ELF malware often strips symbol information during build, which hides function names and increases analysis effort. The article describes using Yara rules and AutoYara4FLIRT to recover function names and explains a Retrohunt-based workflow to create FLIRT signatures for ELF binaries. #AutoYara4FLIRT #FLIRT
Keypoints
- ELF malware commonly removes symbol information during build, making function-name identification harder for analysts.
- Default FLIRT signatures often do not match ELF malware, and creating the right signature is difficult due to library versions and compilation conditions.
- The method uses a Yara rule to search for ELF binaries that still contain symbol information (.symtab/.strtab) and then Retrohunt on VirusTotal to generate a FLIRT signature from the Retrohunt-ed ELF.
- Evaluation on 50 ELF samples (x86 and ARM) showed FLIRT signatures could be created for about 60% of x86 functions and about 30% of ARM functions, with some cases exceeding 90% for x86.
- AutoYara4FLIRT is an IDA plugin that automatically generates Yara rules from ELF malware, using disassembler strings and the longest sequence across multiple blocks to cover differences in conditions.
- A CLI tool (CLI_AutoYara) enables automated Yara rule generation and bulk FLIRT signature creation for multiple ELF binaries.
- The method also works with other architectures (x86-64, MIPS) and can be used with free alternatives to VirusTotal for searching, beyond the paid Retrohunt path.
MITRE Techniques
- [T1564.001] Hide Artifacts – ELF malware removes symbol information during its build, making analysis harder: “ELF malware removes symbol information during its build. This creates extra work in malware analysis to identify each function name because you do not know them.”
Indicators of Compromise
- [Domain] Source domains related to the content – github.com, bazaar.abuse.ch, blogs.jpcert.or.jp, support.virustotal.com
- [File name] Files mentioned – AutoYara4FLIRT.py, AutoYara4FLIRT.sig
Read more: https://blogs.jpcert.or.jp/en/2023/06/autoyara4flirt.html