Re: [clamav-users] Filename Regex

2016-02-19 Thread Mehmet Avcioglu

> On Feb 19, 2016, at 1:30 AM, Noel Jones  wrote:

> You may have more luck with the POSIX character class [[:space:]]
> rather than shorthand \s.


Character classes generate "ERROR: Malformed database" errors.

> On Feb 19, 2016, at 1:29 AM, Steven Morgan  wrote:
> So, I can't say for sure what is the POSIX support without additional
> research. Best bet is to follow Steve Basford's sanesecurity example to get
> you going. I don't see any .cdb in the official ClamAV virus database.


> On Feb 18, 2016, at 11:07 PM, Steve basford  
> wrote:
> If you look at foxhole databases it should give you an idea, if you want to 
> block macro malware try badmacro.ndb


Yes, those examples gave me the information I needed to proceed.

Thank you all.

-- 
Mehmet Avcioglu
meh...@activecom.net

___
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml


[clamav-users] A number of threats discovered by ClamAV on Windows apps, from Ubuntu Linux

2016-02-19 Thread Morten W. Petersen
Hi there.

I run AVG and MalwareBytes on my Windows machine, MalwareBytes manually but
fairly regularly.

Running ClamTK, I found around 60 different threats, attached are the names
of those threats.

freshclam says:

ClamAV update process started at Sun Feb  7 10:37:20 2016
WARNING: Your ClamAV installation is OUTDATED!
WARNING: Local version: 0.98.7 Recommended version: 0.99
DON'T PANIC! Read http://www.clamav.net/support/faq
main.cvd is up to date (version: 55, sigs: 2424225, f-level: 60, builder:
neo)
daily.cvd is up to date (version: 21344, sigs: 1827647, f-level: 63,
builder: neo)
bytecode.cld is up to date (version: 271, sigs: 47, f-level: 63, builder:
anvilleg)

Are these all false-positives or did I have a problem?

Regards,

Morten

-- 
Videos at https://www.youtube.com/user/TheBlogologue
Twittering at http://twitter.com/blogologue
Blogging at http://blogologue.com
Playing music at https://soundcloud.com/morten-w-petersen
Also playing music and podcasting here:
http://www.mixcloud.com/morten-w-petersen/
On Google+ here https://plus.google.com/107781930037068750156
On Instagram at https://instagram.com/morphexx/
___
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml


Re: [clamav-users] Submission Status

2016-02-19 Thread Jesse Nicholson
Not sure if I'm allowed to upload stuff here, but to follow up on this,
I've attached a zip containing the original decoded infection php code, the
infection in its natural state (doubly base64 encoded), definitions that
match it, and other nfo like a simple script that can clean the infection
without damaging php files its been injected into (with sed + regex).

On Sat, Feb 6, 2016 at 7:19 PM, Jesse Nicholson 
wrote:

> @ant indeed, this is what I'm doing. Original server is gone, new server
> was built from the ground up but the xferred required user files (web root)
> is quarantined while I go through it and lean up. There's a really nasty
> php injection that appears to intercept, proxy requests to various IPs that
> come from control server(s), attempts to download new viruses and such to
> your configured temp upload directory and then inject them into responses
> and such. I've made a definition that works very well, and have uncovered
> nearly 300 infected files using that sig. Other root shells were also
> present, but existing definitions cleaned them up.
>
> Was curious because I'd like to submit the definition in case it helps, so
> far I've only submitted one sample of the infection as found in the wild
> and a second file (both zipped) of the decoded main function group.
>
> @Al Yep I subscribed to the db list. MD5 is 92 3b 61 7b a7 9a da 3b 04 e7
> ba d7 a4 d7 04 74
>
> The infection has many things in common with the one posted here:
> http://stackoverflow.com/q/22647441
>
> On Sat, Feb 6, 2016 at 7:05 PM, Crap  wrote:
>
>> > I'm cleaning a server
>> > that got badly infected,
>>
>> I know this doesn't answer the OP, but destroy the server and treat all
>> data as compromised.
>> Rebuild for a fresh trusted base and attempt to clean the data away from
>> the original server..
>>
>> -- ant
>>
>> > On 6 Feb 2016, at 23:41, Jesse Nicholson 
>> wrote:
>> >
>> > Where/how can I check on the status of a submission? I'm cleaning a
>> server
>> > that got badly infected, and while doing so discovered what I believe
>> to be
>> > a PHP exploit that maldet and clamav don't have definitions for.
>> Virustotal
>> > also has 0 hits on it. However, I'm sure it's malicious because the main
>> > function block is double base 64 encoded, everything else that interacts
>> > with it is salted and random. Decoding the main function block, there
>> > appears to functions to compress local files and xfer them to unknown
>> > locations.
>> >
>> > Anyway I've successfully created a definition for it, have nearly 300
>> hits
>> > and am curious about following up after I've submitted one sample via
>> the
>> > website. Never done anything like this before, so looking for
>> > guidance/advice.
>> >
>> > --
>> > Jesse Nicholson
>> > ___
>> > Help us build a comprehensive ClamAV guide:
>> > https://github.com/vrtadmin/clamav-faq
>> >
>> > http://www.clamav.net/contact.html#ml
>> ___
>> Help us build a comprehensive ClamAV guide:
>> https://github.com/vrtadmin/clamav-faq
>>
>> http://www.clamav.net/contact.html#ml
>>
>
>
>
> --
> Jesse Nicholson
>



-- 
Jesse Nicholson
___
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml


Re: [clamav-users] A number of threats discovered by ClamAV on Windows apps, from Ubuntu Linux

2016-02-19 Thread Alain Zidouemba
Your attachment didn't make it through.

Please send in your FPs here: http://www.clamav.net/reports/fp , or paste
the contents of your attachment in your email message body.

Thanks,

- Alain

On Sun, Feb 7, 2016 at 4:39 AM, Morten W. Petersen 
wrote:

> Hi there.
>
> I run AVG and MalwareBytes on my Windows machine, MalwareBytes manually but
> fairly regularly.
>
> Running ClamTK, I found around 60 different threats, attached are the names
> of those threats.
>
> freshclam says:
>
> ClamAV update process started at Sun Feb  7 10:37:20 2016
> WARNING: Your ClamAV installation is OUTDATED!
> WARNING: Local version: 0.98.7 Recommended version: 0.99
> DON'T PANIC! Read http://www.clamav.net/support/faq
> main.cvd is up to date (version: 55, sigs: 2424225, f-level: 60, builder:
> neo)
> daily.cvd is up to date (version: 21344, sigs: 1827647, f-level: 63,
> builder: neo)
> bytecode.cld is up to date (version: 271, sigs: 47, f-level: 63, builder:
> anvilleg)
>
> Are these all false-positives or did I have a problem?
>
> Regards,
>
> Morten
>
> --
> Videos at https://www.youtube.com/user/TheBlogologue
> Twittering at http://twitter.com/blogologue
> Blogging at http://blogologue.com
> Playing music at https://soundcloud.com/morten-w-petersen
> Also playing music and podcasting here:
> http://www.mixcloud.com/morten-w-petersen/
> On Google+ here https://plus.google.com/107781930037068750156
> On Instagram at https://instagram.com/morphexx/
> ___
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
>
> http://www.clamav.net/contact.html#ml
>
___
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml


[clamav-users] Another submission of the JavaScript virus

2016-02-19 Thread Gerald Venzl
Hi,

I haven't heard anything back yet from my submission and as I'm new to
ClamAV I don't fully understand the procedure yet.

I have just submitted another file with the JavaScript virus my website is
struggling.

17:38 Pacific time
58d94feebb1e71d8404956c6b0a3207e8e6cb0a425f2a5cc6942eb4bb25292cb
JSMalware.js
___
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml