[clamav-users] Elmedia Player.app detection
Eric Tykwinski
eric-list at truenet.com
Tue Dec 10 16:33:39 UTC 2019
Found an article on it:
https://www.intego.com/mac-security-blog/osxproton-malware-is-back-heres-wha
t-mac-users-need-to-know/
From: clamav-users [mailto:clamav-users-bounces at lists.clamav.net] On Behalf
Of Al Varnell via clamav-users
Sent: Tuesday, December 10, 2019 11:25 AM
To: ClamAV users ML
Cc: Al Varnell
Subject: Re: [clamav-users] Elmedia Player.app detection
That signature has been in the database since Oct 20, 2017 and is a hash
signature, so there's little chance of it being an FP.
[daily.hsb]
17fe5ebacff74bfb6028eb371ceeaf2b:2484384:Osx.Trojan.Proton-6352635-0:73
-Al-
ClamXAV User
On Tue, Dec 10, 2019 at 06:02 AM, Douglas Stinnette wrote:
Seems to me that this is a false positive.
/Applications/Elmedia Player.app/Contents/MacOS/Elmedia Player
Osx.Trojan.Proton-6352635-0 FOUND
I sent a copy of the file to other vendors to double check it and they
reported it was not malware.
I have submitted false positives to ClamAV before and never received an
update on them:
https://www.clamav.net/reports/fp
What do others do when they get ClamAV false positives?
Thanks,
Doug
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.clamav.net/pipermail/clamav-users/attachments/20191210/a1c99111/attachment.htm>
More information about the clamav-users
mailing list