{"id":5148,"date":"2023-06-15T09:28:54","date_gmt":"2023-06-15T09:28:54","guid":{"rendered":"\/cybersecurity-blog\/?p=5148"},"modified":"2023-06-15T09:47:08","modified_gmt":"2023-06-15T09:47:08","slug":"help-us-find-new-malware","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/help-us-find-new-malware\/","title":{"rendered":"Help Us Find New Malware by Submitting Threats and Samples\u00a0"},"content":{"rendered":"\n<p>At ANY.RUN, our analysts work constantly to identify new threats and create detection rules. But with over 6000 new malware <a href=\"https:\/\/eftsure.com\/statistics\/malware-statistics\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">released<\/a> every month, it is a battle we can only win together. Thankfully, our <strong>community members often spot new samples and send them to us for further analysis. <\/strong>And<strong> <\/strong>you can help too!\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Want to help us make ANY.RUN detection better?&nbsp;<\/h2>\n\n\n\n<p>Think you have found a new malware sample or version?&nbsp;If yes, we&#8217;d be really thankful if you could <strong>send us that suspicious file, or link <\/strong>as well as any notes you believe are important.&nbsp;<\/p>\n\n\n\n<p>To make this easy, we&#8217;ve set up a new email address for you to send those samples: <\/p>\n\n\n\n<figure class=\"wp-block-pullquote has-normal-font-size\" style=\"border-radius:0px;border-top-color:#00b0e8;border-right-color:var(--wp--preset--color--gridlove-bg);border-bottom-color:#00b0e8;border-left-color:var(--wp--preset--color--gridlove-bg);font-style:normal;font-weight:600\"><blockquote><p><strong>SEND US NEW SAMPLES<\/strong><br><br> <a href=\"mailto:newvirus@any.run\" target=\"_blank\" rel=\"noreferrer noopener\">newvirus@any.run<\/a><strong>\u00a0<\/strong><\/p><\/blockquote><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Your Submissions Help Make a Difference&nbsp;<\/h2>\n\n\n\n<p>Take a recent incident where a <strong>user shared an <\/strong><a href=\"https:\/\/app.any.run\/tasks\/0c3f4041-e083-4671-8e2d-8146e72ecbf3\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=newvirus&amp;utm_content=task\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>interesting sample<\/strong><\/a><strong> with us<\/strong>.&nbsp;<\/p>\n\n\n\n<p>This turned out to be a stealer \u2014 it gathered system information, browser history, and captured screenshots. All the harvested data was then sent back to its Command and Control (C2) server.&nbsp;<\/p>\n\n\n\n<p>We decided to analyze the sample and quickly <strong>identified it as Blackguard<\/strong>. Interestingly, it self-declared its name and version in the Information.txt file, which also held various details about the compromised system.&nbsp;<\/p>\n\n\n\n<p>Based on this insight, <strong>we developed new YARA rules <\/strong>to identify the Blackguard family in future analyses. We also <strong>created a malware config extractor<\/strong>.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"689\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-2-1024x689.png\" alt=\"\" class=\"wp-image-5151\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-2-1024x689.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-2-300x202.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-2-768x516.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-2-1536x1033.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-2-370x249.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-2-270x182.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-2-740x498.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-2.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>This means that even if Blackguard doesn&#8217;t fully execute in upcoming tasks \u2014 for instance, if its C2 is down during the analysis \u2014 <a href=\"http:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=newvirus&amp;utm_content=landing\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>ANY.RUN<\/strong><\/a> <strong>users<\/strong> <strong>will always have comprehensive details about this family<\/strong>. The config data will reveal key facts, such as the C2&#8217;s IP address, and specify which directories the malware targets for information theft.&nbsp;<\/p>\n\n\n\n<p><strong>Thank you for your help. Every little bit counts in the fight against cybercrime!<\/strong>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At ANY.RUN, our analysts work constantly to identify new threats and create detection rules. But with over 6000 new malware released every month, it is a battle we can only win together. Thankfully, our community members often spot new samples and send them to us for further analysis. And you can help too!\u00a0 Want to [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":5149,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[34],"class_list":["post-5148","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-malware-analysis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Help Us Find New Malware by Submitting Threats and Samples\u00a0<\/title>\n<meta name=\"description\" content=\"If you find new malware, send it at newvirus@any.run. Help us improve ANY.RUN detection by submitting threats and samples.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/help-us-find-new-malware\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/help-us-find-new-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/help-us-find-new-malware\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Help Us Find New Malware by Submitting Threats and Samples\u00a0\",\"datePublished\":\"2023-06-15T09:28:54+00:00\",\"dateModified\":\"2023-06-15T09:47:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/help-us-find-new-malware\/\"},\"wordCount\":322,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"malware analysis\"],\"articleSection\":[\"Service Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/help-us-find-new-malware\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/help-us-find-new-malware\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/help-us-find-new-malware\/\",\"name\":\"Help Us Find New Malware by Submitting Threats and Samples\u00a0\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2023-06-15T09:28:54+00:00\",\"dateModified\":\"2023-06-15T09:47:08+00:00\",\"description\":\"If you find new malware, send it at newvirus@any.run. Help us improve ANY.RUN detection by submitting threats and samples.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/help-us-find-new-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/help-us-find-new-malware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/help-us-find-new-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service Updates\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Help Us Find New Malware by Submitting Threats and Samples\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Help Us Find New Malware by Submitting Threats and Samples\u00a0","description":"If you find new malware, send it at newvirus@any.run. Help us improve ANY.RUN detection by submitting threats and samples.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/help-us-find-new-malware\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/help-us-find-new-malware\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/help-us-find-new-malware\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Help Us Find New Malware by Submitting Threats and Samples\u00a0","datePublished":"2023-06-15T09:28:54+00:00","dateModified":"2023-06-15T09:47:08+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/help-us-find-new-malware\/"},"wordCount":322,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["malware analysis"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/help-us-find-new-malware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/help-us-find-new-malware\/","url":"https:\/\/any.run\/cybersecurity-blog\/help-us-find-new-malware\/","name":"Help Us Find New Malware by Submitting Threats and Samples\u00a0","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2023-06-15T09:28:54+00:00","dateModified":"2023-06-15T09:47:08+00:00","description":"If you find new malware, send it at newvirus@any.run. Help us improve ANY.RUN detection by submitting threats and samples.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/help-us-find-new-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/help-us-find-new-malware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/help-us-find-new-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Service Updates","item":"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/"},{"@type":"ListItem","position":3,"name":"Help Us Find New Malware by Submitting Threats and Samples\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/5148"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=5148"}],"version-history":[{"count":7,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/5148\/revisions"}],"predecessor-version":[{"id":5169,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/5148\/revisions\/5169"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/5149"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=5148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=5148"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=5148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}