YARA Rules

About YARA

From YARA’s documentation:

YARA is a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families (or whatever you want to describe) based on textual or binary patterns. Each description, a.k.a rule, consists of a set of strings and a boolean expression that determine its logic.

Let's see an example:

rule silent_banker : banker

{
    meta:

        description = "This is just an example"

        threat_level = 3

        in_the_wild = true


    strings:

        $a = {6A 40 68 00 30 00 00 6A 14 8D 91}

        $b = {8D 4D B0 2B C1 83 C0 27 99 6A 4E 59 F7 F9}

        $c = "UVODFRYSIHLNWPEJXQZAKCBGMT"


    condition:

        $a or $b or $c
}

The above rule is telling YARA that any file containing one of the three strings must be reported as silent_banker. This is just a simple example, more complex and powerful rules can be created by using wildcards, case-insensitive strings, regular expressions, special operators, and many other features that you'll find explained fully in YARA's documentation.


What’s Next

Learn about the ways Stairwell empowers users to leverage Yara rules across their entire org.