#YARA

2025-10-26

Still testing 🤞

For those able to use #BinaryNinja projects; #BinYars can sort the files into folders based upon the #Yara-X rule metadata field, BNFolder. The folder nesting structure is determined by the number of matches that reside under each folder - check out the video below!

2025-10-25

Technical alert for SOCs & DFIR teams: RedTiger is a Python‑based infostealer now weaponized in the wild. Key behaviors: PyInstaller binaries, Discord client JS modification (discord_desktop_core index.js), token validation via /users/@me, archive upload to GoFile, webhook delivery via Discord, webcam/screenshot capture, and process/file spamming to obscure forensic traces.
Recommended triage actions:
- Hunt for modifications to discord_desktop_core or unexpected JS files.
- Monitor outbound uploads to GoFile and similar anonymous storage services.
- Alert on unusual Discord webhook creations or metadata and token validation calls to /users/@me.
- Detect mass process spawning or spamming file creation events.
- Enforce secure token storage, hardware MFA, and ephemeral credentials for services.

Discuss your detection queries and signatures — share YARA, Sigma, or hunting queries in comments (safely redacted). Follow our handles for continuous threat updates.

#RedTiger #DFIR #SOC #Hunting #Sigma #YARA #ThreatIntel #Discord #Infostealer #InfoSec #Malware

redtiger
2025-10-24

It's getting close to being done - #BinYars a #YARA-X #BinaryNinja plugin! Still testing, but plan on open sourcing it for all to use.

Shout out to Remco Sprooten for making this tool (also shown in the video) for quickly drafting Yara rules 💪 github.com/1337-42/SimpleYaraBN

Video: Part 1 of 2

2025-10-23

I had the privilege to participate in the first Rulezet workshop at #hacklu2025. rulezet.org/ is still early stage but it has the potential to reshape the way #cybersecurity detection methods are shared and developed for project such as #suricata, #yara or #sigma.
I had the feeling to assist an "historic" moment. Last time I had this feeling was in eBPF related discussions at the early stage of this technology.

EshaHaberEshahaber
2025-10-19

Denizli'de korkunç kaza: 1 vatandaş öldü, çok sayıda yaralı var: Sürücüsü öğrenilemeyen 35 CEJ 948 plakalı günübirlik tura katılanları taşıyan midibüs, Bölmekaya Mahallesi yakınlarında şarampole devrildi.

KAZADA 1 KİŞİ ÖLDÜ, 31 YARALI

İhbar üzerine kaza yerine sağlık, itfaiye ve polis ekipleri sevk edildi.

Sağlık ekipleri, 1 kişinin hayatını kaybettiğini belirledi. Kazada sürücü ile midibüsteki 31 kişi… eshahaber.com.tr/haber/denizli EshaHaber.com.tr

2025-10-18

Mình đang tạo công cụ bảo mật dành cho expansion broswer/IDE (VSCode, Chrome, ...) bằng YARA rules (2k+规则 anti malware), SAST và vui lòng quét script بعد cài đặt. Nên nhấn mạnh tính an toàn cho cộng đồng developer! 🔐 #ToolSecurity #Cybersecurity #ExtensionSafety #YARA #SAST #TechInnovation

reddit.com/r/SideProject/comme

Alexandre Dulaunoyadulau@infosec.exchange
2025-10-14

One year, I had a chat with the fine people @suricata during the @cert_eu conference, and they were wondering why we didn't create an open source website for all the different rules (YARA, Suricata, and many others) — a place to allow comments, reviews, bundling, and integration with @misp.

We’ve just released the first beta version of the rulezet.org service! 🎉

The platform is open and publicly available and the entire back-end is fully open source.

It’s still in beta, so feedback is very welcome!

🔗 rulezet.org/

#cti #yara #threatintelligence #osint #dfir #cybersecurity #suricata

@misp
@circl

rulezet.org screenshot of a Suricata rule.rulezet.org screenshot of a list of rules.
2025-10-08

When walking a zip file's central directory structure using #yara-x, `math.max` and `with` are your friends.

2025-10-01

📢 FlipSwitch : une nouvelle technique de rootkit contourne le dispatch des syscalls de Linux 6.9
📝 Source : Elastic Security Labs — Des chercheurs présentent « FlipSwitch », une technique de rootkit Linux capable de contourner l...
📖 cyberveille : cyberveille.ch/posts/2025-09-3
🌐 source : elastic.co/security-labs/flips
#Linux #YARA #Cyberveille

NETRESEC - Network Forensics and Network Security Monitoringnetresec.com@web.brid.gy
2025-09-24
2025-09-24

📢 SentinelLabs dévoile des méthodes pour traquer les malwares activés par LLM via clés API et prompts intégrés
📝 Selon SentinelLabs (blog de recherche de SentinelOn...
📖 cyberveille : cyberveille.ch/posts/2025-09-2
🌐 source : sentinelone.com/labs/prompts-a
#YARA #chasse_aux_menaces #Cyberveille

2025-09-19

🔎 Malware Analysis Tools & Resources — Lab-Only Guide (Defensive) ☣️🛡️

Malware analysis is the practice of studying suspicious files and binaries to understand capabilities, indicators, and containment actions — always inside isolated, offline labs. 🧪💻 Below are trusted tools and resources analysts use to triage, unpack, and investigate malicious samples, plus learning hubs to level up your skills.

For static analysis (examining files without running them) analysts rely on tools like strings, file, ssdeep, PEStudio, Detect It Easy (DIE), Ghidra, and r2 / radare2 to inspect headers, imports, embedded strings, and binary structure. 🧩 For dynamic analysis (safe execution), sandboxes such as Cuckoo Sandbox, Any.Run, and instrumented VMs with Process Monitor, Process Explorer, Procmon, Sysmon, API monitor, plus network capture (Wireshark/tshark, tcpdump) reveal runtime behavior and network indicators. 🔬📡

Memory & forensic analysis uses Volatility / Volatility3, Rekall, and tools to capture RAM and extract artifacts. For unpacking and debugging native code, analysts use x64dbg, WinDbg, GDB, and deobfuscation helpers; for Java/.NET, tools like jadx and dnSpy help reverse engineered bytecode. 🧠⚙️

Threat intel & enrichment resources accelerate investigation: VirusTotal, Hybrid Analysis, MalwareBazaar, Malpedia, AbuseIPDB, OTX (AlienVault), and MISP provide samples, IOCs, yara rules, and community knowledge. 🗂️📊 Combine these with YARA for signature matching and Sigma for log detections. 🔎🧰

Learning resources & safety: follow vendor blogs (Microsoft Defender, Cisco Talos, CrowdStrike), training platforms (Practical Malware Analysis labs, REMnux VM, FLARE VM), and courses (SANS/GIAC tracks, online DFIR courses). Always run samples in air-gapped / host-only VMs, snapshot before/after, and capture PCAPs & memory for reproducibility. 📚🔐

#MalwareAnalysis #DFIR #ThreatHunting #Volatility #CuckooSandbox #Ghidra #VirusTotal #CyberSecurity #InfoSec #DigitalForensics #YARA

2025-09-16

This report complements @_CERT_UA’s findings and arms #SOC teams with fresh #IOCs, #YARA rules and detailed behavioural indicators. We thank our trusted partner for his time and insights into this subject.

⚯ Michel de Cryptadamus ⚯cryptadamist@universeodon.com
2025-09-08

Used some #AI to jury rig a basic API documentation site for The Yaralyzer, my unexpectedly popular tool for visualizing and forcibly decoding #YARA matches in binary data.

* GitHub: github.com/michelcrypt4d4mus/y
* PyPi: pypi.org/project/yaralyzer/
* API documentation: michelcrypt4d4mus.github.io/ya
* Can also be installed (indirectly) via homebrew if you install The #Pdfalyzer (different tool)

#ascii #asciiArt #blueteam #cybersecurity #detectionengineering #DFIR #forensics #FOSS #hacking #infosec #KaliLinux #malware #malwareDetection #malwareAnalysis #openSource #pdfalyzer #redteam #reverseEngineering #reversing #threathunting #yaralyze #yaralyzer #YARA #YARArule #YARArules

screenshot of The Yaralyzer output
2025-08-12

🛡️ New YARA project just dropped:

🔹 94 RAT/Worm builder variants
🔹 Rules for variant-level matching
🔹 Samples manually generated in isolated QEMU sandboxes
🔹 Encrypted, scoped — no VT noise
github.com/GokbakarE/RuleSetRAT
#malware #infosec #reverseengineering #yara #threathunting

mʕ•ﻌ•ʔm bitPickupbitpickup@troet.cafe
2025-07-31

@mina
> ¡La foto no es nada menos que espectacular!

Si .. no .. bueno .. gracias.
😊

La verdad, la de hoy, de la loca que se metió en pleno invierno me parece que quedo mejor aun.
(es solo un recorte de tamaño real de una imagen de resolución extra super grande)

@jesuisatire @aiquez @crossgolf_rebel @resl @sinmisterios
#bothrops #yara #uruguay #naturaleza #vivoras #serpientes #reptiles

Imagen de cerca de la cabeza y parte del cuerpo de una bothrops bubescens enroscada muy nitida. Cada escama parece un dibujo propio.
2025-07-31

🧬 Built a public YARA corpus from 90+ legacy builder tools.

All binaries manually generated in isolated QEMU sandboxes

Variant-specific YARA rules for precision, not generic coverage

CAPA + DIE static analysis JSON included for each sample

No live samples shared — only clean metadata & signatures

🔗 github.com/GokbakarE/RuleSetRAT

For those into reverse engineering, long-tail tooling, and rule discipline.
#infosec #reverseengineering #yara #DFIR #threathunting

Les Amis de la Terre Franceamisdelaterre.org@bsky.brid.gy
2025-07-31

📣 Mardi matin, nous participions à une conférence de presse pour annoncer le lancement d’un recours grâcieux contre l’usine de #Yara à Montoir-de-Bretagne, aux côtés de 10 organisations locales. On vous explique 👇

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst