Key | Value |
---|---|
FileName | ./usr/share/man/man1/yarac.1.gz |
FileSize | 848 |
MD5 | 97D49D3835D974EA9B118BAD9D315AC5 |
SHA-1 | 6651809AB34A52AAEBFB4369F1CCA860066B2D27 |
SHA-256 | FDCD437B6EB015F46C68388986CB9CB917676A633DEB1B7D703C52E20213C1CA |
SSDEEP | 24:Xn6VrMCZFjYmN/ZiFvxBlzfAX0xs1NCp0NqhH:XnmMijpiFTlzxsLnNqN |
TLSH | T10A01528A99F91B9581742030485DA4E73E5C20E63CF0CDD4B206B9AEBCED912949116B |
hashlookup:parent-total | 2 |
hashlookup:trust | 60 |
The searched file hash is included in 2 parent files which include package known and seen by metalookup. A sample is included below:
Key | Value |
---|---|
FileSize | 17004 |
MD5 | DD27F62266FCA9FE6EB270811DB5E629 |
PackageDescription | help to identify and classify malwares YARA is a tool aimed at helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families based on textual or binary patterns contained on samples of those families. Each description consists of a set of strings and a Boolean expression which determines its logic. This is useful in forensics analysis. . Complex and powerful rules can be created by using binary strings with wild-cards, case-insensitive text strings, special operators, regular expressions and many other features. . Are examples of the organizations and services using YARA: . - VirusTotal Intelligence (https://www.virustotal.com/intelligence/) - jsunpack-n (http://jsunpack.jeek.org/) - We Watch Your Website (http://www.wewatchyourwebsite.com/) - FireEye, Inc. (http://www.fireeye.com) - Fidelis XPS (http://www.fidelissecurity.com/network-security-appliance/ \ Fidelis-XPS) . The Volatility Framework is an example of the software that uses YARA. |
PackageMaintainer | Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com> |
PackageName | yara |
PackageSection | utils |
PackageVersion | 2.0.0-2 |
SHA-1 | 05D2C98CEAC1C8931F7597FCEA45DC797F120F25 |
SHA-256 | 24AF56A3EA9DD2AECA42B5AD7D2D0FFD75ADC9EFB48BEA1E980618B1E50BCDA4 |
Key | Value |
---|---|
FileSize | 17238 |
MD5 | 9325660E4BF7044EA125AC6DAB8A187F |
PackageDescription | help to identify and classify malwares YARA is a tool aimed at helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families based on textual or binary patterns contained on samples of those families. Each description consists of a set of strings and a Boolean expression which determines its logic. This is useful in forensics analysis. . Complex and powerful rules can be created by using binary strings with wild-cards, case-insensitive text strings, special operators, regular expressions and many other features. . Are examples of the organizations and services using YARA: . - VirusTotal Intelligence (https://www.virustotal.com/intelligence/) - jsunpack-n (http://jsunpack.jeek.org/) - We Watch Your Website (http://www.wewatchyourwebsite.com/) - FireEye, Inc. (http://www.fireeye.com) - Fidelis XPS (http://www.fidelissecurity.com/network-security-appliance/ \ Fidelis-XPS) . The Volatility Framework is an example of the software that uses YARA. |
PackageMaintainer | Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com> |
PackageName | yara |
PackageSection | utils |
PackageVersion | 2.0.0-2 |
SHA-1 | C68B0550EFD05814744D1AB9D223F3D7158C31B1 |
SHA-256 | 47D0161188FFE2FC339802E75135A1B01A4DF203CA444D4303F24D3D60D60DC3 |