View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0007994 | Kali Linux | Queued Tool Addition | public | 2022-10-09 23:01 | 2024-08-19 19:52 |
Reporter | mccrypter | Assigned To | |||
Priority | normal | Severity | minor | Reproducibility | N/A |
Status | acknowledged | Resolution | open | ||
Summary | 0007994: yaralyzer - tool to visually inspect and force decode YARA and regex matches found in both binary and text data. | ||||
Description | [Name] yaralyzer [Description] Visually inspect all of the regex matches (and their sexier, more cloak and dagger cousins, the YARA matches) found in binary data and/or text. See what happens when you force various character encodings upon those matched bytes. With colors. Some screenshots are visible here: https://github.com/michelcrypt4d4mus/yaralyzer#example-output [Dependencies] python 3.9+ [Similar tools] http://www.binaryalert.io/yara-matches.html (sort of - it writes matches to a DB rather than STDOUT, and it doesn't do any encoding detection or force decodes) [Activity] Development started mid summer 2022 originally as an internal engine of a related tool, the pdfalyzer: https://github.com/michelcrypt4d4mus/pdfalyzer. actively being maintained, kind of surprising amount of interest since it was open sourced last week [How to install] Note, using source code to acquire (e.g. git clone/svn checkout) can’t be used - Also downloading from the head. Please use a “tag” or “release” version. Scan against YARA definitions in a file:yaralyze --yara-rules /path/to/malware_rules.yara lacan_buys_the_dip.pdf Scan against an arbitrary YARA compatible regular expression:yaralyze --regex-pattern 'evil.*of\s+\w+byte' the_crypto_archipelago.exe Scan against an arbitrary YARA hex patternyaralyze --hex-pattern 'd0 93 d0 a3 d0 [-] 9b d0 90 d0 93' one_day_in_the_life_of_ivan_cryptosovich.bin [Packaged] - Is the tool already packaged for Debian? | ||||
@kali-team, please could this be packaged up. |
|
Package has been drafted: https://gitlab.com/Arszilla/yaralyzer However, it requires the following package as its a dependency I had to package: https://gitlab.com/Arszilla/rich-argparse-plus I tested the functionality in a limited manner - thus I'd appreciate it if you could test it @mccrypter. I've attached the drafted packages below. Feel free to install them in a pre-existing instance of Kali (or spin up one in Docker) and test them, and feel free to report any issues you have. |
|
thanks @arszilla! I did a little test driving on a bare bones kali docker container and while i didn't run the whole test suite everything i tried worked great, including stuff like dumping colored output to svg files which is what i would expect to have issues if there were any. that said i did notice you packaged yaralyzer for "all" architectures but specifically this is what happened: |
|
p.s. i don't know if you'd by any chance be interested in packaging the pdfalyzer which is the tool that i broke the yaralyzer out from and which has proven surprisingly (to me, at least) popular for investigating malware PDFs but if you are it's here: https://github.com/michelcrypt4d4mus/pdfalyzer realistically it only has 2 or 3 dependencies beyond those already required to package the yaralyzer. |
|
Hey @mccrypter
I should point out that the packages I shared were built for |
|
i'm not super worried about the arm64 vs. amd64 thing seeing as how it's pretty tricky to install linux on a mac these days and there is the |
|
created a separate issue for packaging the pdfalyzer (actually far more popular a tool than the standalone yaralyzer) |
|
Date Modified | Username | Field | Change |
---|---|---|---|
2022-10-09 23:01 | mccrypter | New Issue | |
2022-11-01 14:35 | g0tmi1k | Note Added: 0017034 | |
2022-11-01 14:35 | g0tmi1k | Status | new => acknowledged |
2022-11-01 14:35 | g0tmi1k | Category | New Tool Requests => Queued Tool Addition |
2024-03-13 14:09 | daniruiz | Summary | yaralyzer is a tool to visually inspect and force decode YARA and regex matches found in both binary and text data. => yaralyzer - tool to visually inspect and force decode YARA and regex matches found in both binary and text data. |
2024-08-14 16:50 | Arszilla | Note Added: 0019643 | |
2024-08-14 16:50 | Arszilla | File Added: python3-rich-argparse-plus_0.3.1.4-0kali1_amd64.deb | |
2024-08-14 16:50 | Arszilla | File Added: yaralyzer_0.9.4-0kali1_all.deb | |
2024-08-19 01:30 | mccrypter | Note Added: 0019664 | |
2024-08-19 01:33 | mccrypter | Note Added: 0019665 | |
2024-08-19 05:47 | Arszilla | Note Added: 0019666 | |
2024-08-19 05:49 | Arszilla | Note Edited: 0019666 | |
2024-08-19 12:26 | mccrypter | Note Added: 0019668 | |
2024-08-19 19:52 | mccrypter | Note Added: 0019669 |