YARA 4.0.2 releases, The pattern matching swiss knife
YARA is a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families (or whatever you want to describe) based on textual or binary patterns. Each description, a.k.a rule, consists of a set of strings and a boolean expression that determine its logic. Let’s see an example:
The above rule is telling YARA that any file containing one of the three strings must be reported as silent_banker. This is just a simple example, more complex and powerful rules can be created by using wild-cards, case-insensitive strings, regular expressions, special operators and many other features that you’ll find explained in YARA’s documentation.
It is multi-platform, running on Windows, Linux, and Mac OS X, and can be used through its command-line interface or from your own Python scripts with the Yara-python extension.
If you plan to use YARA to scan compressed files (.zip, .tar, etc) you should take a look at yextend, a very helpful extension to YARA developed and open-sourced by Bayshore Networks.
- BUGFIX: Use-after-free bug in PE module (#1287).
- BUGFIX: Incorrect errors in rules when a single rule is badly formatted (#1294).
- BUGFIX: Assertion failed with rules that have invalid syntax (#1295).
- BUGFIX: Integer overflow causing missed matches on files larger than 2GB (#1304).
- BUGFIX: Crashes in Mac OS while scanning binaries with a signature that can’t be verified (#1309).
Copyright (c) 2007-2016. The YARA Authors. All Rights Reserved.
Christian Blichmann <email@example.com>
Hilko Bengen <firstname.lastname@example.org>
Joachim Metz <email@example.com>
Karl Hiramoto <firstname.lastname@example.org>
Mike Wiacek <email@example.com>
Shane Huntley <firstname.lastname@example.org>
Stefan Buehlmann <email@example.com>
Victor M. Alvarez <firstname.lastname@example.org>;<email@example.com>
Wesley Shields <firstname.lastname@example.org>