For some additional info about running YARA rules in ClamAV, please see
section 3.11 in the ClamAV signatures manual:

https://github.com/vrtadmin/clamav-devel/blob/master/docs/signatures.pdf




On Mon, May 15, 2017 at 4:04 PM, Mark Foley <mfo...@novatec-inc.com> wrote:

> On Mon May 15 15:06:07 2017 "Eric Tykwinski" <eric-l...@truenet.com>
> wrote:
> >
> > Here's links to sample files, ie use at your own risk:
> > https://gist.github.com/rain-1/989428fa5504f378b993ee6efbc0b168
> >
> > Sincerely,
> >
> > Eric Tykwinski
> > TrueNet, Inc.
> > P: 610-429-8300
> >
>
> Well, it does seem to try and use the yara rule. Using one of the samples
> on the
> link you gave me:
>
> $ clamscan CYBERed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8
> e080e41aa.EXE
> LibClamAV Error: yyerror(): /var/lib/clamav/wannaCry.yar line 3 non-ascii
> character
> LibClamAV Error: yyerror(): /var/lib/clamav/wannaCry.yar line 3 syntax
> error, unexpected $end, expecting _CONDITION_
> LibClamAV Error: cli_loadyara: failed to parse rules file
> /var/lib/clamav/wannaCry.yar, error count 2
>
> When I fixed the non-ascii character thing I got:
>
> > clamscan
> CYBERed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.EXE
>
> CYBERed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.EXE:
> Win.Trojan.Agent-6312832-0 FOUND
>
> ----------- SCAN SUMMARY -----------
> Known viruses: 6284809
> Engine version: 0.99.2
> Scanned directories: 0
> Scanned files: 1
> Infected files: 1
> Data scanned: 3.49 MB
> Data read: 3.35 MB (ratio 1.04:1)
> Time: 6.828 sec (0 m 6 s)
>
> The yara rule didn't find anything.
>
> I used sample .hxxps://transfer.sh/PnDIl/CYBERed01ebfbc9eb5bbea545af4d0
> 1bf5f1071661840480439c6e5babe8e080e41aa.EXE
>
> The page is headed, "WannaCry|WannaDecrypt0r NSA-Cyberweapon-Powered
> Ransomware Worm"
> so I would imagine the samples on this page are for wannaCry, right?
>
> --Mark
>
> > -----Original Message-----
> > From: clamav-users [mailto:clamav-users-boun...@lists.clamav.net] On
> Behalf
> > Of Mark Foley
> > Sent: Monday, May 15, 2017 2:58 PM
> > To: clamav-users@lists.clamav.net
> > Subject: Re: [clamav-users] Malware/ransomware and Yara signatures with
> > clamav
> >
> > On Sat May 13 13:25:07 2017 From: Alain Zidouemba
> > <azidoue...@sourcefire.com> wrote:
> > >
> > > Yara rules have been supported by ClamAV since 2015:
> > > http://blog.clamav.net/2015/06/clamav-099b-meets-yara.html
> > >
> > > - Alain
> >
> > I'm following these instructions now.  The instruction say, "just place
> your
> > YARA rule files into the ClamAV virus database location." I've copied the
> > Homland Security yara script to a file, wannaCry.yar, in my
> /var/lib/clamav
> > directory.
> >
> > Is that it? No clamscan switch or config setting? Is there any way to
> > confirm this rule is being used?
> >
> > I also downloaded and looked at the yara repo on github.  There are over
> 400
> > rules in the zipfile.  To use some or all of them would I just unzip
> into my
> > database location?
> >
> > The instructions also say, "Regular expressions in both YARA rules and
> > ClamAV logical signatures require the Perl Compatible Regular Expressions
> > (PCRE) library." Is there a way to see if my clamAV was built with this?
> >
> > Thanks, Mark
> >
> > >
> > > On Sat, May 13, 2017 at 1:16 PM, Alex <mysqlstud...@gmail.com> wrote:
> > >
> > > > Hi,
> > > >
> > > > So you've probably heard of the latest ransomware dubbed WannaCry.
> > > > I'm wondering if anyone has figured out a way to integrate the yara
> > > > signatures for these types of exploits with spamassassin?
> > > >
> > > > https://www.us-cert.gov/ncas/alerts/TA17-132A
> > > >
> > > > What is the status of development of integration of yara rules into
> > clamav?
> > > >
> > > > [deleted]
> > > >
> > > > Thanks,
> > > > Alex
> > > _______________________________________________
> > > clamav-users mailing list
> > > clamav-users@lists.clamav.net
> > > http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users
> > >
> > >
> > > Help us build a comprehensive ClamAV guide:
> > > https://github.com/vrtadmin/clamav-faq
> > >
> > > http://www.clamav.net/contact.html#ml
> > >
> > _______________________________________________
> > clamav-users mailing list
> > clamav-users@lists.clamav.net
> > http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users
> >
> >
> > Help us build a comprehensive ClamAV guide:
> > https://github.com/vrtadmin/clamav-faq
> >
> > http://www.clamav.net/contact.html#ml
> >
> >
> > _______________________________________________
> > clamav-users mailing list
> > clamav-users@lists.clamav.net
> > http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users
> >
> >
> > Help us build a comprehensive ClamAV guide:
> > https://github.com/vrtadmin/clamav-faq
> >
> > http://www.clamav.net/contact.html#ml
> >
> _______________________________________________
> clamav-users mailing list
> clamav-users@lists.clamav.net
> http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users
>
>
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
>
> http://www.clamav.net/contact.html#ml
>
_______________________________________________
clamav-users mailing list
clamav-users@lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to