Documentacao renderizada
Esta pagina renderiza o Markdown e Mermaid do modulo diretamente da fonte publica de documentacao.
Overview#
Argus includes a managed YARA (Yet Another Ridiculous Acronym) rules engine that stores, versions, and applies YARA pattern-matching rules across malware samples, binary files, and process memory dumps analysed within the platform. YARA is the de facto standard for writing malware detection signatures describing file content, string patterns, byte sequences, and structural characteristics. The Argus rules engine maintains a tenant-specific YARA rule library that can be applied against CAPE Sandbox results, Binwalk firmware extractions, and FKIE FACT firmware analysis outputs.
Key Features#
Rule Library Management#
Upsert YARA rules via the
syncYaraRule mutation, providing rule name, YARA source text, description, author, and classification level. Rules are stored in PostgreSQL scoped to the organisation and can be updated or deprecated without deleting historical match records. The rule source text is preserved in its canonical YARA format for portability.
Rule Inventory with Classification Filtering#
Query the rule library via
yaraEngineItems with optional filter by rule name or classification. Row-level secrecy filtering ensures classified rules (e.g., those derived from classified intelligence) are visible only to appropriately cleared personnel. This enables a shared rule library across classification boundaries within the same Argus deployment.
Integration with Malware Analysis Domains#
YARA rules stored in Argus are designed to be applied against analysis results from CAPE Sandbox (dynamic analysis), Binwalk firmware extraction, and FKIE FACT firmware analysis. Rule match results link back to the analysed sample, enabling pivot workflows from "this YARA rule matched" to "these are all the samples and firmware images that match."
Statistics#
The
yaraEngineStats query returns rule counts by classification and status (active vs deprecated), supporting the detection engineering lifecycle where rules retire as malware families evolve.
Use Cases#
- Malware Family Classification: Write YARA rules detecting specific malware family characteristics and automatically classify CAPE Sandbox results and MWDB samples against the rule set.
- Firmware Backdoor Detection: Apply YARA rules targeting known backdoor strings, hardcoded credentials, and suspicious imports against Binwalk or FKIE FACT firmware extraction output.
- Threat Hunting: Distribute YARA rules from MISP threat intel events across all analysed samples in the tenant, triggering retrospective matches against previously ingested data.
- Intelligence-Derived Signatures: Convert MWDB-extracted malware strings and config data into YARA rules that detect variants using the same string constants or encryption keys.
Integration#
Available via GraphQL:
yaraEngineItems, yaraEngineStats (queries); syncYaraRule (mutation). All operations require authentication and organisation scoping.
Works alongside CAPE Sandbox (sample analysis), Binwalk (firmware analysis), FKIE FACT (firmware deep analysis), and MWDB (malware metadata correlation).
Last Reviewed: 2026-03-18