Do not run clamscan over your entire filesystem.
It's a bad idea.
In your case clamscan found something looking like a virus in its own
signatures, which is hardly surprising and certainly not a sign of an
infection.
Am 04.01.19 um 13:28 schrieb Kaushal Shriyan:
when i am running clamscan
#clamscan --infected --recursive /
/var/lib/clamav/rfxn.hdb:
YARA.Safe0ver_Shell__Safe_Mod_Bypass_By_Evilc0der_php.UNOFFICIAL FOUND
/var/lib/clamav/rfxn.ndb:
YARA.Safe0ver_Shell__Safe_Mod_Bypass_By_Evilc0der_php.UNOFFICIAL FOUND
/var/lib/clamav/rfxn.yara: {HEX}php.gzbase64.inject.452.UNOFFICIAL FOUND
[root@ clamav]# pwd
/var/lib/clamav
[root@ clamav]# ls -ltrh
total 268M
-rw-r--r--. 1 clamupdate clamupdate 113M Dec 13 02:31 main.cvd
-rw-r--r--. 1 clamupdate clamupdate 990K Jan 2 18:00 bytecode.cld
-rw-r--r--. 1 root root 441K Jan 4 03:52 rfxn.ndb
-rw-r--r--. 1 root root 828K Jan 4 03:52 rfxn.hdb
-rw-r--r--. 1 root root 400K Jan 4 03:52 rfxn.yara
-rw-r--r--. 1 clamupdate clamupdate 153M Jan 4 09:00 daily.cld
-rw-------. 1 clamupdate clamupdate 520 Jan 4 12:21 mirrors.dat
[root@ clamav]#
Is the CentOS Linux release 7.3.1611 (Core) server infected with
Malware? Please suggest. Thanks in Advance.
_______________________________________________
clamav-users mailing list
clamav-users@lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq
http://www.clamav.net/contact.html#ml