HomeService Updates
Release Notes: YARA Search, New Rules, Config Extractors, and More
HomeService Updates
Release Notes: YARA Search, New Rules, Config Extractors, and More

Welcome to ANY.RUN‘s monthly updates, where we share what our team has been working on over the past month. 

In April, we released YARA Search, a new threat intelligence service that allows you to find files, threats, and malware by YARA in 2TB of real-world threat data collected by the ANY.RUN sandbox community and our team.  

We’ve also made several updates to the existing features: our RSPAMD module has been improved to reduce false positives even further, and we’ve increased the amount of data supplied based on the results of traffic checking using Suricata rules.   

We’ve also enhanced the mechanism for adding tags to sandbox tasks, and, as always, we’ve expanded our threat coverage with new YARA and Suricata rules. 

Let’s dive into these updates one by one. 

YARA Search interface, showing the text editor and search results

New features 

YARA Search 

YARA Search allows you to find files, malware, and threats using YARA rules, which analyze the contents of files themselves. This is a massive update to ANY.RUN’s threat intelligence capabilities — it provides a new way to search for threat data in our growing database, supplied by over 400,000 sandbox users who analyze real malware on a daily basis. 

The service also lets you write, edit, test, download, and manage your rules seamlessly within ANY.RUN using a powerful online text editor with syntax highlighting. And, like all our products, it’s incredibly fast, delivering initial search results in under 5 seconds. 

Get started with YARA Search today
and unlock its full potential! 

Contact Sales

Various improvements  

This month, we didn’t just push out new features. We also focused heavily on improving existing ones. 

  • We’ve updated the RSPAMD module script, further reducing the occurrence of false positives. 
  • The data from checking traffic against Suricata rules is now richer in the network tab. 
  • We’ve refined the mechanism that assigns tags (such as “phishing” to an analysis session where phishing was detected) for improved precision. 

New YARA rules and fixes 

We’ve updated detection and config extraction of GuLoader. It now extracts not only C2 but also other strings. We’ve also updated the config extractor and the YARA rule covering Vidar. This stealer, based on Arkei, collects information about 2FA and Tor. Its configuration extracts Telegram API and Steam account or group used for data exfiltration, as well as decoded strings. 

Other new rules added in April include: 

We’ve also made several fixes to existing rules. 

  • We’ve implemented a fix to LaplasClipper rule.  
  • Amadey detection and extractor was fixed. 

Analyze Redline and other malware in ANY.RUN 

Register for free

New signatures 

In total, we’ve added 16 signatures in April. Here are the standout ones: 

New network rules 

In April, we’ve released the following new network rules: 

We’ve also added new rules that cover Botnet Kinsing, Adwind, StreamBot, and GCleaner Loader

About ANY.RUN  

ANY.RUN helps more than 400,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, TI Lookup, Yara Search, and Feeds, help you find IOCs or files to learn more about the threats and respond to incidents faster.   

Identify malicious activity in less than 40s with ANY.RUN 

Get started free

Advantages of ANY.RUN  

ANY.RUN helps you analyze threats faster while improving detection rates. The platform detects common malware families with YARA and Suricata rules and identifies malware behavior with signatures when detection by family is not possible. 

With ANY.RUN you can: 

  • Detect malware in under 40s: ANY.RUN detects malware within about 40 seconds of a file upload. It identifies prevalent malware families using YARA and Suricata rules and uses behavioral signatures to detect malicious actions when you encounter a new threat. 
  • Interact with samples in real time: ANY.RUN is an interactive cloud sandbox powered by VNC, which means that you can do everything you could on a real system: browse webpages, click through installers, open password-protected archives. 
  • Save time and money on sandbox setup and maintenance: ANY.RUN’s cloud-based nature eliminates the need for setup or maintenance by your DevOps team, making it a cost-effective solution for businesses.  
  • Record and study all aspects of malware behavior: ANY.RUN provides a detailed analysis of malware behavior, including network traffic, system calls, and file system changes.  
  • Collaborate with your team: easily share analysis results, or, as a senior team member, check work of junior analysts by viewing recordings of their analysis sessions. 
  • Scale as you need: as a cloud service, you can easily scale your team, simply by adding more licenses. 

Let us give you an interactive presentation of ANY.RUN and show you how it can help your security team.

Get in touch with us → 

What do you think about this post?

0 answers

  • Awful
  • Average
  • Great

No votes so far! Be the first to rate this post.