[nsp-sec] [OT] New feed - ClamAV signatures
Dimitrios Kalogeras
D.Kalogeras at noc.ntua.gr
Mon Jan 28 06:03:52 EST 2008
Hi Rob,
Thanks for the nice service.
We did a short of comparison with the respect to our daily channel. It
is nice that we find differences and that there is a hit in the scanning
feed which in different case, it would have gone unnoticed. Is there
a correspondence between the signature feed and the viruses /trojan names ?
Regards,
Dimitris
Segment of the comparison follows :
- Νormal
/artifacts/binaries/0f8f00b9bb264ea4c7129fbfc4ada24d: OK
/artifacts/binaries/1cd42b27c7ea9c5f43e1e2de1dad25a8: OK
/artifacts/binaries/21e0e2bb5d7c0c0b5342de6229cb49f8: OK
/artifacts/binaries/29f0569b6b287b09a0a296e8eb616566: OK
/artifacts/binaries/45fc0e9e1285e77456fead2cf2f02820: OK
/artifacts/binaries/4f64d8c58fc352c308d946546adcb547: Trojan.Agent-8231
FOUND
/artifacts/binaries/5ae700c1dffb00cef492844a4db6cd69: Worm.Blaster.A FOUND
/artifacts/binaries/6b58d96801ee561e9b9e2204811caefd: OK
/artifacts/binaries/8caaebe038838614d51f852f75918d68: OK
/artifacts/binaries/8e0975e55e29ad1a85d47e80ab00e2bc: Trojan.SdBot-7769
FOUND
/artifacts/binaries/ad410dbfeaeea4ed9c253a2140d1004b: OK
/artifacts/binaries/c2204a662150d482795816ca7b0699c6: OK
/artifacts/binaries/cb032b12af742555e60124f6d7d2d2ea: OK
/artifacts/binaries/e92a8302b8fab21cdc8b7f191a584f06: W32.Virut.ci FOUND
/artifacts/binaries/ecaea72984c74bc57f9221d506bc55d5: OK
/artifacts/binaries/f89c3a4394bd82d3aaf68fa4513008cc: OK
- 0 day
/artifacts/binaries/0f8f00b9bb264ea4c7129fbfc4ada24d: DETECT_25.00 FOUND
/artifacts/binaries/1cd42b27c7ea9c5f43e1e2de1dad25a8: DETECT_11.11 FOUND
/artifacts/binaries/21e0e2bb5d7c0c0b5342de6229cb49f8: DETECT_19.44 FOUND
/artifacts/binaries/29f0569b6b287b09a0a296e8eb616566: DETECT_28.57 FOUND
/artifacts/binaries/45fc0e9e1285e77456fead2cf2f02820: DETECT_17.14 FOUND
/artifacts/binaries/4f64d8c58fc352c308d946546adcb547: DETECT_32.26 FOUND
/artifacts/binaries/5ae700c1dffb00cef492844a4db6cd69: Worm.Blaster.A FOUND
/artifacts/binaries/6b58d96801ee561e9b9e2204811caefd: DETECT_37.14 FOUND
/artifacts/binaries/8caaebe038838614d51f852f75918d68: DETECT_77.78 FOUND
/artifacts/binaries/8e0975e55e29ad1a85d47e80ab00e2bc: Trojan.SdBot-7769
FOUND
/artifacts/binaries/ad410dbfeaeea4ed9c253a2140d1004b: DETECT_41.67 FOUND
/artifacts/binaries/c2204a662150d482795816ca7b0699c6: DETECT_31.43 FOUND
/artifacts/binaries/cb032b12af742555e60124f6d7d2d2ea: DETECT_65.71 FOUND
/artifacts/binaries/e92a8302b8fab21cdc8b7f191a584f06: W32.Virut.ci FOUND
/artifacts/binaries/ecaea72984c74bc57f9221d506bc55d5: DETECT_31.43 FOUND
/artifacts/binaries/f89c3a4394bd82d3aaf68fa4513008cc: DETECT_11.43 FOUND
Rob Thomas wrote:
> ----------- nsp-security Confidential --------
>
> Hi, team.
>
> We are pleased to announce that our ClamAV signatures project is now
> ready for release. We base our signatures on our large malware
> menagerie. Each sample we collect is scrutinized by 33+ anti-virus
> packages and several sandboxes. The resulting analysis determines if
> the sample is malware. We then generate ClamAV signatures for those
> samples that are tagged as malware by our malware analysis process.
> We're processing circa 15K new malware samples per day, so this is a
> significant amount.
>
> Many of you are likely already familiar with ClamAV, which runs on a
> wide variety of platforms. You can read a bit about ClamAV and all
> about our ClamAV Signatures Project at the following URL:
>
> URL: <https://clamsigs.cymru.com/avsigs/>
> Login: tcsigs
> Pass: klams1gz
>
> Please do take the time to read the verbiage regarding installation.
> Our thanks to Larry Lidz for providing a handy Unix-based download
> shell script, which you'll find referenced on the main page.
>
> The actual signature files can be found at the following
> authenticated URL. Please use your nsp-sec mailing list login and
> password to access the download section of our ClamAV Signatures
> Project page.
>
> URL: <https://clamsigs.cymru.com/avsigs/downloads/>
>
> If you have forgotten or need to reset your nsp-sec mailing list
> login and password, you'll find a handy reset tool at the bottom of
> the following page:
>
> URL: <https://puck.nether.net/mailman/listinfo/nsp-security>
>
> We do not intend to make this fully public, but instead will confine
> it to vetted communities such as nsp-sec and FIRST. You may freely
> use these signatures on any platform capable of running ClamAV. You
> may redistribute the signatures within your organization. These
> signatures are for non-commercial use ONLY. If you are interested in
> redistributing these signatures in your products or through your
> customer services, you MUST obtain our written permission to do so.
> We don't want to spend time debugging flash-crowd DDoS. :)
>
> Please remember that this is a *FREE* service and we provide no
> warranties or guarantees. We strive for high quality in all of our
> feeds, but there exists the possibility that these signatures will
> generate false positives, impact the performance of ClamAV, or
> increase the carbon footprint of Al Gore's mansion. Use at your own
> risk.
>
> We remain keenly interested in any and all suggestions, feedback, and
> reports of false positives. Please send those to <team-
> cymru at cymru.com>.
>
> Thanks!
> Rob.
_______________________________________________
nsp-security mailing list
nsp-security at puck.nether.net
https://puck.nether.net/mailman/listinfo/nsp-security
Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
community. Confidentiality is essential for effective Internet security
counter-measures.
_______________________________________________
--
Dimitrios K. Kalogeras
Electrical Engineer, Ph.D.
Network Engineer
NTUA/GR-Net Network Management Center
_____________________________________
icq: 11887484
voice: +30-210-772 1863
fax: +30-210-772 1866
e-mail: D.Kalogeras at noc.ntua.gr
pub 1024D/0E421B50 2007-01-17 [expires: 2008-01-17] Dimitrios
Kalogeras (dkalo) <D.Kalogeras at noc.ntua.gr>
Key fingerprint = F8C8 7B67 74A4 1F82 CDDF 8554 E1EF 7FAE 0E42 1B50
PGP-KEY: http://ajax.noc.ntua.gr/~dkalo/dkalo_pgp.txt
More information about the nsp-security
mailing list