YARA

12009611461?profile=RESIZE_400xNot to be confused with the model/actress Yara Shahidi, today Labs Con will discuss using YARA in cyber diagnostics.  This must-see talk discusses a highly-regarded but rarely publicly investigated threat actor, malware similarity, and YARA.  Publicly available data yields just a generic AV signature with the actor’s name, leaving a void for malware analysts looking to understand the overlaps between different malware families attributed to the same actor.

Greg Lesnewich explores how analysts can use YARA as an analyzer with the console output, leveraging some simple Python scripting, to develop a malware similarity methodology.  With a little, but not too much effort, analysts can easily build their own custom malware analysis toolkits using nothing other than freely available open source projects.

Greg’s presentation highlights just how well YARA can be used to pursue an apex predator and contains plenty of examples and links to all the tools used in the talk.  Greg also shares the custom tooling he built as he analyzed a notorious threat actor, which can easily be adopted or adapted by other analysts to suit their own purposes.[1]

Link to full video: https://youtu.be/aaV7UieJ_l4

This article is presented at no charge for educational and informational purposes only.

Red Sky Alliance is a Cyber Threat Analysis and Intelligence Service organization.  For questions, comments, or assistance, please get in touch with the office directly at 1-844-492-7225, or feedback@redskyalliance.com

Weekly Cyber Intelligence Briefings:

Weekly Cyber Intelligence Briefings:

REDSHORTS - Weekly Cyber Intelligence Briefings

[1] https://www.sentinelone.com/labs/labscon-replay-star-gazing-using-a-full-galaxy-of-yara-methods-to-pursue-an-apex-actor/

E-mail me when people leave their comments –

You need to be a member of Red Sky Alliance to add comments!