March 30, 2023, 3 p.m. | Dr Josh Stroschein

Dr Josh Stroschein www.youtube.com

Lately, malware authors have been using overalys in PE files to add unnecessary size to the main executable. These files, typically delivered in an archive, inflate to a large size, often disrupting analysis pipelines. In this video, we'll discuss ways to create a custom Yara rule to detect large overlays.

Sample: https://tria.ge/230309-s5taradb64

00:00 Introduction
00:57 My Approach to Creating the Rule
01:35 Viewing the Overlay
02:03 Entropy Calculation
02:43 My Approach to the Yara Rule
03:41 Testing

analysis archive authors detect discuss entropy files introduction large main malware overlay overlays pipelines size testing video yara

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Cloud Security Analyst

@ Cloud Peritus | Bengaluru, India

Cyber Program Manager - CISO- United States – Remote

@ Stanley Black & Decker | Towson MD USA - 701 E Joppa Rd Bg 700

Network Security Engineer (AEGIS)

@ Peraton | Virginia Beach, VA, United States

SC2022-002065 Cyber Security Incident Responder (NS) - MON 13 May

@ EMW, Inc. | Mons, Wallonia, Belgium

Information Systems Security Engineer

@ Booz Allen Hamilton | USA, GA, Warner Robins (300 Park Pl Dr)