HomeCybersecurity Lifehacks
Enriching ANY.RUN’s TI Feeds with Unique IOCs: How It Works
HomeCybersecurity Lifehacks
Enriching ANY.RUN’s TI Feeds with Unique IOCs: How It Works

Threat Intelligence Feeds from ANY.RUN provide a continuously-updated stream of the latest indicators of compromise. They enable SOC teams to quickly detect and mitigate attacks, including emerging malware and persistent threats.

But how do ANY.RUN’s feeds get enriched with fresh and, most importantly, unique indicators?

Let’s find out.

About ANY.RUN’s Threat Intelligence Feeds

ANY.RUN’s Threat Intelligence (TI) Feeds offer an extensive collection of Indicators of Compromise (IOCs) designed to enhance the threat detection capabilities of clients’ security systems. These feeds provide detailed information beyond the basics, including malicious IPs, URLs, domains.

Where does this data come from?

An international community of over 500,000 researchers and cybersecurity pros who upload and analyze real-world malware and phishing samples every day to ANY.RUN’s Public submissions repository.

With TI Feeds from ANY.RUN, organizations can:

  • Expand and speed up threat hunting with enriched up-to-date indicators
  • Enhance alert triage and prioritize most urgent issues 
  • Improve incident response thanks to better understanding threats and their behaviors
  • Proactively defend against new and evolving threats   

Give TI Feeds from ANY.RUN a try
Start with a free demo sample in STIX or MISP 

Integrate via API

IOCs Provided by ANY.RUN TI Feeds 

TI Feeds contain indicators along with additional info like the threat score, which signals IOCs’ reliability:

  • 100: Highly reliable
  • 50: Suspicious
  • 75: Trustworthy

Here are the indicators you can find in ANY.RUN’s TI Feeds.

IP addresses

Compromised IPs instantly signal of cybercriminal operations, they are often linked to Command-and-Control (C2) servers or phishing campaigns. By analyzing IP addresses, cybersecurity teams can proactively block malicious traffic and analyze attack patterns and tactics.  

Domains  

Domains provide a higher-level view of malicious activity, often connecting multiple IPs or malware instances within a single campaign. ANY.RUN’s TI Feeds provide comprehensive information about domains, including all the details available for IP addresses, such as threat names, types, detection timestamps, and related file hashes. 

URLs  

URL addresses serve as gateways to distribute malware, execute phishing campaigns, or redirect users to malicious content. By analyzing URLs, cybersecurity teams can uncover attack patterns, block harmful traffic, and prevent unauthorized access to systems and data. 

How ANY.RUN’s TI Feeds Are Enriched with Unique IOCs 

There are several features of Threat Intelligence Feeds that make them stand out, one of them is the way we collect indicators. Here are the two methods we use to get the latest and the most accurate indicators that cannot be found elsewhere.

IOCs Extracted from Malware Configurations 

Configurations are a crucial part of any malware sample. They contain hardcoded IOCs such as command and control (C2) server addresses, encryption keys, and specific attack parameters. ANY.RUN’s Interactive Sandbox can automatically extract configs for dozens of malware families and pull out these valuable indicators.

Take a look at this sandbox session.

ANY.RUN extracts contents of malware configs revealing valuable indicators

By opening the MalConf window we can observe the extracted configuration of an AsyncRAT sample. One of the pieces of data found here is the malicious IP address used by the malware for communication with its C2 server.

ANY.RUN automatically extracts this crucial indicator and sends it to TI Feeds, which then get fed into the clients’ detection systems. This helps them identify the threat early and minimize its potential impact.

Want to integrate TI Feeds from ANY.RUN?
Reach out to us and we’ll help you set it up 

Contact us

IOCs Detected with Suricata IDS Rules 

Suricata rules focus on identifying patterns in network traffic rather than specific details like IP addresses or domains. This means Suricata can recognize threats even when attackers change their infrastructure.

Thanks to ANY.RUN’s extensive integration of Suricata IDS for traffic analysis, we can consistently extract fresh network indicators from the newest samples of evolving malware.

Check out this report, which shows analysis of a FormBook sample.

Suricata rule triggered after detecting FormBook’s C2 traffic

When we navigate to the Threats tab and click on one of the triggered Suricata rules, we can see that the system has detected a connection to a domain controlled by the attackers.

You can see the domain name used by FormBook

As you expect, this domain is sent directly to TI Feeds, strengthening our clients’ defense capabilities.

Integrate ANY.RUN’s TI Feeds 

ANY.RUN offers demo feeds samples in STIX and MISP formats 

You can test ANY.RUN’s Threat Intelligence Feeds in STIX and MISP formats by getting a free demo sample here

ANY.RUN also runs a dedicated MISP instance that you can syncronize your server with or connect to your security solutions. To get started, contact our team via this page

About ANY.RUN  

ANY.RUN helps more than 500,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, TI LookupYARA Search and Feeds, help you find IOCs or files to learn more about the threats and respond to incidents faster.  

Get a 14-day free trial of ANY.RUN’s Threat Intelligence service →

What do you think about this post?

0 answers

  • Awful
  • Average
  • Great

No votes so far! Be the first to rate this post.

0 comments