{"id":1765,"date":"2021-08-25T05:52:00","date_gmt":"2021-08-25T05:52:00","guid":{"rendered":"\/cybersecurity-blog\/?p=1765"},"modified":"2022-12-21T06:49:29","modified_gmt":"2022-12-21T06:49:29","slug":"release-notes-25-08","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/release-notes-25-08\/","title":{"rendered":"Release Notes August 25, 2021"},"content":{"rendered":"\n<p>Hello hunters! The ANY.RUN team has prepared some amazing changes for you! We are glad to present a redesigned \u201cNetwork stream\u201d pop-up window that makes the process of analysis more convenient. Speed up your work, make data analysis faster, and simplify retrieval of information. Once the \u201cNetwork stream\u201d is opened, you can start the analysis immediately.&nbsp;<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Update overview:<\/h1>\n\n\n\n<ul class=\"wp-block-list\"><li>Redesigned logic and enhancement of the \u201cNetwork stream\u201d pop-up window&nbsp;<\/li><li>Service usability improvements<\/li><\/ul>\n\n\n\n<h1 class=\"wp-block-heading\">Network stream<\/h1>\n\n\n\n<p>During the analysis, you can check out the traffic that was sent and received by each of the packets in the \u201cNetwork stream\u201d pop-up window. You can find it by clicking on Traffic in the Connections section. Here it is possible to look through packets that were sent\/received in the HEX and Text formats between two IPs and were set in the virtual machine.<br><\/p>\n\n\n\n<p>The \u201cNetwork stream\u201d helps to investigate packets of traffic and find out what information was stolen. For example, passwords, logins, cookies, and other information from compromised systems in the network. Sometimes it\u2019s possible to check what was downloaded: you may guess that the PE file was downloaded just by looking at its signature. Malware\u2019s configuration data such as a botnet ID, IP of the Command &amp; Control server are also likely to be found here.&nbsp;<br><\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/d8f51f91-fdde-49dd-a224-994bbb7ee71f\/\">Let\u2019s have a look at one sample<\/a> to compare our versions of the window.&nbsp;<br><\/p>\n\n\n\n<p>The previous variant of the \u201cNetwork stream\u201d served just for quick evaluation. Obviously, it used to be challenging to work with.&nbsp;<br><\/p>\n\n\n\n<p>We have reconsidered the whole logic of this pop-up and added new functionalities for your convenience. The new feature has turned the \u201cNetwork stream\u201d from the briefing paper into a window that you can really use.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/q5tfbfJKYySsUSg_0WTRFoM4hg-e_mJlknHi1Vf_xpZxDC1LZM9klAQDgAPJ1Klwr_lRN08cIji1EJureT6rxOx_G7dhdXgTWDiwVjvwVnpTKv4aIG1ZiqILRovTz375SU_gkBJv\" alt=\"\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Work faster with easy traffic analysis<\/h2>\n\n\n\n<p>With a new and better-structured interface, you can speed up your analysis.&nbsp;<br><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Convenient packets\u2019 display.&nbsp;<\/strong><\/li><\/ol>\n\n\n\n<p>Packets contain 3 tables of content: offset from the block\u2019s start, HEX, and Text representation of the stream content.&nbsp;<br><\/p>\n\n\n\n<p>Find the packet you need by managing the \u201cNetwork stream\u201d pop-up window in the navigation panel. Now you see all packets at once, as their contents are hidden under spoiler and available for preview. It simplifies navigation considerably \u2013&nbsp;quickly move to the next block of information to find the needed one.&nbsp;<br><\/p>\n\n\n\n<p>You may check the details of each packet individually. Pick the required data and investigate what you want at once. You can extend a block by clicking on the Show button or right on the needed block to reveal the whole packet&#8217;s data.&nbsp;<br><\/p>\n\n\n\n<p>Need only the received packets? Information in one direction is merged for a more convenient display. The received packets are joined in one blue block, and the sent direction is green.<br><\/p>\n\n\n\n<p>Enormous streams are not a problem from now on. Scroll huge blocks fast \u2013&nbsp;no lagging anymore.&nbsp;<br><\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\"><li><strong>Important information is highlighted.<\/strong><\/li><\/ol>\n\n\n\n<p>Analyze right away: turn \u201cHighlight chars\u201d on to see valuable data that has size.&nbsp;<br><\/p>\n\n\n\n<p>With this new feature, you can skip irrelevant information and don&#8217;t lose the important one.&nbsp;Color indication of this data simplifies reading. Printable characters such as letters, signs, and figures are brighter. Control characters and others that have less priority are less opaque, so you can pinpoint significant details.&nbsp;<br><\/p>\n\n\n\n<p>Moreover, if you hold a mouse over HEX format, its text equivalent is highlighted at the same time. The whole line is in the spotlight as well, for clear imagery.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/5uSMwlY9dOt4p1liaqbsxxniT0gX49IXpJSNYu05ZMwjD7srCgi8qOpz_5SGgiTDzsJGHrkt7F4QISglZd0E46qGa0Y262oznmvL1ypYAg8fSIiIEGyojeQnjfq1XvEHRmcOcplu\" alt=\"\"\/><\/figure>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\"><li><strong>Switch between HEX and Text formats for more convenient research.<\/strong><\/li><\/ol>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/-4VtPOg7PtOpeUQc6nAB8zC5hB7YrHf0KaxG4Yze2NwCSgnvfW2kpiffUJHBXPPg4YljjPM3KQOR2EtI2R8FF23TXuHASbsfQbWB_euDEgyb84VFp-DacvIUaaiZLfWPI0SXGRli\" alt=\"\"\/><\/figure>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\"><li><strong>More details, more high-quality results of the analysis you have. <\/strong>Besides the IPs and the domain name, now you can see the number of sent and received packets.&nbsp;<\/li><\/ol>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/FKTX15uyAMYrGayac5JN1JD2O1jna9wd5QOll0sog2HoLCSnYI84WNk2A3SP3pIuyVaOQc5tD3fa7k4rzNnyeFbEXRF3vIwxi6UnlzhKnfcJfINotTkNdKadAkMq4Q8ZI1mB2M0D\" alt=\"\"\/><\/figure>\n\n\n\n<ol class=\"wp-block-list\" start=\"5\"><li><strong>Learn more about each packet<\/strong> \u2013 its status, size, timeshift.&nbsp;&nbsp;<\/li><\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"6\"><li><strong>Download the needed packet in a binary file.<\/strong> Or you can select a part of HEX\/Text and copy the necessary information from the packet.&nbsp;<\/li><\/ol>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/qE2rx_6Wf1_zrXBGFiVCEXyOSf1uDNasr7NcbvlS7k4jKNn1WL9bDD2Yente1-d56AmnnxMoo04p-3ChPE36hkJ366Y-HTSYDH97sYXtsIHVeDYhv0FEHGlwYn-LMDN-QfZeXh4o\" alt=\"\"\/><\/figure>\n\n\n\n<p>The challenging window made traffic analysis complicated in the past. We hope the brand new \u201cNetwork stream\u201d will surprise you with an easy, convenient, and useful feature where you can work and analyze fast. Try it now at <a href=\"https:\/\/app.any.run\/\">ANY.RUN sandbox<\/a> and check out our video for more details!&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Network stream updates in August 2021\" width=\"770\" height=\"433\" src=\"https:\/\/www.youtube.com\/embed\/ClGr4_GKS_4?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Hello hunters! The ANY.RUN team has prepared some amazing changes for you! We are glad to present a redesigned \u201cNetwork stream\u201d pop-up window that makes the process of analysis more convenient. Speed up your work, make data analysis faster, and simplify retrieval of information. Once the \u201cNetwork stream\u201d is opened, you can start the analysis [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3760,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[57,54,55,56],"class_list":["post-1765","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-anyrun","tag-features","tag-release","tag-update"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Release Notes August 25, 2021 - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"ANY.RUN has updated the service with a new release on the 25th of August. This post will walk you through the improved Network Stream pop-up window.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/release-notes-25-08\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-25-08\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-25-08\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Release Notes August 25, 2021\",\"datePublished\":\"2021-08-25T05:52:00+00:00\",\"dateModified\":\"2022-12-21T06:49:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-25-08\/\"},\"wordCount\":723,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"features\",\"release\",\"update\"],\"articleSection\":[\"Service Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/release-notes-25-08\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-25-08\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-25-08\/\",\"name\":\"Release Notes August 25, 2021 - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2021-08-25T05:52:00+00:00\",\"dateModified\":\"2022-12-21T06:49:29+00:00\",\"description\":\"ANY.RUN has updated the service with a new release on the 25th of August. This post will walk you through the improved Network Stream pop-up window.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-25-08\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/release-notes-25-08\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-25-08\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"teamwork\",\"item\":\"https:\/\/any.run\/tag\/teamwork\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Release Notes August 25, 2021\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Release Notes August 25, 2021 - ANY.RUN&#039;s Cybersecurity Blog","description":"ANY.RUN has updated the service with a new release on the 25th of August. This post will walk you through the improved Network Stream pop-up window.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/release-notes-25-08\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-25-08\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-25-08\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Release Notes August 25, 2021","datePublished":"2021-08-25T05:52:00+00:00","dateModified":"2022-12-21T06:49:29+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-25-08\/"},"wordCount":723,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","features","release","update"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-25-08\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-25-08\/","url":"https:\/\/any.run\/cybersecurity-blog\/release-notes-25-08\/","name":"Release Notes August 25, 2021 - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2021-08-25T05:52:00+00:00","dateModified":"2022-12-21T06:49:29+00:00","description":"ANY.RUN has updated the service with a new release on the 25th of August. This post will walk you through the improved Network Stream pop-up window.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-25-08\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-25-08\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-25-08\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"teamwork","item":"https:\/\/any.run\/tag\/teamwork\/"},{"@type":"ListItem","position":3,"name":"Release Notes August 25, 2021"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1765"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=1765"}],"version-history":[{"count":1,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1765\/revisions"}],"predecessor-version":[{"id":3761,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1765\/revisions\/3761"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/3760"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=1765"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=1765"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=1765"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}