Sorry for the double reply...

You can also use sigtool --find-sigs to find the signature that it's
reporting and isolate it.

On Wed, Jul 12, 2017 at 8:59 AM, Maarten Broekman <
maarten.broek...@gmail.com> wrote:

> If the tarball doesn't match the MD5 hash then it's likely that a file
> within the tarball matches the malicious MD5. ClamAV looks at all the files
> within tarballs and zip files individually as well as the tarball as a
> whole.
>
> --Maarten
>
> On Wed, Jul 12, 2017 at 8:44 AM, Srinivasreddy R <
> srinivasreddy4...@gmail.com> wrote:
>
>> Hi All,
>>
>> I have converted main.cvd to md5 hash database.
>>
>> I have downloaded a file :  wget
>> http://old.honeynet.org/scans/scan19/scan19.tar.gz
>> and when i scan with clamscan it is detecting threat in the tar file .
>>
>> I am not able to find md5 hash of the tar file downloaded in md5 hash
>> database created from main.cvd .
>>
>> I am assuming clamAV hash DB should contain md5 hash of the threat file .
>> Please give me some inputs .
>>
>> Below are the steps to create hash DB:
>> -----------------------------------------------------
>>
>> # download clamav database files
>> wget http://database.clamav.net/main.cvd
>>
>> # extract the databases
>> sigtool --unpack main.cvd
>>
>> # extract md5 hash only to blacklist_md5
>> cat main.hdb >> clamav_md5
>> cut -d':' -f1 clamav_md5 > blacklist_md5
>>
>> thanks
>> srinivas
>> _______________________________________________
>> clamav-users mailing list
>> clamav-users@lists.clamav.net
>> http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users
>>
>>
>> Help us build a comprehensive ClamAV guide:
>> https://github.com/vrtadmin/clamav-faq
>>
>> http://www.clamav.net/contact.html#ml
>>
>
>
_______________________________________________
clamav-users mailing list
clamav-users@lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to