The following interface stands in front of a live engine which takes binary files and runs them against a plethora of hundreds of YARA rules. Some of them are publicly available online many others are my own. By clicking on the desired table raw a modal popup will show you static analysis details such as, which YARA rule has been hit.
If you wish you might decide to search by sha256. In that specific case, just paste the sha256 on the research box and press the “Search” button.
You can make your analysis here:
https://marcoramilli.com/malware/
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – Malware static analysis, malware)
[adrotate banner=”5″]
[adrotate banner=”13″]
Nova Scotia Power confirmed a data breach involving the theft of sensitive customer data after…
Coinbase confirmed rogue contractors stole customer data and demanded a $20M ransom in a breach…
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Fortinet vulnerability to its Known Exploited Vulnerabilities…
Kosovar citizen extradited to the US for running the cybercrime marketplace BlackDB.cc appeared in federal…
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Windows flaws to its Known Exploited…
Ivanti addressed two Endpoint Manager Mobile (EPMM) software vulnerabilities that have been exploited in limited…
This website uses cookies.