YARA Continuous Detection

Validin has extended its YARA-X integration to run YARA rules continuously on live host response data, enabling timestamped, contextual detections across a dataset of over 850 million daily host responses. New features include a YARA playground, rule versioning, Projects for collaborative investigations, and demonstrated detections of ClickFix-related HTML and JavaScript injections. #ClickFix #IUAM

Keypoints

  • Validin’s YARA engine now executes continuously on live host response data, converting retrospective hunts into real-time detection.
  • Integration with YARA-X enables internet-scale processing of over 850 million host responses daily and maintains deep contextual metadata for matches.
  • Rule versioning and a YARA playground let analysts edit, test, and maintain multiple syntax variants with separate run histories for auditability.
  • Projects provide a collaborative workspace that unites indicators, alerts, live scans, and YARA rules for streamlined investigations.
  • Continuous execution timestamps each match and enriches it with response context, enabling near-realtime infrastructure tracking and triage.
  • Case study: ClickFix (IUAM) detections—575 matches for HTML template indicators in 1 day and 2,213 matches for obfuscated JavaScript over 3 days.
  • Overall outcomes include faster triage, improved detection efficiency with historical context, minimized propagation risk, and support for trend analysis.

MITRE Techniques

  • [T1059] Command and Scripting Interpreter – YARA rules detected JavaScript payloads injected into HTML that capture credentials (“…searching for the CMD+R command that was present in the ClickFix instructions…”).
  • [T1204] User Execution – Detection of cloned verification/authentication templates used by ClickFix that rely on user interaction with malicious pages (“…domains hosting cloned verification or authentication templates…”).
  • [T1110] Brute Force (credential access related behavior) – Identified pages and scripts designed to capture credentials via injected JavaScript (“…JavaScript payloads that capture credentials…”).
  • [T1609] Collection from Web Pages – Extraction and inspection of virtual host responses and HTML to verify malicious content (“…Analysts can review the matching HTML response and response summary directly within a slide-out view.”).
  • [T1087] Account Discovery (infrastructure tracking) – Timestamped, continuous matches enable tracking of evolving attacker infrastructure across domains and hosts (“…showing how the ClickFix infrastructure evolves in near real time.”).

Indicators of Compromise

  • [Domain ] ClickFix infrastructure detection – examples include multiple domains hosting cloned verification/authentication templates (575 matches over 1 day).
  • [File/Script Patterns ] Obfuscated JavaScript payloads – encoded scripts inside benign landing pages (2,213 matches over 3 days).
  • [Rule Matches/Timestamps ] Contextual host response matches – timestamped YARA matches with slide-out HTML and certificate details (examples: CMD+R indicator match, obfuscated JS match).
  • [Dataset Metrics ] Scale/context indicators – processing context such as “over 850 million host responses daily” and counts like “575 matches” and “2,213 matches”.


Read more: https://www.validin.com/blog/yara_continuous_updates/