EN
ENNA
YA

YARA

Featured

🔬 Digital Forensics · C

YARA is the pattern matching swiss knife for malware researchers. It allows you to create descriptions of malware families (or whatever you want to describe) based on textual or binary patterns. Each rule consists of a set of strings and a boolean expression which determines its logic. YARA is used by security researchers, incident responders, and threat hunters to identify and classify malware samples, suspicious files, and network artifacts.

Installation

apt (Debian/Ubuntu)

$ sudo apt install yara

brew (macOS)

$ brew install yara

pip

$ pip install yara-python

Use Cases

  • Malware identification and classification
  • Threat hunting across endpoints
  • Incident response triage
  • File and memory scanning for indicators
  • Building detection rules for security products

Tags

malwarepattern-matchingrulesclassification

More in Digital Forensics