ClamAV
Installing (Linux)
Download the latest stable release from the ClamAV Site. Full documentation for the install process is included with the distribution in the file named ./doc/clamdoc.pdf.
De-compress the archive and change your working folder to the de-compressed folder
Installing for All Users
Note: the ‘All Users’ instructions have not been confirmed. They are a summary of the instructions included in the distribution.
Add a clamav user and group
groupadd clamav
useradd -g clamav -s /bin/false -c “Clam AntiVirus” clamav
Build and install
$ ./configure –sysconfdir=/etc $ make # make install
Edit /etc/clamd.conf setting the options to suit
vi /etc/clamd.conf
Edit the configuration file, ensuring you set the location of the database (DatabaseDirectory option)
vi /etc/freshclam.conf
Run the clamd daemo
$ clamd
Installing for Shell Account
Build, specifying an install location, then install
$ ./configure –prefix=/home/myname/clamav –disable-clamav $ make; make install
Edit the configuration file, ensuring you set the location of the database (DatabaseDirectory option)
$ vi ./etc/freshclam.conf
Update the virus database
$ ~/clamav/bin/freshclam
Check the database is up-to-date by examining the date shown with the version option
$ ~/clamav/bin/clamscan –version –database=./${DATABASE_LOCATION}
Test the installation
$ ~/clamav/bin/clamscan –database=./${DATABASE_LOCATION} ~
Scan
The following will provide a default recursive scan of
/media/sda1 with logging and copying of files found to be
infected.
$ mkdir infected
$ clamscan --recursive --suppress-ok-results --log=scan.log --copy=./infected/ /media/sda1
Trouble-Shooting
Heuristics.Phishing.Email.SpoofedDomain FOUND
If you believe this error is occurring due to a false positive, you
can determine the specific part of the e-mail message the heuristic
scanner has reported this scan results for, by running
clamscan with the --debug option and output
the results to a file to examine. E.g.
$ clamscan --debug email.eml 2>result.txt
Search the results.txt file for a string similar to
LibClamAV debug: Phishcheck: Phishing scan result: URLs are way too different
or grep the file to pick out all the non-clean scan results
so you can figure out what to search for:
$ egrep 'Phishing scan result:' result.txt | egrep -v 'Phishing scan result: Clean' -
Using your favourite editor, look back from the non-clean phishing
scan result message for a line similar to
LibClamAV debug: Phishcheck:Checking url. It seems the
heuristic check is checking the reported URL for HTML A
tags with a href attribute and img attribute
referencing different websites. There will also be a line similar to
LibClamAV debug: Looking up in regex_list: which lists the
two sub-domain names. To whitelist those domain combinations, create a
file named spoofing.wdb and place it in your ClamAV
database directory (the one containing daily.cdv etc.)
containing a line of the following pattern, where first-domain.tld and
second-domain.tld are the entries reported alongside
LibClamAV debug: Looking up in regex_list::
X:first-domain\.tld:second-domain\.tld
Escape any characters in the domain names that are special characters in regular expressions.
False Positives
Use VirusTotal.com to check how likely the file is a false positive.
If you think it is a false positive, submit it to ClamAV using the false positive submission form.
References
– Frank Dean - 15 Mar 2010
Related Topics: LinuxHintsAndTips, WindowsXP