What's VT Hunting?
VT Hunting is a service that leverages the power of YARA over Google Threat Intelligence's dataset, it consists of three different components: Livehunt, Retrohunt and VTDIFF. If you have never used YARA before we recommend you to start by reading the YARA documentation.
Livehunt allows you to hook into the stream of files submitted to Google Threat Intelligence and to get notified whenever one of them matches your rules. By matching the submitted files with YARA you should be able to (1) get a constant flow of malware files classified by family, (2) discover new malware flying under the industry's radar, (3) collect files written in a given language or packed with a specific run-time packer, (4) create heuristic rules to detect suspicious files, (5) track threat actors, and, in general, enjoy the benefits of YARA's versatility acting on the huge amount of files processed by Google Threat Intelligence every day.
Besides hunting for files in real time as they arrive to Google Threat Intelligence, you can also apply your YARA rules to the historical collection of files with Retrohunt. A Retrohunt job takes around ~3-4 hours to complete and scans over 600TB of files sent to Google Threat Intelligence during the past year.
Last, VTDIFF eases the task of creating YARA rules. It allows you to provide a collection of hashes that you are interested in matching and a collection of hashes that you do not want to match at all and it will generate common binary subsequences that are shared by your selection. VTDIFF takes into account binary sequence prevalence across the entire Google Threat Intelligencel dataset in order to make sure it does not suggest noisy patterns that may produce false positives.
These hunting components can be automated using the Google Threat Intelligence API v3.
Updated 22 days ago