1 Star 0 Fork 0

pelin0963 / MemProcFS.wiki

加入 Gitee
与超过 1200万 开发者一起发现、参与优秀开源项目,私有仓库也完全免费 :)
免费加入
该仓库未声明开源许可证文件(LICENSE),使用请关注具体项目描述及其代码上游依赖。
克隆/下载
FS_Forensic_Yara.md 1.47 KB
一键复制 编辑 原始数据 按行查看 历史
ufrisk 提交于 2023-05-02 00:36 . Guide Update

The forensic/yara directory

The directory forensic/yara exists as a sub-directory to the file system root.

The directory is hidden by default. It will appear once forensic mode has been started and processing is completed if optional yara rules have been specified.

The directory contains results of a forensic yara scan of process and kernel virtual address spaces.

The forensic scan is conducted with rules specified in the start-up option -forensic-yara-rules. The rules may be either compiled rules or source rules (including index rules referencing other rules). Example: memprocfs.exe -device c:\dumps\win10.raw -forensic-yara-rules c:\yara\rules\windows_malware_index.yar

The files in the forensic/yara directory are listed in the table below:

File Description
match-count.txt The number of yara matches.
result.txt Detailed yara match information.
rules.txt The user-defined rules used in the scan.

Example

The example shows looking at forensic yara matches which indicates Trickbot in the svchost.exe process.

[[resources/root_forensic_yara.png]]

For Developers

The forensic/yara sub-directory is implemented as a built-in native C-code plugin. The plugin source is located in the file modules/m_fc_yara.c in the vmm project.

1
https://gitee.com/pelin0963/MemProcFS-wiki.git
git@gitee.com:pelin0963/MemProcFS-wiki.git
pelin0963
MemProcFS-wiki
MemProcFS.wiki
master

搜索帮助

53164aa7 5694891 3bd8fe86 5694891