Hi,
I seem to be encountering the same issue someone described here:
https://www.mail-archive.com/clamav-users@lists.clamav.net/msg46022.html
For me the null-message arrived when switching to root:
ScanOnAccess: /root/.bash_history: (null) FOUND
I'm running on RHEL7 server, latest updates with v
PUA.Andr.Trojan.Generic-6878612-0 has also been dropped earlier today and will
be removed in the next daily update.
Regards,
Micah
On 3/13/19, 7:33 AM, "clamav-users on behalf of Mark Foley"
wrote:
On Wed, 13 Mar 2019 11:26:06 +0100 vamp898 wrote:
>
> Hi there,
>
> since
On Wed, 13 Mar 2019 11:26:06 +0100 vamp898 wrote:
>
> Hi there,
>
> since a few days we get a _lot_ detections for
> PUA.Andr.Trojan.Generic-6878612-0
>
> Office Documents, ZIP Docuemnts, JPEG Images (containing nothing as
> JPEG) are all more and more detected at this type. Not all of them but
Not sure exactly when this was added to the .ldu database, but by the name it's
a Possibly Unwanted Android Application, so unlikely to be found in that many
different types of files. The signature looks like this:
> VIRUS NAME: PUA.Andr.Trojan.Generic-6878612-0
> TDB: Engine:51-255,FileSize:104
Hi there,
since a few days we get a _lot_ detections for
PUA.Andr.Trojan.Generic-6878612-0
Office Documents, ZIP Docuemnts, JPEG Images (containing nothing as
JPEG) are all more and more detected at this type. Not all of them but
way too much to see a real pattern what the actual issue is :(
That does not appear to be a well anchored regex.
dp
On 3/12/19 9:15 PM, Al Varnell via clamav-users wrote:
All I can add is some technical information about the signature. I have no
idea what kind of infection it causes and on what platform.
The signature was added to the database by daily -