Endpoint Protection

 View Only
Expand all | Collapse all

Risk names

ℬrίαη

ℬrίαηJan 04, 2017 08:20 AM

  • 1.  Risk names

    Posted Jan 04, 2017 07:20 AM

    Hello,

    i have a risk detected whit Trend and i want to know the name that symantec use for the same risk .

    is there any way to know that ?

    Exemple of Trend detections:

    VAN_RANSOMWARE.UMXX
    JS_NEMUCOD.SMK13
    JS_NEMUCOD.SMF1
    JS_NEMUCOD.SMKYO
    W2KM_CERBER.BYX
    VAN_DROPPER.UMXX
    VAN_MALWARE.UMXX
    VAN_BOT.UMXX

    Thank you for your answers.

    Kind regards

     



  • 2.  RE: Risk names

    Posted Jan 04, 2017 07:23 AM

    Symantec may use a different naming convention so there is no way to tell without a submission.

    Submit it to Symantec:

    https://www.symantec.com/security-center/submit-virus-samples

    Also, submit to Virustotal:

    https://www.virustotal.com/



  • 3.  RE: Risk names

    Posted Jan 04, 2017 08:08 AM

    Thank you Brian,

    i dont have a sample to submit, i already checked in virustoital whit the hash but nos results :(

    Kind regards

     



  • 4.  RE: Risk names

    Broadcom Employee
    Posted Jan 04, 2017 08:13 AM

    can you post the hash value?

    For Symantec to identify the name and detection, submission will be required.



  • 5.  RE: Risk names

    Posted Jan 04, 2017 08:20 AM

    What is the hash value of the file?



  • 6.  RE: Risk names

    Posted Jan 04, 2017 08:22 AM

    SHA1 : DDC2D148F586AA3414418FDEAFD97B09CAD3353C

    MD5 : E596C6C0DD7CDB4FC2BFBCDEF634E5FF



  • 7.  RE: Risk names

    Posted Jan 04, 2017 08:30 AM

    Unfortunately, I don't see this hash on any of the online hash lookups. How new is this file?



  • 8.  RE: Risk names

    Posted Jan 04, 2017 08:46 AM

    :(

    The detection is from today 

    other detection (also from today)

    Virus name: VAN_DROPPER.UMXX;VAN_RANSOMWARE.UMXX

    SHA1: 32D3AF539A7373ECD962686D24763B20CE3302B7
    MD5 : 1C6B4B4DC7A31807EBA56A22CE22D8A3

    do you think that i could open a case for this mater ?

     



  • 9.  RE: Risk names

    Posted Jan 04, 2017 08:49 AM

    It won't hurt to try. They'll likely need the file as a sample though. SEP does have detections for ransomware (both AV and IPS) so this may be brand new. 

    Did this file execute on one of your machines with all SEP components enabled? None of the components triggered a detection?



  • 10.  RE: Risk names

    Posted Jan 04, 2017 09:06 AM

    Hi anekkab,

    Different vendors have different names for threats.  The names you list sound similar to JS.Downloader-leading-to-Ransomware. New individual samples of that nature are released into the wild constantly in large number.  A sample, from public hash submission or the file itself, would be necessary to see how Symantec would detect it.

    Does Symantec Detect This: An Illustrated Guide to Public Hash Submission
    https://www-secure.symantec.com/connect/articles/does-symantec-detect-illustrated-guide-public-hash-submission

    Here are some resources about how to keep from being hit by that sort of threat:

    Support Perspective: W97M.Downloader Battle Plan
    https://www-secure.symantec.com/connect/articles/support-perspective-w97mdownloader-battle-plan
     

    Hardening Your Environment Against Ransomware
    https://www.symantec.com/connect/articles/hardening-your-environment-against-ransomware
     

    Please do keep this thread up-to-date with your progress!

     



  • 11.  RE: Risk names

    Broadcom Employee
    Posted Jan 04, 2017 10:39 AM

    Dear Anekkab

    The Trend Micro malware names VAN_DROPPER.UMXX, VAN_MALWARE.UMXX, VAN_BOT.UMXX, VAN_RANSOMWARE.UMXX are all created by the Trend Micro Virtual Analyzer when it analyses the files. Basically it is the name given to files with specific behaviour when the file is unknown to Trend Micro.

    In this case it doesn't make sense to try and match the names with other antimalware companies. You have to wait for a Trend Micro signature detection for that.



     

     



  • 12.  RE: Risk names

    Posted Jan 06, 2017 08:03 AM

    Hi anekkab,

    Just a ping to see if your question has now been answered?  The thread is still marked "needs solution."



  • 13.  RE: Risk names

    Posted Jan 06, 2017 08:28 AM

    Hello all,

    I opend a ticket on mysymantec.com and they confirmed that they needed a sample to be analyzed.

    I downloaded some quanrantined files but nothing

    #

    Filename

    MD5

    Determination

    Signature Protection Name

    RR Seq#

    1

    RE_ Microsoft 20695 giovanni.micieli.zip

    0x71A2153119F66CA2D8337E517E3D816C

    Archive

    N/A

    N/A

    2

    RE_ Microsoft 20695 giovanni.micieli.eml

    0x76C65AF123761F1AB68A9820BE86E1DC

    Threat Artifact

    N/A

    N/A

    3

    CC Dashboard.eml

    0x23B02318DD6E1510F81C2186DECADCA2

    NotMalicious

    N/A

    N/A



  • 14.  RE: Risk names

    Posted Jan 09, 2017 04:51 AM

    Hi anekkab,

    That looks correct to me - .eml files are not malicious in themselves.  The attachments they carry can be.  Links in them can be, but .eml alone is not malware.

    Be sure that you have a good mail security solution in place to block malicious messages with malware attachments and links! 

     

    Support Perspective: W97M.Downloader Battle Plan
    https://www-secure.symantec.com/connect/articles/support-perspective-w97mdownloader-battle-plan