{"id":3966,"date":"2019-01-02T18:43:54","date_gmt":"2019-01-02T17:43:54","guid":{"rendered":"http:\/\/nextron.bsk-consulting.de\/?p=3966"},"modified":"2022-03-25T14:15:01","modified_gmt":"2022-03-25T13:15:01","slug":"50-shades-of-yara","status":"publish","type":"post","link":"https:\/\/www.nextron-systems.com\/2019\/01\/02\/50-shades-of-yara\/","title":{"rendered":"50 Shades of YARA"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.4.2&#8243; hover_enabled=&#8221;0&#8243;]<\/p>\n<p>A long time ago I&#8217;ve noticed that there is no single best YARA rule for a given sample, but different best solutions depending on the user&#8217;s requirements and use case. I noticed that I often create 2 to 3 YARA rules for a single sample that I process, while each of them serves a different purpose.<\/p>\n<p>In this blog post, I&#8217;d like to describe the three most common rule types.<\/p>\n<p>In the following example I&#8217;ll use the\u00a0malware sample with hash\u00a07415ac9d4dac5cb5051bc0e0abff69fbca4967c7 (<a href=\"https:\/\/beta.virusbay.io\/sample\/browse\/39a231b2887740211db8b10f053c4d62\">VirusBay<\/a>, <a href=\"https:\/\/www.hybrid-analysis.com\/sample\/eb18ae69f1511eeb4ed9d4d7bcdf3391a06768f384e94427f4fc3bd21b383127?environmentId=100\">Hybrid-Analysis<\/a>)<\/p>\n<p>While looking at the strings extracted by yarGen, you&#8217;ll notice that it contains a lot of interesting strings. In my past tutorials (<a href=\"\/2015\/02\/16\/write-simple-sound-yara-rules\/\">1<\/a>, <a href=\"\/2015\/10\/17\/how-to-write-simple-but-sound-yara-rules-part-2\/\">2<\/a>, <a href=\"\/2016\/04\/15\/how-to-write-simple-but-sound-yara-rules-part-3\/\">3<\/a>) I&#8217;ve always distinguished between &#8220;Highly Specific&#8221; and &#8220;Suspicious&#8221; strings (see <a href=\"\/2016\/04\/15\/how-to-write-simple-but-sound-yara-rules-part-3\/\">Part 3<\/a> of the blog post series). Today I&#8217;d like to show you a more purpose oriented approach.\u00a0<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2019\/01\/Screenshot-2019-01-02-at-15.11.25.png&#8221; align_tablet=&#8221;center&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.4.2&#8243; hover_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243;]<\/p>\n<p>The following screenshots shows what types of strings I see while looking at these strings:<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2019\/01\/what_i_see-yara.png&#8221; align_tablet=&#8221;center&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.4.2&#8243; hover_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243;]<\/p>\n<p>The strings that are marked with yellow look very specific. I&#8217;d use them as &#8220;Highly Specific&#8221; strings ($x*) of which only a single one is required to trigger the rule:\u00a0<span style=\"font-size: 18px;\">1 of ($x*)<\/span><\/p>\n<p>The strings marked green will be used in combination with other green strings. A reasonable set of these strings is required to trigger the rule:\u00a0$u1 and 1 of ($f*)<\/p>\n<p>The strings marked with red color could serve in a rule that tracks the C2 addresses used by this sample and the strings marked blue could be used for a generic detection of malicious samples that can be completely unrelated.<\/p>\n<p>The different rule categories are:<\/p>\n<ul>\n<li>Regular Rules: Detect a certain malware or malware family\u00a0<\/li>\n<li>Threat Intel Tracking Rules: Detect specific indicators that relate to a certain actor<\/li>\n<li>Method Detection Rules: Detect methods or anomalies\u00a0<\/li>\n<\/ul>\n<p><span style=\"font-size: 18px;\">The following table describes these three different types of rules and gives some string examples.<\/span><span style=\"font-size: 18px;\">\u00a0<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2019\/01\/Screenshot-2019-01-02-at-14.42.29.png&#8221; show_in_lightbox=&#8221;on&#8221; align_tablet=&#8221;center&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.4.2&#8243; hover_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243;]<\/p>\n<h1>Regular Rules<\/h1>\n<p>In the case of the &#8220;Regular Rules&#8221; I distinguish between two different flavors:\u00a0<\/p>\n<ul>\n<li>Threat Detection Rules<\/li>\n<li>Threat Hunting Rules<\/li>\n<\/ul>\n<p>The difference between these flavors is based on a different level of strictness in the conditions and not on the different selection of strings. While a &#8220;threat detection&#8221; rule may require &#8220;6 of them&#8221;, a &#8220;threat hunting&#8221; rule may be satisfied with &#8220;3 of them&#8221;, accepting some false positives.\u00a0<\/p>\n<p>The reason why someone distinguishes between &#8220;threat detection&#8221; and &#8220;threat hunting&#8221; rules is that the response to matches can be very different. Antivirus solutions that respond to matches with &#8220;delete&#8221; or &#8220;disinfect&#8221; reactions do not accept false positives and avoid false positives by any means.<\/p>\n<p>In &#8220;threat hunting&#8221; use cases which include direct destructive reactions to signatures matches are rare. Typically analysts investigate such an event, classify and react to it manually. In &#8220;threat hunting&#8221; scenarios analysts try to avoid &#8220;false negatives&#8221; by all means.\u00a0<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2019\/01\/tweeten-1546448328008.jpg&#8221; align_tablet=&#8221;center&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.4.2&#8243; hover_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243;]<\/p>\n<p>(Source: Chris Gerritz <a href=\"https:\/\/twitter.com\/gerritzc\/status\/974398783038607362\">@gerritzc<\/a>)\u00a0<\/p>\n<p><span style=\"font-size: 26px; font-weight: bold;\">Threat Intel Tracking<\/span><\/p>\n<p>In threat intel, we can use YARA rules to track the activity of certain actors in cases in which there are certain characteristics or keywords that persist over longer periods and campaigns.\u00a0<\/p>\n<p>A very convenient form of tracking without having access to the telemetry data of OS and AV vendors is offered in the form of YARA match notification services as provided by <a href=\"https:\/\/support.virustotal.com\/hc\/en-us\/articles\/115003886005-Private-Services\">VirusTotal<\/a> or <a href=\"https:\/\/www.reversinglabs.com\/\">ReversingLabs<\/a>.\u00a0<\/p>\n<h1>Method Detection Rules<\/h1>\n<p>During the past year I focussed on the last rule type &#8220;Method Detection&#8221; whenever I had the opportunity as it allows me to provide very generic rules that produce amazing results with a minimum of false positives.<\/p>\n<p>However, those rule matches lack a reference like a malware name or an adversary group that used the detected method in their samples. Here is an e<span style=\"font-size: 18px;\">xample with one of the few public YARA rules published in the &#8220;<\/span><a href=\"https:\/\/github.com\/Neo23x0\/signature-base\" style=\"font-size: 18px;\">signature-base<\/a><span style=\"font-size: 18px;\">&#8221; repository:<\/span><\/p>\n<p><span style=\"font-size: 18px;\">Sample:\u00a0<a href=\"https:\/\/www.virustotal.com\/en\/file\/fc18bc1c2891b18bfe644e93c60a2822ad367a697bebc8c527bc9f14dad61db5\/analysis\/\"><span>fc18bc1c2891b18bfe644e93c60a2822ad367a697bebc8c527bc9f14dad61db5<\/span><\/a>\u00a0<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2019\/01\/Screenshot-2019-01-02-at-17.52.30.png&#8221; align_tablet=&#8221;center&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.4.2&#8243; hover_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243;]<\/p>\n<p>The comment tab shows a match with generic rule &#8220;<a href=\"https:\/\/github.com\/Neo23x0\/signature-base\/blob\/master\/yara\/gen_susp_lnk_files.yar#L19\">SUSP_LNK_SuspiciousCommands<\/a>&#8221; . No reference is given. The Antivirus detection ratio is low.\u00a0<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2019\/01\/Screenshot-2019-01-02-at-17.54.37.png&#8221; align_tablet=&#8221;center&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.4.2&#8243; hover_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243;]<\/p>\n<p>You can find more matches with this rule on Virustotal using the search function &#8211;\u00a0<span style=\"font-size: 18px;\">URL:\u00a0<\/span><a href=\"https:\/\/www.virustotal.com\/#\/search\/lnk\" style=\"font-size: 18px;\">https:\/\/www.virustotal.com\/#\/search\/lnk<\/a><span style=\"font-size: 18px;\">\u00a0<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243;]<\/p>\n<h1>Conclusion<\/h1>\n<p><span style=\"font-size: 18px;\">These are the reasons why the analysis of a single sample often results in 2-3 different YARA rules. <\/span><\/p>\n<p><span style=\"font-size: 18px;\">Using this method the coverage is exceptionally good as the set of rules covers specific samples of the same family and the different malware families the use the same methods.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A long time ago I&#8217;ve noticed that there is no single best YARA rule for a given sample, but different best solutions depending on the user&#8217;s requirements and use case. I noticed that I often create 2 to 3 YARA rules for a single sample that I process, while each of them serves a different purpose. In this blog post, I&#8217;d like to describe the three most common rule types. In the following example I&#8217;ll use the\u00a0malware sample with hash\u00a07415ac9d4dac5cb5051bc0e0abff69fbca4967c7 (VirusBay, Hybrid-Analysis) While looking at the strings extracted by yarGen, you&#8217;ll notice that it contains a lot of interesting strings. In my past tutorials (1, 2, 3) I&#8217;ve always distinguished between &#8220;Highly Specific&#8221; and &#8220;Suspicious&#8221; strings (see Part 3 of the blog post series). Today I&#8217;d like to show you a more purpose oriented approach.\u00a0The following screenshots shows what types of strings I see while looking at these strings:The strings that are marked with yellow look very specific. I&#8217;d use them as &#8220;Highly Specific&#8221; strings ($x*) of which only a single one is required to trigger the rule:\u00a01 of ($x*) The strings marked green will be used in combination with other green strings. A reasonable set of these strings is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[47],"tags":[110,163,62,101,162,142,128,161,48],"class_list":["post-3966","post","type-post","status-publish","format-standard","hentry","category-yara","tag-create","tag-methods","tag-rules","tag-signatures","tag-threat-hunting","tag-threat-intel","tag-tutorial","tag-write","tag-yara"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>50 Shades of YARA - Nextron Systems<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nextron-systems.com\/2019\/01\/02\/50-shades-of-yara\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nextron-systems.com\/2019\/01\/02\/50-shades-of-yara\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2019\/01\/02\/50-shades-of-yara\/\"},\"author\":{\"name\":\"Florian Roth\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\"},\"headline\":\"50 Shades of YARA\",\"datePublished\":\"2019-01-02T17:43:54+00:00\",\"dateModified\":\"2022-03-25T13:15:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2019\/01\/02\/50-shades-of-yara\/\"},\"wordCount\":1315,\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"keywords\":[\"create\",\"methods\",\"Rules\",\"signatures\",\"threat hunting\",\"threat intel\",\"tutorial\",\"write\",\"YARA\"],\"articleSection\":[\"YARA\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nextron-systems.com\/2019\/01\/02\/50-shades-of-yara\/\",\"url\":\"https:\/\/www.nextron-systems.com\/2019\/01\/02\/50-shades-of-yara\/\",\"name\":\"50 Shades of YARA - Nextron Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#website\"},\"datePublished\":\"2019-01-02T17:43:54+00:00\",\"dateModified\":\"2022-03-25T13:15:01+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nextron-systems.com\/2019\/01\/02\/50-shades-of-yara\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nextron-systems.com\/#website\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"name\":\"Nextron Systems\",\"description\":\"We Detect Hackers\",\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nextron-systems.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\",\"name\":\"Nextron Systems GmbH\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"width\":260,\"height\":260,\"caption\":\"Nextron Systems GmbH\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\",\"name\":\"Florian Roth\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"caption\":\"Florian Roth\"},\"description\":\"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.\",\"url\":\"https:\/\/www.nextron-systems.com\/author\/florian\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"50 Shades of YARA - Nextron Systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nextron-systems.com\/2019\/01\/02\/50-shades-of-yara\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nextron-systems.com\/2019\/01\/02\/50-shades-of-yara\/#article","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/2019\/01\/02\/50-shades-of-yara\/"},"author":{"name":"Florian Roth","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919"},"headline":"50 Shades of YARA","datePublished":"2019-01-02T17:43:54+00:00","dateModified":"2022-03-25T13:15:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2019\/01\/02\/50-shades-of-yara\/"},"wordCount":1315,"publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"keywords":["create","methods","Rules","signatures","threat hunting","threat intel","tutorial","write","YARA"],"articleSection":["YARA"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.nextron-systems.com\/2019\/01\/02\/50-shades-of-yara\/","url":"https:\/\/www.nextron-systems.com\/2019\/01\/02\/50-shades-of-yara\/","name":"50 Shades of YARA - Nextron Systems","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/#website"},"datePublished":"2019-01-02T17:43:54+00:00","dateModified":"2022-03-25T13:15:01+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nextron-systems.com\/2019\/01\/02\/50-shades-of-yara\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.nextron-systems.com\/#website","url":"https:\/\/www.nextron-systems.com\/","name":"Nextron Systems","description":"We Detect Hackers","publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nextron-systems.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nextron-systems.com\/#organization","name":"Nextron Systems GmbH","url":"https:\/\/www.nextron-systems.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","width":260,"height":260,"caption":"Nextron Systems GmbH"},"image":{"@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919","name":"Florian Roth","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","caption":"Florian Roth"},"description":"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.","url":"https:\/\/www.nextron-systems.com\/author\/florian\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/3966","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/comments?post=3966"}],"version-history":[{"count":14,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/3966\/revisions"}],"predecessor-version":[{"id":7255,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/3966\/revisions\/7255"}],"wp:attachment":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media?parent=3966"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/categories?post=3966"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/tags?post=3966"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}