Hi,

In a mostly OS X environment running gruntworks on client machines, clamav 
scans are finding things like ‘hacktool.crack.someprogram’. Would this be 
considered a PUA by the clamav team or is it just a naming convention for 
something more malicious? More generally is there anywhere I could search the 
tagged names and get a one line description of what clamav found. For example 
another scan found ‘W97M.Thus.A’  and a quick google search gives a symantec 
writeup: "W97M.Thus.A is a simple macro virus that infects Word 97 documents. 
It has a payload that triggers on December 13th which will try to delete all 
files and subdirectories from the root of the C: drive. This virus will also 
disable the macro virus protection in Word 97.”

Does clamav maintain anything similar?

Thanks for any help, and thanks for the great tool!

Steven
_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to