Thanks for your reply.

You are right, I'm not a native English speaker. I went too fast using 
automatic translators and I didn't review it enough. :D
I forgot to mention that I tested our binary with other antivirus and none of 
them raised an alert.
In the meantime, we will look at your possible solutions.


-----Message d'origine-----
De : clamav-users <clamav-users-boun...@lists.clamav.net> De la part de G.W. 
Haywood via clamav-users
Envoyé : lundi 11 avril 2022 10:08
À : alex via clamav-users <clamav-users@lists.clamav.net>
Cc : G.W. Haywood <cla...@jubileegroup.co.uk>
Objet : ⚠️ Re: [clamav-users] Is the signature "Win.Tool.Hoax-9939325-0" really 
problematic ?

Hi there,

On Mon, 11 Apr 2022, alex via clamav-users wrote:

> Recently, ClamAV sent us the following alert "Win.Tool.Hoax-9939325-0"
> on one of our executables.  This software was developed by our teams 
> and has not been modified since 2014. And suddenly, an alert is lifted...

On a point of order, in English we would say "an alert is raised".
It's clear that you aren't a native English speaker so I understand that the 
distinction may be a little confusing to you, but I assure you that it's no 
more confusing to you than "lifted" was to me when first I read it. :)

> After some research in the ClamAV VirusDB announcements, I found that 
> this signature was added on February 18, 2022 ...

This begs the question "Why was this almost two months ago?"

> We investigated on our side and saw that the alert was lifted because of 5 
> subsignatures :
>
>  *   OnClientToHostWindowX
>  *   OnDownloadComplete(
>  *   OnFrameNavigateComplete4
>  *   OnDownloadBegin4
>  *   OnStatusBar
>
> These functions come from a Borland library. ...

Is the library still supported, e.g. with security fixes?

> Does ... "Win.Tool.Hoax-9939325-0" detect something really problematic 
> that can compromise our system via our executable?

I doubt it, but I'd imagine you should wait for feedback from the signature 
team.  They're very busy so it might take a while.  Other readers of this list 
might have some observations.

> Is there a way to bypass the lifting of this signature, without 
> completely ignoring it, if it ultimately proves useful against other 
> files?

Not directly in ClamAV, but you could either

(1) ensure that whatever feeds files/directories/data to the scanner ignores 
your binary (see docs); or

(2) whitelist the signature as a false positive (see docs) and then, 
optionally, create your own signature which is based on this one but which 
specifically avoids flagging your binary.

-- 

73,
Ged.

_______________________________________________

clamav-users mailing list
clamav-users@lists.clamav.net
https://urldefense.com/v3/__https://lists.clamav.net/mailman/listinfo/clamav-users__;!!La4veWw!ikA_WcTm41JxAwbpxMYyqUIrNN-JPbaAqcaME0hFbgW0OQdj73vFV_0JrMImjcpc-o6a$
 


Help us build a comprehensive ClamAV guide:
https://urldefense.com/v3/__https://github.com/vrtadmin/clamav-faq__;!!La4veWw!ikA_WcTm41JxAwbpxMYyqUIrNN-JPbaAqcaME0hFbgW0OQdj73vFV_0JrMImjcgSgAbl$
 

https://urldefense.com/v3/__http://www.clamav.net/contact.html*ml__;Iw!!La4veWw!ikA_WcTm41JxAwbpxMYyqUIrNN-JPbaAqcaME0hFbgW0OQdj73vFV_0JrMImjVCTtvny$
 

⚠️ This symbol is automatically added to emails originating from outside of the 
organization. Be extra careful with hyperlinks and attachments. 

_______________________________________________

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to