[clamav-users] ScanOnAccess: ... (null) FOUND

2019-03-13 Thread Franky Van Liedekerke via clamav-users
Hi,

I seem to be encountering the same issue someone described here:
https://www.mail-archive.com/clamav-users@lists.clamav.net/msg46022.html

For me the null-message arrived when switching to root:
ScanOnAccess: /root/.bash_history: (null) FOUND

I'm running on RHEL7 server, latest updates with versions:
clamd-0.101.1-1.el7.x86_64

The accompanying files (coming from clamav-data rpm):

-rw-r--r--. 1 clamupdate clamupdate199693 Jan 10 06:14 bytecode.cvd
-rw-r--r--. 1 clamupdate clamupdate  53834626 Jan 10 06:14 daily.cvd
-rw-r--r--. 1 clamupdate clamupdate 117892267 Jan  9  2018 main.cvd

It seems the main.cvd is old, but I haven't run freshclam against this yet. 
Could that be the reason? Since it is an internal server, I first need to setup 
a proxy etc ... for freshclam to work.

With friendly regards,

Franky

___

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml


Re: [clamav-users] Detection as PUA.Andr.Trojan.Generic-6878612-0

2019-03-13 Thread Micah Snyder (micasnyd) via clamav-users
PUA.Andr.Trojan.Generic-6878612-0 has also been dropped earlier today and will 
be removed in the next daily update.

Regards,
Micah

On 3/13/19, 7:33 AM, "clamav-users on behalf of Mark Foley" 
 
wrote:

On Wed, 13 Mar 2019 11:26:06 +0100 vamp898 wrote:
>
> Hi there,
>
> since a few days we get a _lot_ detections for 
> PUA.Andr.Trojan.Generic-6878612-0
>
> Office Documents, ZIP Docuemnts, JPEG Images (containing nothing as 
> JPEG) are all more and more detected at this type. Not all of them but 
> way too much to see a real pattern what the actual issue is :(
>
> Is that something known?
>

Yes, I'm having the same issue.  Several hundred emails in IMAP folder are 
FOUND
with this PUA.  Many of these messages are one or more years old, many of 
the
emails are generated from with my office and are unlikely to contain 
malware. 

I'm wondering how legit this is and whether to actually go through and 
remove
hundreds of message from user's mail folder or to set .ign2 to ignore this
signature.

--Mark

___

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml



___

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml


Re: [clamav-users] Detection as PUA.Andr.Trojan.Generic-6878612-0

2019-03-13 Thread Mark Foley
On Wed, 13 Mar 2019 11:26:06 +0100 vamp898 wrote:
>
> Hi there,
>
> since a few days we get a _lot_ detections for 
> PUA.Andr.Trojan.Generic-6878612-0
>
> Office Documents, ZIP Docuemnts, JPEG Images (containing nothing as 
> JPEG) are all more and more detected at this type. Not all of them but 
> way too much to see a real pattern what the actual issue is :(
>
> Is that something known?
>

Yes, I'm having the same issue.  Several hundred emails in IMAP folder are FOUND
with this PUA.  Many of these messages are one or more years old, many of the
emails are generated from with my office and are unlikely to contain malware. 

I'm wondering how legit this is and whether to actually go through and remove
hundreds of message from user's mail folder or to set .ign2 to ignore this
signature.

--Mark

___

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml


Re: [clamav-users] Detection as PUA.Andr.Trojan.Generic-6878612-0

2019-03-13 Thread Al Varnell via clamav-users
Not sure exactly when this was added to the .ldu database, but by the name it's 
a Possibly Unwanted Android Application, so unlikely to be found in that many 
different types of files. The signature looks like this:

> VIRUS NAME: PUA.Andr.Trojan.Generic-6878612-0
> TDB: Engine:51-255,FileSize:1048576-4194304,Target:0
> LOGICAL EXPRESSION: 0
>  * SUBSIG ID 0
>  +-> OFFSET: ANY
>  +-> SIGMOD: NONE
>  +-> HEX: 
> 010002110304211231054151611322718132061491a1b14223241552c16233347282d14307259253f0e1f163733516a2b283264493546445c2a3743617d255
>  e2

except that I added a space before the last two characters to prevent this 
e-mail from being detected as infected.

-Al-


On Mar 13, 2019, at 03:26, vamp898 via clamav-users 
 wrote:
> Hi there,
> 
> since a few days we get a _lot_ detections for 
> PUA.Andr.Trojan.Generic-6878612-0
> 
> Office Documents, ZIP Docuemnts, JPEG Images (containing nothing as JPEG) are 
> all more and more detected at this type. Not all of them but way too much to 
> see a real pattern what the actual issue is :(
> 
> Is that something known?


___

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml


[clamav-users] Detection as PUA.Andr.Trojan.Generic-6878612-0

2019-03-13 Thread vamp898 via clamav-users

Hi there,

since a few days we get a _lot_ detections for 
PUA.Andr.Trojan.Generic-6878612-0


Office Documents, ZIP Docuemnts, JPEG Images (containing nothing as 
JPEG) are all more and more detected at this type. Not all of them but 
way too much to see a real pattern what the actual issue is :(


Is that something known?



Best Regards

___

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml


Re: [clamav-users] Txt.Trojan.Kryptik-6887991-0 FOUND

2019-03-13 Thread Dennis Peterson

That does not appear to be a well anchored regex.

dp

On 3/12/19 9:15 PM, Al Varnell via clamav-users wrote:
All I can add is some technical information about the signature. I have no 
idea what kind of infection it causes and on what platform.


The signature was added to the database by daily - 25386 earlier today as an 
.ldb. Looking for a single ascii string in any type of file:



sigtool -fTxt.Trojan.Kryptik-6887991-0|sigtool --decode-sigs
VIRUS NAME: Txt.Trojan.Kryptik-6887991-0
TDB: Engine:51-255,FileSize:262144-1048576,Target:0
LOGICAL EXPRESSION: 0
 * SUBSIG ID 0
 +-> OFFSET: ANY
 +-> SIGMOD: NONE
 +-> DECODED SUBSIGNATURE:
1/g,"");if(!/^[-_a-zA-Z0-9#.:* ,>+~[\]()=^$|]+$/.test(c))throw  E



___

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml