lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <000901c491e8$e73b7450$02fea8c0@fluidnyc>
From: dsardina at si.rr.com (DSardina)
Subject: Where to submit a suspected trojan or virus?

submit@...mondcs.com.au 

Add trojan to zip file and send away. Nothing accepted over 1mb.



-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of John LaCour
Sent: Friday, September 03, 2004 1:32 PM
To: Scenobro; full-disclosure@...ts.netsys.com
Subject: RE: [Full-Disclosure] Where to submit a suspected trojan or virus?


Here's my list of vendor submission addresses, many of which initially came
from Nick Fitzgerald.

antivir@...ls.ru
avsubmit.symantec.com
ipevirus@....com.au
labs@...dasoftware.com
newvirus@...persky.com
samples@...ecure.com
submit@...ertrek.com
submitvirus@...tinet.com
support@...hos.com
virus@...ivir.de
virus@...hentium.com
virus@...com
virus@...soft.cz
virus_doctor@...ndmicro.com
virus_research@....com
viruslab@...rot.com


Most of these want you to send it in a password protected zip file with a
password 'infected'.  Some of them want the password to be 'virus'.  I tend
to just send two zip files to everyone on my distribution list.

If anyone knows of any others, I'd appreciate the info.

-John

> -----Original Message-----
> From: Scenobro [mailto:scenobro@...cali.it]
> Sent: Thursday, September 02, 2004 9:00 PM
> To: full-disclosure@...ts.netsys.com
> Subject: [Full-Disclosure] Where to submit a suspected trojan 
> or virus?
> 
> 
> I  found an explorer.exe in my system32 folder which I believe take
> precedence over the real explorer.exe located in c:\windows. 
> It's a 92K file that seems to be a visual basic program. Among the 
> strings contained in it there is a "C:\TestDL.exe" which I 
> didn't find 
> on my disk and a url 
> "http://www.getupdate.com/TestDownload.exe" which 
> does't exists. (the home page of that site is a textfile 
> containing only 
> "SB2").
> I sent the file to virustotal.com and they found nothing.
> Where I can send this file for analysis?
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
> 

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ