YARA (Yet Another Ridiculous Acronym) is a toolkit that enables malware researches to identify and classify malware samples
Using YARA rules we can look for string (patterns) in files
YARA Rule Sections
meta
This section is used to define descriptive information about the rule
strings
This section is used to define the patterns that we want to search in the binaries
Strings can be hexadecimal patterns as well.
condition
In this section we define the logic that will be used to evaluate the rule