[clamav-users] Probable false positive *.xlsm - Win.Trojan.Toa-5368540-0

Reindl Harald h.reindl at thelounge.net
Thu Dec 29 09:15:13 UTC 2016


Am 29.12.2016 um 07:30 schrieb demonhunter:
> Samples can be easily generated by creating a blank Word or Excel document, creating an empty macro module with a single empty subroutine, and saving the Word/Excel file as a .docm or .xlsm file. Scanning one of these brand new files against a saved copy of the signature shows that it matches (implying that all or nearly all modern Office 2007+ files containing VBA macros would have matched this rule):

yeah, but only the docm/xlsm and frankly on a sane inbound mailserver 
you reject them unconditional - i have even seen servers in the wild 
rejecting xls/doc and use xlsx/docx because they *could* contain macros 
to keep all the crypto malware out of the house

signatures where and will be always too late for the last recent malware 
and hence in 2016 macros and executeables don't belong into emails at all



More information about the clamav-users mailing list