We are currently collecting requests for a YARA rule feed service that would provide you the newest, high quality YARA rules that only integrated into our scanners.
The internal signature database contains more than 8400 quality tested YARA rules for malware (mostly RATs), droppers, exploit codes, hack tools, the output files of these hack tools, forensic artefacts, malicious scripts and other anomalies.
If you are interested in such a service, please contact us via firstname.lastname@example.org
Some key points
- Available in fall 2018
- Accessible via REST API or MISP community
- Different streams: hack tools, malware, APT, web shells, anomalies