|
David, looks like the final results of the file you submitted to ClamAV turned out to be the Worm.VB-8 virus as I suspected. ClamAV added detection for that virus in the Jan 18, 2006 update http://lurker.clamav.net/message/20060118.170112.26933418.en.html. The following information has been pulled from my resources, mostly McAfee's AVERT site http://vil.nai.com/vil (which incidently, indicates that McAfee customers have been protected from this worm since 5/28/2003). Vendor Virus name ================= =========== AntiVir TR/KillAV.GR Avast Win32:VB-CD AVG Worm/Generic.FX Avira TR/KillAV.GR BitDefender Win32.Worm.P2P.ABM CAT-QuickHeal I-Worm.VB.bi ClamAV Worm.VB-8 DrWeb Win32.HLLM.Generic.391 eTrust-InoculateIT Win32/Cabinet!Worm eTrust-Vet Win32/Blackmal.F Ewido Worm.VB.bi Fortinet W32/Grew.A!wm F-Prot W32/Kapser.A@mm Ikarus Email-Worm.Win32.VB.BI Kaspersky Email-Worm.Win32.VB.bi McAfee W32/Generic.worm!p2p NOD32v2 Win32/VB.NEI Norman W32/Small.KI Panda W32/Tearec.A.worm Sophos W32/Nyxem-D Symantec no virus found TheHacker no virus found UNA I-Worm.VB VBA32 Email-Worm.Win32.VB.bi ============== The following information is copied from McAfee's AVERT http://vil.nai.com/vil/content/v_100342.htm -- Update January 17, 2005 -- A new variant of W32/MyWife@MM is being proactively detected as W32/Generic.worm!p2p. For details on this threat, see W32/MyWife.d@MM at http://vil.nai.com/vil/content/v_138027.htm
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.