If you're interested in monitoring what virustotal has seen, you can do a 
search like this: 
https://www.virustotal.com/gui/search/Multios.Exploit.CVE_2022_3602-9976476-0/files

At present, it only shows a single .pcap​ network traffic recording as having 
matched with the signature.

That is for revision 0 of the signature, though.  The signature has been 
updated and there is a newer one: Multios.Exploit.CVE_2022_3602-9976476-1

Searching for this signature does not show any hits on VirusTotal, yet: 
https://www.virustotal.com/gui/search/Multios.Exploit.CVE_2022_3602-9976476-1

I imagine additional files will appear with time.

Unfortunately, I do not have a sample that I can share for this signature.

Regards,
Micah

Micah Snyder
ClamAV Development
Talos
Cisco Systems, Inc.
________________________________
From: clamav-users <clamav-users-boun...@lists.clamav.net> on behalf of 
Turritopsis Dohrnii Teo En Ming via clamav-users <clamav-users@lists.clamav.net>
Sent: Monday, November 7, 2022 5:21 AM
To: ClamAV users ML <clamav-users@lists.clamav.net>
Cc: Turritopsis Dohrnii Teo En Ming <tdtemc...@gmail.com>; 
c...@teo-en-ming-corp.com <c...@teo-en-ming-corp.com>
Subject: Re: [clamav-users] ClamAV signatures have been released to detect 
malware exploiting CVE-2022-3602 and CVE-2022-3786 OpenSSL 3.0.x security 
vulnerabilities



On Mon, 7 Nov 2022 at 08:39, Al Varnell via clamav-users 
<clamav-users@lists.clamav.net<mailto:clamav-users@lists.clamav.net>> wrote:
Those are vulnerability signatures, not necessarily for any existing malware. 
Anything that attempts to exploit those vulnerabilities should be caught.

Noted with thanks.

Mr. Turritopsis Dohrnii Teo En Ming
Targeted Individual in Singapore
_______________________________________________

Manage your clamav-users mailing list subscription / unsubscribe:
https://lists.clamav.net/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/Cisco-Talos/clamav-documentation

https://docs.clamav.net/#mailing-lists-and-chat

Reply via email to