This Yara generator utilizes VirusTotal's 'code-similar-to:' beta search modifier to extract code blocks from PE files and automatically generate a Yara signature, allowing for the hunting of similar APT samples with refined results using Kaspersky KTAE. It requires a VirusTotal Enterprise API key, Python 2/3, requests, and json. The tool accepts a PE file hash, queries VirusTotal for files sharing code blocks, and post-processes the results based on user-defined code block length and similarity score thresholds. It then collects code blocks, their offset, and filesize from each file to determine the file size range for the Yara rule, ranking the most popular code blocks for user selection.
FEATURES
SIMILAR TOOLS
ThreatMiner is a threat intelligence portal that aggregates data from various sources and provides contextual information related to indicators of compromise (IOCs).
CRITs is an open source malware and threat repository for collaborative threat defense and analysis.
Malware Patrol offers a range of threat intelligence solutions, including enterprise data feeds, DNS firewall, phishing threat intelligence, and small business protection.
A nonprofit security organization that collects and shares threat data to make the Internet more secure.
Search engine for Windows executable files and hashes, providing insights into file prevalence, behavior, and security information.
A free software that calculates the security ranking of Internet Service Providers to detect malicious activities.
A platform providing real-time threat intelligence streams and reports on internet-exposed assets to help organizations monitor and secure their attack surface.
VirusTotal API v3 is a threat intelligence platform for scanning files, URLs, and IP addresses, and retrieving reports on threat reputation and context.
ZoomEye is an advanced cyberspace search engine that provides detailed information on cyberspace assets, including server software and version information, for cybersecurity experts, researchers, and enterprises.