-
Notifications
You must be signed in to change notification settings - Fork 37
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improve detection of machO backdoors & stealers #631
Conversation
It's odd that Edit, it finished:
That's strange. Tests are slow locally, too:
From
Seems like a new rule is slowing down scans? |
Yeah, it looks like there may be no fast way to match a long string of alphanumeric text. It turns out that compiled regexps are run across all files - not just the ones matching conditions: https://github.com/Neo23x0/YARA-Performance-Guidelines |
commit incoming to improve performance ... |
updated rules are still slower than I like, but they are faster than they were. there doesn't seem to be a fast way to detect a very large string with YARA :( |
finished in 6 minutes - not bad! I had to remove a query, but the best improvement was adding a nul character up front to find the start character. |
* improve malicious dmg detection * Improve detection of machO backdoors & stealers * improve rules * update testdata * update testdata * tune rules * tune rules --------- Co-authored-by: Evan Gibler <[email protected]>
* Improve Python detection for EvilDojo666 attack * Improve detection of machO backdoors & stealers (#631) * improve malicious dmg detection * Improve detection of machO backdoors & stealers * improve rules * update testdata * update testdata * tune rules * tune rules --------- Co-authored-by: Evan Gibler <[email protected]> * Add files, update test data * Add models.py sample * improve rule matcha accuracy * fmt yara * fix false-positive for versioneer/versioneer.py --------- Co-authored-by: Evan Gibler <[email protected]>
Based on studying some recent submissions to the Malware Bazaar.