Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Blacklisted YARA rules that produce FPs
* https://github.com/Yara-Rules/rules/blob/master/malware/RAT_PoetRATPython.yar FPs on a whole bunch of C & C++ sources and headers amongst other benign files. Try scanning /usr/include/ and find out :) * https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Sqlite.yar alerts on anything with "SQLite format 3" * php_uname & php_malfunctions in https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Magento_suspicious.yar are too generic * blackhole_basic in https://github.com/Yara-Rules/rules/blob/master/exploit_kits/EK_Blackhole.yar seems too generic and FPs on files like swig-4.0.2/CHANGES & bison.info.gz * PM_Email_Sent_By_PHP_Script in https://github.com/Yara-Rules/rules/blob/master/malware/MALW_Mailers.yar is too generic (e.g. only having "/usr/bin/php") * https://github.com/Yara-Rules/rules/blob/master/malware/MALW_CAP_HookExKeylogger.yar is too generic and FPs on files like /usr/lib64/gcc/x86_64-slackware-linux/11.2.0/include/d/core/sys/windows/winuser.d
- Loading branch information
86e3371
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
#84