YARA is a tool for classifying and identifying malware.
Questions tagged [yara]
9 questions
7
votes
1 answer
Unusual case of Microsoft Calculator
Pretty interesting series of event unfolded. I had a newly installed Windows Image downloaded from Microsoft Dreamspark/Imagine. less 3 weeks old with some security restriction policy, gpos etc. Anyhow I started to notice that I saw Cortana and MS…

Sam Arnold
- 105
- 7
6
votes
0 answers
How to find malware added in supply chain to Android phone?
As has become a mainstream news story many times over, some Android phones are being shipped with malware preinstalled, because they go from factory to a second party who adds the malware and then to the US.
What is the strategy for examining and…

flane
- 69
- 2
4
votes
1 answer
How can I write logical signature for ClamAV simillar as it is in YARA?
First of all, I know that yara rules can be used in combination with ClamAV, but here I have something else in my mind, so my question is; how can I write logical signature simillar as it is in YARA.
Here is an example; Let's say that I have three…

Mirsad
- 10,005
- 8
- 33
- 53
4
votes
1 answer
How do I use a directory of YARA files?
I'm going through the Malware Cookbook PEScanner and they want a path to my YARA files to search on. I currently have a directory full of YARA rules for known pieces of malware.
What would be the best way to run the scanner using all my YARA…

T. McT
- 41
- 1
- 3
2
votes
1 answer
Scanning a binary against YARA rules dictionary
I have found a malware binary, Which i am curious to see what patterns has been found from this file. Also i have a collection of ~1000 ioc's and yara-rule's related to Malwares and RAT's. I used Loki, yara-gui, The yara64 (i don't remember the link…

0_o
- 1,142
- 1
- 9
- 19
1
vote
1 answer
Yara rules not working in debian
Yara rules are working on Windows 7 perfectly. I am able to scan and detect malicious commands in .exe malware files but when I run the same program in debian v8.6, it can't detect malicious commands in .exe. When I run the same rule against a .txt…

Arun Pratap Singh
- 121
- 4
0
votes
0 answers
False Positives for YARA rule
I've run a malware ruleset from the Yara rules repository run on my Sys32 directory
yara64.exe -f -r ./malware_index.yar C:\Windows\System32
and come across a lot of positives (+extra counts) for GLASSES and GLASSESCode
Most matches are with…

N S
- 41
- 3
0
votes
1 answer
Yara condition count operator with wildcard
I have a yara rule that looks for multiple strings in a file and fires if the count is greater than 3. But how would I change the condition statement to only fire if greater than 3 but less than 5?
Essentially I want something like this
3 <…

bigC5012
- 143
- 7
-2
votes
1 answer
How long is a typical malware signature?
I read in Peter Szor's Art of Computer Virus Research and Defense that, in the past, a 16-byte malware signature was sufficient to 16-bit detect malware, but that longer signatures are necessary for 32-bit malware. I am wondering how large the…

chillsauce
- 345
- 1
- 7