Hunting Evil with YARA (Windows Edition)
Overview
Hunting for Malicious Executables on Disk
rule ransomware_dharma {
meta:
author = "Madhukar Raina"
version = "1.0"
description = "Detect strings from Dharma ransomware"
reference = "https://www.virustotal.com"
strings:
$string_pdb = { 433A5C6372797369735C52656C656173655C5044425C7061796C6F61642E706462 }
$string_ssss = { 73 73 73 73 73 62 73 73 73 }
condition: all of them
}Command to Execute YARA Scan on Files
Hunting for Malware in Running Processes
Scanning Active Processes
Hunting for Evil Within ETW Data with YARA
Key ETW Providers
YARA and SilkETW Integration Example
Last updated