If you are into cybersecurity and are passionate about ares like Malware Analys or Detection Engineering, you problaby know about Yara Rules, if not, you can read the documentation. For those who already saw an Yara rule, might notice that almost always they have just regular strings which are extracted…