If you are infected with a rootkit moving YARA into the kernel is not an answer
since the rootkit has full access to muck around with YARA even if it is in the
kernel.
My recommendation is don't run YARA on a system which is potentially
compromised with a rootkit like you describe. If the
Not entirely true. The YARA VM does not run native instructions directly, so if
you did manage to jump somewhere other than YARA instructions the VM would
likely crash badly. If this can lead to arbitrary code execution, I have no
idea.
Jumps are not bad. BPF, which runs in the kernel, allows
Yara rules with jump constructs would make it easy to get code execution in
the kernel.
On Fri, Mar 18, 2016 at 6:03 AM Wesley Shields wrote:
> If you are infected with a rootkit moving YARA into the kernel is not an
> answer since the rootkit has full access to muck around