You can create allow-list rules for this sort of phishing heuristic alert using 
WDB signatures:
https://docs.clamav.net/manual/Signatures/PhishSigs.html#wdb-format
Phishing Signatures - ClamAV 
Documentation<https://docs.clamav.net/manual/Signatures/PhishSigs.html#wdb-format>
The names of the constants are self-explanatory. These constants are defined in 
libclamav/phishcheck.h, you can check there for the latest flags.. There is a 
default set of flags that are enabled, these are currently:
docs.clamav.net

There are two types of WDB signatures, "X" and "M". Here are a couple extra 
examples, since the documentation is a bit iffy:

X:.+\.usbank-email\.com([/?].*)?:.+\.usbank\.com([/?].*)?
X:.+\.ebay\.(ca|com)([/?].*)?:ebay\.caorebay\.com([/?].*)?
M:www.postfinance.info:www.postfinance.ch
M:www.deliverymail.com:media.monster.com

If you want to see more, create an empty directory and open terminal in the 
directory.  Then run:
 sigtool --unpack /var/lib/clamav/daily.cld​
(or whatever path to your daily CVD/CLD file).

It will drop a bunch of signature files in your current directory.  Open 
daily.wdb​ and you'll see a much larger list.  Some are more complicated 
because they use various country codes in the domains, others are less so.

If you craft a signature and would like Talos to distribute in the official 
databases, you can upload it to https://www.clamav.net/reports/signature
The web-form does get a surprising amount of spam though, so it may get looked 
at faster if you are interested in joining our 
community-sigs<mailto:community-s...@lists.clamav.net> mailing list and send it 
there. See: https://lists.clamav.net/mailman/listinfo/community-sigs

For anyone interested in submitting signatures, we manually review signature 
submissions. Sometimes signatures cannot be accepted or need to be revised 
because they are FP-prone. We will let you know when changes to the signatures 
are required.

Best regards,
Micah


Micah Snyder
ClamAV Development
Talos
Cisco Systems, Inc.
________________________________
From: clamav-users <clamav-users-boun...@lists.clamav.net> on behalf of Maarten 
Broekman via clamav-users <clamav-users@lists.clamav.net>
Sent: Thursday, March 17, 2022 10:26 AM
To: ClamAV users ML <clamav-users@lists.clamav.net>
Cc: Maarten Broekman <maarten.broek...@gmail.com>
Subject: Re: [clamav-users] Amazon/SpoofedDomain FP

That's indicating that there is a link in the email that's displaying 
"www.americanexpress.com<http://www.americanexpress.com>" but is actually going 
to "www.amazonbusiness.com<http://www.amazonbusiness.com>". It's hard to help 
without seeing the original email code.

On Thu, Mar 17, 2022 at 12:55 PM Alex via clamav-users 
<clamav-users@lists.clamav.net<mailto:clamav-users@lists.clamav.net>> wrote:
Hi,
The link description is a URL and apparently doesn't match the link
itself, resulting in email from Amazon Business being marked as
malicious. Do I just add this to some kind of allow/bypass list?

How do I go about doing that?

$ clamscan -v amazon-fp.eml
Scanning /home/alex/quarantine/amazon-fp.eml
LibClamAV info: Suspicious link found!
LibClamAV info:   Real URL:    https://www.amazonbusiness.com
LibClamAV info:   Display URL: 
www.americanexpress.com<http://www.americanexpress.com>
/root/quarantine/amazon-fp.eml: Heuristics.Phishing.Email.SpoofedDomain FOUND

_______________________________________________

clamav-users mailing list
clamav-users@lists.clamav.net<mailto:clamav-users@lists.clamav.net>
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml
_______________________________________________

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to