One of the founders of ReversingLabs Presenter at conferences: - - PowerPoint PPT Presentation

one of the founders of reversinglabs presenter at
SMART_READER_LITE
LIVE PREVIEW

One of the founders of ReversingLabs Presenter at conferences: - - PowerPoint PPT Presentation

One of the founders of ReversingLabs Presenter at conferences: BlackHat, ReCon, CARO Workshop, SAS and TechnoSecurity. Developer on such projects as TitaniumCore, TitanEngine, NyxEngine and RLPack. @ap0x { YARA at ReversingLabs 2016 2017


slide-1
SLIDE 1
slide-2
SLIDE 2

One of the founders of ReversingLabs Presenter at conferences: BlackHat, ReCon, CARO Workshop, SAS and TechnoSecurity. Developer on such projects as TitaniumCore, TitanEngine, NyxEngine and RLPack.

@ap0x

slide-3
SLIDE 3

{YARA at ReversingLabs

2013 - 2015 2016 2017 2018 2019 2020

Integrated YARA into TitaniumCore Started including YARA threat detection rules in our products Patch contributions to YARA code base Showing YARA match information Automatic YARA ruleset versioning Included .NET and hash modules Enabled suspicious classifications Integrated with TitaniumCore format identification and unpacking Using YARA metadata to name detected threats Extended YARA to support more than 32 threads Explainable YARA rules

slide-4
SLIDE 4

Detection

  • Goal: Malware detection & blocking
  • Pro:

Can accurately detect malware threats Can block for malware based on artifacts Can be deployed to scan files or memory

  • Con:

Requires time to write & test correctly Can be bypassed with pattern breaking

Hunting

  • Goal: Proactive analysis & detection
  • Pro:

Can find new interesting things to analyze Can be broad to cover multiple formats Can look for things other than malware

  • Con:

Requires time consuming human analysis Can generate lots of false positives

{YARA dilemma: Threat detection or hunting?

slide-5
SLIDE 5

1.

Clean written YARA rules with well labeled conditions

{YARA threat detection rule goals

slide-6
SLIDE 6

2.

Matching on unique malware type functionality

{YARA threat detection rule goals

slide-7
SLIDE 7

3.

Preferring code byte pattern matching over strings

{YARA threat detection rule goals

slide-8
SLIDE 8

4.

Native classification pipeline integration

{YARA threat detection rule goals

slide-9
SLIDE 9

PE/EXE/UPX PE/EXE Machine learning YARA Ransomware

Sample a) After unpacking Classification Verdict

Preferred due to family name

b) Memory analysis

{YARA threat detection within layered objects

slide-10
SLIDE 10

{YARA threat detection results

slide-11
SLIDE 11

{YARA threat detection results

slide-12
SLIDE 12

ReversingLabs Open Source {YARA rules

ReversingLabs Open Source rules require YARA version 3.2.0 or newer to be

  • installed. Additionally, the following YARA modules need to be enabled: PE and ELF.

https://github.com/reversinglabs/reversinglabs-yara-rules 128 YAR

YARA A Rule les publis lished

slide-13
SLIDE 13
slide-14
SLIDE 14
slide-15
SLIDE 15

THANK YOU