YARA ("Yet Another Recursive Acronym") is the de facto standard for writing signatures that describe families of malware. A YARA rule combines text/byte strings, regex, and a Boolean condition that fires when the sample matches.
Analysts use YARA in three main contexts:
- Triage of large file sets (a SOC pipeline scans every email attachment with hundreds of rules).
- Threat hunting in memory captures (Volatility's
yarascanplugin,loki,THOR). - IOC sharing — vendors and CERTs publish YARA rules alongside CVE / IOC reports.