YARA rules for live and retro hunts, focused on:
- Infostealers (e.g., Jupyter / SolarMarker)
- Malicious document loaders and droppers
- Suspicious PowerShell and script-based threats
- DLL hijacking and custom loaders
- VBS downloaders and other commodity malware
- Fake PDF/File converters
These rules are created and maintained by Luke Acha.
Most of these rules are backed by full malware analysis posts on my blog:
Malware analysis & YARA write-ups:
https://blog.lukeacha.com
You’ll find posts that walk through:
- How each sample was discovered
- Behavioral analysis (network, persistence, LOLBins, etc.)
- String and pattern selection for the YARA rule
- Hunting tips and example usage
Highlighted Pages:
https://blog.lukeacha.com/2025/11/fake-pdf-converter-hides-dark-secret.html
https://blog.lukeacha.com/2025/10/systemshock-loader-look-at-malware.html
https://blog.lukeacha.com/2025/06/suspicious-recipe-app.html
https://blog.lukeacha.com/2023/10/interesting-customloader-observed-in.html
https://blog.lukeacha.com/2020/12/tracking-jupyter-malware.html
Older posts and legacy content are also mirrored here:
Each folder groups rules by family or theme:
Jupyter Malware/– Jupyter / SolarMarker–related ruleshydraseven/– HydraSeven loader and related artifactsmaldocs/– Malicious Office docs, loaders, and dropperspws/– Suspicious PowerShell patternsrats/– Remote access trojan detectionsvbs/– VBS downloaders and script-based threatsobfuscation/– Generic obfuscation / packing indicators- Standalone
.yarfiles – One-off rules for specific campaigns or loaders