Generating YARA rules based on binary code
Project description
mkYARA
Writing YARA rules based on executable code within malware can be a tedious task. An analyst cannot simply copy and paste raw executable code into a YARA rule, because this code contains variable values, such as memory addresses and offsets. The analyst has to disassemble the code and wildcard all the pieces in the code that can change between samples. mkYARA aims to automate this part of writing rules by generating executable code signatures that wildcard all these little pieces of executable code that are not static.
Installation
Installation is as easy as installing the pip package.
pip install mkyara
Usage
import codecs
from capstone import CS_ARCH_X86, CS_MODE_32
from mkyara import YaraGenerator
gen = YaraGenerator("normal", CS_ARCH_X86, CS_MODE_32)
gen.add_chunk(b"\x90\x90\x90", offset=1000)
gen.add_chunk(codecs.decode("6830800000E896FEFFFFC3", "hex"), offset=0x100)
gen.add_chunk(b"\x90\x90\x90\xFF\xD7", is_data=True)
rule = gen.generate_rule()
rule_str = rule.get_rule_string()
print(rule_str)
Standalone Tool
mkYARA comes with a standalone tool that is cross platform, as in, it can create signatures for Windows binaries running under Linux.
usage: mkyara [-h] [-i {x86}] [-a {32,64,x86,x64}] -f FILE_PATH [-n RULENAME]
-o OFFSET -s SIZE [-m {loose,normal,strict}] [-r RESULT] [-v]
Generate a Yara rule based on disassembled code
optional arguments:
-h, --help show this help message and exit
-i {x86}, --instruction_set {x86}
Instruction set
-a {32,64,x86,x64}, --instruction_mode {32,64,x86,x64}
Instruction mode
-f FILE_PATH, --file_path FILE_PATH
Sample file path
-n RULENAME, --rulename RULENAME
Generated rule name
-o OFFSET, --offset OFFSET
File offset for signature
-s SIZE, --size SIZE Size of desired signature
-m {loose,normal,strict}, --mode {loose,normal,strict}
Wildcard mode for yara rule generation
loose = wildcard all operands
normal = wildcard only displacement operands
strict = wildcard only jmp/call addresses
-r RESULT, --result RESULT
Output file
-v, --verbose Increase verbosity
IDA Plugin
mkYARA comes with a IDA plugin to easily create YARA signatures by selecting a set of instructions and choosing one of the mkYARA -> Generate YARA rule options. Installation is as easy as installing the pip package and copying the mkyara_plugin.py to your IDA plugin directory.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file mkYARA-1.0.0.tar.gz
.
File metadata
- Download URL: mkYARA-1.0.0.tar.gz
- Upload date:
- Size: 6.6 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/1.13.0 pkginfo/1.5.0.1 requests/2.21.0 setuptools/40.8.0 requests-toolbelt/0.9.1 tqdm/4.31.1 CPython/3.7.1
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 5fa3fa8dc1342adb4818ab111f23891fcb817caff09941b295593c54207a010e |
|
MD5 | 8134df70e63a8b8eca529f60edd2c627 |
|
BLAKE2b-256 | b02eda30e5e4ae94eaacf88b41ea776b7228df97a7cbd931da2c1e112020f317 |