Yara Carpet Bomber, Part 2
2022-1-19 07:15:26 Author: www.hexacorn.com(查看原文) 阅读量:17 收藏

January 18, 2022 in Yara sigs

Steve asked about the use cases for Yara Carpet Bomber approach and in this twitter convo I provided 2 examples of quick & dirty Yara rules:

that help to find all references to API names (including API names spelled backward) within a given binary e.g. in this case Notepad executable. It may come handy if you want to quickly check for API references that are inside any place of the files including import tables and strings used to resolve APIs dynamically:

The list includes APIs from the following libraries:

  • advapi32.dll
  • avicap32.dll
  • cabinet.dll
  • combase.dll
  • crypt32.dll
  • dbghelp.dll
  • dbnetlib.dll
  • gdi32.dll
  • icmp.dll
  • IPHLPAPI.DLL
  • kernel32.dll
  • mfc140.dll
  • MFCaptureEngine.dll
  • mpr.dll
  • mscoree.dll
  • mstask.dll
  • ntdll.dll

You can download the set here.


文章来源: https://www.hexacorn.com/blog/2022/01/18/yara-carpet-bomber-part-2/
如有侵权请联系:admin#unsafe.sh