Malware researcher and founder of Yoroi Marco Ramilli shared a simple tool for malware static analysis he used to perform massive Malware analysis research.
The following interface stands in front of a live engine which takes binary files and runs them against a plethora of hundreds of YARA rules. Some of them are publicly available online many others are my own. By clicking on the desired table raw a modal popup will show you static analysis details such as, which YARA rule has been hit.
If you wish you might decide to search by sha256. In that specific case, just paste the sha256 on the research box and press the “Search” button.
You can make your analysis here:
|[adrotate banner=”9″]||[adrotate banner=”12″]|
(SecurityAffairs – Malware static analysis, malware)