GuitarBob
Joined: 09 Jul 2006 |
Posts: 9 |
Location: USA |
|
 |
Posted: Thu Jun 03, 2021 5:18 pm |
|
 |
 |
 |
 |
Below are a couple of MDB signatures for the Skinny Boy Malware used by Russian hackers to attack sensitive organizations. I guess that any sensitive orgs wouldn't be using ClamWin, but who knows. You might encounter this. These sigs are for the payload--there are no samples for the delivery, which is probably via scripts used over time to infect to evade AVs.
Copy the MDB signature(s) to a Notepad file and save it in the ClamWin db program data folder, or add the signature to an existing MDB file if you already have one there. Do not save the file with a .txt or .text extension on the end of the name. Save the file as Sigfile.mdb. Select file type All Files to prevent .txt or .text from being used at the end of the filename. ClamWin is unable to recognize a text file as a signature and will give a corrupt database warning. After saving the file to the ClamWin db program folder, scan something with ClamWin to make sure the signature works--delete the signature file if it does not, or remove the signature from an existing MDB file if you put it there and save the file as it was.
MDB signatures are signatures for a section of a malware file. They can sometimes last up to a month, especially if the section is re-used in other malware. I delete my MDB signatures two weeks after the end of the month in which they were prepared. The last section of each signature tells the month/date/time the signature was prepared (060321 is June 3, 2021 at 12:10 pm).
38400:10d30527488a96dcb31484029e290bc9:Win.Trojan.Agent-060321.1210
32256:5f0dfc6e8ebcbf57b104b3e6abdce8f7:Win.Trojan.Agent-060321.1206
Regards,
|
|