How to submit samples to McAfee Labs for suspected malware detection failure (Virus not found) or Clean failure for detected malware

How to submit samples to McAfee Labs for suspected malware detection failure (Virus not found) or Clean failure for detected malware


Environment

McAfee DAT files
McAfee Labs
Multiple McAfee products

Summary

If you have a file that you think is infected but was not detected by your McAfee anti-virus software, or that was detected but was not cleaned, use the instructions in this article and submit the sample to McAfee Labs for evaluation. McAfee Labs can receive samples for review and potential inclusion into the daily DAT file releases or GTI File Reputation for future detection.

Issue types and submission methods
Follow the sample submission method below based on the issue type:
  • Clean failure: If a malware detection occurred and the action is "Clean Failed," email the sample to virus_research@avertlabs.com and immediately open a Malware related Service Request using the ServicePortal at https://support.mcafee.com or by contacting Technical Support.
  • Virus Information Library (VIL) request (with sample): If you have a malware sample and require details about its behavior, email the sample to virus_research@avertlabs.com and immediately open a Malware related Service Request using the ServicePortal at https://support.mcafee.com or by contacting Technical Support.
  • Detection failure: If you have a file that is not detected by McAfee, submit the sample to McAfee Labs using the ServicePortal.
  • Suspected false positive: If you have a file that you suspect is falsely detected by McAfee, submit the sample to McAfee Labs using the instructions in KB85567.
To contact Technical Support, log on to the ServicePortal and go to the Create a Service Request page at https://support.mcafee.com/ServicePortal/faces/serviceRequests/createSR:
  • If you are a registered user, type your User Id and Password, and then click Log In.
  • If you are not a registered user, click Register and complete the required fields. Your password and logon instructions will be emailed to you.

To submit samples to McAfee Labs using the ServicePortal:
  1. Log on to the ServicePortal at https://support.mcafee.com using your Grant Number.
  2. Click the Service Requests tab.
  3. Click the Submit a Sample tab.
  4. Click Continue.
  5. Complete the submission details.
  6. Upload the samples.
  7. Click Submit. A Sample Submission Service Request is created on the ServicePortal, which you can use to track progress. This system is automated and no support agents are assigned to submissions. The Service Request number is provided only for tracking purposes and is not monitored.

Below are other methods to submit samples for review:
  • Web Gateway: If you are using Web Gateway, follow the product-specific instructions in KB62662 to collect and submit samples.
  • Advanced Threat Defense: If you are using Advanced Threat Defense, follow the product-specific instructions in KB83659 to collect and submit samples.
  • GetSusp: GetSusp is a free tool that helps you find and log undetected malware. GetSusp has built-in submission capabilities that allow you to automatically submit samples to McAfee Labs.

    To review the FAQs for GetSusp, see KB69385.
    To download GetSusp, go to http://www.mcafee.com/us/downloads/free-tools/getsusp.aspx.
     
  • FTP: Submissions through FTP are accepted only if the samples exceed the limits for the ServicePortal, or if there is a technical issue with the ServicePortal or email submission. In this case, follow the instructions in KB87703 to submit the samples through FTP.
Submission requirements
It is important that this information is followed because not doing so will cause a submission or sample processing failure. Submissions or samples that have failed as a result of not adhering to these requirements is discarded without further processing, and you are not sent any notification to that effect.
  • The sample must be in a password-protected .zip or .7z file. RAR and other formats will not be processed.
  • The .zip file must be a single level. Do not include .zip files within the .zip file, with or without password protection, and do not include folder structures that are more than one level deep. These actions can cause samples to not be processed.
  • The file extension of the password-protected .zip file must be .zip or .7z. Any other extensions, or lack of an extension, causes the sample to not be processed.
  • When creating the .zip file, do not use AES or other types of encryption available from the program; use only a password for protection.
  • You must use the word infected as the password for the .zip or .7z file. Any other password causes the sample to not be processed.
  • Do not include more than 100 files within the .zip or .7z file. More than 100 files causes the sample to not be processed. If you have more than 100 files, spread them across multiple submissions.
  • The .zip file can be no larger than 50 MB. Larger .zip or .7z files cause the sample to not be processed.
For more information about creating a .zip file:Additional requirements
Provide the following information:
  • File path where the sample was found
Potentially Unwanted Program (PUP) requirements
Submit the full installation package for the PUP. This package is needed for McAfee Labs to determine PUP coverage. Programs must violate the McAfee PUP policy to be classified as a PUP: https://www.mcafee.com/enterprise/en-us/assets/misc/ms-pup-policy.pdf.

What not to submit
Do not submit additional files other than the suspected file as it resides on the system because it will cause delays in processing, and might cause the submission to fail by increasing the total number of files or size over the permitted thresholds. The following list contains some examples of what not to send:
  • Log files from scans, such as On-Demand or On-Access Log files
  • Screenshots
  • .eml or .msg files (submit only the files that are attached to the emails, not the email itself)
  • Reports created by forensics tools
  • String dumps
  • Network traffic dumps
Submit only the suspicious files.

What to expect after submitting your sample
You will receive no further notifications until the sample has been analyzed. Track progress in the Service Request created on the ServicePortal. If an Extra.DAT relating to your sample is posted to the ServicePortal, you will be informed of its availability in an email. Check your Service Request on the ServicePortal to download the Extra.DAT file. You will not receive any Extra.DAT files via email or otherwise:
  • To manually check in and deploy an Extra.DAT through ePolicy Orchestrator, see KB67602.
  • For instructions on how to apply an Extra.DAT locally for Endpoint Security, see the "Load an Extra.DAT file" section of the Endpoint Security Product Guide.
  • For instructions on how to apply an Extra.DAT locally for VirusScan Enterprise, see KB50642.
  • For instructions on how to apply an Extra.DAT to Security for Microsoft Exchange, see KB76201.
  • For instructions on how to apply an Extra.DAT to Security for SaaS Endpoint Protection, see KB51459.
  • For instructions on how to combine one or more Extra.DAT files, see KB68061.
    • Related Articles

    • McAfee ePolicy Orchestrator server backup and disaster recovery procedure

      Environment McAfee ePolicy Orchestrator (ePO) 5.x Summary This article provides information about the backup and disaster recovery process for the ePO server. IMPORTANT: This procedure is intended for use by network and ePO administrators only. ...
    • EE020006 Endpoint Encryption Disk information not found (when booting from DETech using the Standalone USB version)

      Environment McAfee Drive Encryption (DE) 7.x For details of DE supported environments, see KB79422. Problem If you boot a system that is encrypted from a USB DETech standalone recovery media, it fails to authenticate. If you click any of the ...
    • How to respond to a ransomware infection

      Environment McAfee Endpoint Security (ENS) Threat Prevention 10.x McAfee Host Intrusion Prevention (Host IPS) 8.0 McAfee VirusScan Enterprise (VSE) 8.8 Summary This article provides general guidance to first responders during a ransomware outbreak. ...
    • TIE POC Guide Final

      ​ ​ ​ Contents Introduction Purpose Deployment Requirements Optional Components Requirements/Pre-Requisites Installation and Configuration Checklist Installation and Configuration of McAfee Threat Intelligence Exchange (TIE) and Data Exchange Layer ...
    • LINUX Endpoint Security Commands Summary

      LINUX (Create an on-demand scan task) To configure a scan with your custom settings, create an on-demand task.  Task Log on to your Linux system as root user.  Change directory to the /bin folder of the software.  cd ...