Our CTO and co-founder Jonas Wagner alongside Carlos Rubio Ricote, malware researcher at Threatray will run the workshop “Using systematic code reuse analysis to create robust YARA rules”

Feel free to register, there are still tickets available on https://hack.lu/info/

More info: https://pretalx.com/hack-lu-2023/talk/GL99GV/

Using systematic code reuse analysis to create robust YARA rules

YARA is a commonly used tool to detect and identify malware. There are roughly two types of YARA rules used on binary files: 1) based on metadata and strings and 2) based on code.
There are certain benefits by basing YARA rules on code. Since code reuse is frequent amongst binaries of a malware family, it offers plenty of options to base a YARA rule on. If the chosen code is heavily reused amongst the binaries, then it can result in very robust rules.
This approach comes with certain challenges. A key aspect is being able to find heavily reused code amongst many binaries of a malware family. Unless some sort of automation is at play, this quickly becomes difficult and time-consuming. Once suitable reused code is identified, it needs to be turned into a YARA rule, so that it works even when compiler differences, optimizations or instruction set changes are involved.
In this workshop we will create robust YARA rules for a handful of malware families based on automatically identifying shared code between many binaries of a family.

The takeaways for the participants of this workshop are:

  • Understanding the differences between good and bad YARA rules, be it
    based on code or based on strings/metadata.
  • Understanding the code reuse approach to YARA rules writing, with its
    benefits and challenges.
  • Understanding of the tooling required to identify code reuse over many
    binaries.
  • Understanding how to apply this process to real-world malware.

 

Ready to find out how Threatray can protect your organization?

Talk to an expert