On Tue, 27 Sep 2016, Al Varnell wrote:

> The signature is based on a 2240 byte file, so it is probably something 
> embedded in the PDF.

Yes,  the 2240 null byte file pdf51 is extracted by clamav from the pdf.  
--leave-temps and --debug
can be used to show this and to obtain the file. 


md5sum pdf51
013167adb9fbc93923f9c0789599ec95  pdf51

sha256sum pdf51
2f7eaacf490839d9c603736149286272aea4df46c0daf58f0c70062041c68230  pdf51

(sha256 sum is in the virustotal url not md5sum).

The md5sum and sha256sum of the original malware are unknown.   I don't have 
the malware
only a file with a FP on the broken signature , that may or may not also 
contain malware
or be the original malware.

The clamav hdb signature is independent of file type and would match any 2240 
null byte
file not just a file extracted from  a pdf.

Incidently clamav debug shows the file
as stream 68 0 , but stream 68 does not extract to a 2240 null byte file with 
pdf-parser.py.

Uploading the null byte file to fp would make sense.   But anyone can create 
the file themselves.

Uploading the pdf to fp might  not make sense as is unknown if it contains 
malware or not. 
The pdf scans negative except for clamav on virustotal, but could still contain 
malware.

https://virustotal.com/en/file/13f14263e8268626e7a7f42e10dab99b87007cf6f2a29affd46f2cafa2ecb607/analysis/

Note the filename is not the same as original.

sha256sum Deal.pdf
13f14263e8268626e7a7f42e10dab99b87007cf6f2a29affd46f2cafa2ecb607  Deal.pdf

Is the original malware sample for which the signature was intended still 
available
and does it have the above sha256sum ?


--

David Shrimpton
_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to