The following interface stands in front of a live engine which takes binary files and runs them against a plethora of hundreds of YARA rules. Some of them are publicly available online many others are my own. By clicking on the desired table raw a modal popup will show you static analysis details such as, which YARA rule has been hit.
If you wish you might decide to search by sha256. In that specific case, just paste the sha256 on the research box and press the “Search” button.
You can make your analysis here:
https://marcoramilli.com/malware/
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – Malware static analysis, malware)
[adrotate banner=”5″]
[adrotate banner=”13″]
Microsoft Patch Tuesday security updates for February 2026 fix six actively exploited zero-day vulnerabilities. Microsoft…
ZeroDayRAT is a commercial mobile spyware that grants full remote access to Android and iOS…
Senegal closed its national ID card office after a ransomware cyberattack disrupted ID, passport, and…
Dutch agencies confirmed attacks exploiting Ivanti EPMM flaws that exposed employee contact data at the…
China-linked group UNC3886 targeted Singapore ’s telecom sector in a cyber espionage campaign, Singapore’s Cyber…
Fortinet warns of a critical FortiClientEMS vulnerability that lets remote attackers run malicious code without…
This website uses cookies.