On Wednesday 03 March 2004 21:36, Michael L Torrie wrote:

> I have made a rudimentary patch (clean patch) against clamav 0.67 to
> mark all zip files containing password-protected (and hence unscannable)
> files as a virus type "SuspectEncrypted.Zip."  This way I can simply
> quarantine all such passworded zip files, along with normal viruses.  I
> know of no other way for clamav to catch this virus currently.  (In fact
> it didn't even catch one of them using fingerprinters.)

According to nanog, Bagle uses an uncommon zip format (zip 1, no compression, 
encryption), which is detectable with this pattern at the beginning of the 
file: 504b03040a00010000

Unfortunately this might be a bit short for a signature. 

However, I had a different idea.. current bagle uses a password that is in the 
range of '10000' - '99999'. a regular zipcrack takes about 0.01s to find the 
right password here. 

Given such a weak password, how about we simply try to brute force it and then 
scan the zip file as usual? 0.01s doesn't sound like much overhead to me. 


Dirk


-------------------------------------------------------
This SF.Net email is sponsored by: IBM Linux Tutorials
Free Linux tutorial presented by Daniel Robbins, President and CEO of
GenToo technologies. Learn everything from fundamentals to system
administration.http://ads.osdn.com/?ad_id=1470&alloc_id=3638&op=click
_______________________________________________
Clamav-devel mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/clamav-devel

Reply via email to