New Capabilities in THOR Lite: Archive Scanning and YARA Forge Integration

by Aug 13, 2025

Many of our customers value the broad module support and high detection coverage found in our professional-grade products. However, we are also committed to continuously improving our free tools, ensuring that the gap in detection capabilities does not grow too wide.

As part of this effort, we recently enabled multithreaded scanning in THOR Lite — and now we are taking another major step. We’re unlocking a new feature that brings even more forensic depth to our free edition: archive scanning with embedded YARA rules. Additionally, we are integrating a powerful, community-curated rule set named YARA Forge, an open-source initiative maintained by our Head of Research.

These upgrades significantly enhance THOR Lite’s capabilities and bring it closer to the level of detection traditionally reserved for our enterprise offerings.

Chapter 1: Archive Scanning in THOR Lite

We recently unlocked a highly impactful feature in THOR Lite that significantly improves deep detection capabilities: archive scanning using YARA rules.

Unlike many traditional YARA scanners, which either ignore or only partially unpack archives, THOR Lite now offers recursive archive scanning up to a configurable depth. This enhancement applies not only to standard formats like .zip or .tar.gz, but also includes frequently abused PKZIP-based or archive-like formats such as:

  • JAR and WAR files (Java packages) – often deliver malicious Java droppers or JAVA-based web shells in compromised application servers.
  • Malicious JAR droppers – observed delivering infostealers like FormBook or loaders like SmokeLoader.
  • APK files (Android application packages) – used to distribute Android banking trojans or other mobile malware, sometimes as part of cross-platform attack kits.
  • VSIX (Visual Studio extensions) – not yet widely abused but represent a high-potential future attack vector targeting developer environments.

Performance and Safety Considerations

Archive scanning in THOR Lite is performed in memory and includes multiple safeguards to prevent instability or resource exhaustion. These safeguards include:

  • Limits on maximum nesting depth to avoid ZIP bombs.
  • Restrictions on total extracted size to prevent excessive disk or memory usage.
  • Handling of uncommon conditions to avoid high system load or memory leaks.

These measures are part of what distinguishes Nextron’s tools from many other scanners — we invest heavily in safeguards, performance tuning, and scan stability, ensuring that even when scanning complex or unusual files, the system remains responsive and secure.

Real-World Example: Template Injection in an Office Document

The capabilities described above are not theoretical — they detect what others miss, even in the free version of THOR Lite.

The following example illustrates this:

  • An Office document uploaded to VirusTotal nine days ago shows zero detections by 66 antivirus engines.
  • Inside the archive, the document.xml.rels file contains a suspicious external template reference:
    <Target>https://microsoft.wordocuments.workers.dev/DocumentItem</Target>
    

This domain is highly suspicious and fits a common technique known as Office Template Injection.

Below are the four key illustrations:

  1. VirusTotal Analysis – Showing no AV engine flagged the file
  2. XML Content – Embedded in the .rels file inside the Office archive
  3. THOR Lite Detection – Detected and flagged successfully
  4. Domain Verdict – Domain flagged as malicious

Sample Links:

Chapter 2: YARA Forge Integration – High-Quality Rules, Instantly Available

What is YARA Forge?

YARA Forge is a community-driven project maintained by Florian Roth and hosted under the YARA HQ initiative. It was created to solve the real-world challenges of inconsistent quality, structure, and performance in public YARA rule repositories.

Rather than teaching best practices individually, YARA Forge automatically processes and curates thousands of rules from over 70 open-source YARA repositories. It:

  • Normalizes rule metadata
  • Identifies performance issues (e.g., inefficient regex)
  • Applies quality and compatibility checks
  • Scores and filters rules based on stability and false positive rates

The final output is a set of ready-to-use rule packages:

  • core – high-quality, stable rules with minimal performance impact
  • extended – broader rule set with slightly relaxed criteria
  • full – all valid, non-excluded rules from included repositories

Every rule’s quality issues are logged and made transparent to users. False positive testing is done manually and tracked via custom YAML scores.

This approach not only improves accessibility but also amplifies the visibility of smaller but high-quality rule repositories.

  • Aggregation from open and private repositories
  • Streamlining and normalization of metadata and tags
  • Manual quality review to reduce false positives
  • Focus on performance and compatibility

Integration Workflow

The YARA Forge ruleset can be added to your scan environment with a single command:

thor-util yara-forge download --ruleset core

This downloads the “core” rule set, which contains only the best-performing, high-quality rules, and incorporates it alongside your existing signature base. In THOR Cloud, the same is achievable through the web interface.

By leveraging YARA Forge, users benefit primarily from broader detection coverage, as the rule sets aggregate high-quality rules from many different vendors and individuals.

While the default rule set shipped with THOR Lite already represents the highest standard in terms of quality and minimal false positives, YARA Forge complements this by offering:

  • Access to a wider variety of rules from multiple public sources
  • A unified structure and standardized metadata across all rules
  • An internal scoring system that assists with assessing matches, especially for hunting-style rules

This consolidated access to diverse, pre-scored, and normalized rule sets makes integration and evaluation far more efficient for analysts.

Outlook: THOR Cloud Lite and SIGMA Rule Integration

The cloud version of THOR Lite, called THOR Cloud Lite, includes an additional feature that goes beyond the local capabilities: live SIGMA rule scanning. This feature allows users to apply detection logic from the public SIGMA HQ rule repository directly to endpoint data — in a manner similar to what tools like Hayabusa offer.

Through the web interface, users can:

  • Leverage the complete SIGMA HQ rule set in real time
  • Extend detection logic by uploading their own custom rules
  • Scan endpoint logs for attacker behaviors and traces without requiring local rule management

We plan to enable even more modules and capabilities in THOR Cloud Lite in the near future — making it an increasingly powerful, flexible, and user-friendly platform for retrospective compromise assessments.

Summary

With archive scanning and YARA Forge integration now available in THOR Lite and THOR Cloud, analysts gain two powerful enhancements:

  1. In-depth inspection of frequently abused archive and PKZIP-based formats, including JAR/WAR files, malicious JAR droppers, APKs, and VSIX extensions
  2. Access to a growing, quality-controlled pool of detection logic

Both improvements support more accurate compromise assessments and retrospective analysis with minimal manual effort. These enhancements further align THOR with the core mission of detecting what others miss — even when it’s hidden deep inside zipped or embedded structures.

About the author:

Avatar photo

Florian Roth

Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.

Subscribe to our Newsletter

Monthly news, tips and insights.

Follow Us

Upgrade Your Cyber Defense with THOR

Detect hacker activity with the advanced APT scanner THOR. Utilize signature-based detection, YARA rules, anomaly detection, and fileless attack analysis to identify and respond to sophisticated intrusions.