIG ID 3
>>  +-> OFFSET: ANY
>>  +-> SIGMOD: WIDE
>>  +-> DECODED SUBSIGNATURE:
>> Unable to create process using '%ls': %ls
>>  * SUBSIG ID 4
>>  +-> OFFSET: ANY
>>  +-> SIGMOD: NONE
>>  +-> DECODED SUBSIGNATURE:
>> Unable to find executable in environment: %ls
>>
>> So it’s looking for all five ascii strings indicated, which might have
>> been enough to uniquely identify whatever windows file that is, but
>> apparently either that file was misidentified as being malware or those
>> strings are common to both the malware and your python lib.
>>
>> -Al-
>>
>> On Jan 31, 2022, at 04:22, Arnaud Jacques via clamav-users <
>> clamav-users@lists.clamav.net> wrote:
>>
>> FP confirmed (I guess) :
>>
>> https://www.virustotal.com/gui/file/217ae5161a0e08c0fb873858806e3478c9775caffce5168b50ec885e358c199d
>>
>>
>> Le 31/01/2022 à 12:30, Al Varnell via clamav-users a écrit :
>>
>> First I would upload the file to https://virustotal.com to see if any
>> other scanners identify the file as malware.
>>
>> Sent from my iPad
>>
>> -Al-
>>
>> On Jan 31, 2022, at 03:21, Nick Theofanidis via clamav-users <
>> clamav-users@lists.clamav.net> wrote:
>>
>>
>> 
>>
>> Hello, i hope everyone is well.
>>
>>
>> while scanning my database vps clamav found Win.Malware.Generic-9937882-0
>>
>> on
>> /opt/datadog-agent/embedded/lib/python3.8/ensurepip/_bundled/pip-21.1.1-py3-none-any.whl,
>> the server is running Centos 7 so a win based malware not likely dangerous
>> but it makes me wonder, is it a malware or is it a false positive?
>>
>>
>> I am new to all this so i would like some guidelines as to what should i
>> check and how should i proceed...
>>
>>
>> thanks in advance,
>>
>> N. Theofanidis
>>
>>
>>
>> _______________________________________________
>>
>>
>> clamav-users mailing list
>>
>> clamav-users@lists.clamav.net
>>
>> https://lists.clamav.net/mailman/listinfo/clamav-users
>>
>>
>>
>> Help us build a comprehensive ClamAV guide:
>>
>> https://github.com/vrtadmin/clamav-faq
>>
>>
>> http://www.clamav.net/contact.html#ml
>>
>> _______________________________________________
>>
>> clamav-users mailing list
>>
>> clamav-users@lists.clamav.net
>>
>> https://lists.clamav.net/mailman/listinfo/clamav-users
>>
>> Help us build a comprehensive ClamAV guide:
>>
>> https://github.com/vrtadmin/clamav-faq
>>
>> http://www.clamav.net/contact.html#ml
>>
>>
>> --
>> Cordialement / Best regards,
>>
>> Arnaud Jacques
>> Gérant de SecuriteInfo.com
>>
>> Téléphone : +33-(0)3.60.47.09.81
>> E-mail : a...@securiteinfo.com <a...@securiteinfo.com>
>> Site web : https://www.securiteinfo.com
>> Facebook : https://www.facebook.com/pages/SecuriteInfocom/132872523492286
>> Twitter : @SecuriteInfoCom
>> Signatures for ClamAV antivirus : http://ow.ly/LqfdL
>>
>> _______________________________________________
>>
>> clamav-users mailing list
>> clamav-users@lists.clamav.net
>> https://lists.clamav.net/mailman/listinfo/clamav-users
>>
>>
>> Help us build a comprehensive ClamAV guide:
>> https://github.com/vrtadmin/clamav-faq
>>
>> http://www.clamav.net/contact.html#ml
>>
>>
>> Powered by Mailbutler, the email extension that does it all:
>> https://www.mailbutler.io
>>
>>
>> _______________________________________________
>>
>> clamav-users mailing list
>> clamav-users@lists.clamav.net
>> https://lists.clamav.net/mailman/listinfo/clamav-users
>>
>>
>> Help us build a comprehensive ClamAV guide:
>> https://github.com/vrtadmin/clamav-faq
>>
>> http://www.clamav.net/contact.html#ml
>>
>
> _______________________________________________
>
> clamav-users mailing list
> clamav-users@lists.clamav.net
> https://lists.clamav.net/mailman/listinfo/clamav-users
>
>
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
>
> http://www.clamav.net/contact.html#ml
>


-- 
Christopher Marczewski
Research Engineer, Talos
Cisco Systems
443-832-2975
_______________________________________________

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to