{"id":13868,"date":"2025-05-27T11:25:00","date_gmt":"2025-05-27T11:25:00","guid":{"rendered":"\/cybersecurity-blog\/?p=13868"},"modified":"2025-05-27T14:04:35","modified_gmt":"2025-05-27T14:04:35","slug":"how-to-analyze-malware-threats","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malware-threats\/","title":{"rendered":"How to Analyze Node.js, Python, Android, and Linux Malware with ANY.RUN\u00a0"},"content":{"rendered":"\n<p>Malware doesn\u2019t stick to one platform or play fair. One day it\u2019s a Python stealer. The next, it\u2019s an Android RAT or a Node.js backdoor quietly pinging its C2. Then it hits Linux, flooding your network with suspicious connections.&nbsp;<\/p>\n\n\n\n<p>Modern threats are unpredictable. They move across systems and languages, often slipping past tools that weren\u2019t built for this level of complexity.&nbsp;<\/p>\n\n\n\n<p><a href=\"http:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=how_to_analyze_nodejs_python&amp;utm_term=270525&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN\u2019s cloud-based sandbox<\/a> gives <a href=\"https:\/\/any.run\/cybersecurity-blog\/expertware-success-story\/\" target=\"_blank\" rel=\"noreferrer noopener\">companies and SOC teams<\/a> the flexibility to investigate these threats. <\/p>\n\n\n\n<p>One sandbox where you can analyze, detect, and understand malware and phishing, no matter the OS, architecture, or language. With support for&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/windows-10-sandbox\/\" target=\"_blank\" rel=\"noreferrer noopener\">Windows<\/a>, <a href=\"https:\/\/any.run\/cybersecurity-blog\/linux-malware-analysis-cases\/\" target=\"_blank\" rel=\"noreferrer noopener\">Linux<\/a>, and <a href=\"https:\/\/any.run\/cybersecurity-blog\/android-malware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">Android<\/a>, you can choose the environment that fits your sample and see how the same threat behaves across platforms. Just upload, launch, and start investigating.&nbsp;<\/p>\n\n\n\n<p>Let\u2019s see how cybersecurity teams use ANY.RUN to detect and analyze malware written in languages like Python and Node.js, and built to target different systems.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Malware Written in Node.js: Unpacking GootLoader\u2019s Multi-Stage Execution&nbsp;<\/h2>\n\n\n\n<p>JavaScript isn\u2019t just for websites anymore, and that\u2019s part of the problem. Threat actors increasingly use JavaScript and Node.js to build droppers, stealers, and loaders that can bypass traditional defenses.&nbsp;&nbsp;<\/p>\n\n\n\n<p>For businesses, these threats often arrive disguised as legitimate files, especially in environments where document sharing and template downloads are common. Once executed, they can trigger multi-stage infections, establish persistence, and pull down additional payloads without leaving obvious traces.&nbsp;<\/p>\n\n\n\n<p>To see how a Node.js-based attack unfolds in the real world, let\u2019s analyze a live <a href=\"https:\/\/any.run\/malware-trends\/gootloader\/\" target=\"_blank\" rel=\"noreferrer noopener\">GootLoader<\/a> infection inside the ANY.RUN sandbox.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/ff1f17dc-3519-4c32-8e7b-893e5e4d5451\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=how_to_analyze_nodejs_python&amp;utm_term=270525&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">View analysis of Node.js threat<\/a>&nbsp;<\/p>\n\n\n\n<p>The attack begins when a user lands on a compromised website while searching for something business-related, like a contract template. &nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"577\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image-22-1024x577.png\" alt=\"\" class=\"wp-image-13871\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image-22-1024x577.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image-22-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image-22-768x433.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image-22-1536x866.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image-22-370x209.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image-22-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image-22-740x417.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image-22.png 1857w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Analysis of the Gootloader Node.js malware inside ANY.RUN\u2019s Interactive Sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The site delivers a ZIP file containing a&nbsp;trojanized JavaScript file&nbsp;posing as a common library (e.g., jQuery). Once opened, the script runs via&nbsp;wscript.exe, launching a heavily obfuscated payload.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nGet extra sandbox licenses for your team as a gift<br>Take advantage of <span class=\"highlight\">ANY.RUN&#8217;s special offers<\/span> before May 31&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/plans\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=how_to_analyze_nodejs_python&#038;utm_term=270525&#038;utm_content=linktoplans\" rel=\"noopener\" target=\"_blank\">\nSee all offers\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>ANY.RUN\u2019s&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/malicious-scripts\/\" target=\"_blank\" rel=\"noreferrer noopener\">Script Tracer<\/a>&nbsp;logs and deobfuscates this activity in real time, giving analysts full visibility into each execution step.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"656\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image2-1-1024x656.png\" alt=\"\" class=\"wp-image-13873\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image2-1-1024x656.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image2-1-300x192.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image2-1-768x492.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image2-1-1536x985.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image2-1-2048x1313.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image2-1-370x237.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image2-1-270x173.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image2-1-740x474.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>ANY.RUN\u2019s Script Tracer showing deobfuscatded info<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>We can see all the completed processes of the attack from the right side of the screen, where the process tree is. Here is what we discover here:&nbsp;<\/p>\n\n\n\n<p>Once executed, the first-stage payload drops a second-stage JavaScript file onto the victim\u2019s system and creates a scheduled task to run it immediately and ensure persistence. &nbsp;<\/p>\n\n\n\n<p>The task launches the second-stage script, initially again through wscript.exe (PID 7828), which then transfers execution to cscript.exe (PID 7896). This script spawns a PowerShell process (PID 8092), which further deobfuscates and runs another PowerShell script.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"592\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image3-1-1024x592.png\" alt=\"\" class=\"wp-image-13875\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image3-1-1024x592.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image3-1-300x173.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image3-1-768x444.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image3-1-1536x887.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image3-1-2048x1183.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image3-1-370x214.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image3-1-270x156.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image3-1-740x427.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>PID 7828 with its exposed techniques and tactics inside ANY.RUN sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>This <a href=\"https:\/\/any.run\/cybersecurity-blog\/powershell-script-tracer\/\" target=\"_blank\" rel=\"noreferrer noopener\">PowerShell<\/a> script conducts extensive system reconnaissance, collecting environment variables, OS version, running processes, and more. It communicates with the attacker\u2019s command and control (C2) server by sending compressed and encoded data embedded in HTTP headers, complicating detection.&nbsp;<\/p>\n\n\n\n<p>After establishing communication, the PowerShell script downloads additional payloads, often storing them within the Windows registry to avoid being written to disk. These payloads may include a loader and a secondary component such as a <a href=\"https:\/\/any.run\/malware-trends\/cobaltstrike\" target=\"_blank\" rel=\"noreferrer noopener\">Cobalt Strike<\/a> Beacon or other post-exploitation tools.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Python-Based Malware: A Stealthy Threat to Business Environments&nbsp;<\/h2>\n\n\n\n<p>Python isn\u2019t just a favorite among developers, it\u2019s increasingly used by attackers to create lightweight, modular, and evasive malware. Its readability and cross-platform flexibility make it an ideal choice for building custom stealers, droppers, and loaders that are easy to modify and hard to catch.&nbsp;<\/p>\n\n\n\n<p>For businesses, Python-based malware like <a href=\"https:\/\/any.run\/cybersecurity-blog\/pentagon-stealer-malware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">Pentagon Steale<\/a>r poses a real threat. It\u2019s designed to quietly siphon off browser data, crypto wallet credentials, communication tokens, and personal files, often without dropping anything obvious to disk.&nbsp;<\/p>\n\n\n\n<p>To see how it operates in the wild, let\u2019s break down a real sample of the Python variant of Pentagon Stealer in the ANY.RUN sandbox.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/ee0a809d-1d42-4074-aa15-83a5ae6be6cb\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=how_to_analyze_nodejs_python&amp;utm_term=270525&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">View analysis of Pentagon Stealer<\/a>&nbsp;<\/p>\n\n\n\n<p>The infection starts with an encrypted dropper, which launches a hidden Python script using <a href=\"https:\/\/any.run\/cybersecurity-blog\/aes-encryption\/\" target=\"_blank\" rel=\"noreferrer noopener\">AES encryption<\/a> in CBC mode. Once decrypted, the stealer sets up persistence and scans the system for valuable data.&nbsp;<\/p>\n\n\n\n<p>In ANY.RUN\u2019s sandbox, Pentagon\u2019s behavior is clearly exposed across each stage of the infection chain.&nbsp;<\/p>\n\n\n\n<p><strong>Data theft detection<\/strong>: The stealer harvests browser credentials, cookies, and data from apps like Atomic and Exodus. This activity is automatically flagged by the sandbox, giving analysts immediate insight into what data was accessed and how.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"422\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image4-1-1024x422.png\" alt=\"\" class=\"wp-image-13877\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image4-1-1024x422.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image4-1-300x124.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image4-1-768x316.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image4-1-1536x633.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image4-1-370x152.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image4-1-270x111.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image4-1-740x305.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image4-1.png 1894w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Data theft detected inside ANY.RUN sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p><strong>C2 communication:<\/strong> Pentagon communicates with domains like pentagon[.]cy and stealer[.]cy, while variants such as BLX upload stolen data to gofile.io. These indicators are collected and displayed in the IOC section, making it easy to pivot, enrich threat intel, or block infrastructure in other systems.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"738\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image5-2-1024x738.png\" alt=\"\" class=\"wp-image-13879\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image5-2-1024x738.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image5-2-300x216.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image5-2-768x554.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image5-2-1536x1107.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image5-2-370x267.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image5-2-270x195.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image5-2-740x533.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image5-2.png 1548w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>IOCs gathered along with the domain pentagon[.]cy&nbsp;<\/em><\/figcaption><\/figure><\/div>\n\n\n<p><a href=\"https:\/\/any.run\/cybersecurity-blog\/mitre-ttps-in-ti-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">MITRE ATT&amp;CK mapping<\/a>: The sandbox automatically links observed behavior to ATT&amp;CK tactics and techniques. For Pentagon, this includes:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Credentials from Web Browsers<\/strong>: The malware extracts saved usernames, passwords, and cookies from Chromium-based browsers, compromising access to email, cloud apps, and internal systems.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Credentials in Files<\/strong>: It scans user directories for sensitive files, like password.txt or wallet backups, that may contain unprotected login credentials.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>System Information Discovery<\/strong>: Pentagon gathers OS details, hardware info, and environment variables to tailor its behavior or decide whether to proceed with the attack.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Query Registry<\/strong>: The stealer accesses Windows Registry keys to detect installed software, security tools, and persistence mechanisms.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Service Stop<\/strong>: It disables security-related services like Windows Defender to avoid detection and ensure uninterrupted operation of follow-up payloads.&nbsp;<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"293\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image6-3-1024x293.png\" alt=\"\" class=\"wp-image-13888\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image6-3-1024x293.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image6-3-300x86.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image6-3-768x220.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image6-3-1536x439.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image6-3-2048x586.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image6-3-370x106.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image6-3-270x77.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image6-3-740x212.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>MITRE ATT&amp;CK techniques and tactics displayed inside ANY.RUN sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>With this mapping, teams get a full picture of the attack\u2019s intent and progression without manually stitching logs together.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Android Malware: How Salvador Stealer Hijacks Banking Credentials&nbsp;<\/h2>\n\n\n\n<p>Salvador Stealer&nbsp;is a highly deceptive Android malware disguised as a legitimate banking app. Behind its clean interface lies a full-fledged phishing and data exfiltration machine, designed to steal everything from government ID numbers and personal information to net banking credentials and one-time passwords. &nbsp;<\/p>\n\n\n\n<p>For both individuals and financial institutions, <a href=\"https:\/\/any.run\/cybersecurity-blog\/salvador-stealer-malware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">Salvador<\/a> poses a serious threat, combining technical sophistication with aggressive credential harvesting and real-time data leaks via Telegram and phishing servers.&nbsp;<\/p>\n\n\n\n<p>To uncover the full behavior of Salvador Stealer and observe its actions in real time, we executed the sample inside&nbsp;ANY.RUN\u2019s Android environment.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/fe800ccb-fccc-42a6-a11d-a3d2b6e89edf\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=how_to_analyze_nodejs_python&amp;utm_term=270525&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">View full analysis ses<\/a><a href=\"https:\/\/app.any.run\/tasks\/fe800ccb-fccc-42a6-a11d-a3d2b6e89edf\/\" target=\"_blank\" rel=\"noreferrer noopener\">sion<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"578\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image7-3-1024x578.png\" alt=\"\" class=\"wp-image-13890\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image7-3-1024x578.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image7-3-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image7-3-768x433.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image7-3-1536x867.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image7-3-370x209.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image7-3-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image7-3-740x418.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image7-3.png 1852w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Analysis of the Salvador malware inside ANY.RUN Sandbox\u2019s interactive Android VM<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Inside the interactive Android VM, we could clearly observe each stage of the infection, uncovering its tactics, visualizing the phishing interface, and tracing data exfiltration with minimal manual effort.&nbsp;<\/p>\n\n\n\n<p>We see that Salvador Stealer operates in two stages:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Dropper APK<\/strong>&nbsp;\u2013 Silently installs and triggers the second-stage payload.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Base.apk (Payload)<\/strong>&nbsp;\u2013 The actual credential-stealing component.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Dropper APK Behavior<\/strong>&nbsp;<\/h3>\n\n\n\n<p>The dropper <a href=\"https:\/\/any.run\/cybersecurity-blog\/android-malware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">APK<\/a> is engineered to install the second-stage malware without the user\u2019s knowledge. It uses specific permissions and intent filters in its&nbsp;AndroidManifest.xml.&nbsp;<\/p>\n\n\n\n<p>Inside ANY.RUN, we observed the dropper launching a new activity immediately after execution, behavior consistent with silent installations.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"732\" height=\"554\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image8-3.png\" alt=\"\" class=\"wp-image-13892\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image8-3.png 732w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image8-3-300x227.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image8-3-370x280.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image8-3-270x204.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image8-3-80x60.png 80w\" sizes=\"(max-width: 732px) 100vw, 732px\" \/><figcaption class=\"wp-element-caption\"><em>The dropper APK designed to install and launch a secondary payload (base.apk) as a new activity<\/em><\/figcaption><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>Payload Behavior &amp; Phishing Interface<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Once executed, the payload connects to Telegram, used as a&nbsp;<strong>Command and Control (C2)<\/strong>&nbsp;channel and triggers the \u201cstarts itself from another location\u201d signature, confirming it was deployed via dropper.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"725\" height=\"496\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image9-2.png\" alt=\"\" class=\"wp-image-13894\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image9-2.png 725w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image9-2-300x205.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image9-2-370x253.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/image9-2-270x185.png 270w\" sizes=\"(max-width: 725px) 100vw, 725px\" \/><figcaption class=\"wp-element-caption\"><em>Process communicating with Telegram revealed inside ANY.RUN Android sandbox<\/em><\/figcaption><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>Real-Time Credential Exfiltration<\/strong>&nbsp;<\/h3>\n\n\n\n<p>After submission, all user data is&nbsp;immediately exfiltrated&nbsp;to:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A phishing website controlled by the attacker&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A Telegram bot used as a backup C2 channel&nbsp;<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"623\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagea-1024x623.png\" alt=\"\" class=\"wp-image-13896\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagea-1024x623.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagea-300x182.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagea-768x467.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagea-370x225.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagea-270x164.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagea-740x450.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagea.png 1046w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Stolen data sent to Telegram C2 server<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>ANY.RUN\u2019s&nbsp;HTTPS <a href=\"https:\/\/any.run\/cybersecurity-blog\/mitm-proxy-fake-net\/\" target=\"_blank\" rel=\"noreferrer noopener\">MITM Proxy mode<\/a>&nbsp;captured this behavior clearly, allowing us to inspect the exact HTTP requests, destination URLs, and the contents of the exfiltrated data in plaintext. &nbsp;<\/p>\n\n\n\n<p>This level of visibility is critical when dealing with mobile malware that uses encrypted channels. Teams can immediately verify whether sensitive information was stolen, where it was sent, and how it was packaged, all without reverse-engineering the app or relying on guesswork. It shortens investigation time, boosts detection accuracy, and helps teams extract actionable IOCs in minutes.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nSee all ANY.RUN&#8217;s 9th Birthday special offers <br>and <span class=\"highlight\">get yours before May 31<\/span>&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/plans\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=how_to_analyze_nodejs_python&#038;utm_term=270525&#038;utm_content=linktoplans\" rel=\"noopener\" target=\"_blank\">\nSee all offers\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">Linux Malware: Uncovering Mirai\u2019s Network Flood Inside the Sandbox&nbsp;<\/h2>\n\n\n\n<p>While Linux systems are often seen as more secure, they\u2019re far from immune, especially when it comes to&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/network-traffic-analysis-in-linux\/\" target=\"_blank\" rel=\"noreferrer noopener\">IoT-targeting malware&nbsp;like&nbsp;Mirai<\/a>. Built to infect vulnerable devices with weak or default credentials, Mirai turns compromised routers, IP cameras, and other Linux-based systems into part of a massive botnet used for coordinated DDoS attacks.&nbsp;<\/p>\n\n\n\n<p>In our sandbox session, we ran a Mirai sample inside a&nbsp;<strong>Linux virtual environment<\/strong>, revealing exactly how this malware behaves post-infection.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/dd0463c2-aa96-4503-b962-6ba874fadf84\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=how_to_analyze_nodejs_python&amp;utm_term=270525&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">View the full analysis session<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"568\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imageb-3-1024x568.png\" alt=\"\" class=\"wp-image-13903\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imageb-3-1024x568.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imageb-3-300x166.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imageb-3-768x426.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imageb-3-1536x852.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imageb-3-2048x1136.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imageb-3-370x205.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imageb-3-270x150.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imageb-3-740x411.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Mirai malware detected by ANY.RUN sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>After running the analysis, the malware began scanning the internet for additional targets, sending out a&nbsp;flood of connection attempts&nbsp;to IP addresses across various ports. The spike in outbound activity was visible in the sandbox\u2019s&nbsp;<strong>network traffic tab<\/strong>, highlighting Mirai\u2019s worm-like behavior as it looked to propagate further.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"237\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagec-1024x237.png\" alt=\"\" class=\"wp-image-13902\" style=\"width:650px;height:auto\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagec-1024x237.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagec-300x69.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagec-768x178.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagec-1536x356.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagec-370x86.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagec-270x63.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagec-740x171.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagec.png 1892w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Network traffic tab with 121964 connections<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>To add another layer of detection,&nbsp;<strong><a href=\"https:\/\/any.run\/cybersecurity-blog\/detection-with-suricata-ids\/\" target=\"_blank\" rel=\"noreferrer noopener\">Suricata rules<\/a><\/strong>&nbsp;were triggered during the session, automatically flagging the traffic as malicious and confirming the presence of a Mirai variant. This kind of signature-based alert is crucial for quickly validating what you&#8217;re looking at without needing to manually inspect every packet.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"628\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imaged-1024x628.png\" alt=\"\" class=\"wp-image-13905\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imaged-1024x628.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imaged-300x184.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imaged-768x471.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imaged-1536x941.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imaged-370x227.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imaged-270x165.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imaged-740x453.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imaged.png 1560w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Suricata rule triggered by Mirai malware inside ANY.RUN sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>By analyzing Mirai in ANY.RUN, cyber security teams gain:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A&nbsp;real-time view of malicious scanning and propagation behavior&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Easy access to&nbsp;network IOCs, including contacted IPs, ports, and protocols&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Automated&nbsp;rule-based detection (Suricata)&nbsp;to validate threats instantly&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A safe environment to test&nbsp;Linux-specific malware, which is often harder to analyze in traditional sandboxes&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Whether you\u2019re defending enterprise infrastructure or monitoring connected devices, ANY.RUN\u2019s support for&nbsp;Linux malware analysis&nbsp;makes it easier to uncover threats that operate below the radar of Windows-based defenses.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Going Deeper with Pre-Installed Developer Tools&nbsp;<\/h2>\n\n\n\n<p>Not every sample can be cracked with just behavioral analysis, some require deeper inspection, debugging, or code-level investigation. ANY.RUN\u2019s&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/pre-installed-dev-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">pre-installed development software set<\/a> is perfect for these purposes.&nbsp;<\/p>\n\n\n\n<p>Available for&nbsp;Windows 10 (64-bit)&nbsp;VMs, this configuration equips analysts with a curated toolkit tailored for reverse engineering, unpacking, and scripting, all without needing to set anything up manually.&nbsp;<\/p>\n\n\n\n<p>By selecting the&nbsp;<strong>\u201cDevelopment\u201d<\/strong>&nbsp;software set before starting a session, users instantly gain access to tools like&nbsp;<strong>Python, Node.js, x64dbg, Detect It Easy, dnSpy, HxD, DebugView, Process Hacker<\/strong>, and more to investigate complex malware like custom loaders, obfuscated stealers, or scripts in Node.js or Python.&nbsp;<\/p>\n\n\n\n<p>Let\u2019s look at two real-world use cases where this set has been used:&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Example 1: Extracting MSI Files Without Execution&nbsp;<\/h3>\n\n\n\n<p>Using&nbsp;<strong>Lessmsi<\/strong>, analysts can safely unpack&nbsp;.msi&nbsp;files and inspect their contents without running them, critical for avoiding accidental payload execution. In one session, this was combined with&nbsp;<strong>Detect It Easy (DiE)<\/strong>&nbsp;to analyze extracted binaries and flag suspicious file signatures or packers.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/0301c814-d0b7-4f3e-9763-b4ae4ffca9da\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=how_to_analyze_nodejs_python&amp;utm_term=270525&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">View analysis session<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"584\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagee-1024x584.png\" alt=\"\" class=\"wp-image-13907\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagee-1024x584.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagee-300x171.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagee-768x438.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagee-1536x876.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagee-370x211.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagee-270x154.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagee-740x422.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagee.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Lessmi tool used inside ANY.RUN sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">Example 2: Debugging Obfuscated Malware with x64dbg&nbsp;<\/h3>\n\n\n\n<p>In another session,&nbsp;<strong>x64dbg<\/strong>&nbsp;was used to step through malware execution line by line, helping analysts understand how the sample unpacked itself and interacted with system components; insights that static analysis alone couldn\u2019t reveal.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/89375e4c-0941-43e4-b987-790c15111af2\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=how_to_analyze_nodejs_python&amp;utm_term=270525&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">View analysis session<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"586\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagef-1024x586.png\" alt=\"\" class=\"wp-image-13909\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagef-1024x586.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagef-300x172.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagef-768x439.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagef-1536x878.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagef-370x212.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagef-270x154.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagef-740x423.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/05\/imagef.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>x64dbg used inside ANY.RUN sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Having these tools built into the sandbox means your team can dig deeper without wasting time setting things up. It speeds up investigations, helps catch more sophisticated threats, and gets you closer to answers when every minute counts.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Smarter Way to Investigate Multi-Platform Threats&nbsp;<\/h2>\n\n\n\n<p>Modern malware doesn\u2019t limit itself to one environment, and neither should your analysis. From Windows loaders and Python stealers to Android banking malware and Linux-based botnets, today\u2019s threats are built to adapt. The same sample can behave differently depending on where it runs, dropping different payloads, using OS-specific evasion techniques, or communicating with separate C2 infrastructure.&nbsp;<\/p>\n\n\n\n<p>Using a different tool for each platform only slows your team down and increases the risk of missing critical behavior.&nbsp;<\/p>\n\n\n\n<p><a href=\"http:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=how_to_analyze_nodejs_python&amp;utm_term=270525&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> <strong>brings everything together in one place.<\/strong>&nbsp;One sandbox where you can detect, investigate, and understand threats, no matter the OS, architecture, or language. Launch analysis sessions across&nbsp;Windows, Linux, and even&nbsp;real Android environments&nbsp;to see how malware acts in each context.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Faster Investigations Across Platforms: <\/strong>Skip the tool-switching and analyze samples across operating systems, Windows, Linux, and Android, from one streamlined interface.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Deeper Insight into Complex Samples:<\/strong> Whether it&#8217;s a Node.js loader or a Python stealer, trace execution, follow obfuscated logic, and unpack evasive behavior with ANY.RUN\u2019s Script Tracer, Pre-Installed Dev toolkit.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Clear View of Network Behavior: <\/strong>See how malware communicates, even over encrypted channels or uncommon protocols using HTTPS MITM Proxy and Suricata rule integration.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Complete Context Behind Every Attack: <\/strong>Understand the full attack chain, from persistence to exfiltration, through mapped behavior, process trees, ATT&amp;CK matrix, and comprehensive logs.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Cloud-Based, Ready-to-Go Malware Analysis: <\/strong>Skip complex setups. Launch your session in seconds with debuggers, interpreters, and network tools already built in.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Built for Teamwork and Collaboration:<\/strong> ANY.RUN makes it easy for teams to work together. Share live sessions, tag behaviors, and keep everyone, from analysts to managers, on the same page. &nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Join ANY.RUN with your business email to <a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=how_to_analyze_nodejs_python&amp;utm_term=270525&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">get a 14-day trial of advanced features<\/a> and see how much faster and deeper your malware investigations can be.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malware doesn\u2019t stick to one platform or play fair. One day it\u2019s a Python stealer. The next, it\u2019s an Android RAT or a Node.js backdoor quietly pinging its C2. Then it hits Linux, flooding your network with suspicious connections.&nbsp; Modern threats are unpredictable. They move across systems and languages, often slipping past tools that weren\u2019t [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":13936,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[57,10,15,34,40],"class_list":["post-13868","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-instructions","tag-anyrun","tag-cybersecurity","tag-malware","tag-malware-analysis","tag-malware-behavior"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Analyze Node.js, Python, Android, and Linux Malware<\/title>\n<meta name=\"description\" content=\"See hands-on examples of how you can analyze and detect hard-to-catch malware using ANY.RUN&#039;s Interactive Sandbox.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malware-threats\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malware-threats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malware-threats\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"How to Analyze Node.js, Python, Android, and Linux Malware with ANY.RUN\u00a0\",\"datePublished\":\"2025-05-27T11:25:00+00:00\",\"dateModified\":\"2025-05-27T14:04:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malware-threats\/\"},\"wordCount\":2480,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware\",\"malware analysis\",\"malware behavior\"],\"articleSection\":[\"Instructions on ANY.RUN\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malware-threats\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malware-threats\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malware-threats\/\",\"name\":\"How to Analyze Node.js, Python, Android, and Linux Malware\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2025-05-27T11:25:00+00:00\",\"dateModified\":\"2025-05-27T14:04:35+00:00\",\"description\":\"See hands-on examples of how you can analyze and detect hard-to-catch malware using ANY.RUN's Interactive Sandbox.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malware-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malware-threats\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malware-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Instructions on ANY.RUN\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/instructions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to Analyze Node.js, Python, Android, and Linux Malware with ANY.RUN\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Analyze Node.js, Python, Android, and Linux Malware","description":"See hands-on examples of how you can analyze and detect hard-to-catch malware using ANY.RUN's Interactive Sandbox.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malware-threats\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malware-threats\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malware-threats\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"How to Analyze Node.js, Python, Android, and Linux Malware with ANY.RUN\u00a0","datePublished":"2025-05-27T11:25:00+00:00","dateModified":"2025-05-27T14:04:35+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malware-threats\/"},"wordCount":2480,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware","malware analysis","malware behavior"],"articleSection":["Instructions on ANY.RUN"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malware-threats\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malware-threats\/","url":"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malware-threats\/","name":"How to Analyze Node.js, Python, Android, and Linux Malware","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2025-05-27T11:25:00+00:00","dateModified":"2025-05-27T14:04:35+00:00","description":"See hands-on examples of how you can analyze and detect hard-to-catch malware using ANY.RUN's Interactive Sandbox.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malware-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malware-threats\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/how-to-analyze-malware-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Instructions on ANY.RUN","item":"https:\/\/any.run\/cybersecurity-blog\/category\/instructions\/"},{"@type":"ListItem","position":3,"name":"How to Analyze Node.js, Python, Android, and Linux Malware with ANY.RUN\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/13868"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=13868"}],"version-history":[{"count":52,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/13868\/revisions"}],"predecessor-version":[{"id":13988,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/13868\/revisions\/13988"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/13936"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=13868"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=13868"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=13868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}