Hi there,

On Mon, 21 Feb 2022, Eliya Voldman via clamav-users wrote:

... found this line in the log:

C:\Windows\SysWOW64\sechost.dll: Win.Trojan.Pemalform-9786579-0 FOUND

You should take positive action to investigate anything which gives a
result like this.  It may mean that the computer has been compromised,
or it could be a false positive.  I did a quick search and I didn't
find very much but I don't have all day to spend on it.  Be aware that
different suppliers of threat information may call the *same* threats
by different names.

As this seems to be a fairly old signature, if it really is a false
positive, I'd almost have expected that it would have been mentioned
on this list by now.  AFAICT it hasn't.

Here's the decoded signature:
8<----------------------------------------------------------------------
$ time sigtool --datadir=/EXPORTS/clamav/databases --find-sigs 
'Win.Trojan.Pemalform-9786579-0' | sigtool --decode-sigs
VIRUS NAME: Win.Trojan.Pemalform-9786579-0
TDB: Engine:81-255,Target:1
LOGICAL EXPRESSION: 0&1&2&3&4
 * SUBSIG ID 0
 +-> OFFSET: ANY
 +-> SIGMOD: WIDE
 +-> DECODED SUBSIGNATURE:
 !"&)(<>=|%5C%5C.%5CMutex%5C
 * SUBSIG ID 1
 +-> OFFSET: ANY
 +-> SIGMOD: WIDE
 +-> DECODED SUBSIGNATURE:
LastRunPercentFragmentation
 * SUBSIG ID 2
 +-> OFFSET: ANY
 +-> SIGMOD: WIDE
 +-> DECODED SUBSIGNATURE:
\Registry\Machine\Software\Microsoft\SQMClient
 * SUBSIG ID 3
 +-> OFFSET: ANY
 +-> SIGMOD: NONE
 +-> DECODED SUBSIGNATURE:
ARSDS{Z,
 * SUBSIG ID 4
 +-> OFFSET: ANY
 +-> SIGMOD: NONE
 +-> DECODED SUBSIGNATURE:
)^72>x

real    2m16.854s
user    0m7.074s
sys     0m6.778s
8<----------------------------------------------------------------------

To me, because of all those 'ANY' offsets, it looks possible that this
*could* generate false positives - but I certainly wouldn't claim to be
an expert on the assessment of signature performance and I haven't even
looked at the content of the genuine file nor any malicious versions.

There's a lot of advice Out There.  You could for example calculate
the MD5 digest of the file content and search for that (this is one of
the more efficient ways of looking for indicators) or you could submit
the file to the ClamAV team, and to any of a number of Websites which
collect malware, for analysis.  You might want to install yet another
scanning tool on the computer to see if it agrees with ClamAV, but if
the threat is real, and the malicious actor is competent, the results
are likely to be unreliable.  It might be better to take the file from
the affected computer and scan it elsewhere.  There might be readers
on this mailing list who can provide the MD5 of the same file for you
to compare it with that for your file.
The main things to consider are that

(1) all this might be a storm in a teacup if it's a false positive

(2) this computer, apparently on a connection which does not permit
traffic from the Internet, might possibly be compromised

(3) if this computer is on the same firewalled network as other
computers, it might present a threat to those other computers - I'd
advise disconnecting it until you're sure one way or another

(4) if the computer is in fact compromised, my advice would be to wipe
it thoroughly, reinstall all software and data from known good sources
and then monitor it carefully in controlled conditions until it can be
confidently called 'clean' (given the prevalence of Windows malware,
that's quite a tall order for a Windows box at the best of times)

(5) if it's a real compromise you'll want to know how it got there,
and take steps to prevent it from happening again

(6) there are many Websites out there which will lie to you about
things like this, for example they will tell you that absolutely
anything you submit to them is a danger and that you need to pay them
money in order to fix the problem, or perhaps you should download the
version of the file that they provide; be careful what you believe.

Does it mean that I could/should rely on 'FOUND' or it should be something
'more specific'?

A ClamAV scan normally gives the word 'FOUND' in the output which it
produces when something it scans matches a signature or a heuristic.
If that's enough for you to decide on what's been found depends on you
and to some extent on what you're looking at.  For example if you have
files which contain the word 'FOUND' in their names, or in the names
of the directories which contain them, then yes, you might need to be
more specific.  But we can't really tell you because we don't know
exactly what you're looking at.  ClamAV is primarily a toolkit, and
how you use it is primarily up to you.

--
73,
Ged.

_______________________________________________

clamav-users mailing list
clamav-users@lists.clamav.net
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to