Sept. 22, 2023, 6 p.m. | Dr Josh Stroschein

Dr Josh Stroschein www.youtube.com

In this video, we'll take a look at how to create Yara rules using code patterns, that is byte sequences, from IDA Pro. We'll use a sample packed with PECompact2, which is a commonly used packer for malware. We'll identify code pattern to use for the signature, discuss platforms to help validate our rule, and then test our rule against representative samples.

00:16 Why PE?
1:01 Sample on VirusTotal
1:26 My approach to this analysis
2:49 Yaraify project on Abuse.ch …

code discuss hex ida ida pro identify malware packer patterns platforms pro rules sample signature signatures video yara yara rules

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC