Featured resource
2026 Tech Forecast
2026 Tech Forecast

1,500+ tech insiders, business leaders, and Pluralsight Authors share their predictions on what’s shifting fastest and how to stay ahead.

Download the forecast
  • Course

Executable Analysis with YARA

This course will teach you how to detect and classify malware families using YARA behavioral pattern matching and how to operationalize detection rules with threat intelligence feeds for automated malware analysis.

Beginner
34m

Created by Paul Sanford

Last Updated Mar 02, 2026

Course Thumbnail
  • Course

Executable Analysis with YARA

This course will teach you how to detect and classify malware families using YARA behavioral pattern matching and how to operationalize detection rules with threat intelligence feeds for automated malware analysis.

Beginner
34m

Created by Paul Sanford

Last Updated Mar 02, 2026

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

Modern malware uses obfuscation and packing to evade signature-based detection, leaving security teams unable to identify threat families or prioritize incident response.

In this course, Executable Analysis with YARA, you’ll learn to detect and classify malware families using behavioral pattern matching that works even when static analysis fails.

First, you’ll explore how to map malware behaviors to MITRE ATT&CK techniques (T1027 Obfuscated Files, T1105 Ingress Tool Transfer, T1587.001 Develop Malware) and apply SHIELD defensive countermeasures.

Next, you’ll discover how to build campaign-specific YARA rules that detect infostealer families like Azorult by hunting C2 infrastructure, victim profiling patterns, and stealer artifacts.

Finally, you’ll learn how to configure memory-based YARA detection for packed ransomware samples like Phobos, and integrate YARA rules with threat intelligence feeds for automated malware analysis.

When you’re finished with this course, you’ll have the skills and knowledge of behavioral malware detection needed to classify threat families, identify active campaigns, and operationalize YARA rules in your security infrastructure.

Executable Analysis with YARA
Beginner
34m
Table of contents

About the author
Paul Sanford - Pluralsight course - Executable Analysis with YARA
Paul Sanford
1 courses 0.0 author rating 0 ratings

Paul Sanford is a digital forensics examiner with 10+ years of experience in incident response, cyber investigations, and advanced forensic analysis across enterprise and tactical environments.

2025 Forrester Wave™ names Pluralsight as a Leader among tech skills dev platforms

See how our offering and strategy stack up.

forrester wave report