> On Feb 27, 2016, at 6:09 PM, Al Varnell <[email protected]> wrote: > > I understand SHA-256 is preferred, but MD-5 will also work. > > Submit them back here. > > -Al-
$ openssl dgst -sha256 invoice_SCAN_fGYbuu.zip SHA256(invoice_SCAN_fGYbuu.zip)= ba41513235b21783b9741b59ceb191cc6e65f15cd15ba58ab1d9c648513419c0 > > On Sat, Feb 27, 2016 at 06:08 PM, Kristen wrote: >> >> On 2/27/16 4:50 PM, Joel Esler (jesler) wrote: >>> Kristen, >>> >>> We'll take a look. >>> >>> Please send us the hashes of the files. >>> >>> -- >>> Joel Esler >>> Manager, Talos Group >> >> Which hashes do you desire? And then where should I submit them? >> >> Kristen >> >>> >>> On Feb 27, 2016, at 8:21 PM, Kristen >>> <[email protected]<mailto:[email protected]>> wrote: >>> >>> List, >>> >>> I just submitted to the virus submission webpage a new sample of a virus >>> email that slipped through clamd on my mail server. I received an email >>> with the subject "Successfully processed" from >>> clamav.net<http://clamav.net>. However the >>> content of this mail states; >>> >>> Result: >>> >>> Please encrypt your ZIP files with password virus >>> >>> Please correct the above errors and retry. Thank you for helping the >>> ClamAV project. >>> >>> I have decompressed this zipped virus attachment, then zipped it anew >>> with the requested password of virus and resubmitted again. In return I >>> received the very same email message stating I need to correct my error >>> and zip the file with the password virus and retry. >>> >>> At this point I think something is broken and I have no idea if my >>> submission has succeeded. Any thoughts? >>> >>> Kristen >>
signature.asc
Description: Message signed with OpenPGP using GPGMail
_______________________________________________ Help us build a comprehensive ClamAV guide: https://github.com/vrtadmin/clamav-faq http://www.clamav.net/contact.html#ml
