Skip to main content

Featured YARA rule: Top 10 Ransomware Threats


Rick Vanover
Forum|alt.badge.img+10

Now that V12.1 is available, I wanted to share with you a featured YARA rule set that can give you on-demand scanning for some top ransomware threats. 

Attached to this post is a file named: Top10RW_YARArules.zip. In this file are YARA rules for some common ransomware threats that have been seen recently:

Attribution: This great collection was made by Felix Bilsten. Links: X: Felix Bilstein (@fxb_b) / X (twitter.com), website: Felix Bilstein - project overview (cocacoding.com) and Github: fxb-cocacoding (Felix Bilstein) · GitHub

14 comments

Chris.Childerhose
Forum|alt.badge.img+21
  • Veeam Legend, Veeam Vanguard
  • 8395 comments
  • December 15, 2023

Thanks for sharing these, Rick.  Looking forward to exploring Yara with 12.1.


coolsport00
Forum|alt.badge.img+20
  • Veeam Legend
  • 4106 comments
  • December 15, 2023

Fantastic Rick! Appreciate the share. Will look at this for sure after I get my environment upgraded.


Rick Vanover
Forum|alt.badge.img+10
  • Author
  • RICKATRON
  • 764 comments
  • December 15, 2023

Cheers, Shane.


JMeixner
Forum|alt.badge.img+17
  • Veeam Vanguard
  • 2650 comments
  • December 15, 2023

Thanks Rick, I will try this on Monday 😎👍🏼


BertrandFR
Forum|alt.badge.img+8
  • Influencer
  • 527 comments
  • December 16, 2023

Thanks for sharing @Rick Vanover , any comments about it @Julien Mousqueton ?


Scott
Forum|alt.badge.img+8
  • Veeam Legend
  • 993 comments
  • December 18, 2023

This is great. I’ll add it to the lab this week!


JMousqueton
Forum|alt.badge.img+3
  • Veeam Vanguard
  • 10 comments
  • December 19, 2023

@Rick Vanover & @BertrandFR 

Find bellow the golden mine of Yara rules : 

https://yarahq.github.io
 

“YARA Forge specializes in delivering high-quality YARA rule packages for immediate integration into security platforms. This tool automates the sourcing, standardization, and optimization of YARA rules from a variety of public repositories shared by different organizations and individuals. By collating these community-contributed rules, YARA Forge ensures that each package meets rigorous quality standards, offering a diverse and comprehensive rule set.” 


Link State
Forum|alt.badge.img+11
  • Veeam Legend
  • 601 comments
  • December 20, 2023

Thank you @Rick Vanover  everything seems okay.

uploaded C:\Program Files\Veeam\Backup and Replication\Backup\YaraRules

Launched scan yara medusa no error at the moment.
Thanks for sharing.

 

 


Scott
Forum|alt.badge.img+8
  • Veeam Legend
  • 993 comments
  • December 20, 2023

Tested in my lab and it worked great. (minimal CPU available and a pretty small backup set)

I’m excited to get more into Yara rules and look forward to posting some writeups and new rules for people to try on here. 


  • New Here
  • 2 comments
  • January 4, 2024
JMousqueton wrote:

@Rick Vanover & @BertrandFR 

Find bellow the golden mine of Yara rules : 

https://yarahq.github.io
 

“YARA Forge specializes in delivering high-quality YARA rule packages for immediate integration into security platforms. This tool automates the sourcing, standardization, and optimization of YARA rules from a variety of public repositories shared by different organizations and individuals. By collating these community-contributed rules, YARA Forge ensures that each package meets rigorous quality standards, offering a diverse and comprehensive rule set.” 

Trying the core ruleset tonight!


damien commenge
Forum|alt.badge.img+5

Hello,

 

Thanks for sharing it @Rick Vanover 

I’m sorry but I ‘m not sure to understand really what YARA rules are for ? 

I need to select 1 rule like “test eicar” for VBR to scan file backup and say me yes there is eicar on this file backup ?

I’m sorry I don’t know anything about it but not sure I understand the benefits when I compare to other new 12.1 feature like inline detection (I don’t have to create any rules) or suspicious activity detection ?
Thanks for your explanations :)


  • New Here
  • 2 comments
  • May 20, 2024

The yara file adonunix alerts a lot of false positives, primarily it detects windows update packages as threats. Is this supposed to happen, or I should worry about it?

 

 


Rick Vanover
Forum|alt.badge.img+10
  • Author
  • RICKATRON
  • 764 comments
  • May 20, 2024
mmalarino wrote:

The yara file adonunix alerts a lot of false positives, primarily it detects windows update packages as threats. Is this supposed to happen, or I should worry about it?

 

 

Hi @mmalarino → Yes, windows update have also hit a lot of false positive for massive encryptions also. We are tuning the logic often. Stay tuned. And welcome to the Veeam community :)


  • New Here
  • 2 comments
  • May 20, 2024

@Rick Vanover thanks for the rules and the chance for a test. I'll be looking forward for more info!