Working with YARA results

Learn how to how to interpret YARA results, explore individual HTTP events, and pivot on results

This article covers accessing matched data from YARA rules, understanding the results table, pivoting across returned indicators, and exporting or reusing matched data.

📘

Retrohunting

Retrohunting is referenced where relevant but is documented fully in the standalone retrohunting article.

Access YARA results

To view all matched domains generated by a rule, open the results view.

  1. Open a Project.
  2. Select the YARA Rules tab.
  3. Select the rule you want to inspect.
  4. Open the All Matches tab to review current match results.

Understanding the results table

The results table contains contextual fields that describe each matched resource.

These values help determine what your rule has identified and how to prioritise investigation.

FieldDescription
Host/IPThe host or resolved IP address where the YARA match occurred.
PortDestination port for the HTTP request.
Response/PathThe URL or resource path associated with the match.
TitleExtracted HTML title from the returned content.
Bytes ReceivedSize of the HTTP response.
First SeenEarliest time Validin observed this matched resource.
Last SeenMost recent observation of the matched resource.
Last Match TimeMost recent timestamp when the YARA rule matched this item.
CountNumber of times this match has occurred.
👍

Detecting live infrastructure

Sorting by Last Seen can reveal active infrastructure by highlighting resources that are currently returning content.

Configuring auto-refresh

YARA rules can be enabled to auto-refresh every 5 seconds, by using the Auto-Refresh slider at the top of the results table.

📘

Auto-matches

The All Matches table defaults to auto-refresh for monitored rules.

Open a detailed indicator view

Selecting any row in All Matches opens a contextual sidebar. This provides a full view of the observed domain, including:

  • HTTP method, response path and features
  • Response headers
  • Parsed HTML
  • Certificate metadata
  • JARM fingerprint
  • Related network history

Detailed indicator view

Pivot directly into Core Search

You can pivot into deeper analytics by selecting hyperlinked data in the results table:

  • Select Host/IP to open a Core Search and reveal DNS history, SSL associations, reputation, and linked indicators.
  • Select Response/Path to view content-specific observations across multiple hosts.

Review retrohunt output

Retrohunt results appear in the History tab and follow the same structure as All Matches.

Retrohunts represent matches identified across historical telemetry and are essential for reconstructing earlier activity and analyzing how adversary attack patterns have changed over time.

👍

Learn how to retrohunt

For details on configuring and executing retrohunts, see the separate Retrohunt with YARA Rules article.

Export matches

To retrieve historical match content for offline or comparative analysis:

  1. Open the YARA rule.
  2. Select either All Matches tab.
  3. Select the matches you want to download.
  4. Click the **Export **button
  5. Select your data format (JSON or CSV)
  6. Select Download.

What’s Next

Learn how to execute retrohunts in Validin...