This is a simple tool of mine used to perform massive Malware analysis research. The following interface stands in front of a live engine which takes binary files and runs them against a pletora of hundreds YARA rules. Some of them are publicly available online many other are my own. By clicking on a desired table raw a modal popup will show you static analysis details such as, which YARA rule has been hit. If you wish you might decide to search by sha256. In that specific case, just paste the sha256 on the research box and press the “Search” button.


Total

Total analyzed

Waiting to be analyzed

TOP 10 Tags

Last 10 Tags

Last (10) Interesting Analysed Samples (click on one row)

Date sha256 Report size rules