Suggestion is to have hash values included in the YARA object. This would allow correlation between malware samples and YARA rules that return true positives (and also false positives).
This would allow:
- Tracking of a files that give true positive and false positives
- Provide a mechanism for highlighting files that could be used to test new revisions of a YARA rule
- Correlation between a malware sample and a YARA rule
- As a result of correlation, this would provide a mechanism whereby users are aware of their YARA ruleset coverage against their malware samples
Suggestion is to have hash values included in the YARA object. This would allow correlation between malware samples and YARA rules that return true positives (and also false positives).
This would allow: