

YARA – The pattern matching swiss knife for malware researchers
source link: https://www.tuicool.com/articles/iAJ3aq3
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

YARA in a nutshell
YARA is a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families (or whatever you want to describe) based on textual or binary patterns. Each description, a.k.a rule, consists of a set of strings and a boolean expression which determine its logic. Let's see an example:
rule silent_banker : banker { meta: description = "This is just an example" thread_level = 3 in_the_wild = true strings: $a = {6A 40 68 00 30 00 00 6A 14 8D 91} $b = {8D 4D B0 2B C1 83 C0 27 99 6A 4E 59 F7 F9} $c = "UVODFRYSIHLNWPEJXQZAKCBGMT" condition: $a or $b or $c }
The above rule is telling YARA that any file containing one of the three strings must be reported as silent_banker . This is just a simple example, more complex and powerful rules can be created by using wild-cards, case-insensitive strings, regular expressions, special operators and many other features that you'll find explained in YARA's documentation .
YARA is multi-platform, running on Windows, Linux and Mac OS X, and can be used through its command-line interface or from your own Python scripts with the yara-python extension.
If you plan to use YARA to scan compressed files (.zip, .tar, etc) you should take a look at yextend , a very helpful extension to YARA developed and open-sourced by Bayshore Networks.
Additional resources
If you plan to use YARA to scan compressed files (.zip, .tar, etc) you should take a look at yextend , a very helpful extension to YARA developed and open-sourced by Bayshore Networks.
Additionally, they guys from InQuest have curated an aweseome list of YARA-related stuff .
Who's using YARA
- ActiveCanopy
- Adlice
- AlienVault
- BAE Systems
- Bayshore Networks, Inc.
- BinaryAlert
- Blue Coat
- Blueliv
- Cofense
- Conix
- CrowdStrike FMS
- Cuckoo Sandbox
- Cyber Triage
- Digita Security
- Dragos Platform
- Dtex Systems
- ESET
- ESTSecurity
- Fidelis XPS
- FireEye, Inc.
- Fox-IT
- FSF
- Guidance Software
- Heroku
- Hornetsecurity
- InQuest
- JASK
- Joe Security
- jsunpack-n
- Kaspersky Lab
- Koodous
- Laika BOSS
- Lastline, Inc.
- LimaCharlie
- McAfee Advanced Threat Defense
- Metaflows
- NBS System
- Nozomi Networks
- osquery
- Payload Security
- PhishMe
- Picus Security
- Radare2
- Raytheon Cyber Products, Inc.
- RedSocks Security
- ReversingLabs
- root9B
- Scanii
- RSA ECAT
- SpamStopsHere
- stoQ
- Symantec
- Tanium
- Tenable Network Security
- The DigiTrust Group
- ThreatConnect
- ThreatStream, Inc.
- Thug
- Trend Micro
- VirusTotal Intelligence
- VMRay
- We Watch Your Website
- Websense
- x64dbg
- YALIH
Are you using it? Want to see your site listed here?
Recommend
-
145
YARA in a nutshell YARA is a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families (or whatever you want to describe) based on te...
-
148
During my day job I’ve been working on re-factoring some the internals of Juju to reverse the trend of a growing
-
37
Table of contents Overview
-
48
A while back, there was a discussion comparing the performance of using the hashbrown crate (based on...
-
23
A previous Fedora Magazine article covered tracking your time and tasks . Another introduced
-
13
Single Message Transformations - The Swiss Army Knife of Kafka Connect Posted at May 14, 2020 Do you remember Angus "Mac" MacGyver? The always creative protagonist of the popular...
-
14
Yesterday I gave a talk at Strange Loop. I’ll try to write more about the conference and my favorite things about it later, but for now here’s the talk I gave. video transcript I mean “transcript” in a very loose sen...
-
6
The Swiss Knife Complex: How a features focus approach can harm your product
-
7
YARA rules are used to classify and identify malware samples by creating descriptions of malware families based on textual or binary patterns. In this article I will cover: How YARA rules function ...
-
6
Lightning Framework: New Undetected “Swiss Army Knife” Linux Malware ⚡Written by Ryan Robinson - 21 July 2022
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK