{"id":4644,"date":"2023-03-31T12:42:58","date_gmt":"2023-03-31T12:42:58","guid":{"rendered":"\/cybersecurity-blog\/?page_id=4644"},"modified":"2025-09-11T12:42:52","modified_gmt":"2025-09-11T12:42:52","slug":"guides","status":"publish","type":"page","link":"https:\/\/any.run\/cybersecurity-blog\/guides\/","title":{"rendered":"Guides and Tutorials"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<!-- Help Container START -->\n<div class=\"help--container\">\n\n  <!-- Section Header START -->\n  <h2 class=\"-section--header\">First steps in ANY.RUN<\/h2>\n  <!-- Section Header END -->\n\n\n  <!-- Card START -->\n  <div class=\"-card\">\n    <img decoding=\"async\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/guides_flag.jpg\">\n    <h3>Start here<\/h3>\n    <ul style=\"padding-left: 0 !important\">\n      <li>\n        <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/any.run\/cybersecurity-blog\/how-to-use-anyrun\/\">How to\n          use ANY.RUN Sandbox<\/a>\n      <\/li>\n      <li>\n        <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\">Threat Intelligence with ANY.RUN Lookup<\/a>\n      <\/li>\n      <li>\n        <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/any.run\/cybersecurity-blog\/teamwork\/\">Setting up your\n          team<\/a>\n      <\/li>\n      <li>\n        <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/any.run\/cybersecurity-blog\/indicators-tags\/\">Tags and\n          indicators<\/a>\n      <\/li>\n    <\/ul>\n  <\/div>\n  <!-- Card END -->\n\n  <!-- Card START -->\n  <div class=\"-card\">\n    <img decoding=\"async\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/guides_glass.jpg\">\n    <h3>Intro to malware analysis<\/h3>\n    <ul style=\"padding-left: 0 !important\">\n      <li>\n        <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/any.run\/cybersecurity-blog\/interactive-malware-analysis\/\">What is interactive\n          analysis<\/a>\n      <\/li>\n      <li>\n        <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/any.run\/cybersecurity-blog\/malware-detection-guide\/\">Basics of\n          malware detection<\/a>\n      <\/li>\n      <li>\n        <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/any.run\/cybersecurity-blog\/retrospective-malware-analysis\/\">\n          Retrospective analysis and detection<\/a>\n      <\/li>\n      <li>\n        <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/\">\n          ANY.RUN and Suricata<\/a>\n      <\/li>\n      <li>\n        <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-report\/\">Creating\n          malware reports<\/a>\n      <\/li>\n    <\/ul>\n  <\/div>\n  <!-- Card END -->\n\n  <!-- Section Header START -->\n  <h2 class=\"-section--header\">ANY.RUN essentials<\/h2>\n  <!-- Section Header END -->\n\n\n  <!-- Card START -->\n  <div class=\"-card\">\n    <img decoding=\"async\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/guides_flask.jpg\">\n    <h3>Extracting in-depth data<\/h3>\n    <ul style=\"padding-left: 0 !important\">\n      <li>\n        <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/any.run\/cybersecurity-blog\/indicators-of-compromise\/\">\n          Collecting IOCs<\/a>\n      <\/li>\n      <li>\n        <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/any.run\/cybersecurity-blog\/malware-details\/\">Examining process\n          details<\/a>\n      <\/li>\n      <li>\n        <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/any.run\/cybersecurity-blog\/malware-configuration\/\">Quick\n          access to malware configs<\/a>\n      <\/li>\n      <li>\n        <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/any.run\/cybersecurity-blog\/mitre-attack\/\">ATT&amp;CK matrix\n          in ANY.RUN<\/a>\n      <\/li>\n    <\/ul>\n  <\/div>\n  <!-- Card END -->\n\n  <!-- Card START -->\n  <div class=\"-card\">\n    <img decoding=\"async\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/guides_user.jpg\">\n    <h3>Network tools<\/h3>\n    <ul style=\"padding-left: 0 !important\">\n      <li>\n        <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/any.run\/cybersecurity-blog\/analyzing-the-network-stream\/\">\n          Analyzing the network stream<\/a>\n      <\/li>\n      <li>\n        <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/any.run\/cybersecurity-blog\/mitm-proxy-fake-net\/\">MITM\n          proxy<\/a>\n      <\/li>\n      <li>\n        <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/any.run\/cybersecurity-blog\/open-directories\/\">Extracting data\n          from open directories<\/a>\n      <\/li>\n    <\/ul>\n  <\/div>\n  <!-- Card END -->\n\n  <!-- Section Header START -->\n  <h2 class=\"-section--header\">Threat inteligence and real-word usage<\/h2>\n  <!-- Section Header END -->\n\n  <!-- Card START -->\n  <div class=\"-card\">\n    <img decoding=\"async\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/guides_magnet.jpg\">\n    <h3>Collecting threat data<\/h3>\n    <ul style=\"padding-left: 0 !important\">\n      <li>\n        <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\">Finding linked indicators in ANY.RUN TI Lookup<\/a>\n      <\/li>\n      <li>\n        <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/any.run\/cybersecurity-blog\/malware-statistics-and-trends\/\">\n          Tracking popular malware<\/a>\n      <\/li>\n      <li>\n        <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/any.run\/cybersecurity-blog\/free-malware-samples-reports\/\">\n          Downloading samples from our database<\/a>\n      <\/li>\n    <\/ul>\n  <\/div>\n  <!-- Card END -->\n\n  <!-- Card START -->\n  <div class=\"-card\">\n    <img decoding=\"async\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/09\/guides_lightbulb.jpg\">\n    <h3>Applying your knowledge<\/h3>\n    <ul style=\"padding-left: 0 !important\">\n      <li>\n        <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/any.run\/cybersecurity-blog\/introduction-to-malware-analysis\/\">\n          Analyzing IcedID<\/a>\n      <\/li>\n      <li>\n        <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/any.run\/cybersecurity-blog\/top-recent-malware-cases\/\">How we\n          solved 3 malware cases with ANY.RUN<\/a>\n      <\/li>\n      <li>\n        <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/any.run\/cybersecurity-blog\/using-sandbox-for-incident-response\/\">Using a sandbox for incident\n          response<\/a>\n      <\/li>\n    <\/ul>\n  <\/div>\n  <!-- Card END -->\n\n  <!-- CTA Container START -->\n  <div class=\"cta-container\">\n    <p class=\"cta__text\">Didn&#8217;t find what you were looking for? Reach out to our friendly support team<\/p>\n\n    <a class=\"cta__link\" id=\"blog-help-center-btn\" href=\"https:\/\/app.any.run\/contact-us\" target=\"__blank\" rel=\"noopener\">Get help<\/a>\n  <\/div>\n  <!-- CTA Container END -->\n\n<\/div>\n<!-- Help Container END -->\n\n\n<style>\n  \/* Cta banner styles *\/\n\n  .cta-container {\n    grid-column: 1\/-1;\n    display: flex;\n    text-align: center;\n    flex-direction: column;\n    align-items: center;\n    gap: 1.5rem;\n    width: 100%;\n    padding: 2rem;\n    margin: 1.5rem 0;\n    border-radius: 0.5rem;\n    font-family: 'Catamaran Bold';\n    margin-inline: auto;\n    background: rgba(32, 168, 241, 0.1);\n    border: 1px solid rgba(75, 174, 227, 0.32);\n  }\n\n  .cta__text {\n    margin: 0;\n  }\n\n  .cta__link {\n    padding: 0.5rem 2rem;\n    font-weight: 500;\n    text-decoration: none;\n    border-radius: 0.5rem;\n    color: #FFFFFF;\n    background-color: #1491D4;\n    text-align: center;\n    transition: all 0.2s ease-in;\n  }\n\n  .cta__link:hover {\n    background-color: #68CBFF;\n    color: white;\n  }\n\n\n  \/* Main styles *\/\n\n  .page-template-default .gridlove-cover-content h1.entry-title {\n    position: relative;\n    margin-top: 140px !important;\n  }\n\n  h2.-subheading {\n    color: #e8e8e8;\n    font-size: 22px;\n    margin-top: 26px;\n    font-weight: 400;\n  }\n\n  span.-highlight {\n    color: #00c3b5;\n    text-decoration: underline;\n  }\n\n  .entry-content {\n    display: flex;\n    flex-direction: column;\n    align-items: center;\n  }\n\n  .entry-content>p:first-child {\n    margin-top: 25px;\n  }\n\n  .entry-content>p {\n    max-width: 700px;\n  }\n\n  .help--container {\n    width: 100%;\n    height: inherit;\n    display: grid;\n    justify-content: center;\n    grid-template-columns: 1fr 1fr;\n    grid-gap: 45px;\n    row-gap: 30px;\n    padding: 25px 77px 50px 77px;\n    background-color: #fff;\n  }\n\n  .help--container .-card {\n    width: 100%;\n  }\n\n  .help--container img {\n    width: 100%;\n    margin-bottom: 16px;\n  }\n\n  .help--container h3 {\n    margin-bottom: 8px;\n    font-size: 22px;\n  }\n\n  .help--container ul {\n    list-style: none;\n    padding: 0;\n    margin: 0;\n  }\n\n  .help--container li {\n    list-style: none;\n  }\n\n  .help--container a {\n    font-size: 15px;\n  }\n\n  h2.-section--header {\n    border-bottom: 1px solid rgb(238, 238, 238);\n    grid-column: 1 \/ -1;\n    padding-bottom: 8px;\n    margin: 22px 0 0;\n  }\n\n  \/* Media Queries *\/\n\n  @media (max-width: 768px) {\n\n    .page-template-default .gridlove-cover-content h1.entry-title {\n      margin-top: 20px !important;\n    }\n\n    .entry-title::after {\n      display: none;\n      position: relative;\n      top: -5px;\n      left: 10px;\n      transform: none;\n      margin-top: 16px;\n      text-align: center;\n    }\n\n    h2.-subheading {\n      font-size: 16px;\n      line-height: 1.3;\n      margin-top: 36px;\n      font-weight: 200;\n    }\n\n    .help--container {\n      grid-template-columns: 1fr;\n      padding: 50px 16px 50px 16px;\n      margin-top: -100px;\n    }\n\n    .help--container img {\n      display: none;\n    }\n  }\n<\/style>\n\n\n<script>\n  \/\/ Select the entry header element\n  const entryHeader = document.querySelector('.entry-header');\n\n  \/\/ Set the inner HTML of the entry header to a new h1 element\n  entryHeader.innerHTML = `<h1 class=\"entry-title\">Guides and Tutorials<\/h1>`;\n\n  \/\/ Create a new h2 element with the desired content and class\n  const newH2 = document.createElement('h2');\n  newH2.textContent = 'Useful articles from around the blog \u2014 all in one place';\n  newH2.classList.add('-subheading');\n\n  \/\/ Insert the new h2 element after the entry header\n  entryHeader.insertAdjacentElement('afterend', newH2);\n<\/script>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>First steps in ANY.RUN Start here How to use ANY.RUN Sandbox Threat Intelligence with ANY.RUN Lookup Setting up your team Tags and indicators Intro to malware analysis What is interactive analysis Basics of malware detection Retrospective analysis and detection ANY.RUN and Suricata Creating malware reports ANY.RUN essentials Extracting in-depth data Collecting IOCs Examining process details [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4737,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4644","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Guides and Tutorials<\/title>\n<meta name=\"description\" content=\"We&#039;ve collected useful articles from around the blog \u2014 all in one place. Check out ANY.RUN&#039;s help center and enjoy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/guides\/\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/guides\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/guides\/\",\"name\":\"Guides and Tutorials\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2023-03-31T12:42:58+00:00\",\"dateModified\":\"2025-09-11T12:42:52+00:00\",\"description\":\"We've collected useful articles from around the blog \u2014 all in one place. Check out ANY.RUN's help center and enjoy.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/guides\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/guides\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/guides\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Guides and Tutorials\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Guides and Tutorials","description":"We've collected useful articles from around the blog \u2014 all in one place. Check out ANY.RUN's help center and enjoy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/guides\/","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/guides\/","url":"https:\/\/any.run\/cybersecurity-blog\/guides\/","name":"Guides and Tutorials","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2023-03-31T12:42:58+00:00","dateModified":"2025-09-11T12:42:52+00:00","description":"We've collected useful articles from around the blog \u2014 all in one place. Check out ANY.RUN's help center and enjoy.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/guides\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/guides\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/guides\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Guides and Tutorials"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/pages\/4644"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=4644"}],"version-history":[{"count":68,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/pages\/4644\/revisions"}],"predecessor-version":[{"id":15833,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/pages\/4644\/revisions\/15833"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/4737"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=4644"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}