{"id":5282,"date":"2023-06-30T07:34:47","date_gmt":"2023-06-30T07:34:47","guid":{"rendered":"\/cybersecurity-blog\/?p=5282"},"modified":"2025-03-11T12:19:19","modified_gmt":"2025-03-11T12:19:19","slug":"monthly-updates-june","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/monthly-updates-june\/","title":{"rendered":"Monthly Updates: New Detection Rules, Increased Threat Coverage, and More\u00a0"},"content":{"rendered":"\n<p>We&#8217;re excited to launch a new monthly update format that gives you a closer look into the work we&#8217;ve done in the last 30 days. &nbsp;<\/p>\n\n\n\n<p>In addition to releasing several new features, this past month, here at <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=updates0623&amp;utm_content=landing\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>, we focused on improving threat detection, adding new rules and contributing to the ET Labs community.&nbsp;<\/p>\n\n\n\n<p>Let\u2019s jump right in \u2014 there\u2019s a lot of ground to cover. &nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Product updates&nbsp;<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"843\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-36-1024x843.png\" alt=\"\" class=\"wp-image-5283\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-36-1024x843.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-36-300x247.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-36-768x633.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-36-370x305.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-36-270x222.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-36-740x609.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/image-36.png 1440w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>Residential Proxy <\/strong>You can now <a href=\"https:\/\/any.run\/cybersecurity-blog\/residential-proxy-for-your-traffic\/\" target=\"_blank\" rel=\"noreferrer noopener\">assign a home user\u2019s IP to virtual machines<\/a> and change the location, making it easier to work with geo-targeted samples and evade detection.&nbsp;&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><strong>Updated default browsers.<\/strong> On Windows 10 and 11 machines, we\u2019ve changed the default web browser to Edge, instead of the previously used Internet Explorer.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li><strong>Downloadable memory dumps. <\/strong>You can now download memory dumps and analyze them locally. This option is available under the &#8220;Advanced details&#8221; section of the process window.&nbsp;<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"641\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-54-1-1024x641.png\" alt=\"\" class=\"wp-image-5318\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-54-1-1024x641.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-54-1-300x188.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-54-1-768x481.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-54-1-370x232.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-54-1-270x169.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-54-1-740x463.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-54-1.png 1091w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"420\" height=\"163\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-55-1.png\" alt=\"\" class=\"wp-image-5321\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-55-1.png 420w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-55-1-300x116.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-55-1-370x144.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-55-1-270x105.png 270w\" sizes=\"(max-width: 420px) 100vw, 420px\" \/><figcaption class=\"wp-element-caption\"><strong><strong>Downloadable<\/strong><\/strong> <strong>memory dumps<\/strong><\/figcaption><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Malware config extractors&nbsp;&nbsp;<\/h2>\n\n\n\n<p>We\u2019ve added <strong>4 new extractors<\/strong> to the sandbox:&nbsp;<br>&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>PrivateLoader<\/strong>&nbsp;<\/h3>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/3c798f93-a2bd-4c3e-a9e8-30ad156cb04f\" target=\"_blank\" rel=\"noreferrer noopener\">Privateloader<\/a>&nbsp;is a loader that distributes a wide variety of malware types. Some samples are covered by VMprotect. All of PrivateLoader\u2019s important strings are encrypted with an XOR key. We\u2019ve implemented a fix which now allows you to extract C2 and payload.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Typhon<\/strong>&nbsp;<\/h3>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/83723bd2-8b9e-4190-ba91-6c3ab28be5e2\" target=\"_blank\" rel=\"noreferrer noopener\">Typhon<\/a> is an info stealer. A year ago, the revamped second version of V2 Reborn was launched. This iteration involved a complete overhaul of the code, and now it boasts an expanded set of anti-analysis features such as process detection, emulation, and virtual machine capabilities, among others. Moreover, it presents a broad array of methods for data theft.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"965\" height=\"646\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-52.png\" alt=\"Typhon malware config extractor\" class=\"wp-image-5287\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-52.png 965w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-52-300x201.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-52-768x514.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-52-370x248.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-52-270x181.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-52-740x495.png 740w\" sizes=\"(max-width: 965px) 100vw, 965px\" \/><figcaption class=\"wp-element-caption\">Typhon malware configs<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>LaplasClipper<\/strong>&nbsp;<\/h3>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/364c1482-cbf9-44cb-838f-0d3f240e96ee\" target=\"_blank\" rel=\"noreferrer noopener\">LaplasClipper<\/a> is designed to monitor cryptocurrency wallet addresses on a victim&#8217;s clipboard. When it identifies an address, it communicates this information to the C2. The server then generates a similar wallet address and replaces the original one on the victim&#8217;s clipboard.&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"739\" height=\"627\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-53.png\" alt=\"LaplasClipper\u2019s network traffic \" class=\"wp-image-5288\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-53.png 739w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-53-300x255.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-53-370x314.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-53-270x229.png 270w\" sizes=\"(max-width: 739px) 100vw, 739px\" \/><figcaption class=\"wp-element-caption\">LaplasClipper\u2019s network traffic&nbsp;<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>LummaStealer<\/strong>&nbsp;<\/h3>\n\n\n\n<p>We&#8217;ve introduced the capability to detect and extract configurations of <a href=\"https:\/\/app.any.run\/tasks\/feb80c8d-86d5-4e52-8497-2c513e9f9a4d\" target=\"_blank\" rel=\"noreferrer noopener\">LummaStealer<\/a>, an information-stealing malware that targets data from browsers, wallets, and more.&nbsp;<\/p>\n\n\n\n<p>It communicates with its command and control (C2) server via a POST request along the \/c2sock route, carrying data in multipart\/form-data format, and sends information such as HWID, LummaID, PKZIP with stolen data, and an obscure PID.&nbsp;<\/p>\n\n\n\n<p>In recent times, we&#8217;ve come across variants of <a href=\"https:\/\/any.run\/malware-trends\/lumma\">Lumma Stealer<\/a> written in C++, likely wrapped with Pascal\/Delphi in a manner similar to Inno Setup. We&#8217;ve noticed a surge in the number of samples in .pif format. Inside the original .exe file (which is sometimes Inno Setup), there lies an encrypted and obfuscated script (akin to AutoIt) that is extracted to the %temp% directory. This script then produces a .pif file (which is in actuality a PE file), which subsequently executes.\u00a0<\/p>\n\n\n\n<p>A new variant has emerged as well. In the past, the configuration was stored internally within the malware. However, it is now delivered from the C2 server. The malware accesses its C2 server via the \/c2conf route and receives a base64 response, which contains a 32-byte XOR key and an encrypted JSON.&nbsp;<\/p>\n\n\n\n<p>Here are some useful links if you want to dive deeper into this malware:&nbsp;<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/0291aaa1-530d-43fa-84c3-373829df3a17\/\">\u0421heck the example of the new sample&nbsp;<\/a><\/li>\n<\/ol>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/content.any.run\/tasks\/0291aaa1-530d-43fa-84c3-373829df3a17\/download\/files\/a49ea61b-89f2-46eb-a442-1b34dcd340ce\/649d23e590b8865d4436c350\">Download script&nbsp;<\/a><\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>AgentTesla<\/strong>&#8216;s updates<\/h3>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/affce652-afef-4d06-9813-ab4dfe2785b0\" target=\"_blank\" rel=\"noreferrer noopener\">AgentTesla<\/a> is a prominent spyware strain that has been making rounds in the cyber threat landscape for several years. It is essentially a keylogger and information stealer, often used by cybercriminals to extract sensitive data, such as login credentials, system information, and credit card details.&nbsp;We completely updated the malware&#8217;s config extractor.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">YARA rules&nbsp;<\/h2>\n\n\n\n<p>We released YARA rules that detect <a href=\"https:\/\/app.any.run\/tasks\/54ccc036-c98a-4ba0-b78e-982755c39b2c\" target=\"_blank\" rel=\"noreferrer noopener\">gh0stbins<\/a> and <a href=\"https:\/\/app.any.run\/tasks\/6282ecd6-2dfb-4513-ab57-7b2932d42211\" target=\"_blank\" rel=\"noreferrer noopener\">zgrat<\/a>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">New Malware and Threat Detection Rules&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>367 new detection rules added<\/strong>. We&#8217;ve significantly increased threat coverage of our sandbox.&nbsp;<\/li>\n\n\n\n<li><strong>QuasarRAT connection detection.<\/strong> We now detect QuasarRAT connections in GCM_SHA384, CBC_SHA384, and RAW TCP encryption modes.&nbsp;<\/li>\n\n\n\n<li><strong>Added 9 rules to detect suspicious PowerShell scripts<\/strong>. We&#8217;ve created 9 new rules to help identify potentially malicious PowerShell scripts.&nbsp;<\/li>\n\n\n\n<li><strong>Gh0stCringe tool detection<\/strong>. We\u2019ve written 9 rules to detect this tool, including a content-agnostic universal rule.&nbsp;<\/li>\n\n\n\n<li><strong>Exfiltration to Discord and Telegram<\/strong>. Detection of data exfiltration attempts into these platforms is now available across all pricing plans without decrypting the traffic.&nbsp;<\/li>\n<\/ul>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nTry ANY.RUN <span class=\"highlight\">free<\/span> for 14 days&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article_ctabanner&amp;utm_campaign=updates0623&amp;utm_content=trial\" rel=\"noopener\" target=\"_blank\">\nRequest free trial \n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Increased threat coverage&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Bibleoteka backdoor discovery<\/strong>. We uncovered a new Bibleoteka backdoor while investigating zgRat activity and improved our threat coverage.&nbsp;<\/li>\n\n\n\n<li><strong>PseudoManuscrypt access<\/strong>. We introduced a rule to detect attempts to access PseudoManuscrypt&#8217;s C2 server.&nbsp;<\/li>\n\n\n\n<li><strong>Malware on file-sharing services<\/strong>. You can now detect <a href=\"https:\/\/app.any.run\/tasks\/acce88f0-c3bf-4dd9-a841-6eccbbb1d296\/\" target=\"_blank\" rel=\"noreferrer noopener\">malicious content stored on file-sharing services<\/a> like OneDrive.&nbsp;<\/li>\n\n\n\n<li><strong>Faster Xworm detection<\/strong>. You can now identify Xworm in the first client packet.&nbsp;<\/li>\n\n\n\n<li><strong>Response to Medusa Stealer<\/strong>. To tackle this emerging threat, we&#8217;ve established comprehensive coverage.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Detecting even more threats&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>GoGateway identification<\/strong>. Added the ability to detect GoGateway, a rare, previously untagged gateway written in Go.&nbsp;<\/li>\n\n\n\n<li><strong>PE EXE files detection<\/strong>. We created a large pull of 255 rules, all generalized into one under the 8000467 number. They will help you to detect encrypted executable files of this format.&nbsp;<\/li>\n\n\n\n<li><strong>SilverFox Group\u2019s tool detected<\/strong>. Thanks to our community for their help <a href=\"https:\/\/twitter.com\/Jane_0sint\/status\/1672239409226211331?s=20\" target=\"_blank\" rel=\"noreferrer noopener\">detecting this tool<\/a>.&nbsp;<\/li>\n\n\n\n<li><strong>Better phishing HTML page detection<\/strong>. We enhanced our ability to detect phishing attempts from HTML pages containing stolen user credentials.&nbsp;<\/li>\n\n\n\n<li>We&#8217;ve introduced a new signature to detect <a href=\"https:\/\/app.any.run\/tasks\/8a0c019d-702c-4627-81d3-23d577a8e63c\" target=\"_blank\" rel=\"noreferrer noopener\">UxCryptor<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Sharing Threat Intelligence with the Community&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>LummaStealer detection rule shared<\/strong>. We shared the rule that detects LummaStealer\u2019s C2 server configuration request with the ET Labs community.&nbsp;<\/li>\n\n\n\n<li><strong>New Phonk signature<\/strong>. We wrote a signature for Phonk a trojan frequently submitted to ANY.RUN.&nbsp;<\/li>\n\n\n\n<li><strong>Graphican backdoor investigation<\/strong>. We probed into the <a href=\"https:\/\/app.any.run\/tasks\/917e3067-b3a0-4e5e-81b4-c3141df64463\" target=\"_blank\" rel=\"noreferrer noopener\">Graphican backdoor<\/a>, an evolution of the old Ketrican malware, now using Microsoft Graph API and OneDrive.&nbsp;<\/li>\n\n\n\n<li><strong>Unauthenticated connection rules<\/strong>. We expanded our detection capabilities with rules for unauthenticated SOCKS5 and VNC connections.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>We\u2019ve also shared rules that detect the following threats with ET Labs:&nbsp;<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/community.emergingthreats.net\/t\/observerstealer\/624\/6\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">ObserverStealer<\/a>&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/community.emergingthreats.net\/t\/medusa-stealer\/672\/3\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Medusa Stealer<\/a>&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/community.emergingthreats.net\/t\/risepro-tcp-v-0-1\/647\/3\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">RisePro TCP v.0.1<\/a>&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"4\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/community.emergingthreats.net\/t\/lumma-stealer-configuration\/685\/3\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Lumma Stealer Configuration<\/a>&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"5\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/community.emergingthreats.net\/t\/statusrecorder\/699\/2\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">StatusRecorder<\/a>&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"6\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/community.emergingthreats.net\/t\/dynamicrat\/634\/3\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">DynamicRAT<\/a>&nbsp;<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Software Threat Identification&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Threat detected in TektonIT\u2019s RMS program<\/strong>.&nbsp;Threats embedded in legal software are highly dangerous. In this case, adversaries seem to have <a href=\"https:\/\/app.any.run\/tasks\/fd3e62c7-b149-4eb7-89ea-7ab4e322b717\/\" target=\"_blank\" rel=\"noreferrer noopener\">exploited an encrypted Microsoft Cabinet<\/a> to store malicious libraries. The new rule classifies under the <em>STEALER <\/em>category and is an extension of the existing <em>ETPRO MALWARE Win32\/RA-based.NLR Exfil<\/em> rule.&nbsp;<\/li>\n\n\n\n<li><strong>StatusRecorder stealer discovery<\/strong>. We found this previously unrecognized stealer, wrote a detection rule and <a href=\"https:\/\/twitter.com\/Jane_0sint\/status\/1673058053636202497?s=20\" target=\"_blank\" rel=\"noreferrer noopener\">shared it with the ET Labs community<\/a>.&nbsp;<\/li>\n\n\n\n<li><strong>BitRAT TLS traffic activity detection<\/strong>. We&#8217;ve improved detection of BitRAT TLS traffic and created associated rules.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-medium\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"293\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-56-300x293.png\" alt=\"\" class=\"wp-image-5302\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-56-300x293.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-56-1024x1000.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-56-768x750.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-56-370x361.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-56-270x264.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-56-740x722.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/MicrosoftTeams-image-56.png 1180w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><figcaption class=\"wp-element-caption\"><a href=\"https:\/\/twitter.com\/anyrun_app\/status\/1674317841078550529\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN post on Twitter<\/a><\/figcaption><\/figure><\/div>\n\n\n<p>Our team works hard to keep up with emerging threats, ensuring that ANY.RUN detection remains industry leading. This happens largely behind the scenes, and we haven\u2019t written about it a lot. Did you find this sneak peek useful? Let us know in the comments below. We\u2019ll keep regular updates coming.&nbsp;<\/p>\n\n\n\n<p>To try these new rules in action in ANY.RUN. <a href=\"https:\/\/any.run\/demo\/\" target=\"_blank\" rel=\"noreferrer noopener\">Request your 14 days free trial \u2192<\/a>&nbsp;<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We&#8217;re excited to launch a new monthly update format that gives you a closer look into the work we&#8217;ve done in the last 30 days. &nbsp; In addition to releasing several new features, this past month, here at ANY.RUN, we focused on improving threat detection, adding new rules and contributing to the ET Labs community.&nbsp; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4099,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[57,10,54,34,55],"class_list":["post-5282","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-anyrun","tag-cybersecurity","tag-features","tag-malware-analysis","tag-release"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Monthly Updates New Detection Rules, Increased Threat Coverage<\/title>\n<meta name=\"description\" content=\"ANY.RUN monthly updates - we&#039;ve launched Residential proxy, added 367 new detection rules, continued collaborating with ET labs,etc.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/monthly-updates-june\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"y.shvetsov\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/monthly-updates-june\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/monthly-updates-june\/\"},\"author\":{\"name\":\"y.shvetsov\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Monthly Updates: New Detection Rules, Increased Threat Coverage, and More\u00a0\",\"datePublished\":\"2023-06-30T07:34:47+00:00\",\"dateModified\":\"2025-03-11T12:19:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/monthly-updates-june\/\"},\"wordCount\":1238,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"features\",\"malware analysis\",\"release\"],\"articleSection\":[\"Service Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/monthly-updates-june\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/monthly-updates-june\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/monthly-updates-june\/\",\"name\":\"Monthly Updates New Detection Rules, Increased Threat Coverage\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2023-06-30T07:34:47+00:00\",\"dateModified\":\"2025-03-11T12:19:19+00:00\",\"description\":\"ANY.RUN monthly updates - we've launched Residential proxy, added 367 new detection rules, continued collaborating with ET labs,etc.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/monthly-updates-june\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/monthly-updates-june\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/monthly-updates-june\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service Updates\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Monthly Updates: New Detection Rules, Increased Threat Coverage, and More\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"y.shvetsov\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d0d0a5df59078efed19ba1b45c4fb721?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d0d0a5df59078efed19ba1b45c4fb721?s=96&d=mm&r=g\",\"caption\":\"y.shvetsov\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/y-shvetsov\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Monthly Updates New Detection Rules, Increased Threat Coverage","description":"ANY.RUN monthly updates - we've launched Residential proxy, added 367 new detection rules, continued collaborating with ET labs,etc.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/monthly-updates-june\/","twitter_misc":{"Written by":"y.shvetsov","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/monthly-updates-june\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/monthly-updates-june\/"},"author":{"name":"y.shvetsov","@id":"https:\/\/any.run\/"},"headline":"Monthly Updates: New Detection Rules, Increased Threat Coverage, and More\u00a0","datePublished":"2023-06-30T07:34:47+00:00","dateModified":"2025-03-11T12:19:19+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/monthly-updates-june\/"},"wordCount":1238,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","features","malware analysis","release"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/monthly-updates-june\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/monthly-updates-june\/","url":"https:\/\/any.run\/cybersecurity-blog\/monthly-updates-june\/","name":"Monthly Updates New Detection Rules, Increased Threat Coverage","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2023-06-30T07:34:47+00:00","dateModified":"2025-03-11T12:19:19+00:00","description":"ANY.RUN monthly updates - we've launched Residential proxy, added 367 new detection rules, continued collaborating with ET labs,etc.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/monthly-updates-june\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/monthly-updates-june\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/monthly-updates-june\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Service Updates","item":"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/"},{"@type":"ListItem","position":3,"name":"Monthly Updates: New Detection Rules, Increased Threat Coverage, and More\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"y.shvetsov","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/d0d0a5df59078efed19ba1b45c4fb721?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d0d0a5df59078efed19ba1b45c4fb721?s=96&d=mm&r=g","caption":"y.shvetsov"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/y-shvetsov\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/5282"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=5282"}],"version-history":[{"count":26,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/5282\/revisions"}],"predecessor-version":[{"id":12060,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/5282\/revisions\/12060"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/4099"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=5282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=5282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=5282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}