Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Mach-O Feature Extraction and Malware Similarity Analysis with YARA-X

Objective-See Foundation via YouTube

Overview

Learn about macOS malware analysis techniques and Mach-O similarity methods in this 36-minute conference talk from Objective-See Foundation. Explore how to develop effective methods for finding similar malware samples beyond traditional string searching approaches, with a focus on creating "easy pivots" similar to those available for Windows executables. Discover the development of a custom Mach-O parser built in Rust for YARA-X, enabling deeper analysis of Mach-O similarities. Follow along as Senior Threat Researcher Greg Lesnewich and Staff Software Engineer Jacob Latonis demonstrate these techniques using real APT Mach-O malware families, while sharing their expertise in threat intelligence, infrastructure tracking, and open-source security tool development.

Syllabus

OBTS v7 A Better Way, YARA-X, Mach-O Feature Extraction, and Malware Similarity. Latonis & Lesnewich

Taught by

Objective-See Foundation

Reviews

Start your review of Mach-O Feature Extraction and Malware Similarity Analysis with YARA-X

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.