On Aug 15, 2012, at 7:55 AM, Gene Heskett wrote:
> Greets all;
> 
> I got one of those emails from what looked like the IRS yesterday, but the 
> .doc file it linked to was .htm and supposedly infected my machine with 
> either the JS/Iframe.W!tr; Trojan-Downloader.JS.Iframe.czj or once 
> infected, the Trojan-Ransom.Win32.Gimemo.akxc
> 
> I killed firefox about 1.5 seconds after the dummy download screen was 
> displayed.

OK.  1.5 seconds is quite a while as far as a computer is concerned;
if you were running a vulnerable platform, then yeah, your system probably
was compromised.

> So I made a /virii directory, cd'd to / and ran:
> 
> clamscan -r --move=/virii

My first instincts would have been to take a complete backup for
forensic purposes, and then reinstall the OS and restore from a prior
backup.

(You are taking backups of everything you care about, right?)

> And moved what I would consider quite a few FP's to that directory. Several 
> .log files it didn't like, and one wine .dll it moved many copies of.  A 
> partial list, not including hundreds of mozilla cache files:
[ ... ]
> It didn't like quite a few of clamav's own files, and had a regular party 
> with the spamassassin source tarballs too.

These aren't false positives-- a virus scanner _should_ trigger from 
(unencrypted)
malware signatures.

> End of partial list.
> 
> Now, how do I get it to rescan those 963 files and report the matching 
> signature that triggered the move?

clamscan -v?

> And, how do I go about bringing the engine up to 0.96.7 since it appears 
> that Ubuntu-10.04.4 LTS has no intention up updating it?

One can build ClamAV-0.96.7 from source code, just as whoever builds the 
"official"
Ubuntu packages would.

Regards,
-- 
-Chuck

_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to