{"id":5359,"date":"2023-07-05T07:36:23","date_gmt":"2023-07-05T07:36:23","guid":{"rendered":"\/cybersecurity-blog\/?p=5359"},"modified":"2023-07-05T08:10:34","modified_gmt":"2023-07-05T08:10:34","slug":"malware-analysis-news-june-2023","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-news-june-2023\/","title":{"rendered":"Malware Analysis News: June 2023\u00a0"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p>This is the June 2023 edition of <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;amp%3Butm_medium=article&amp;amp%3Butm_campaign=junedigest2023&amp;amp%3Butm_content=landing\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN\u2019s<\/a> monthly malware analysis report, where we share key cybersecurity incidents from the last 30 days.&nbsp;<\/p>\n\n\n\n<p>In June, cybercriminals use fake OnlyFans content to deploy DcRAT. The RecordBreaker malware spreads disguised as a .NET installer. North Korea&#8217;s APT37 group launches &#8220;FadeStealer&#8221;&nbsp;for cyber espionage. Crysis threat actors use Remote Desktop Protocol to deploy Venus ransomware, and more.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1. Fake OnlyFans Content Used to Deploy DcRAT Malware&nbsp;<\/h2>\n\n\n\n<p>A new malware campaign <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-use-fake-onlyfans-pics-to-drop-info-stealing-malware\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">exploits<\/a> the popularity of the content subscription service, OnlyFans, by using phony content and adult lures to install a remote access trojan (RAT) named <a href=\"https:\/\/app.any.run\/tasks\/ca1cea88-77fe-45b4-8427-6aaf4d80aecf?utm_source=anyrunblog&amp;amp%3Butm_medium=article&amp;amp%3Butm_campaign=junedigest2023&amp;amp%3Butm_content=task1\" target=\"_blank\" rel=\"noreferrer noopener\">DcRAT<\/a>.&nbsp;&nbsp;<\/p>\n\n\n\n<p>This RAT gives threat actors the ability to steal data and credentials or distribute ransomware on infected devices. The cybercriminals trick victims into executing a VBScript loader contained in a ZIP file, misleading them to believe they are accessing premium OnlyFans collections.&nbsp;<\/p>\n\n\n\n<p>The infection chain for this campaign remains uncertain, but potential sources could include malicious forum posts, instant messages, malvertising, or Black SEO sites. The VBScript loader used is a minimally modified and obfuscated version of a script seen in a previous 2021 campaign. Upon launch, the loader verifies the OS architecture, extracts an embedded DLL file, and registers the DLL, gaining access to DynamicWrapperX \u2014 a tool for calling functions from Windows API or other DLL files.&nbsp;<\/p>\n\n\n\n<p>Finally, the payload &#8220;BinaryData&#8221; is loaded into memory and injected into the &#8220;RegAsm.exe&#8221; process, a legitimate part of the .NET Framework less likely to be flagged by AV tools. This injected payload, DcRAT, is a modified version of AsyncRAT and has capabilities including keylogging, webcam monitoring, file manipulation, and remote access. Notably, it also has a ransomware plugin that targets all non-system files and appends the &#8220;.DcRat&#8221; filename extension to encrypted files.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"554\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-1024x554.png\" alt=\"Analyze DcRAT in ANY.RUN\" class=\"wp-image-5361\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-1024x554.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-300x162.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-768x416.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-1536x831.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-370x200.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-270x146.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-740x401.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">DcRAT&#8217;s IOCs<\/figcaption><\/figure>\n\n\n\n<p>You can <a href=\"https:\/\/app.any.run\/tasks\/ca1cea88-77fe-45b4-8427-6aaf4d80aecf?utm_source=anyrunblog&amp;amp%3Butm_medium=article&amp;amp%3Butm_campaign=junedigest2023&amp;amp%3Butm_content=task1\/\" target=\"_blank\" rel=\"noreferrer noopener\">analyze DcRAT in ANY.RUN<\/a> and easily collect IOCs from this malware.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">2. RecordBreaker Infostealer Disguised as Legitimate Software&nbsp;<\/h2>\n\n\n\n<p>Innovative evasion techniques are <a href=\"https:\/\/malware.news\/t\/recordbreaker-infostealer-disguised-as-a-net-installer\/70609\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">being used<\/a> by a new variant of the RecordBreaker (Raccoon Stealer V2) malware, which is now being disguised as a .NET installer. The malware employs a dual approach where, if executed in a virtual environment, it downloads a legitimate .NET update installer, deceiving sandbox-type analysis environments into classifying the file as benign.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nCollect the latest <span class=\"highlight\">Raccoon IOCs<\/span> in ANY.RUN&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/malware-trends\/raccoon\" rel=\"noopener\" target=\"_blank\">\nTrack Raccoon\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p><\/p>\n\n\n\n<p>However, in a typical user environment, a delayed execution command is triggered which downloads and executes an encrypted malware file from the C2 server. Once activated, RecordBreaker proceeds to steal sensitive user information and send it back to the server. Experts warn users to exercise caution when downloading files from unknown sources and to avoid using illegal tools like cracks or keygens.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"554\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-1024x554.png\" alt=\"Collect the latest Raccoon IOCs in ANY.RUN\u00a0\" class=\"wp-image-5360\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-1024x554.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-300x162.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-768x416.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-1536x831.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-370x200.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-270x146.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-740x401.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Raccoon\u2019s IOCs<\/figcaption><\/figure>\n\n\n\n<p>If you want to learn more about Raccoon\u2019s execution process, you can <a href=\"https:\/\/app.any.run\/tasks\/798c07e3-61bc-4971-8c9b-da6a2eb27ac7?utm_source=anyrunblog&amp;amp%3Butm_medium=article&amp;amp%3Butm_campaign=junedigest2023&amp;amp%3Butm_content=task2\" target=\"_blank\" rel=\"noreferrer noopener\">analyze it in ANY.RUN<\/a>. View registry events, network activity, and extract a memory dump.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3. APT37 Group Deploys New FadeStealer Malware for Cyber Espionage&nbsp;<\/h2>\n\n\n\n<p>The North Korean hacking group APT37, also known as StarCruft, Reaper, or RedEyes, has <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/apt37-hackers-deploy-new-fadestealer-eavesdropping-malware\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">begun<\/a> utilizing a new &#8220;FadeStealer&#8221; malware, equipped with wiretapping features.&nbsp;<\/p>\n\n\n\n<p>This malware allows the threat actors to steal sensitive data and record audio from victims&#8217; microphones. In the past, the group targeted North Korean defectors, educational institutions, and EU-based organizations, deploying custom malware like &#8220;Dolphin&#8221; and &#8220;M2RAT&#8221; to extract information from Windows devices and linked mobile phones.&nbsp;<\/p>\n\n\n\n<p>FadeStealer is typically delivered through phishing emails containing password-protected Word documents and a &#8220;password.chm&#8221; Windows CHM file. Upon opening the CHM file, a remote PowerShell script is downloaded and executed, establishing a backdoor that communicates with the attackers&#8217; command and control servers. The malware &#8220;AblyGo backdoor&#8221; is also used in later stages of the attack for privilege escalation, data theft, and further malware delivery.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">4. Crysis Threat Actor Deploys Venus Ransomware Via Remote Desktop Protocol (RDP)&nbsp;<\/h2>\n\n\n\n<p>AhnLab Security Emergency Response Center (ASEC) has <a href=\"https:\/\/malware.news\/t\/crysis-threat-actor-installing-venus-ransomware-through-rdp\/71016\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">detected<\/a> that the threat actor behind Crysis ransomware is now deploying Venus ransomware via the Remote Desktop Protocol (RDP).&nbsp;&nbsp;<\/p>\n\n\n\n<p>Both Crysis and Venus are significant types of ransomware known for targeting externally accessible remote desktop services. The actual logs from AhnLab Smart Defense (ASD) also demonstrate attacks being initiated through RDP, with additional tools such as Port Scanner and Mimikatz installed if the infected systems belong to a company&#8217;s internal network.&nbsp;<\/p>\n\n\n\n<p>The threat actor utilizes RDP as an attack vector, scanning for systems with active RDP allowing external access. Systems discovered during this scanning process are susceptible to brute force or dictionary attacks, especially if the users have inadequate account credentials. Once the actor obtains these credentials, they gain control of the system and perform various malicious actions. The Venus ransomware installation was likely facilitated through RDP, evidenced by multiple malware types generated by the Windows Explorer process. Besides, the actor used the same Crysis ransomware to repeatedly launch attacks against other systems.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">5. Microsoft Teams Bug Enables Malware Delivery from External Accounts&nbsp;<\/h2>\n\n\n\n<p>UK-based security services company, Jumpsec, has <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-teams-bug-allows-malware-delivery-from-external-accounts\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">uncovered<\/a> a flaw in Microsoft Teams that allows malware delivery from external accounts, bypassing the application&#8217;s established restrictions.&nbsp;<\/p>\n\n\n\n<p>The communication and collaboration platform, with 280 million active users monthly, is susceptible to this vulnerability when running its default configuration, which permits communication with external Microsoft Teams accounts, also known as &#8220;external tenants.&#8221;&nbsp;<\/p>\n\n\n\n<p>The researchers found they could circumvent client-side protections by modifying the internal and external recipient ID in a message&#8217;s POST request, thereby tricking the system into treating an external user as an internal one. This method enables a malicious payload to be delivered directly to a target inbox. Although Microsoft confirmed the existence of the flaw, they stated it &#8220;does not meet the bar for immediate servicing,&#8221; indicating a lack of urgency to rectify the issue. Consequently, Jumpsec advises organisations to either disable the external tenant feature or create specific domain allow-lists to reduce the risk of exploitation.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">6. Job Application Letter Used as Malware Disguise&nbsp;<\/h2>\n\n\n\n<p>AhnLab Security Emergency Response Center (ASEC) has <a href=\"https:\/\/malware.news\/t\/malware-being-distributed-disguised-as-a-job-application-letter\/70280\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">identified<\/a> the ongoing distribution of malware masquerading as a job application letter.&nbsp;<\/p>\n\n\n\n<p>The malware, capable of detecting various antivirus processes, is spread via malicious URLs designed to imitate a Korean job-seeking website. The downloaded file appears as a screen saver file extension (.scr) with an HWP document icon and contains a compressed data file.&nbsp;<\/p>\n\n\n\n<p>Upon execution, the malware creates additional files by decompressing data in a directory and executes through InternetShortcut files. Normal-looking documents, such as a job application letter, are used to disguise the harmful actions of the malware. It initiates registry changes to continuously run the malware and performs malicious behaviors such as information theft and keylogging. The malware can execute a variety of actions based on the threat actor&#8217;s commands, such as configuring internet options, capturing screenshots, managing services, and checking internet cookie data. Users are advised to exercise caution, particularly with files disguised as Job Application Letter.scr.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">7. MuddyWater Utilizes New PhonyC2 Framework in Attacks on Technion, PaperCut Servers&nbsp;&nbsp;<\/h2>\n\n\n\n<p>The Iranian-backed threat group MuddyWater, also known as Mango Sandstorm and Mercury, has been found using the PhonyC2 command-and-control framework in attacks against Israeli research institute Technion and PaperCut servers, as per <a href=\"https:\/\/thehackernews.com\/2023\/06\/from-muddyc3-to-phonyc2-irans.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The Hacker News<\/a>.&nbsp;<\/p>\n\n\n\n<p>PhonyC2, though bearing similarities to MuddyWater&#8217;s earlier MuddyC3 framework, has been undergoing regular updates to its tactics, techniques, and procedures, revealed a report from Deep Instinct.&nbsp;<\/p>\n\n\n\n<p>Importantly, PhonyC2 is used to generate varying payloads that communicate back to the C2, awaiting operator instructions to conduct the final step of the &#8216;intrusion kill chain&#8217;. Initial access to compromised systems is vital for executing these PowerShell payloads, stressed Deep Instinct Threat Research Team Leader Mark Vaitzman. Some payloads are designed to maintain a persistent connection with the operator&#8217;s C2. Moreover, MuddyWater&#8217;s use of multiple C2 frameworks in its operations was also pointed out by Vaitzman.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Wrapping up June with ANY.RUN&nbsp;<\/h2>\n\n\n\n<p>Here at ANY.RUN, our team is always busy, rolling out new content and product updates.&nbsp;<\/p>\n\n\n\n<p>We believe the only way to make the internet safer is by working together. That\u2019s why we\u2019ve started a new inbox to get your suspicious files and links submissions. Each one gets checked out, and if we find something new, we\u2019ll add the detection rule to our sandbox. <a href=\"https:\/\/any.run\/cybersecurity-blog\/help-us-find-new-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">More about that here<\/a>.&nbsp;<\/p>\n\n\n\n<p>Talking about new stuff, this month ANY.RUN analysts have found what might be a new variant of the Gh0stBins RAT. We\u2019ve put out a <a href=\"https:\/\/any.run\/cybersecurity-blog\/gh0stbins-chinese-rat-malware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">detailed technical analysis<\/a> about its structure, communication protocol, and data exfiltration process.&nbsp;<\/p>\n\n\n\n<p>Also, to help you sidestep sandbox evasion, we\u2019ve added the option to set a residential proxy when you create new tasks. This gives a home user\u2019s IP to your sandbox connections, so adversaries see your traffic as just another infected system. More on that in the <a href=\"https:\/\/any.run\/cybersecurity-blog\/residential-proxy-for-your-traffic\/\" target=\"_blank\" rel=\"noreferrer noopener\">update note<\/a>.&nbsp;<\/p>\n\n\n\n<p>Curious about more new things at ANY.RUN, like the latest extractors, detection rules and signatures added to the sandbox? Check it all out and more in our new format \u2014 <a href=\"https:\/\/any.run\/cybersecurity-blog\/monthly-updates-june\/\" target=\"_blank\" rel=\"noreferrer noopener\">monthly updated notes<\/a>.&nbsp;<\/p>\n\n\n\n<p>ANY.RUN is a cloud malware sandbox that handles the heavy lifting of malware analysis for SOC and DFIR teams. Every day, 300,000 professionals use our platform to investigate incidents and streamline threat analysis. Request a demo today and enjoy 14 days of free access to our enterprise plan.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;amp%3Butm_medium=article&amp;amp%3Butm_campaign=junedigest2023&amp;amp%3Butm_content=trial\" target=\"_blank\" rel=\"noreferrer noopener\">Request demo \u2192<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is the June 2023 edition of ANY.RUN\u2019s monthly malware analysis report, where we share key cybersecurity incidents from the last 30 days.&nbsp; In June, cybercriminals use fake OnlyFans content to deploy DcRAT. The RecordBreaker malware spreads disguised as a .NET installer. North Korea&#8217;s APT37 group launches &#8220;FadeStealer&#8221;&nbsp;for cyber espionage. Crysis threat actors use Remote [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":5365,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[34],"class_list":["post-5359","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-malware-analysis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Malware Analysis News: June 2023\u00a0<\/title>\n<meta name=\"description\" content=\"We&#039;ve compiled some of the most significant security events, news and emerging threats over the past month in our malware analysis digest.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-news-june-2023\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-news-june-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-news-june-2023\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Malware Analysis News: June 2023\u00a0\",\"datePublished\":\"2023-07-05T07:36:23+00:00\",\"dateModified\":\"2023-07-05T08:10:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-news-june-2023\/\"},\"wordCount\":1584,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"malware analysis\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-news-june-2023\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-news-june-2023\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-news-june-2023\/\",\"name\":\"Malware Analysis News: June 2023\u00a0\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2023-07-05T07:36:23+00:00\",\"dateModified\":\"2023-07-05T08:10:34+00:00\",\"description\":\"We've compiled some of the most significant security events, news and emerging threats over the past month in our malware analysis digest.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-news-june-2023\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-news-june-2023\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-news-june-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Malware Analysis News: June 2023\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malware Analysis News: June 2023\u00a0","description":"We've compiled some of the most significant security events, news and emerging threats over the past month in our malware analysis digest.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-news-june-2023\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-news-june-2023\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-news-june-2023\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Malware Analysis News: June 2023\u00a0","datePublished":"2023-07-05T07:36:23+00:00","dateModified":"2023-07-05T08:10:34+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-news-june-2023\/"},"wordCount":1584,"commentCount":1,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["malware analysis"],"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/malware-analysis-news-june-2023\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-news-june-2023\/","url":"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-news-june-2023\/","name":"Malware Analysis News: June 2023\u00a0","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2023-07-05T07:36:23+00:00","dateModified":"2023-07-05T08:10:34+00:00","description":"We've compiled some of the most significant security events, news and emerging threats over the past month in our malware analysis digest.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-news-june-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/malware-analysis-news-june-2023\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-news-june-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/any.run\/cybersecurity-blog\/category\/news\/"},{"@type":"ListItem","position":3,"name":"Malware Analysis News: June 2023\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/5359"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=5359"}],"version-history":[{"count":4,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/5359\/revisions"}],"predecessor-version":[{"id":5374,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/5359\/revisions\/5374"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/5365"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=5359"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=5359"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=5359"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}