Malware Classification And Identification
Malware classification is the process of classifying malware samples based on shared characteristics with previously analyzed samples. An example of these characteristics are: strings and binary code.
What's wrong with hash-based identification/classification?
The content of the samples are changed by attackers to evade hash based identification/classification.
Cryptographic hashing is only accurate if the data/content of the samples remain the same, if just one line of code is changed, the hash changes.
The attacker may only change a small portion of the sample, but the functionality of the malware remains the same, while the hash changes completely. For example, many attackers will plant random data/strings to change the hash and avoid hash-based detection/identification. (Garbage strings)
Hash based signature identification/detection is inaccurate and should not relied upon for accurate classification/identification of samples.
This is where YAYA comes in to play.
What is YARA?
YARA is a malware identification and classification tool that works by matching patterns accross various malware samples.
What can you do with YARA?
Signature identification based on particular signatures.
You can generate rules that identify particular signatures that can then be used to detect future similar infections. (AV's)
Last updated