<!-- Put the link to this slide here so people can follow slide: https://hackmd.io/p/template-Talk-slide --> # YARA with osquery and Fleet --- ## RECAP: What is YARA - YARA describes itself pattern-matching swiss army knife - Aimed at malware analysis, but it's so much more - YARA: - A language to describe rules, patterns and conditions - Enables Remote Forensics --- ## RECAP: Why use YARA - Traditionally detection strategies have revolved around static IOCs (MD5, SHA256 and similar signatures) - YARA: move to a dynamic-style analysis: - describe patterns (aka heuristics) - Example: detection of Log4J vuln jars in the wild --- ## YARA tables - Two types: ad-hoc and evented - ad-hoc: `yara` for on-demand scanning - requires `PATH` and either one of `sig_group`, `sigfile` or `sigrule` - evented: `yara_events` table, used in conjunction with FIM - like with other evented tables, requires configuration --- ## Ad-hoc: `yara` table - on-demand scanning - need to specifiy path the rule inline with `sigrule` - if the yara rule file exists on disk of the endpoint can use `sigfile` - `sig_group` if used as a configuration option --- ## evented: `yara_events` table - To be used in conjuction with `file_events` (FIM) table - Does a YARA scan when a file event is triggered - Requires configuration --- ## `yara_events` configuration ```yaml yara: file_paths: tmp: - sig_group_1 signatures: sig_group_1: - /path/to/yara/file ``` --- ## Caveats - YARA itself is CPU intensive - Pattern matches entire files
{"title":"YARA with osquery and Fleet","description":"View the slide with \"Slide Mode\".","contributors":"[{\"id\":\"0f214e65-3e0c-4001-a641-4edf8607f80d\",\"add\":1714,\"del\":0}]"}
    479 views