You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Yara scanner is revamped to perform file and
memory scanning triggered by multiple signals. Aside
from the basic process creation and image loading, the
scan is initiated when the PE file is dropped in the file
system, or when the ADS (Alternate Data Stream) is created.
Memory scan is triggered under suspicious memory allocation or section mapping. Lastly, when the
registry binary value is set, the scan is also performed
on the binary blob.
flags.Bool(enabled, false, "Specifies if Yara scanner is enabled")
114
-
flags.String(alertVia, "mail", "Defines which alert sender is used to emit the alert on rule matches")
115
-
flags.String(alertTextTemplate, "", "Defines the template that is used to render the text of the alert")
116
-
flags.String(alertTitleTemplate, "", "Defines the template that is used to render the title of the alert")
132
+
flags.String(alertTemplate, "", "Defines the template that is used to render the alert. By default only the threat/rule name is rendered")
117
133
flags.Bool(fastScanMode, true, "Avoids multiple matches of the same string when not necessary")
118
134
flags.Duration(scanTimeout, time.Second*10, "Specifies the timeout for the scanner. If the timeout is reached, the scan operation is cancelled")
119
-
flags.Bool(skipFiles, true, "Indicates whether file scanning is disabled")
120
-
flags.StringSlice(excludedFiles, []string{}, "Contains the list of the comma-separated file names that shouldn't be scanned")
121
-
flags.StringSlice(excludedProcesses, []string{}, "Contains the list of the comma-separated process' image names that shouldn't be scanned")
135
+
flags.Bool(skipFiles, false, "Indicates whether file scanning is disabled")
136
+
flags.Bool(skipAllocs, false, "Indicates whether scanning on suspicious memory allocations is disabled")
137
+
flags.Bool(skipMmaps, false, "Indicates whether scanning on suspicious mappings of sections is disabled")
138
+
flags.Bool(skipRegistry, false, "Indicates whether registry value scanning is disabled")
139
+
flags.StringSlice(excludedFiles, []string{}, "Contains the list of the comma-separated file paths that shouldn't be scanned. Wildcard matching is possible")
140
+
flags.StringSlice(excludedProcesses, []string{}, "Contains the list of the comma-separated process image paths that shouldn't be scanned. Wildcard matching is possible")
122
141
}
123
142
124
-
// ShouldSkipProcess determines whether the specified process name is rejected by the scanner.
125
-
func (cConfig) ShouldSkipProcess(psstring) bool {
126
-
for_, proc:=rangec.ExcludedProcesses {
127
-
ifstrings.EqualFold(proc, ps) {
143
+
// ShouldSkipProcess determines whether the specified full process image path is rejected by the scanner.
0 commit comments