Hello everyone! I just started working with Chronicle SIEM and I need some help with a YARA-L rule.
I need to create a rule that will filter Corelight logs with files containing malicious hashes and match the hashes against Virus Total.
Appreciate any help in advance!🙂
Solved! Go to Solution.
Thanks for sending this along. The $e2 event needs to be something more specific. As I read this, we have network connection events in $e1. Narrowing this down to a specific kind of network traffic might be nice to improve the rule, but for now we are ok.
Is the Corelight data the $e1 Network Connection events or is it something else? If we just want to look for Corelight data and VT data, the first portion of the event section might be able to be narrowed to just this:
I would suggest removing $e2 because at the moment $e2 is basically everything in your environment.
This rule looks similar to a template rule we created here.
We're here to help with questions like this. Do you have a portion of the rule built that you can share? Chronicle has a few integrations with VT but they have some specific licensing requirements associated with it. If you are putting VT data into some sort of reference list, that might change things a bit, so understanding how you are gathering the VT data would be helpful as well.
Thank you for the quick reply!
Here is the rule I built:
Thanks for sending this along. The $e2 event needs to be something more specific. As I read this, we have network connection events in $e1. Narrowing this down to a specific kind of network traffic might be nice to improve the rule, but for now we are ok.
Is the Corelight data the $e1 Network Connection events or is it something else? If we just want to look for Corelight data and VT data, the first portion of the event section might be able to be narrowed to just this:
I would suggest removing $e2 because at the moment $e2 is basically everything in your environment.
This rule looks similar to a template rule we created here.
hey team
based the same rule which i build when i search the hash and ip in vt am getting zero rating then how come it is alerting as vt rates it has clean .
could you please explain