{"id":1978,"date":"2022-02-01T01:50:00","date_gmt":"2022-02-01T01:50:00","guid":{"rendered":"\/cybersecurity-blog\/?p=1978"},"modified":"2024-07-24T08:02:18","modified_gmt":"2024-07-24T08:02:18","slug":"instant-malware-analysis","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/instant-malware-analysis\/","title":{"rendered":"ANY.RUN brings a New Technology for Instant Malware Analysis"},"content":{"rendered":"\n<p>ANY.RUN is starting 2022 with a huge change. We\u2018re happy to share a brand new technology. Try instant access to malware analysis and get the first results immediately. Wait no more!<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Why is speed vital?&nbsp;<\/h3>\n\n\n\n<p>In cybersecurity, speed is a key to a successful defense. If an attack happens, the main goal of a SOC specialist is to collect all possible data about the incident, attackers and figure out what the target was. Every second spent in vain lets criminals exploit vulnerabilities and cause damage.<br><\/p>\n\n\n\n<p>Moreover, time is money. And when an employee wastes his working hours on useless waiting, the company suffers in the first place. The annoying website\u2019s loading and buffering can drive anybody mad. \u201cWe want it all at once\u201d \u2013&nbsp;it has become a must in the modern world.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Wait no more<\/h3>\n\n\n\n<p>ANY.RUN\u2019s key advantage has always been fast and convenient analysis. After submitting a file, launching took about 18 seconds to get the first results. But we are always working hard to improve the service for users.&nbsp;<br><\/p>\n\n\n\n<p>The process of working out the solution was a real challenge for us. It took more than a year to figure out how exactly ANY.RUN users can start analysis immediately. We kept in mind that malware specialists are eager to run as many samples as possible, so we need to meet their demands and be ready for an increasing number of tasks on the service.&nbsp;<br><\/p>\n\n\n\n<p>And here is the Instant access. A task is launching about x10 times faster! A sample runs immediately and is ready for analysis. Automated sandboxes and other interactive services pale in comparison to ANY.RUN\u2019s Instant access.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2022\/01\/ezgif.com-gif-maker.gif\" alt=\"\" class=\"wp-image-1994\"\/><\/figure>\n\n\n\n<p>Wait no more, work right away. The virtual machine works even faster than starting your laptop, turning on your phone, or opening a browser. And we are proud to say, our service is the fastest in the market, and we hope our users can enjoy it to the fullest.<\/p>\n\n\n\n<p>Stop waiting and start analyzing malware x2,5 faster! Right now you go to the Emotet investigation immediately. Compare the task launch with Instant access to the previous version. And you better buckle up!<br><\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"LAUNCH A MALWARE ANALYSIS WITH INSTANT ACCESS TECHNOLOGY\" width=\"770\" height=\"578\" src=\"https:\/\/www.youtube.com\/embed\/N1pnJh0gxCI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Instant access technology<\/h3>\n\n\n\n<p>ANY.RUN is happy to present a new technology \u2013 Instant access. We have been working on an entirely new method for a while: a remastered process of launching the task and a faster way to get to the analysis.&nbsp;<br><\/p>\n\n\n\n<p><strong>Instant access technology gives you an opportunity to:<\/strong><br><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Analyze a sample faster as you don\u2019t waste time waiting.<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li>Run an unlimited number of tasks and investigate them immediately.<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li>Get the first results in a flash.<\/li>\n<\/ol>\n\n\n\n<p>Instant access is not only about speed. The amount of launched tasks is rapidly growing on the service. Malware analysts run about 10 thousand samples daily. And despite the high load, you get stable and smooth usage for research. The new technology allocates the service&#8217;s resources rationally for your convenience.&nbsp;<br><\/p>\n\n\n\n<p>All <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=in-house&amp;utm_content=instant_access\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">ANY.RUN<\/a> users can already try the Instant access technology and get to the analysis immediately! This feature is available for all subscriptions, including the Community plan. We value your time and do our best to make your research fast, convenient and informative. Now you can focus on your investigations and leave the rest to us. And we will try to work hard to make your experience on the service better. Enjoy your hunting!&nbsp;<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ANY.RUN is starting 2022 with a huge change. We\u2018re happy to share a brand new technology. Try instant access to malware analysis and get the first results immediately. Wait no more! Why is speed vital?&nbsp; In cybersecurity, speed is a key to a successful defense. If an attack happens, the main goal of a SOC [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":8313,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[57],"class_list":["post-1978","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-anyrun"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A New Technology for Instant Malware Analysis - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"ANY.RUN brings new technology for Instant Malware Analysis. Now a sample runs immediately and is ready for research. A task has never launched so fast!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/instant-malware-analysis\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/instant-malware-analysis\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/instant-malware-analysis\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"ANY.RUN brings a New Technology for Instant Malware Analysis\",\"datePublished\":\"2022-02-01T01:50:00+00:00\",\"dateModified\":\"2024-07-24T08:02:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/instant-malware-analysis\/\"},\"wordCount\":586,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\"],\"articleSection\":[\"Service Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/instant-malware-analysis\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/instant-malware-analysis\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/instant-malware-analysis\/\",\"name\":\"A New Technology for Instant Malware Analysis - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2022-02-01T01:50:00+00:00\",\"dateModified\":\"2024-07-24T08:02:18+00:00\",\"description\":\"ANY.RUN brings new technology for Instant Malware Analysis. Now a sample runs immediately and is ready for research. A task has never launched so fast!\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/instant-malware-analysis\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/instant-malware-analysis\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/instant-malware-analysis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service Updates\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ANY.RUN brings a New Technology for Instant Malware Analysis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A New Technology for Instant Malware Analysis - ANY.RUN&#039;s Cybersecurity Blog","description":"ANY.RUN brings new technology for Instant Malware Analysis. Now a sample runs immediately and is ready for research. A task has never launched so fast!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/instant-malware-analysis\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/instant-malware-analysis\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/instant-malware-analysis\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"ANY.RUN brings a New Technology for Instant Malware Analysis","datePublished":"2022-02-01T01:50:00+00:00","dateModified":"2024-07-24T08:02:18+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/instant-malware-analysis\/"},"wordCount":586,"commentCount":1,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/instant-malware-analysis\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/instant-malware-analysis\/","url":"https:\/\/any.run\/cybersecurity-blog\/instant-malware-analysis\/","name":"A New Technology for Instant Malware Analysis - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2022-02-01T01:50:00+00:00","dateModified":"2024-07-24T08:02:18+00:00","description":"ANY.RUN brings new technology for Instant Malware Analysis. Now a sample runs immediately and is ready for research. A task has never launched so fast!","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/instant-malware-analysis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/instant-malware-analysis\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/instant-malware-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Service Updates","item":"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/"},{"@type":"ListItem","position":3,"name":"ANY.RUN brings a New Technology for Instant Malware Analysis"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1978"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=1978"}],"version-history":[{"count":2,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1978\/revisions"}],"predecessor-version":[{"id":8297,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1978\/revisions\/8297"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/8313"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=1978"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=1978"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=1978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}