Am 16.02.2017 um 20:55 schrieb Markus Egg:
The attached file was in an email as attachment as "bill":
319598.js

sha1sum
b32a6dfdef2444de1695cb96e6a674c2f7cda74b  319598.js
sha256sum 319598.js
50df856fa3291473face6db59dcc655476e0618e457cdfa2832d0d72f61008e7  319598.js

just block them in general as gmail will do in the near future

[sa-milt@mail-gw:~]$ cat /var/lib/clamav/thelounge_blocked_extensions.cdb | grep js
thelounge.blocked.extension.js:CL_TYPE_MAIL:*:(?i)\.js$:*:*:*:*:*:*

http://sanesecurity.com/foxhole-databases/

foxhole_js.cdb (medium false positive risk)

This database will block most JavaScript (.js) files within Zip, Rar archived. The current #locky #javascript #malware is using rapidly changing JavaScript files and this database is aimed at blocking these. To help minimise false positives, this database will only scan small sized Zip and Rar files.

foxhole_js.ndb (medium false positive risk)
This database will block ALL JavaScript (.js) files within GZip and Ace archives. The current #locky #javascript #malware is using rapidly changing JavaScript files and this database is aimed at blocking these.
_______________________________________________
clamav-users mailing list
[email protected]
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to