G.W. Haywood via clamav-users wrote:
Hi there,

On Fri, 14 Jan 2022, Kris Deugau wrote:

I've just come across a presumed-malicious .zip file of about 500K that contains a ~315M ISO image, which in turn appears to contain a ~315M executable file.

After a bit of searching and testing I see the --max-ratio option has been removed from clamscan, and ArchiveMaxCompressionRatio in clamd.conf has been deprecated.

Are there any remaining (or new?) options that might help flag hypercompressed files like this?

If you're using clamd, perhaps try the AlertExceedsMax option together
with the MaxScanSize and/or MaxFileSize options.  No it's not the same. :/

Hmm.  Might work for this case, I'll try some combinations.

Did this arrive in mail, Kris?

Yes. Indications are it was sent through a cracked hosting account, with an envelope and reply to a GMail account.

On closer inspection, when originally received the message matched one of the Sanesecurity "foxhole" signatures, which could collectively be scored much higher on this particular receiving account (technical role address). It's a hack and I'm not sure it's worth even that much effort since this is the first example I've seen in the wild.

-kgd

_______________________________________________

clamav-users mailing list
[email protected]
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to