YARA
Rule-based malware analysis tool
From Wikipedia, the free encyclopedia
YARA is a tool primarily used in malware research and detection.
| YARA | |
|---|---|
| Designed by | Victor Alvarez |
| First appeared | 2013 |
| Stable release | |
| Filename extensions | .yara |
| Website | virustotal |
It provides a rule-based approach to create descriptions of malware families based on regular expression, textual or binary patterns. A description is essentially a YARA rule name, where these rules consist of sets of strings and a Boolean expression.[2]
Analysts write YARA rules to capture the DNA of malware families, persistent elements like code fragments, configuration strings, and structural patterns expressed as text, hex sequences, or regex with Boolean logic. This signature-based detection survives file mutations that defeat hash matching, enabling identification of variants and related samples across large datasets[3].
History
YARA was originally developed by Victor Alvarez of VirusTotal and released on GitHub in 2013.[4] The name is an abbreviation of YARA: Another Recursive Acronym or Yet Another Ridiculous Acronym.[5] In 2024, Alvarez announced that YARA would be superseded by a rewrite called YARA-X, written in Rust.[6] A first stable version of YARA-X was released in June 2025, marking the passage of the original YARA into maintenance mode.[7]