diff --git a/README.md b/README.md index 7571e13..4cb4cdd 100644 --- a/README.md +++ b/README.md @@ -40,6 +40,17 @@ If you want to re-run the analysis across your binaries: 3. Remove the feed from your Cb server's Threat Intelligence page 4. Restart the service: `service cb-yara-connector start` +## Building yara-python with crypto + +1. `git clone --recursive https://github.com/VirusTotal/yara-python` +2. `cd yara-python/yara` +3. `./bootstrap.sh` +3. `./configure --with-crypto` +4. `make` +5. `mktmpenv` +6. `python setup.py build --dynamic-linking` +7. `python setup.py install` + ## Contacting Carbon Black Developer Relations Support Web: https://developer.carbonblack.com diff --git a/cbopensource/connectors/yara/bridge.py b/cbopensource/connectors/yara/bridge.py index 0b220a6..b25e64e 100644 --- a/cbopensource/connectors/yara/bridge.py +++ b/cbopensource/connectors/yara/bridge.py @@ -73,7 +73,7 @@ def getHighScore(self, matches): class YaraConnector(DetonationDaemon): @property def integration_name(self): - return 'Cb Yara Connector 1.3.2' + return 'Cb Yara Connector 1.3.3' @property def filter_spec(self): diff --git a/python-cb-yara-connector.spec b/python-cb-yara-connector.spec index 3b54aab..bc256dd 100644 --- a/python-cb-yara-connector.spec +++ b/python-cb-yara-connector.spec @@ -1,7 +1,7 @@ %define name python-cb-yara-connector %define version 1.3 %define unmangled_version 1.3 -%define release 2 +%define release 3 %global _enable_debug_package 0 %global debug_package %{nil} %global __os_install_post /usr/lib/rpm/brp-compress %{nil}