Skip to content
This page was generated and translated with the assistance of AI. If you spot any inaccuracies, feel free to help improve it. Edit on GitHub

Signature Sources

PRX-SD aggregates threat intelligence from over 20 open-source and community sources. This page provides detailed information on each source, its coverage, update frequency, and data type.

abuse.ch Sources

The abuse.ch project provides several high-quality, freely available threat feeds:

SourceData TypeContentUpdate FrequencyLicense
MalwareBazaarSHA-256Malware samples submitted by researchers worldwide. Rolling 48-hour window of the latest submissions.Every 5 minutesCC0
URLhausSHA-256File hashes associated with URLs distributing malware. Covers drive-by downloads, phishing payloads, and exploit kit drops.HourlyCC0
Feodo TrackerSHA-256Banking trojans and loaders: Emotet, Dridex, TrickBot, QakBot, BazarLoader, IcedID.Every 5 minutesCC0
ThreatFoxSHA-256Community-submitted IOCs spanning multiple malware families. Includes file hashes, domains, and IPs.HourlyCC0
SSL BlacklistSHA-1 (cert)SHA-1 fingerprints of SSL certificates used by botnet C2 servers. Used for network IOC matching.DailyCC0

TIP

All abuse.ch feeds are available without registration or API keys. PRX-SD downloads them directly from the public API endpoints.

VirusShare

FieldDetails
Data TypeMD5 hashes
Count20,000,000+
ContentOne of the largest public malware hash repositories. Contains MD5 hashes organized in numbered list files (VirusShare_00000.md5 through VirusShare_00500+.md5).
Update FrequencyNew list files added periodically
AccessFree (requires --full flag due to download size)
LicenseFree for non-commercial use

WARNING

The full VirusShare download is approximately 500 MB and takes significant time to import. Use sd update --full to include it, or sd update for standard updates without VirusShare.

YARA Rule Sources

SourceRule CountFocus AreaQuality
Built-in Rules64Ransomware, trojans, backdoors, rootkits, miners, webshells across Linux, macOS, WindowsCurated by PRX-SD team
Yara-Rules/rulesCommunityEmotet, TrickBot, CobaltStrike, Mirai, LockBit, APTsCommunity-maintained
Neo23x0/signature-baseHigh volumeAPT29, Lazarus Group, crypto mining, webshells, ransomware familiesHigh quality, Florian Roth
ReversingLabs YARACommercial-gradeTrojans, ransomware, backdoors, hack tools, exploitsProfessional-grade, open-source
Elastic SecurityGrowingEndpoint detection rules covering Windows, Linux, macOS threatsElastic threat research team
Google GCTISelectiveHigh-confidence rules from Google Cloud Threat IntelligenceVery high quality
ESET IOCSelectiveAPT tracking: Turla, Interception, InvisiMole, and other advanced threatsAPT-focused
InQuestSpecializedMalicious documents: OLE exploits, DDE injection, macro-based malwareDocument-specific

YARA Rule Categories

The combined rule set covers these malware categories:

CategoryExample FamiliesPlatform Coverage
RansomwareWannaCry, LockBit, Conti, REvil, Akira, BlackCatWindows, Linux
TrojansEmotet, TrickBot, QakBot, Agent Tesla, RedLineWindows
BackdoorsCobaltStrike, Metasploit, ShadowPad, PlugXCross-platform
RootkitsReptile, Diamorphine, Horse PillLinux
MinersXMRig, CCMiner variantsCross-platform
WebshellsChina Chopper, WSO, b374k, c99, r57Cross-platform
APTsAPT29, Lazarus, Turla, Sandworm, OceanLotusCross-platform
ExploitsEternalBlue, PrintNightmare, Log4Shell payloadsCross-platform
Hack ToolsMimikatz, Rubeus, BloodHound, ImpacketWindows
DocumentsMalicious Office macros, PDF exploits, RTF exploitsCross-platform

IOC Feed Sources

SourceIndicator TypeCountContentUpdate Frequency
IPsumIP addresses150,000+Aggregated malicious IP reputation from 50+ blocklists. Multi-level scoring (level 1-8 based on number of lists citing the IP).Daily
FireHOLIP addresses200,000+Curated IP blocklists organized by threat level (level1 through level4). Higher levels have stricter inclusion criteria.Every 6 hours
Emerging ThreatsIP addresses100,000+IPs extracted from Suricata and Snort IDS rules. Covers botnet C2, scanning, brute force, exploit attempts.Daily
SANS ISCIP addresses50,000+Suspicious IPs from the Internet Storm Center's DShield sensor network.Daily
URLhaus (URLs)URLs85,000+Active malicious URLs used for malware distribution, phishing, and exploit delivery.Hourly

ClamAV Database

FieldDetails
Data TypeMulti-format signatures (hash, bytecode, regex, logical)
Count11,000,000+ signatures
Filesmain.cvd (core), daily.cvd (daily updates), bytecode.cvd (bytecode rules)
ContentThe largest open-source virus signature database. Covers viruses, trojans, worms, phishing, PUAs.
Update FrequencyMultiple times daily
AccessFree via freshclam or direct download

To enable ClamAV integration:

bash
# Import ClamAV databases
sd import-clamav /var/lib/clamav/main.cvd
sd import-clamav /var/lib/clamav/daily.cvd

See Import Hashes for detailed ClamAV import instructions.

Source Configuration

Enable or disable individual sources in config.toml:

toml
[signatures.sources]
malware_bazaar = true
urlhaus = true
feodo_tracker = true
threatfox = true
ssl_blacklist = true
virusshare = false          # Enable with sd update --full
builtin_rules = true
yara_community = true
neo23x0 = true
reversinglabs = true
elastic = true
gcti = true
eset = true
inquest = true
ipsum = true
firehol = true
emerging_threats = true
sans_isc = true
clamav = false              # Enable after importing ClamAV DBs

Next Steps

Released under the Apache-2.0 License.