{"id":11428,"date":"2025-02-04T09:39:35","date_gmt":"2025-02-04T09:39:35","guid":{"rendered":"\/cybersecurity-blog\/?p=11428"},"modified":"2025-02-04T09:40:00","modified_gmt":"2025-02-04T09:40:00","slug":"release-notes-january-2025","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2025\/","title":{"rendered":"Release Notes: System Updates, New YARA and Suricata Rules, Signatures, and More"},"content":{"rendered":"\n<p>Hello, cybersecurity enthusiasts!&nbsp;<\/p>\n\n\n\n<p>January may often feel like a slow month, but at <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_25&amp;utm_term=040225&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>, we\u2019ve been hard at work behind the scenes, focusing on system and threat coverage updates.&nbsp;<\/p>\n\n\n\n<p>As the new year kicked off, our team dived straight into fine-tuning the platform, optimizing performance, and strengthening detection capabilities.&nbsp;<\/p>\n\n\n\n<p>Now that February is here, let\u2019s take a look at what we\u2019ve been up to and how these updates enhance your malware-hunting experience.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">System Updates: Keeping Things Running Smoothly&nbsp;<\/h2>\n\n\n\n<p>In January, we focused on making ANY.RUN\u2019s Interactive Sandbox and <a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Lookup<\/a> faster, more stable, and overall better for you.&nbsp;<\/p>\n\n\n\n<p>Our team has been fixing bugs, fine-tuning the system, and optimizing performance so that everything runs like clockwork. These aren\u2019t the kind of changes you immediately notice, but they make a big difference in keeping your malware analysis smooth and hassle-free.&nbsp;<\/p>\n\n\n\n<p>While January was all about optimizations, stay tuned as we have plenty of exciting updates coming your way soon!&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Threat Coverage Updates&nbsp;<\/h2>\n\n\n\n<p>We continued expanding ANY.RUN\u2019s detection capabilities and strengthening its ability to identify emerging threats. This included adding new malware signatures, refining <a href=\"https:\/\/any.run\/cybersecurity-blog\/yara-rules-explained\/\" target=\"_blank\" rel=\"noreferrer noopener\">YARA rules<\/a>, and enhancing <a href=\"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/\" target=\"_blank\" rel=\"noreferrer noopener\">Suricata rule sets<\/a> to keep up with evolving attack techniques.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">New Malware Signatures&nbsp;<\/h3>\n\n\n\n<p>We\u2019ve introduced new signatures to detect a wide range of malware families. Here are some of the threats we now cover:&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-grid wp-container-core-group-is-layout-1 wp-block-group-is-layout-grid\">\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/8814e366-8033-4cf2-8b9e-67c0a5850f59\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_25&amp;utm_term=040225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">LiteManager<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/ff1407e3-fee8-400e-8958-c9a90413bff7\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_25&amp;utm_term=040225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Ammy<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/ca40e41e-bdfc-4e97-add4-65e00130598f\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_25&amp;utm_term=040225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">BundleInstaller<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/288f3ca8-574e-4c50-b6de-777533c69ff1\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_25&amp;utm_term=040225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">CS137<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/f60b2648-22f5-41b6-bb94-d3b9a776f4cb\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_25&amp;utm_term=040225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Fragtor<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/ade2456d-276c-4365-9f19-34274a4ba38e\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_25&amp;utm_term=040225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">DownloadAssistant<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/35fd2641-ac73-4f27-9c77-adf72923b166\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_25&amp;utm_term=040225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">ScreenConnect<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/59754048-f4ac-4acf-bb0e-29e23ef89edb\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_25&amp;utm_term=040225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Psiphon<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/2419b9ae-5fda-41d7-be94-c908952086db\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_25&amp;utm_term=040225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Haperlock<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/e7c9e876-f525-422c-9090-1a0ee73113c2\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_25&amp;utm_term=040225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">RMS<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/81448212-70ba-4ca1-b204-06dfcbc1027d\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_25&amp;utm_term=040225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">FileZilla<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/576facb1-8957-495b-aef5-382180959862\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_25&amp;utm_term=040225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Incredibuild<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/2cbbab81-47ad-4f49-86f1-5b1716bec144\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_25&amp;utm_term=040225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Zhong<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n<\/div><\/div>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nTry advanced malware analysis with <span class=\"highlight\">ANY.RUN<\/span>&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=release_notes_jan_25&#038;utm_term=040225&#038;utm_content=linktodemo\/\" rel=\"noopener\" target=\"_blank\">\nGet 14-day trial\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h3 class=\"wp-block-heading\">New YARA Rules&nbsp;<\/h3>\n\n\n\n<p>To improve our malware classification and detection precision, we\u2019ve added YARA rules for the following:&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-grid wp-container-core-group-is-layout-2 wp-block-group-is-layout-grid\">\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/e7c9e876-f525-422c-9090-1a0ee73113c2\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_25&amp;utm_term=040225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">RMS<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/5bdd838b-8497-43dc-92f2-53bd40464245\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_25&amp;utm_term=040225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">WinLocker<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/ce77e5d6-fa10-4d8d-b436-72da4221115c\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_25&amp;utm_term=040225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Inno Installer<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/02fe8dbd-60c2-47e7-b01c-a02bf655135e\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_25&amp;utm_term=040225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Inno Setup Packer<\/a>&nbsp;<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">YARA + Signatures&nbsp;<\/h3>\n\n\n\n<p>For even more precise detections, we\u2019ve combined YARA rules and malware signatures to cover:&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-grid wp-container-core-group-is-layout-3 wp-block-group-is-layout-grid\">\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/6ae8f1d6-97cd-4f27-ad19-e87afc639e65\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_25&amp;utm_term=040225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">ArrowRAT<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/b9f4ccb0-a9ef-4829-8d0c-b7b446a306c5\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_25&amp;utm_term=040225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Ardamax<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/40724acd-b87b-4a99-90b8-deb1d161ba6a\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_25&amp;utm_term=040225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">MinstLoader<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/9a7ed7f0-e2e1-4c29-98f1-eb121627cfee\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_25&amp;utm_term=040225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">TinyTurlaNG<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/eb0a9fdb-6597-4864-a397-6e90f0ba488d\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_25&amp;utm_term=040225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">PoohLoader<\/a>&nbsp;<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">APT Detection Updates&nbsp;<\/h3>\n\n\n\n<p>Our threat intelligence team has improved detection capabilities for several APT groups, focusing on domain-related threats:&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-grid wp-container-core-group-is-layout-4 wp-block-group-is-layout-grid\">\n<ul class=\"wp-block-list\">\n<li>Patchwork APT&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ducktail APT&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Sidewinder APT&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>ScreenConnect&nbsp;<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Suricata Rule Updates&nbsp;<\/h3>\n\n\n\n<p>We\u2019ve also strengthened our network-based detection capabilities by adding <strong>5,578 new Suricata rules<\/strong>. Notable additions include focused detections for phishing kits such as:&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-grid wp-container-core-group-is-layout-5 wp-block-group-is-layout-grid\">\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/d08740ba-7f01-4963-8e78-e0eff7120049\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_25&amp;utm_term=040225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Sneaky2FA<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/a84e322a-a5e5-469e-98b3-1235f8069cbb\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_25&amp;utm_term=040225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Zhong Stealer<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/6c2da425-860a-4be5-8994-b23f02bc1e74\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_25&amp;utm_term=040225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Interlock RAT<\/a>&nbsp;<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Helping Businesses Stay Ahead of Cyber Threats&nbsp;<\/h2>\n\n\n\n<p>Businesses can\u2019t afford to fall behind the constantly evolving cyber threats. Attackers are getting smarter, using new techniques to bypass defenses and target organizations with phishing kits and malware.&nbsp;&nbsp;<\/p>\n\n\n\n<p>That\u2019s why we\u2019re always refining ANY.RUN\u2019s detection capabilities and analysis tools. From spotting emerging malware families to improving APT detection, we\u2019re making sure security teams have the insights they need to stop threats before they cause real damage.&nbsp;<\/p>\n\n\n\n<p>Cybercriminals adapt fast, but let\u2019s always stay one step ahead. More updates, more improvements, and better ways to protect your business are on the way. Stay tuned!&nbsp;<\/p>\n\n\n\n<!-- CTA Split START -->\n<div class=\"cta-split\">\n<div class=\"cta__split-left\">\n\n<!-- Image -->\n<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/mcusercontent.com\/663b94f19348582a8dc323efe\/images\/0d88188b-3e89-2314-5a60-cb87e8077326.png\" alt=\"ANY.RUN cloud interactive sandbox interface\" class=\"cta__split-icon\" \/>\n<\/div>\n\n<div class=\"cta__split-right\">\n<div>\n\n<!-- Heading -->\n<h3 class=\"cta__split-heading\"><br>Sandbox for Businesses<\/h3>\n\n<!-- Text -->\n<p class=\"cta__split-text\">\nDiscover all features of the <span class=\"highlight\">Enterprise plan<\/span> designed for businesses and large security teams.\n<br \/>\n<\/p>\n<\/div>\n<!-- CTA Link -->\n<a target=\"_blank\" rel=\"noopener\" id=\"article-banner-split\" href=\"https:\/\/any.run\/cybersecurity-blog\/anyrun-for-enterprises\/\"><div class=\"cta__split-link\">See details<\/div><\/a>\n<\/div>\n<\/div>\n<!-- CTA Split END -->\n<!-- CTA Split Styles START -->\n<style>\n.cta-split {\noverflow: hidden;\nmargin: 3rem 0;\ndisplay: grid;\njustify-items: center;\nborder-radius: 0.5rem;\nwidth: 100%;\nmin-height: 25rem;\ngrid-template-columns: repeat(2, 1fr);\nborder: 1px solid rgba(75, 174, 227, 0.32);\nfont-family: 'Catamaran Bold';\n}\n\n.cta__split-left {\ndisplay: flex;\nalign-items: center;\njustify-content: center;\nheight: 100%;\nwidth: 100%;\nbackground-color: #161c59;\nbackground-position: center center;\nbackground: rgba(32, 168, 241, 0.1);\n}\n\n.cta__split-icon { \nwidth: 100%;\nheight: auto;\nobject-fit: contain;\nmax-width: 100%;\n}\n\n.cta__split-right {\ndisplay: flex;\nflex-direction: column;\njustify-content: space-between;\npadding: 2rem;\n}\n\n.cta__split-heading { font-size: 1.5rem; }\n\n.cta__split-text {\nmargin-top: 1rem;\nfont-family: Lato, Roboto, sans-serif;\n}\n\n.cta__split-link {\npadding: 0.5rem 1rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: white;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\ndisplay: block;\nz-index: 1000;\nposition: relative;\ncursor: pointer !important;\n}\n\n.cta__split-link:hover {\nbackground-color: #68CBFF;\ncolor: white;\ncursor: pointer;\n}\n\n.highlight { color: #ea2526;}\n\n\n\/* Mobile styles START *\/\n@media only screen and (max-width: 768px) {\n\n.cta-split {\ngrid-template-columns: 1fr;\nmin-height: auto;\n}\n\n.cta__split-left {\nheight: auto;\nmin-height: 10rem;\n}\n\n\n.cta__split-left, .cta__split-right {\nheight: auto;\n}\n\n.cta__split-heading { font-size: 1.2rem; }\n\n.cta__split-text { font-size: 1rem; }\n.cta__split-icon {\nmax-height: auto;\nobject-fit: cover;\n}\n\n}\n\/* Mobile styles END *\/\n<\/style>\n<!-- CTA Split Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN<\/h2>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_25&amp;utm_term=040225&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> helps more than 500,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, <a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>, <a href=\"https:\/\/any.run\/cybersecurity-blog\/yara-search\/\" target=\"_blank\" rel=\"noreferrer noopener\">YARA Search<\/a>, and <a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-feeds\/\" target=\"_blank\" rel=\"noreferrer noopener\">Feeds<\/a>, help you find IOCs or files to learn more about the threats and respond to incidents faster.<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_25&amp;utm_term=040225&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Request free trial of ANY.RUN&#8217;s services \u2192<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hello, cybersecurity enthusiasts!&nbsp; January may often feel like a slow month, but at ANY.RUN, we\u2019ve been hard at work behind the scenes, focusing on system and threat coverage updates.&nbsp; As the new year kicked off, our team dived straight into fine-tuning the platform, optimizing performance, and strengthening detection capabilities.&nbsp; Now that February is here, let\u2019s [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":7723,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[57,10,15,55,56],"class_list":["post-11428","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-anyrun","tag-cybersecurity","tag-malware","tag-release","tag-update"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Release Notes: YARA and Suricata Rules, Signatures, and more<\/title>\n<meta name=\"description\" content=\"Service optimization, extended APT coverage, YARA and Suricata rules for emerging cyber threats, new malware signatures, and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2025\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2025\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2025\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Release Notes: System Updates, New YARA and Suricata Rules, Signatures, and More\",\"datePublished\":\"2025-02-04T09:39:35+00:00\",\"dateModified\":\"2025-02-04T09:40:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2025\/\"},\"wordCount\":616,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware\",\"release\",\"update\"],\"articleSection\":[\"Service Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2025\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2025\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2025\/\",\"name\":\"Release Notes: YARA and Suricata Rules, Signatures, and more\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2025-02-04T09:39:35+00:00\",\"dateModified\":\"2025-02-04T09:40:00+00:00\",\"description\":\"Service optimization, extended APT coverage, YARA and Suricata rules for emerging cyber threats, new malware signatures, and more.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2025\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2025\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service Updates\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Release Notes: System Updates, New YARA and Suricata Rules, Signatures, and More\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Release Notes: YARA and Suricata Rules, Signatures, and more","description":"Service optimization, extended APT coverage, YARA and Suricata rules for emerging cyber threats, new malware signatures, and more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2025\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2025\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2025\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Release Notes: System Updates, New YARA and Suricata Rules, Signatures, and More","datePublished":"2025-02-04T09:39:35+00:00","dateModified":"2025-02-04T09:40:00+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2025\/"},"wordCount":616,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware","release","update"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2025\/","url":"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2025\/","name":"Release Notes: YARA and Suricata Rules, Signatures, and more","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2025-02-04T09:39:35+00:00","dateModified":"2025-02-04T09:40:00+00:00","description":"Service optimization, extended APT coverage, YARA and Suricata rules for emerging cyber threats, new malware signatures, and more.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2025\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Service Updates","item":"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/"},{"@type":"ListItem","position":3,"name":"Release Notes: System Updates, New YARA and Suricata Rules, Signatures, and More"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/11428"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=11428"}],"version-history":[{"count":6,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/11428\/revisions"}],"predecessor-version":[{"id":11954,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/11428\/revisions\/11954"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/7723"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=11428"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=11428"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=11428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}