
Open-Source YARA Rules
ReversingLabs developed a set of Open-Source YARA rules which undergo rigorous quality assurance to ensure zero false positives, tested against a cloud repository of 40B+ binaries.
ReversingLabs has developed, tested and published over 100 Open-Source YARA rules on GitHub.
The rules cover a broad range of categories, detecting a multitude of malware downloaders, viruses, trojans, exploits and ransomware.
YARA detection rules are developed for threat hunters, threat researchers, incident responders and security analysts with the mission to reduce malware infection risk across the organization.
Each unique rule can inspect file content on endpoints, during transfer, execution or at rest. While there’s no limit to usage, the best results are seen with fully inspected multi-layered content.
Apply these YARA rules within static analysis solutions that perform decomposition, dynamic sandbox solutions that perform in memory YARA matching, network IPS controls or even SIEMs.
On June 30th 2020 ReversingLabs published over 100 open-source YARA rules within the ReversingLabs GitHub repository.
ReversingLabs plans to use the GitHub repository as the primary delivery method for threat defenders to access updated and quality open-source YARA rules that detect the latest threats.
Spectra Assure analysis for end-to-end software development workflows, containers and release packages
LEARN MORE about Software Supply Chain SecuritySoftware Supply Chain SecurityThe world's most trusted and authoritative data corpus of goodware and malware intelligence, consisting of more than 422+ billion samples
LEARN MORE about File & Network Threat IntelligenceFile & Network Threat IntelligenceHigh-volume, high-speed inspection of files from web, email, endpoints, file shares, and cloud storage – scalable to millions of files per day.
LEARN MORE about Enterprise-Scale File AnalysisEnterprise-Scale File AnalysisAn instant malware lab for automated, in-depth static and dynamic analysis, plus powerful search and threat hunting
LEARN MORE about Private Malware Analysis WorkbenchPrivate Malware Analysis WorkbenchFinding similar or relevant samples using YARA is part of every hunter's day, and is similar to finding a needle in a haystack.
Learn More about How to Hunt for Threats Using YARA RulesGetting Ahead of Ryuk attacks using YARA Rules - Continued
Learn More about Exposing Ryuk Variants Using YARARegister for On-Demand Webinar: How to Analyze the Kwampirs RAT
Learn More about How to Analyze the Kwampirs RAT