Skip to content

YARA Detection Rules

This directory contains 19 YARA rules across 12 files for file-based threat detection. Use these rules with YARA-compatible tools (YARA CLI, ClamAV, THOR, Velociraptor, etc.) to scan endpoints and file shares.

How to Use

  1. Install YARA: brew install yara (macOS) or apt install yara (Linux)
  2. Scan a file: yara -r ransomware_indicators.yar /path/to/suspect_file
  3. Scan a directory: yara -r *.yar /path/to/directory/
  4. Use in Velociraptor: Import rules into Yara.Scan artifact for endpoint sweeps

📋 Rules Index

File Rules Threat Category Severity Playbook MITRE
ransomware_indicators.yar 2 Ransomware (ransom notes, shadow delete) Critical PB-02 T1486
webshell_generic.yar 3 Webshells (PHP, JSP, ASPX) High PB-10, PB-18 T1505.003
cryptominer_detection.yar 2 Cryptominers (binary + script) High PB-23 T1496
cobalt_strike_beacon.yar 2 Cobalt Strike (beacon + stager) Critical PB-13, PB-12 T1071.001
malicious_document.yar 2 Malicious docs (Office macros, PDF JS) High PB-01, PB-03 T1566.001
credential_dumping_tools.yar 2 Mimikatz, LaZagne, Rubeus, SAM dump Critical PB-36 T1003
wiper_malware.yar 1 Shamoon, NotPetya, HermeticWiper, MBR wipe Critical PB-38 T1485, T1561
rootkit_bootkit.yar 1 TDL, ZeroAccess, kernel hooks, UEFI tamper Critical PB-45 T1014, T1542
lolbin_dropper.yar 1 certutil, mshta, BITSAdmin abuse scripts High PB-39 T1218
exploit_kit_payload.yar 1 Exploit kit landing pages, shellcode Critical PB-25, PB-43, PB-44 T1189, T1203
supply_chain_backdoor.yar 1 npm/pip backdoor, SolarWinds/SUNBURST High PB-21 T1195
data_staging_archive.yar 1 Password-protected archives, staging Medium PB-08, PB-35 T1074, T1560

Total: 19 rules / 12 files


Rule Severity Guide

Severity Action
Critical Block immediately + escalate to Tier 2
High Alert + quarantine + triage within 15 min
Medium Alert + investigate within 1 hour

Integration Examples

Velociraptor Artifact

name: Custom.Yara.SOCScan
sources:
  - query: |
      SELECT * FROM yara(
        rules=read_file(filename="/path/to/yara/*.yar"),
        files=glob(globs="/tmp/**")
      )

ClamAV

# Convert YARA to ClamAV signatures
sigtool --convert-yara ransomware_indicators.yar > ransomware.ldb

THOR (Nextron Systems)

# Drop .yar files into THOR's custom-signatures directory
cp *.yar /opt/thor/custom-signatures/yara/