This is a simple tool of mine used to perform massive Malware analysis research. The following interface stands in front of a live engine which takes binary files and runs them against a pletora of hundreds YARA rules. Some of them are publicly available online many other are my own. By clicking on a desired table raw a modal popup will show you static analysis details such as, which YARA rule has been hit. If you wish you might decide to search by sha256. In that specific case, just paste the sha256 on the research box and press the “Search” button.
Waiting to be analyzed
TOP 10 Tags
Last 10 Tags
Last (10) Interesting Analysed Samples (click on one row)