KasperskyLab / klara

Kaspersky's GReAT KLara
https://great.kaspersky.com
Other
693 stars 136 forks source link
klara threat-hunting threat-intelligence yara-rules

GReAT's KLara project

KLara project is aimed at helping Threat Intelligence researchers hunt for new malware using Yara.

In order to hunt efficiently for malware, one needs a large collection of samples to search over. Researchers usually need to fire a Yara rule over a collection / set of malicious files and then get the results back. In some cases, the rule needs adjusting. Unfortunately, scanning a large collection of files takes time. Instead, if a custom architecture is used, scanning 10TB of files can take around 30 minutes.

KLara, a distributed system written in Python, allows researchers to scan one or more Yara rules over collections with samples, getting notifications by e-mail as well as the web interface when scan results are ready.

Features

Architecture

KLara leverages Yara's power, distributing scans using a dispatcher-worker model. Each worker server connects to a dispatcher trying to check if new jobs are available. If a new job is indeed available, it checks to see if the required scan repository is available on its own filesystem and, if it is, it will start the Yara scan with the rules submitted by the researcher

The main issue KLara tries to solve is running Yara jobs over a large collection of malware samples ( > 1TB) in a reasonable amount of time.

Installing KLara

Please refer to instructions outlined here

======

If you have any issues with installing this software, please submit a bug report

Contributing and reporting issues

Anyone is welcome to contribute. Please submit a PR and our team will review it.

You can get in touch with us on our Telegram channel: #KLara

The best way to submit bugs or issues is using Github's Issues feature.

Credits

KLara team would like to thank

for their amazing input and ideas. Happy hunting!