[clamav-users] Recommended workstation usage?
Dan Rawson
drawson1 at earthlink.net
Wed Dec 20 13:05:26 UTC 2017
Maarten -
Great summary, thanks!
Dan
On 12/20/2017 07:02 AM, Maarten Broekman wrote:
> There are far more than 31 signatures that have the potential to impact
> Linux systems. There are, in truth, over 23,000 signatures that are able to
> detect malware on Linux and Unix systems. Most "Linux" signatures only
> contain the word Unix, however. Additionally, keep in mind that these are
> only from the ClamAV provided databases. Sanesecurity and the Linux Malware
> Detect project add more as well.
>
> Of the official databases, the signatures break down like this for Unix
> signatures:
> 1 [bytecode]
> 7386 [daily.hdb]
> 11640 [daily.hsb]
> 67 [daily.ldb]
> 11 [daily.ndb]
> 141 [main.hdb]
> 3445 [main.hsb]
> 5 [main.mdb]
> 426 [main.ndb]
> 2 [daily.ldb] <== These are noted by Al in his previous message.
>
> Aside from the Win.* signatures, these are the major grouping of the
> non-hash signatures:
> 1 Unix.Downloader
> 28 Unix.Exploit
> 1 Unix.Malware
> 1 Unix.Packer
> 6 Unix.Rootkit
> 311 Unix.Tool
> 144 Unix.Trojan
> 11 Unix.Worm
>
> Of the hashes, there are about 50 different 'families' of Unix/Linux
> related malware of varying specificity:
> 3 Unix.Adware.Bundlore
> 1 Unix.Adware.Bundloreca
> 9 Unix.Adware.Genieo
> 1 Unix.Adware.Installmiez
> 1 Unix.Adware.Macinst
> 1 Unix.Adware.Spigot
> 1 Unix.Adware.Xloader
> 1 Unix.Downloader.Amcleaner
> 1 Unix.Exploit.CVE_2016_8733
> 1 Unix.Exploit.CVE_2016_9032
> 1 Unix.Exploit.CVE_2016_9033
> 1 Unix.Exploit.CVE_2017_1000253
> 1 Unix.Exploit.Gingerbreak
> 1 Unix.Exploit.Iosjailbreak
> 1 Unix.Exploit.Lacksand
> 4 Unix.Exploit.Lotoor
> 1 Unix.Exploit.Powershell
> 1 Unix.Exploit.Remotesync
> 1 Unix.Exploit.Roothack
> 1 Unix.Exploit.TALOS_2016_0257
> 21777 Unix.Malware.Agent
> 1 Unix.Malware.Generic
> 1 Unix.Malware.Setag
> 4 Unix.Malware.Tsunami
> 1 Unix.Malware.Xorddos
> 1 Unix.Spyware.Opinionspy
> 1 Unix.Tool.Dnsamp
> 6 Unix.Tool.Dofloo
> 448 Unix.Tool.EQGRP
> 5 Unix.Tool.FakeAV
> 1 Unix.Tool.Flood
> 1 Unix.Tool.Zusy
> 137 Unix.Trojan.Agent
> 6 Unix.Trojan.Cornelgen
> 7 Unix.Trojan.Ddostf
> 13 Unix.Trojan.Dofloo
> 1 Unix.Trojan.Dogspectus
> 1 Unix.Trojan.Elknot
> 1 Unix.Trojan.Elzob
> 127 Unix.Trojan.Gafgyt
> 3 Unix.Trojan.Hanthie
> 3 Unix.Trojan.Mayday
> 24 Unix.Trojan.Mirai
> 2 Unix.Trojan.Small
> 7 Unix.Trojan.Tsunami
> 1 Unix.Trojan.Webshell
> 1 Unix.Trojan.Zonie
> 1 Unix.Virus.Zusy
> 1 Unix.Worm.Cheese
> 1 Unix.Worm.Darlloz
>
> My suggestion is, yes. Run ClamAV. But don't rely on just the official
> databases.
>
> --Maarten
>
> On Wed, Dec 20, 2017 at 4:09 AM, Al Varnell <alvarnell at mac.com> wrote:
>
>> FYI, there are 31 ClamAV signatures that contain the word "Linux". There
>> are currently almost 6.4 million ClamAV signatures in the database.
>>
>> All but two are in main.ndb or main.hdb, meaning they are relatively old.
>>
>> All but five start with Win.Trojan or Win.Exploit or Win.Tool so I'm not
>> clear on their relationship to Linux.
>>
>> The two most recent ones are:
>> - Unix.Trojan.Linux_DDoS_93-2
>> - Unix.Trojan.Linux_DDoS_93-5364119-0
>>
>> -Al-
>>
>> On Wed, Dec 20, 2017 at 12:47 AM, Matus UHLAR - fantomas wrote:
>>> On 19.12.17 12:44, Dan Rawson wrote:
>>>> I'm working on running clamav on my Linux workstation - NOT a server
>> environment. What is the recommended usage in that environment? clamd +
>> OnAccess? clamscan scheduled from cron?? clamdscan scheduled from cron??
>>>> I did search through the documentation but didn't see much addressing
>> "best practices" in a single machine environment.
>>> I haven't seen a linux malware yet. Well, I've heard that it exists, but
>>> haven't seen it (except hacking suite...)
>>>
>>> what makes you think you need it?
>> -Al-
>> --
>> Al Varnell
>> Mountain View, CA
>>
>>
>>
>>
>>
>> _______________________________________________
>> clamav-users mailing list
>> clamav-users at lists.clamav.net
>> http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users
>>
>>
>> Help us build a comprehensive ClamAV guide:
>> https://github.com/vrtadmin/clamav-faq
>>
>> http://www.clamav.net/contact.html#ml
>>
> _______________________________________________
> clamav-users mailing list
> clamav-users at lists.clamav.net
> http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users
>
>
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
>
> http://www.clamav.net/contact.html#ml
>
More information about the clamav-users
mailing list