Re: [Clamav-devel] Clam Scan on Android APK

2015-10-23 Thread Sujit Nandan
Hi Steven, I am following up with this mail just to bring under your attention the problem related to apk file scan as mentioned in previous mail. I also have another query regarding creating a avbases (Clam AV signature) which has only malware relevant to Android OS. This is because full avsigna

Re: [Clamav-devel] Clam Scan on Android APK

2015-10-17 Thread Sujit Nandan
Hi Steven, We found the infected apk from http://contagiodump.blogspot.in/2011/03/take-sample-leave-sample-mobile-malware.html http://www.mediafire.com/download/a31f86dzejilwea/026_capture-site.com_ocjp.zip is the zip file which contains an apk with the name btm.apk which is our concerned apk. Qu

Re: [Clamav-devel] Clam Scan on Android APK

2015-10-16 Thread Steven Morgan
One of the triggers for the BC.Exploit.Andr bytecode is the zip file magic at offset 0. If you are using --leave-temps, the inner files are extracted, but the zip file magic is lost. On Fri, Oct 16, 2015 at 7:51 AM, Sujit Nandan wrote: > Hi Everybody, > > I want to know how clam creates signatur

Re: [Clamav-devel] Clam Scan on Android APK

2015-10-16 Thread Steven Morgan
Hi, What is the virus name? I believe there are byte code signatures that process APKs. Steve On Fri, Oct 16, 2015 at 7:51 AM, Sujit Nandan wrote: > Hi Everybody, > > I want to know how clam creates signature with infected android APK. Right > now we are totally in dark. Clam has determined an

[Clamav-devel] Clam Scan on Android APK

2015-10-16 Thread Sujit Nandan
Hi Everybody, I want to know how clam creates signature with infected android APK. Right now we are totally in dark. Clam has determined an APK as infected with malware but when we run clamscan on extracted content from that APK it is not able to detect any malware. Can anybody brief me the steps