[clamav-users] how to verify if a malware signature is in DB & adding hash
Al Varnell
alvarnell at mac.com
Mon May 6 06:44:46 UTC 2019
On May 5, 2019, at 23:24, Sunhux G via clamav-users <clamav-users at lists.clamav.net> wrote:
> Where can I download a copy of sigtool (that's pre-compiled) for
> Solaris 10 and RHEL7? Was combing clamav site but can't locate it.
> Appreciate a full URL to download it.
It's built into your ClamAV installation in clamav/bin.
> As for actual file, it's too dangerous as they're ransomware/malware,
> so wouldn't want to get a copy of it.
It's only dangerous if launched. The file itself just sitting on a drive is harmless and you only need it log enough to perform one scan to get the answer to your original question. I thought the whole purpose of your questions were based on being able to identify that this malware was on your drive so you wouldn’t become infected.
Honestly, I have to say, based on all the questions you are asking, you don't have sufficient knowledge yet of basic anti-malware operations to be undertaking this level of investigation.
If this is a well known malware in the wild, there is an extremely high probability that there is a signature in the ClamAV database already, and it may well not be in the form of a hash. IMHO, you need to trust that the professionals at Talos/ClamAV are on top of these things and better use your time and energies.
-Al-
More information about the clamav-users
mailing list