{"id":3136,"date":"2018-03-19T12:00:46","date_gmt":"2018-03-19T11:00:46","guid":{"rendered":"http:\/\/nextron.bsk-consulting.de\/?p=3136"},"modified":"2023-02-02T16:32:15","modified_gmt":"2023-02-02T15:32:15","slug":"thor-8-44-features-tls-syslog-transmission-zip-yara-scanning","status":"publish","type":"post","link":"https:\/\/www.nextron-systems.com\/2018\/03\/19\/thor-8-44-features-tls-syslog-transmission-zip-yara-scanning\/","title":{"rendered":"THOR 8.44 features TLS Syslog Transmission &#038; ZIP YARA Scanning"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221; da_disable_devices=&#8221;off|off|off&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.18.0&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]The new THOR version 8.44 comes with some interesting new features.<\/p>\n<h2>TLS\/SSL Syslog Transmission<\/h2>\n<p>THOR version 8.44.0 supports the Syslog log transmission in an SSL\/TLS encrypted form. Just set the value &#8220;TCPTLS&#8221; as protocol in the 4th position of the target definition.<\/p>\n<pre>\nthor.exe -s mysyslogserver:6514:SYSLOG:TCPTLS\n<\/pre>\n<p>The documentation has been updated accordingly.<\/p>\n<div id=\"attachment_3138\" style=\"width: 795px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3138\" class=\"size-full wp-image-3138\" src=\"\/wp-content\/uploads\/2018\/03\/Screen-Shot-2018-03-10-at-17.17.39.png\" alt=\"\" width=\"785\" height=\"556\" srcset=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2018\/03\/Screen-Shot-2018-03-10-at-17.17.39.png 785w, https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2018\/03\/Screen-Shot-2018-03-10-at-17.17.39-300x212.png 300w, https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2018\/03\/Screen-Shot-2018-03-10-at-17.17.39-768x544.png 768w, https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2018\/03\/Screen-Shot-2018-03-10-at-17.17.39-400x284.png 400w\" sizes=\"(max-width: 785px) 100vw, 785px\" \/><p id=\"caption-attachment-3138\" class=\"wp-caption-text\">TLS Syslog Log Transmission<\/p><\/div>\n<h2>ZIP YARA Scanning<\/h2>\n<p>Until today the ZIP file checks were limited to file name IOC or anomaly checks. The new version 8.44.2 supports the scanning of ZIP file contents with the YARA rule base. However, for the time being the ZIP YARA scanning has some limitations:<\/p>\n<ol>\n<li>The feature is limited to files which decompressed size does not exceed the defined maximum file size (default 4.5 Megabytes)<\/li>\n<li>The feature is limited to certain scan modes: &#8211;intense, &#8211;fsonly, &#8211;dropzone<\/li>\n<\/ol>\n<p>If the feature proves to be stable, we will activate it in the default scan mode in a future minor release.<\/p>\n<p><div id=\"attachment_3137\" style=\"width: 698px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3137\" class=\"size-full wp-image-3137\" src=\"\/wp-content\/uploads\/2018\/03\/Screen-Shot-2018-03-17-at-18.12.52.png\" alt=\"\" width=\"688\" height=\"378\" srcset=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2018\/03\/Screen-Shot-2018-03-17-at-18.12.52.png 688w, https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2018\/03\/Screen-Shot-2018-03-17-at-18.12.52-300x165.png 300w\" sizes=\"(max-width: 688px) 100vw, 688px\" \/><p id=\"caption-attachment-3137\" class=\"wp-caption-text\">ZIP YARA Scanning<\/p><\/div>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The new THOR version 8.44 comes with some interesting new features. TLS\/SSL Syslog Transmission THOR version 8.44.0 supports the Syslog log transmission in an SSL\/TLS encrypted form. Just set the value &#8220;TCPTLS&#8221; as protocol in the 4th position of the target definition. thor.exe -s mysyslogserver:6514:SYSLOG:TCPTLS The documentation has been updated accordingly. ZIP YARA Scanning Until today the ZIP file checks were limited to file name IOC or anomaly checks. The new version 8.44.2 supports the scanning of ZIP file contents with the YARA rule base. However, for the time being the ZIP YARA scanning has some limitations: The feature is limited to files which decompressed size does not exceed the defined maximum file size (default 4.5 Megabytes) The feature is limited to certain scan modes: &#8211;intense, &#8211;fsonly, &#8211;dropzone If the feature proves to be stable, we will activate it in the default scan mode in a future minor release.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"The new THOR version 8.44 comes with some interesting new features.\r\n<h2>TLS\/SSL Syslog Transmission<\/h2>\r\nTHOR version 8.44.0 supports the Syslog log transmission in an SSL\/TLS encrypted form. Just set the value \"TCPTLS\" as protocol in the 4th position of the target definition.\r\n\r\n[cc lang=\"bash\"]\r\nthor.exe -s mysyslogserver:6514:SYSLOG:TCPTLS\r\n[\/cc]\r\n\r\nThe documentation has been updated accordingly.\r\n\r\n[caption id=\"attachment_3138\" align=\"alignnone\" width=\"785\"]<img class=\"size-full wp-image-3138\" src=\"http:\/\/nextron.bsk-consulting.de\/wp-content\/uploads\/2018\/03\/Screen-Shot-2018-03-10-at-17.17.39.png\" alt=\"\" width=\"785\" height=\"556\" \/> TLS Syslog Log Transmission[\/caption]\r\n<h2>ZIP YARA Scanning<\/h2>\r\nUntil today the ZIP file checks were limited to file name IOC or anomaly checks. The new version 8.44.2 supports the scanning of ZIP file contents with the YARA rule base. However, for the time being the ZIP YARA scanning has some limitations:\r\n<ol>\r\n \t<li>The feature is limited to files which decompressed size does not exceed the defined maximum file size (default 4.5 Megabytes)<\/li>\r\n \t<li>The feature is limited to certain scan modes: --intense, --fsonly, --dropzone<\/li>\r\n<\/ol>\r\nIf the feature proves to be stable, we will activate it in the default scan mode in a future minor release.\r\n\r\n[caption id=\"attachment_3137\" align=\"alignnone\" width=\"688\"]<img class=\"size-full wp-image-3137\" src=\"http:\/\/nextron.bsk-consulting.de\/wp-content\/uploads\/2018\/03\/Screen-Shot-2018-03-17-at-18.12.52.png\" alt=\"\" width=\"688\" height=\"378\" \/> ZIP YARA Scanning[\/caption]","_et_gb_content_width":"","footnotes":""},"categories":[46,32],"tags":[74,75,5,73,48,72],"class_list":["post-3136","post","type-post","status-publish","format-standard","hentry","category-newsletter","category-thor","tag-encryption","tag-syslog","tag-thor","tag-tls","tag-yara","tag-zip"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>THOR 8.44 features TLS Syslog Transmission &amp; ZIP YARA Scanning - Nextron Systems<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nextron-systems.com\/2018\/03\/19\/thor-8-44-features-tls-syslog-transmission-zip-yara-scanning\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nextron-systems.com\/2018\/03\/19\/thor-8-44-features-tls-syslog-transmission-zip-yara-scanning\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2018\/03\/19\/thor-8-44-features-tls-syslog-transmission-zip-yara-scanning\/\"},\"author\":{\"name\":\"Florian Roth\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\"},\"headline\":\"THOR 8.44 features TLS Syslog Transmission &#038; ZIP YARA Scanning\",\"datePublished\":\"2018-03-19T11:00:46+00:00\",\"dateModified\":\"2023-02-02T15:32:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2018\/03\/19\/thor-8-44-features-tls-syslog-transmission-zip-yara-scanning\/\"},\"wordCount\":300,\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"keywords\":[\"encryption\",\"syslog\",\"thor\",\"tls\",\"YARA\",\"zip\"],\"articleSection\":[\"Newsletter\",\"THOR\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nextron-systems.com\/2018\/03\/19\/thor-8-44-features-tls-syslog-transmission-zip-yara-scanning\/\",\"url\":\"https:\/\/www.nextron-systems.com\/2018\/03\/19\/thor-8-44-features-tls-syslog-transmission-zip-yara-scanning\/\",\"name\":\"THOR 8.44 features TLS Syslog Transmission & ZIP YARA Scanning - Nextron Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#website\"},\"datePublished\":\"2018-03-19T11:00:46+00:00\",\"dateModified\":\"2023-02-02T15:32:15+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nextron-systems.com\/2018\/03\/19\/thor-8-44-features-tls-syslog-transmission-zip-yara-scanning\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nextron-systems.com\/#website\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"name\":\"Nextron Systems\",\"description\":\"We Detect Hackers\",\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nextron-systems.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\",\"name\":\"Nextron Systems GmbH\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"width\":260,\"height\":260,\"caption\":\"Nextron Systems GmbH\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\",\"name\":\"Florian Roth\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"caption\":\"Florian Roth\"},\"description\":\"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.\",\"url\":\"https:\/\/www.nextron-systems.com\/author\/florian\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"THOR 8.44 features TLS Syslog Transmission & ZIP YARA Scanning - Nextron Systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nextron-systems.com\/2018\/03\/19\/thor-8-44-features-tls-syslog-transmission-zip-yara-scanning\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nextron-systems.com\/2018\/03\/19\/thor-8-44-features-tls-syslog-transmission-zip-yara-scanning\/#article","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/2018\/03\/19\/thor-8-44-features-tls-syslog-transmission-zip-yara-scanning\/"},"author":{"name":"Florian Roth","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919"},"headline":"THOR 8.44 features TLS Syslog Transmission &#038; ZIP YARA Scanning","datePublished":"2018-03-19T11:00:46+00:00","dateModified":"2023-02-02T15:32:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2018\/03\/19\/thor-8-44-features-tls-syslog-transmission-zip-yara-scanning\/"},"wordCount":300,"publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"keywords":["encryption","syslog","thor","tls","YARA","zip"],"articleSection":["Newsletter","THOR"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.nextron-systems.com\/2018\/03\/19\/thor-8-44-features-tls-syslog-transmission-zip-yara-scanning\/","url":"https:\/\/www.nextron-systems.com\/2018\/03\/19\/thor-8-44-features-tls-syslog-transmission-zip-yara-scanning\/","name":"THOR 8.44 features TLS Syslog Transmission & ZIP YARA Scanning - Nextron Systems","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/#website"},"datePublished":"2018-03-19T11:00:46+00:00","dateModified":"2023-02-02T15:32:15+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nextron-systems.com\/2018\/03\/19\/thor-8-44-features-tls-syslog-transmission-zip-yara-scanning\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.nextron-systems.com\/#website","url":"https:\/\/www.nextron-systems.com\/","name":"Nextron Systems","description":"We Detect Hackers","publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nextron-systems.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nextron-systems.com\/#organization","name":"Nextron Systems GmbH","url":"https:\/\/www.nextron-systems.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","width":260,"height":260,"caption":"Nextron Systems GmbH"},"image":{"@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919","name":"Florian Roth","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","caption":"Florian Roth"},"description":"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.","url":"https:\/\/www.nextron-systems.com\/author\/florian\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/3136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/comments?post=3136"}],"version-history":[{"count":9,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/3136\/revisions"}],"predecessor-version":[{"id":15928,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/3136\/revisions\/15928"}],"wp:attachment":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media?parent=3136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/categories?post=3136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/tags?post=3136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}