VirusTotal / yara

The pattern matching swiss knife
https://virustotal.github.io/yara/
BSD 3-Clause "New" or "Revised" License
8.29k stars 1.45k forks source link

YARA rules did not detect reverse TCP payload #1736

Closed Evacch closed 3 months ago

Evacch commented 2 years ago

I created a malicious file using Metasploit, however, YARA did not detect anything. I downloaded the YARA rules from the official GitHub repo and after that run yara rules/index.yar malicious.bin and also to be specific, yara rules/malware/RAT_Meterpreter_Reverse_Tcp.yar malicious.bin, nothing was shown. Anything I miss out here?

plusvic commented 2 years ago

Well, the first thing is to manually check that malicious.bin actually matches the rule. Can you paste the content of the rule here? I've found for RAT_Meterpreter_Reverse_Tcp.yar in GitHub and found multiple repositories that contain that file, but in all of them is an empty file.

Evacch commented 2 years ago

Well, the first thing is to manually check that malicious.bin actually matches the rule. Can you paste the content of the rule here? I've found for RAT_Meterpreter_Reverse_Tcp.yar in GitHub and found multiple repositories that contain that file, but in all of them is an empty file.

I am using this rule from https://github.com/Yara-Rules/rules/blob/master/malware/RAT_Meterpreter_Reverse_Tcp.yar and it is not empty

plusvic commented 2 years ago

The rule is very straightforward, have you confirmed that malicious.bin contain those strings?