GuitarBob
Joined: 09 Jul 2006 |
Posts: 9 |
Location: USA |
|
 |
Posted: Mon Jun 28, 2021 4:45 pm |
|
 |
 |
 |
 |
Microsoft let a signed certificate from a rootkit bypass its security. They have fixed it in Windows Defender, but I am attaching 3 related MDB signatures (for 2 droppers plus the rootkit driver). Copy the MDB signature(s) to a Notepad file and save it in the ClamWin db program data folder, or add the signature to an existing MDB file if you already have one there. Do not save the file with a .txt or .text extension on the end of the name. Save the file as Sigfile.mdb. Select file type All Files to prevent .txt or .text from being used at the end of the filename. ClamWin is unable to recognize a text file as a signature and will give a corrupt database warning. After saving the file to the ClamWin db program folder, scan something with ClamWin to make sure the signature works--delete the signature file if it does not, or remove the signature from an existing MDB file if you put it there and save the file as it was.
MDB signatures are signatures for a section of a malware file. They can sometimes last up to a month, especially if the section is re-used in other malware. I delete my MDB signatures two weeks after the end of the month in which they were prepared. The last section of each signature tells the month/date/time the signature was prepared (062821.1136 is June 28 2021 at 11:36 am).
26624:098176cbe7675264d6f52aefe3ebd623:Win.Trojan.Dropper-062821.1136
109568:12d6f69ba868596cb4a6723689a1b8fa:Win.Trojan.Dropper-062821.1133
26624:15f5563904f45f5272fac59eae00f78b:Win.Trojan.Netfilter-062821.1128
Regards,
|
|