Malware Analysis Bootcamp - Creating YARA Rules

Поділитися
Вставка
  • Опубліковано 9 січ 2025

КОМЕНТАРІ • 56

  • @Tom-q1z7m
    @Tom-q1z7m Місяць тому +1

    Good tutorial, much better than those with powerpoint only. Thanks for sharing!

  • @DrHappybone
    @DrHappybone 4 роки тому +4

    Subbed. Waiting for the rest of this course. Great work, man!

  • @AnshuKumar-gy6sw
    @AnshuKumar-gy6sw 5 років тому +2

    Thanks for this amazing Bootcamp. Please upload next videos.

  • @moeaj1536
    @moeaj1536 5 років тому +8

    We want more videos about web app pentesting ..👍

  • @msecure5543
    @msecure5543 5 років тому +2

    U r doing great job..thank you.
    Waiting for your...dynamic analysis videos.

  • @abhijitnaik2006
    @abhijitnaik2006 4 роки тому +1

    Hey watched all the 16 videos of this series and liked it vl.. Very informative and very well explained . Where are the other parts of analysis.. I Mean Dynamic Analysis... Please post videos on Dynamic analysis.. ..Thanks for posting such videos it helps a lot!!

  • @mritunjay706
    @mritunjay706 2 роки тому

    Helped a lot in starting with YARA !

  • @sheadovas
    @sheadovas 5 років тому +2

    You have bug in your Yara rule (check how evaluation of url strings affects AND operator)

  • @captain_shiv
    @captain_shiv 5 років тому

    Awesome video man Love from India Appreciating you hard work for the community. Love you

  • @anonymousme5261
    @anonymousme5261 7 місяців тому

    can i write a rule based on "This program cannot be run in dos mode" this string?

  • @faridazeidoubrah
    @faridazeidoubrah Рік тому

    Bonjour, pouvez-vous m'aider j'ai écrit la règle yara j'ai pris l'échantillon du malware mais quand je fais le test avec l'option -r et -s on me renvoi rien comme le résultat qu'il y a bien des chaines que j'ai spécifié pour la correspondance. Merci de m'aider s'il vous plait

  • @ねこねこ-f9w
    @ねこねこ-f9w 4 роки тому

    Sir,I like your viedeos very much, I am waiting for you next vedio,I like binary analysis very much.Thanks!

  • @Crmabsn
    @Crmabsn 2 роки тому

    I'm not sure if you'll see this, but in your demo, you "anded" the $MZ variable. it ran, because the three URLs were present so the Boolean logic returned true. But if the MZ wasn't present, you'd still return true if variable A or B was present, correct? I read this s "If A is true, or if B is true or if C AND MZ is true, return". Should the logic not be (($A or $B or $C) AND $MZ)? New user, only experienced with other nested boolean queries.

  • @jamysim7321
    @jamysim7321 3 роки тому

    Can default Yara become a 24 hours background running process and if it is matched it will fire and email?

  • @arunrawat5476
    @arunrawat5476 4 роки тому

    Someone told me that "Yara rules can also be used to convert a big data set in the form of clusters in machine learning " and it has a different use at different platforms. Is it true?

  • @MzHSky
    @MzHSky 5 років тому

    hi brother, can you make a tutor for Linux package update problems, because when updates always occur errors and enter grub rescue mode which when I enter for normal insmod mode the result is always that the file does not exist, x86_amd64 / normal.mod
    Thanks 🙏

  • @lIlIllll1
    @lIlIllll1 4 роки тому

    Where can I learn more about malware analysis?

  • @Ichinin
    @Ichinin 5 років тому +1

    Loved the tip about the free VMs, even though they are 90 day versions.

  • @aabdulr
    @aabdulr 4 роки тому

    Nicely done. Thanks!

  • @jensulrich4848
    @jensulrich4848 Рік тому

    great, always after 4 Years :)

  • @kfashalsheik5162
    @kfashalsheik5162 5 років тому

    Hi
    I tried to communicate with you but I couldn't I have a problem with Kali Linux
    Bach: jarsigner command not found
    What should I do ??

  • @stevehae9017
    @stevehae9017 4 роки тому

    Will this course continue?

  • @sherlockbakker6233
    @sherlockbakker6233 5 років тому

    can we create Yara rules for malware prevention or it can be used only for malware detection

    • @BlackPerl
      @BlackPerl 3 роки тому

      YARA rules are a way of identifying malware (or other files) by creating rules that look for certain characteristics. Now you can write some Yara Rules and plug them into your EDR/AV solution to identify any behavioral aspect and hence block/quarantine the sample in question so that you can stop the attack before reaching to delivery stage in Kill-chain. That would solve your problem.

  • @vgplays1862
    @vgplays1862 10 місяців тому

    the sample files asks for password, what is it?

  • @swiftpaw7356
    @swiftpaw7356 4 роки тому

    Great explanation thankyou!

  • @huzaifazahoor654
    @huzaifazahoor654 5 років тому

    make more videoss on yara and ida pro and olly debugger

  • @ericthomas8147
    @ericthomas8147 5 років тому

    So is this how experts are able to say "this sample that has never been seen before is actually a variant of Emotet", for example? What if a sample is packed?

    • @憂鬱な冒険家
      @憂鬱な冒険家 3 роки тому +2

      Bit of a late reply, but they can detect that its packed which can be very suspicious especially if the file is not digitally signed (often times antiviruses simply just classify a file as malicious if its packed in such a manner because they are unable to properly read and analyze its code; however, this naturally can lead to false positives). What anti-viruses typically do is something called "Heuristic analysis" by where they run the executable in a sandbox (a virtual machine if you will) and dynamically analyze its behavior on runtime (if its creating a registry key to achieve persistence such as making the executable run on startup, if its trying to delete system32 files, connecting to a weird IP, etc.). They also scan for patterns (typically a series of assembly op codes unique to that malware or family of malware) and other malicious strings/values once the executable loads and unpacks itself in memory. If the executable is deemed to be malicious during this heuristic scan, naturally the anti-virus will prevent it from running on the host computer and alert the user/quarantine the binary. Even though heuristic scanning can sound very performance heavy, this is often done quite quickly and thus is a viable solution for AV vendors and end users alike. I hope this answers your question!

  • @cyberi2009
    @cyberi2009 5 років тому

    thanks waiting for more

  • @itsAnaMC
    @itsAnaMC 3 роки тому

    Thanks for this!

  • @rewindgaming1053
    @rewindgaming1053 Рік тому

    Hi the malware sample has a password on it , what is the password

  • @hontiangan5316
    @hontiangan5316 5 років тому

    Great job!

  • @valterpereiracjr
    @valterpereiracjr 3 роки тому

    Great content, thank you! A kind request, please...Even watching in 1080HD, the screen of the Windows machine is not readable. Could you please address that? Once again, thank you a lot! Referring to the app used to extract the URLs and MZ (Hexadecimal Value)

  • @kekkettoful
    @kekkettoful 3 роки тому +1

    Password for unzip file?

    • @pon4ik537
      @pon4ik537 2 роки тому

      ZIP password is “infected”

  • @haraf9743
    @haraf9743 5 років тому +2

    😊😊😊😊

  • @riyadriyaddawood
    @riyadriyaddawood 4 роки тому

    Lol that’s my channel name such a coincidence

  • @thabetboubaker2729
    @thabetboubaker2729 5 років тому

    very good

  • @hardwork3196
    @hardwork3196 5 років тому

    thank u alotttt... :D

  • @geethalatha4187
    @geethalatha4187 Рік тому

    Sir malware analysis please

  • @pawankagra9406
    @pawankagra9406 5 років тому

    My fb account was hacked and then my pubg mobile account hacked 😥😥😥😥
    I am very disappointed
    Hacker disable my fb account
    Plsss help me anyone plssss help🙏🙏

  • @ChillerDragon
    @ChillerDragon 5 років тому

    Yikes watched all episodes until here and still feel like a maleware noob.

  • @yara5117
    @yara5117 4 роки тому

    منور اسمي😍

    • @Baqilawati
      @Baqilawati 3 роки тому

      بالضبط 😂😂😂

  • @alyagomaa5101
    @alyagomaa5101 4 роки тому

    thank youu

  • @N50fficial17
    @N50fficial17 5 років тому

    Good

  • @johnmwansa4180
    @johnmwansa4180 5 років тому

    i mean how to hack any mobile using pythone command please brother

  • @johnmwansa4180
    @johnmwansa4180 5 років тому

    brother please can you make the video how to connect any mobile phone using python command please brother iam asking any video how to connect any mobile phone using python

  • @Arangol-cc5qs
    @Arangol-cc5qs 5 років тому +4

    First

  • @pon4ik537
    @pon4ik537 2 роки тому +1

    Guys ZIP password is “infected”
    Pin my comment please

  • @fraproxy
    @fraproxy 4 роки тому

    Go focus on your last "t" when you speak.