CYFARE.NET

CYFARE.NET
MALWARES / SANDBOX / SUBDOMAINS / BUG BOUNTY / URL SHORTENER / CYBER SECURITY

Malware Query Engine

Quick Reference

Download Malware


Command

download=SHA-256_HASH

Example

download=094fd325049b8a9cf6d3e5ef2a6d4cc6a567d7d49c35f8bb8dd9e3c6acf3d78d

Hash Info


Command

hash_info=HASH

Example

hash_info=094fd325049b8a9cf6d3e5ef2a6d4cc6a567d7d49c35f8bb8dd9e3c6acf3d78d

Type Info


Command

type_info=FILE_TYPE

Example

type_info=docx

Tag Info


Command

tag_info=TAG

Example

tag_info=Lazarus

Yara Matches


Command

yara=YARA_RULE

Example

yara=win_remcos_g0

Hash Similarity


Command

sim_hash=SHA256_HASH

Example

sim_hash=094fd325049b8a9cf6d3e5ef2a6d4cc6a567d7d49c35f8bb8dd9e3c6acf3d78d

CN Serial


Command

cn_serial=SERIAL_NUMBER

Example

cn_serial=51CD5393514F7ACE2B407C3DBFB09D8D

Country (Slow Query!)


Command

country=COUNTRY_CODE (IN, UKR..)

Example

country=IN

Sample Tags


exe
32
AgentTesla
elf
mirai
signed
zip

Yara Rules


NET
Skystars_Malware_Imphash
pe_imphash
DebuggerCheck__API
NETexecutableMicrosoft
MD5_Constants
maldoc_find_kernel32_base_method_1
unixredflags3
maldoc_getEIP_method_1
meth_get_eip
INDICATOR_SUSPICIOUS_Binary_References_Browsers
RIPEMD160_Constants
SHA1_Constants
linux_generic_ipv6_catcher
INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients