Running SAV on Ubuntu, I was scanning drives of a Windows-virtual machine (mounted the VMDK-files) and the memory-snapshot of that VM (i.e. the SnapshotXX.vmem), using the following command:
I added -dn to see it making progress, -f for full scan, --no-stop-scan to force scanning large files as the pagefile.sys, -rec for recursive scanning (obviously), and all -archive
SAV reports two hits
To rule out false positive, how do I go about finding more useful information than of the above?
Kind regards
Did you pull the 2 hits from the logs and was that all the available detail in there-
Sophos Anti-Virus logs details of scanning activity in the Sophos Anti-Virus log and syslog. In addition, virus and error events are logged in the Sophos Anti-Virus log. ■ To view the Sophos Anti-Virus log, use the command savlog. This can be used with various options to restrict the output to certain messages and to control the display. For example, to display all messages logged to the Sophos Anti-Virus log in the last 24 hours, and to display the date and time in UTC/ISO 8601 format, type: /opt/sophos-av/bin/savlog --today --utc ■ To see a complete list of the options that can be used with savlog, type: man savlog
Respectfully,
Badrobot
The logs were not helpful at all, example:
[…] log.threat Threat detected in /mnt/windows_mount2/pagefile.sys: Nutcracker Boot during on-demand scan. (The file is still infected.)
Hello Knut Erik Hauslo,
logs were not helpfulnot really a surprise, it's unfeasible to provide an execution trace.Another indication that these are FPs is that both Nutcracker Boot and Troj/VGA are from the distant past.
Christian