This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Details on 'CXmal/ZAccess-C'

SESC v10 detects this and quarantines it; the Sophos Removal Tool appears to remove it. However, when linking to info in the Sophos Threat database, there's not a lot of information:

http://www.sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/CXmal~ZAccess-C/detailed-analysis.aspx

After reading a bit on other Zero Access malwares, now I'm concerned it may not be cleaned up.  Anyone have any input?

:39643


This thread was automatically locked due to age.
Parents
  • Hello ChickGeekHCCC,

    the article on Context-Based Detections is rather arcane (although the one rating it got is Excellent) - if I understand correctly the detection correlates the source and results (maybe dropped files) of its execution. The article is optimistic stating CXmal/ detections include cleanup where possible - the analysis nevertheless asks you to send a sample so you should probably do this.

    HTH

    Christian

    :39653
Reply
  • Hello ChickGeekHCCC,

    the article on Context-Based Detections is rather arcane (although the one rating it got is Excellent) - if I understand correctly the detection correlates the source and results (maybe dropped files) of its execution. The article is optimistic stating CXmal/ detections include cleanup where possible - the analysis nevertheless asks you to send a sample so you should probably do this.

    HTH

    Christian

    :39653
Children
No Data