Since Monday, we investigated a little further and found that the executable is extracted by the MPRESS unpacker a part of our bytecode.cvd signature set, and then once unpacked it alerted with the Win.Dropper.Tinba-9943147-0 signature. It makes sense that if it could be unpacked with the MPRESS unpacker that it would also alert with the PUA.Win.Packer.Exe-6 signature. The reason that the Win.Dropper.Tinba-9943147-0 signature did not alert during the false positive report processing is because of a bug wherein bytecode signatures will not run if a signature alert already occurred, even in all-match mode. I am working on a fix for this now, while I work on other improvements to the all-match feature.
I found that the Win.Dropper.Tinba-9943147-0 signature was highly effective at detecting malware, with approximately 10,060 hits on virus total and a relatively low false positive rate: https://www.virustotal.com/gui/search/clamav%253AWin.Dropper.Tinba-9943147-0/files. So, we have added the signature back, as Win.Dropper.Tinba-9943147-1, and it is already beginning to detect malware again https://www.virustotal.com/gui/search/clamav%253AWin.Dropper.Tinba-9943147-1/files). Yaron, For now, your application is instead added as a hash-based FP signature to our daily.cvd database to prevent the false positive. I would be curious to know if there is anything unusual in your application build process that would help me understand why ClamAV thinks the application is packed using the MPRESS packer. I suspect that future builds of your application will have the same issue unless we are able to refine the detection or change how your software is built to prevent the detection. Regards, Micah Micah Snyder ClamAV Development Talos Cisco Systems, Inc. ________________________________ From: clamav-users <clamav-users-boun...@lists.clamav.net> on behalf of Christopher Marczewski <cmarczew...@sourcefire.com> Sent: Monday, July 11, 2022 4:48 PM To: ClamAV users ML <clamav-users@lists.clamav.net> Subject: Re: [clamav-users] False positive, My program is recently Started to be flagged with Win.Dropper.Tinba-9943147-0 Looks like allmatch scanning may be confined to the PUA CVDs if the first signature alert is a PUA signature, as was the case here. PUA.Win.Packer.Exe-6 alerted on this sample during the report processing, but no additional signature alerted. A manual scan without PUA signatures enabled resulted in the expected FP hit. I've dropped the signature after examining the binary and will check with the dev team on this case. On Mon, Jul 11, 2022 at 5:20 PM Yaron Elharar via clamav-users <clamav-users@lists.clamav.net<mailto:clamav-users@lists.clamav.net>> wrote: Did anybody from the ClamAV team had the chance to take a look at this? On Sun, 10 Jul 2022, 9:27 G.W. Haywood via clamav-users, <clamav-users@lists.clamav.net<mailto:clamav-users@lists.clamav.net>> wrote: Hi there, On Sat, 9 Jul 2022, Al Varnell via clamav-users wrote: > I've never seen a user post to that list and I've subscribed to it > for decades. My impression has always been it's for database update > announcements only. You might be right Al but I took the URI from a list post and ISTR that a while back Micah suggested it as a way to report FPs which might get a quicker response than using the Web form or the submission utility. But these ol' neurones aren't what they used to be. -- 73, Ged. _______________________________________________ clamav-users mailing list clamav-users@lists.clamav.net<mailto:clamav-users@lists.clamav.net> https://lists.clamav.net/mailman/listinfo/clamav-users Help us build a comprehensive ClamAV guide: https://github.com/Cisco-Talos/clamav-documentation https://docs.clamav.net/#mailing-lists-and-chat _______________________________________________ clamav-users mailing list clamav-users@lists.clamav.net<mailto:clamav-users@lists.clamav.net> https://lists.clamav.net/mailman/listinfo/clamav-users Help us build a comprehensive ClamAV guide: https://github.com/Cisco-Talos/clamav-documentation https://docs.clamav.net/#mailing-lists-and-chat -- Christopher Marczewski Research Engineer, Talos Cisco Systems 443-832-2975
_______________________________________________ clamav-users mailing list clamav-users@lists.clamav.net https://lists.clamav.net/mailman/listinfo/clamav-users Help us build a comprehensive ClamAV guide: https://github.com/Cisco-Talos/clamav-documentation https://docs.clamav.net/#mailing-lists-and-chat