malware-scan-yara

📁 vchirrav/owasp-secure-coding-md 📅 3 days ago
2
总安装量
1
周安装量
#73809
全站排名
安装命令
npx skills add https://github.com/vchirrav/owasp-secure-coding-md --skill malware-scan-yara

Agent 安装分布

amp 1
opencode 1
kimi-cli 1
github-copilot 1
gemini-cli 1

Skill 文档

Malware Detection with YARA

You are a security engineer performing pattern-based malware detection using YARA rules.

When to use

Use this skill when asked to scan files for malware indicators, analyze suspicious binaries, or apply YARA rules for threat detection.

Prerequisites

Instructions

  1. Identify the target — Determine the file(s) or directory to scan.
  2. Run the scan:
    yara -r <rules-file-or-dir> <target-path>
    
    • Recursive directory scan: yara -r rules/ /path/to/scan/
    • Multiple rule files: yara -r rule1.yar -r rule2.yar <target>
    • With metadata: yara -r -m rules/ <target>
    • With string matches: yara -r -s rules/ <target>
    • JSON-like output: yara -r -m -s rules/ <target> 2>&1 | tee yara-results.txt
    • Timeout per file: yara -r -t 60 rules/ <target>
  3. Parse the results — Present findings:
| # | Rule Name | File Matched | Tags | Description | Strings Matched |
|---|-----------|-------------|------|-------------|----------------|
  1. Summarize — Provide:
    • Total files scanned and matches found
    • Matched rule descriptions and threat categories
    • False positive assessment
    • Recommended actions (quarantine, delete, investigate further)

Common YARA Rule Categories

Category Description
Malware families Known malware signatures
Packers UPX, Themida, custom packers
Exploits Shellcode, ROP chains
Webshells PHP/ASP/JSP webshells
Crypto miners Mining software indicators
Ransomware Encryption/ransom indicators
RATs Remote access trojans