{"id":4661,"date":"2023-04-06T07:30:11","date_gmt":"2023-04-06T07:30:11","guid":{"rendered":"\/cybersecurity-blog\/?p=4661"},"modified":"2023-04-07T05:29:44","modified_gmt":"2023-04-07T05:29:44","slug":"malware-analysis-digest-march-2023","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-digest-march-2023\/","title":{"rendered":"Malware Analysis Digest: March 2023\u00a0"},"content":{"rendered":"\n<p>Welcome to the March 2023 edition of our monthly malware analysis news report. We&#8217;ve compiled some of the most significant security events and emerging threats that took place over the past month to keep you informed and help you stay one step ahead of cybercriminals.&nbsp;<\/p>\n\n\n\n<p>Let&#8217;s dive into some of the key highlights and developments in the world of malware and cybersecurity.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1. Outlook Vulnerability (CVE-2023-23397) and Mitigation Steps&nbsp;<\/h2>\n\n\n\n<p>A new Microsoft Office Outlook vulnerability, CVE-2023-23397, has been <a href=\"https:\/\/malware.news\/t\/microsoft-office-outlook-vulnerability-cve-2023-23397-appearance-and-manual-measure-guide\/68241\" target=\"_blank\" rel=\"noreferrer noopener\">identified<\/a>.&nbsp;&nbsp;<\/p>\n\n\n\n<p>This vulnerability enables threat actors to steal user account credentials, including the NTLM hash value, upon receiving an email and triggering a notification. Attackers can exploit this information for internal propagation and further system compromise.&nbsp;<\/p>\n\n\n\n<p>Users can mitigate the vulnerability by disabling the &#8216;Reminder&#8217; feature in MS Outlook. However, caution is advised as the vulnerability can still be triggered if the sound is played by checking &#8216;Play this sound&#8217; on a malicious email.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">2. LummaC2 Infostealer Disguised as Illegal Cracks&nbsp;<\/h2>\n\n\n\n<p>A new infostealer called LummaC2 is being <a href=\"https:\/\/asec.ahnlab.com\/en\/50594\/\" target=\"_blank\" rel=\"noreferrer noopener\">distributed<\/a> disguised as illegal cracks and keygens.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Similar to other malware such as CryptBot, RedLine, and Vidar, it has been available for purchase on the dark web since early this year. LummaC2 uses obfuscation techniques and anti-sandbox measures to evade detection and hinder analysis. It targets browser data, browser extensions, cryptocurrency wallet programs, system information, email clients, and other applications for theft.&nbsp;<\/p>\n\n\n\n<p>The distribution method involves users searching for a crack or serial key for popular software, leading them to a malicious website. After clicking the download button, users are redirected several times before reaching the malware distribution page. The malware is then downloaded in a compressed format, either through the threat actor&#8217;s server or services like MediaFire or MEGA.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3. New IcedID Variants Focus on Malware Delivery Instead of Bank Fraud&nbsp;<\/h2>\n\n\n\n<p>Recent IcedID malware variants have <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-icedid-variants-shift-from-bank-fraud-to-malware-delivery\/\" target=\"_blank\" rel=\"noreferrer noopener\">shifted<\/a> focus from online banking fraud to installing further malware on compromised systems.&nbsp;<\/p>\n\n\n\n<p>Proofpoint has identified two new IcedID loader variants, &#8220;Lite&#8221; and &#8220;Forked,&#8221; which deliver the IcedID bot with a narrower feature set.&nbsp;<\/p>\n\n\n\n<p>By removing unneeded functions, these variants become stealthier and leaner, helping threat actors evade detection. The &#8220;Lite&#8221; variant appeared in November 2022, while the &#8220;Forked&#8221; version emerged in February 2023. Proofpoint predicts the use of new IcedID variants will likely grow, with more variants possibly emerging later in 2023.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">4. CatB: a new Ransomware Strain Discovered&nbsp;<\/h2>\n\n\n\n<p>CatB is a new ransomware family with unique characteristics, including performing basic evasion checks before executing its loader component to avoid running in an analysis environment like a sandbox.\u00a0<\/p>\n\n\n\n<p>Once the checks are passed, the payload containing the ransomware is executed via a DLL Side-Loading attack using a trusted Windows service.&nbsp;&nbsp;<\/p>\n\n\n\n<p>CatB searches for user-specific files to encrypt, but unlike other ransomware families, it prepends the ransom note to each encrypted file instead of dropping it in separate files in various locations. The malware uses anti-VM techniques to hide its behavior from analysis environments, making it more challenging for security researchers to study its operations.&nbsp;<\/p>\n\n\n\n<p>Emotet malware is now <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/emotet-malware-distributed-as-fake-w-9-tax-forms-from-the-irs\/\" target=\"_blank\" rel=\"noreferrer noopener\">targeting<\/a> US taxpayers by impersonating W-9 tax forms allegedly sent by the Internal Revenue Service and companies taxpayers work with.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">5. Emotet Malware Targets US Taxpayers with Fake W-9 Forms&nbsp;<\/h2>\n\n\n\n<p>This notorious malware infection is distributed through phishing emails, which in the past contained Microsoft Word and Excel documents with malicious macros. However, with Microsoft now blocking macros by default, Emotet has switched to using Microsoft OneNote files with embedded scripts to install the malware.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Once installed, Emotet steals victims&#8217; emails for future reply-chain attacks, sends spam emails, and installs other malware that grants initial access to threat actors, such as ransomware gangs.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"570\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-1024x570.png\" alt=\"Emotet Malware Targets US Taxpayers with Fake W-9 Forms\u00a0\" class=\"wp-image-4662\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-1024x570.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-300x167.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-768x428.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-1536x855.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-370x206.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-270x150.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image-740x412.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/04\/image.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Emotet \u2014 which holds a spot in the top 5 of most <a href=\"https:\/\/any.run\/malware-trends\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=digest3&amp;utm_content=mtt\" target=\"_blank\" rel=\"noreferrer noopener\">popular malware families<\/a> (according to our monthly submissions data at the time of writing) \u2014 can evade discovery by waiting for user interaction to start executing. This tactic means that its detection in an automated sandbox is not guaranteed.&nbsp;<\/p>\n\n\n\n<p>We successfully activated the malware and gathered the following:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"> Indicators of Compromise (IOCs)<\/h4>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>SHA256&nbsp;<\/td><td>e173ecebfd5b01766dd8184250d5f2d442507b9b097e4ced319c246b78550d85&nbsp;<\/td><\/tr><tr><td>SHA1&nbsp;<\/td><td>dd6ba6ae1680e4245f5ecc22ee12a18b9e16db2d&nbsp;<\/td><\/tr><tr><td>MD5&nbsp;<\/td><td>b1a10568aa1e4a47ad2aa35788edc0af&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">Domains&nbsp;<\/h4>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>sipo.ru&nbsp;<\/td><\/tr><tr><td>sdspush.beget.tech&nbsp;<\/td><\/tr><tr><td>www.agropuno.gob.pe<\/td><\/tr><tr><td>www.gomespontes.com.br<\/td><\/tr><tr><td>meteo.camera<\/td><\/tr><tr><td>www.garrett.kz<\/td><\/tr><tr><td>penshorn.org<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">IP<\/h4>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>186.202.153.5&nbsp;<\/td><\/tr><tr><td>209.126.85.32&nbsp;<\/td><\/tr><tr><td>187.63.160.88&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Feel free to explore more DNS and HTTP requests and connections on the linked analysis page above. Alternatively, visit our <a href=\"https:\/\/app.any.run\/submissions\/#tag:emotet?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=digest3&amp;utm_content=publictasks\" target=\"_blank\" rel=\"noreferrer noopener\">public submissions<\/a> page for more Emotet analyses.&nbsp;<\/p>\n\n\n\n<p>In our <a href=\"https:\/\/app.any.run\/tasks\/057cd017-bc53-424a-a4d0-b9da58af590a\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=digest3&amp;utm_content=task\" target=\"_blank\" rel=\"noreferrer noopener\">recent analysis<\/a> in ANY.RUN, a <strong>researcher detonated the malware by interacting with a OneNote document<\/strong> and dismissing a few system warnings. So, no matter what system you use, ensure that it also allows for interactivity or employs alternative methods for detecting user-triggered malware.&nbsp;<\/p>\n\n\n\n<div style=\"height:37px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"alignwide has-text-align-center wp-block-heading\" id=\"schedule-a-visit\" style=\"font-size:30px;font-style:normal;font-weight:600;line-height:1.15;text-transform:uppercase\"><strong>Try ANY.RUN for Enterprises <\/strong><\/h3>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\" id=\"schedule-a-visit\" style=\"font-size:15px;line-height:1.15;text-transform:lowercase\">Combat new threats together  \u2013 ANALYZE MALWARE IN A TEAM<\/h2>\n\n\n\n<div class=\"wp-block-buttons alignwide has-custom-font-size has-normal-font-size is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50 has-custom-font-size is-style-fill has-normal-font-size\"><a class=\"wp-block-button__link has-text-color has-background wp-element-button\" href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=digest3&amp;utm_content=demo_button\" style=\"border-radius:45px;color:#ffffff;background-color:#00b0e8\" target=\"_blank\" rel=\"noreferrer noopener\">Get a free trial<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:37px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">6. New &#8216;HinataBot&#8217; Botnet Could Launch Massive 3.3 Tbps DDoS Attacks&nbsp;<\/h2>\n\n\n\n<p>A new botnet named HinataBot has been <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-hinatabot-botnet-could-launch-massive-33-tbps-ddos-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">discovered<\/a> targeting Realtek SDK, Huawei routers, and Hadoop YARN servers to recruit devices for massive DDoS (distributed denial of service) attacks.&nbsp;<\/p>\n\n\n\n<p>Researchers at Akamai discovered the botnet at the beginning of 2023 and believe it is based on Mirai, a notorious malware strain. HinataBot is under active development and has shown functional improvements and anti-analysis additions.&nbsp;<\/p>\n\n\n\n<p>The botnet can potentially perform powerful DDoS attacks using HTTP and UDP floods. With 10,000 nodes, the attack data volume could reach 3.3 Tbps for UDP floods and generate 20,400,000 requests per second for HTTP floods. As HinataBot&#8217;s development remains active, more potent versions may soon appear in the wild.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">7. CASPER Attack Steals Data Using Air-Gapped Computer&#8217;s Internal Speaker&nbsp;<\/h2>\n\n\n\n<p>CASPER is a new covert channel attack that can <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/casper-attack-steals-data-using-air-gapped-computers-internal-speaker\/\" target=\"_blank\" rel=\"noreferrer noopener\">steal<\/a> data from air-gapped computers using their internal speakers.&nbsp;&nbsp;<\/p>\n\n\n\n<p>It transmits high-frequency audio inaudible to humans, up to 1.5 meters away, to a nearby smartphone or laptop microphone. Malware must first be installed on the target, and the maximum reliable transmission bit rate is 20 bits\/s. To defend against CASPER, remove internal speakers from mission-critical computers or implement a high-pass filter to block ultrasound transmissions.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">8. Kimsuky Group Distributes Malware via Fake Profile Template on GitHub&nbsp;<\/h2>\n\n\n\n<p>A malicious Word file distributed by the Kimsuky Group, disguised as a profile template was <a href=\"https:\/\/malware.news\/t\/kimsuky-group-distributes-malware-disguised-as-profile-template-github\/68242\" target=\"_blank\" rel=\"noreferrer noopener\">found<\/a> in the wild.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The password-protected file, named &#8216;[Attachment] Profile Template.doc,&#8217; contains a malicious VBA macro. When activated, it connects to a C2 server via PowerShell, downloading and executing additional scripts.&nbsp;<\/p>\n\n\n\n<p>The malware collects information saved on browsers, similar to the one found in a previously discovered Malicious Word Document. However, unlike the previous version, which used FTP to leak user credentials, this altered script uses the GitHub API to transmit the information to a specific repository. The Red Eyes threat group (also known as APT37 or ScarCruft) has recently been found using GitHub as their malware distribution site as well.&nbsp;<\/p>\n\n\n\n<p>Users are advised to exercise caution as these scripts continue to evolve.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">ANY.RUN March news&nbsp;<\/h2>\n\n\n\n<p>March proved to be an eventful month for <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=digest3&amp;utm_content=landing\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>, and if you haven&#8217;t had a chance to catch up on our latest news, now is the perfect time before we jump headfirst into April!&nbsp;<\/p>\n\n\n\n<p>We shared a comprehensive analysis of LimeRat, explored the potential impact of AI on the development of super malware, and discussed how ANY.RUN assists large security teams in staying coordinated daily, and reported on our participation at GISEC 2022 in Dubai.&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n<ul class=\"wp-block-latest-posts__list is-grid columns-2 wp-block-latest-posts has-normal-font-size\"><li><div class=\"wp-block-latest-posts__featured-image\"><a href=\"https:\/\/any.run\/cybersecurity-blog\/german-industries-attack-cases\/\" aria-label=\"How\u00a0Phishing Is Targeting Germany\u2019s Economy:\u00a0Active Threats\u00a0from Finance to Manufacturing\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"146\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Phishing-Targeting-Germany-300x146.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Germany industry threats\" style=\"\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Phishing-Targeting-Germany-300x146.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Phishing-Targeting-Germany-1024x497.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Phishing-Targeting-Germany-768x373.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Phishing-Targeting-Germany-1536x746.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Phishing-Targeting-Germany-2048x995.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Phishing-Targeting-Germany-370x180.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Phishing-Targeting-Germany-270x131.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Phishing-Targeting-Germany-740x359.png 740w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/div><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/any.run\/cybersecurity-blog\/german-industries-attack-cases\/\">How\u00a0Phishing Is Targeting Germany\u2019s Economy:\u00a0Active Threats\u00a0from Finance to Manufacturing<\/a><\/li>\n<li><div class=\"wp-block-latest-posts__featured-image\"><a href=\"https:\/\/any.run\/cybersecurity-blog\/phishing-detection-steps-for-cisos\/\" aria-label=\"Building\u00a0Phishing\u00a0Detection That Works: 3\u00a0Steps for CISOs\u00a0\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"146\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Phishing-Detection-that-Works-300x146.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Phishing Detection that Works\" style=\"\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Phishing-Detection-that-Works-300x146.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Phishing-Detection-that-Works-1024x497.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Phishing-Detection-that-Works-768x373.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Phishing-Detection-that-Works-1536x746.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Phishing-Detection-that-Works-2048x995.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Phishing-Detection-that-Works-370x180.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Phishing-Detection-that-Works-270x131.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Phishing-Detection-that-Works-740x359.png 740w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/div><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/any.run\/cybersecurity-blog\/phishing-detection-steps-for-cisos\/\">Building\u00a0Phishing\u00a0Detection That Works: 3\u00a0Steps for CISOs\u00a0<\/a><\/li>\n<li><div class=\"wp-block-latest-posts__featured-image\"><a href=\"https:\/\/any.run\/cybersecurity-blog\/macos-clickfix-amos-attack\/\" aria-label=\"ClickFix\u00a0Meets AI: A Multi-Platform Attack Targeting macOS in the Wild\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"146\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/ClickFix-300x146.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"macOS threats\" style=\"\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/ClickFix-300x146.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/ClickFix-1024x497.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/ClickFix-768x373.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/ClickFix-1536x746.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/ClickFix-2048x995.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/ClickFix-370x180.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/ClickFix-270x131.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/ClickFix-740x359.png 740w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/div><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/any.run\/cybersecurity-blog\/macos-clickfix-amos-attack\/\">ClickFix\u00a0Meets AI: A Multi-Platform Attack Targeting macOS in the Wild<\/a><\/li>\n<li><div class=\"wp-block-latest-posts__featured-image\"><a href=\"https:\/\/any.run\/cybersecurity-blog\/soc-maturity-with-threat-intelligence\/\" aria-label=\"From Reactive to Proactive: 5 Steps to SOC Maturity with Threat Intelligence\u00a0\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"146\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/5-Practical-Steps-to-a-Mature-SOC-300x146.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"mature TI\" style=\"\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/5-Practical-Steps-to-a-Mature-SOC-300x146.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/5-Practical-Steps-to-a-Mature-SOC-1024x497.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/5-Practical-Steps-to-a-Mature-SOC-768x373.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/5-Practical-Steps-to-a-Mature-SOC-1536x746.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/5-Practical-Steps-to-a-Mature-SOC-2048x995.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/5-Practical-Steps-to-a-Mature-SOC-370x180.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/5-Practical-Steps-to-a-Mature-SOC-270x131.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/5-Practical-Steps-to-a-Mature-SOC-740x359.png 740w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/div><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/any.run\/cybersecurity-blog\/soc-maturity-with-threat-intelligence\/\">From Reactive to Proactive: 5 Steps to SOC Maturity with Threat Intelligence\u00a0<\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Welcome to the March 2023 edition of our monthly malware analysis news report. We&#8217;ve compiled some of the most significant security events and emerging threats that took place over the past month to keep you informed and help you stay one step ahead of cybercriminals.&nbsp; Let&#8217;s dive into some of the key highlights and developments [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4663,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[10,15,34],"class_list":["post-4661","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-cybersecurity","tag-malware","tag-malware-analysis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Malware Analysis Digest: March 2023\u00a0<\/title>\n<meta name=\"description\" content=\"We&#039;ve compiled some of the most significant security events and emerging threats over the past month in our malware analysis digest.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-digest-march-2023\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jack Zalesskiy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-digest-march-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-digest-march-2023\/\"},\"author\":{\"name\":\"Jack Zalesskiy\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Malware Analysis Digest: March 2023\u00a0\",\"datePublished\":\"2023-04-06T07:30:11+00:00\",\"dateModified\":\"2023-04-07T05:29:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-digest-march-2023\/\"},\"wordCount\":1296,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"cybersecurity\",\"malware\",\"malware analysis\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-digest-march-2023\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-digest-march-2023\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-digest-march-2023\/\",\"name\":\"Malware Analysis Digest: March 2023\u00a0\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2023-04-06T07:30:11+00:00\",\"dateModified\":\"2023-04-07T05:29:44+00:00\",\"description\":\"We've compiled some of the most significant security events and emerging threats over the past month in our malware analysis digest.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-digest-march-2023\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-digest-march-2023\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-digest-march-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Malware Analysis Digest: March 2023\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"Jack Zalesskiy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image1-min-1-1-1-1.webp\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image1-min-1-1-1-1.webp\",\"caption\":\"Jack Zalesskiy\"},\"description\":\"Jack Zalesskiy is a technology writer with five years of experience under his belt. He closely follows malware incidents, data breaches, and the way in which cyber threats manifest in our day-to-day lives.\",\"url\":\"#molongui-disabled-link\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malware Analysis Digest: March 2023\u00a0","description":"We've compiled some of the most significant security events and emerging threats over the past month in our malware analysis digest.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-digest-march-2023\/","twitter_misc":{"Written by":"Jack Zalesskiy","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-digest-march-2023\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-digest-march-2023\/"},"author":{"name":"Jack Zalesskiy","@id":"https:\/\/any.run\/"},"headline":"Malware Analysis Digest: March 2023\u00a0","datePublished":"2023-04-06T07:30:11+00:00","dateModified":"2023-04-07T05:29:44+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-digest-march-2023\/"},"wordCount":1296,"commentCount":1,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["cybersecurity","malware","malware analysis"],"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/malware-analysis-digest-march-2023\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-digest-march-2023\/","url":"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-digest-march-2023\/","name":"Malware Analysis Digest: March 2023\u00a0","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2023-04-06T07:30:11+00:00","dateModified":"2023-04-07T05:29:44+00:00","description":"We've compiled some of the most significant security events and emerging threats over the past month in our malware analysis digest.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-digest-march-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/malware-analysis-digest-march-2023\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-digest-march-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/any.run\/cybersecurity-blog\/category\/news\/"},{"@type":"ListItem","position":3,"name":"Malware Analysis Digest: March 2023\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"Jack Zalesskiy","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image1-min-1-1-1-1.webp","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/image1-min-1-1-1-1.webp","caption":"Jack Zalesskiy"},"description":"Jack Zalesskiy is a technology writer with five years of experience under his belt. He closely follows malware incidents, data breaches, and the way in which cyber threats manifest in our day-to-day lives.","url":"#molongui-disabled-link"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4661"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=4661"}],"version-history":[{"count":5,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4661\/revisions"}],"predecessor-version":[{"id":4676,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4661\/revisions\/4676"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/4663"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=4661"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=4661"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=4661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}