The following interface stands in front of a live engine which takes binary files and runs them against a plethora of hundreds of YARA rules. Some of them are publicly available online many others are my own. By clicking on the desired table raw a modal popup will show you static analysis details such as, which YARA rule has been hit.
Now, more than 240.000 statically analysed samples, for free here: https://t.co/DulSaUQtQY #malware #Yara #infosec #CyberSecurity pic.twitter.com/NrDNmHGoyS
— Marco Ramilli (@Marco_Ramilli) March 22, 2019
If you wish you might decide to search by sha256. In that specific case, just paste the sha256 on the research box and press the “Search” button.
You can make your analysis here:
https://marcoramilli.com/malware/
[adrotate banner=”9″] | [adrotate banner=”12″] |
(
[adrotate banner=”5″]
[adrotate banner=”13″]