{"id":5406,"date":"2023-07-13T06:32:31","date_gmt":"2023-07-13T06:32:31","guid":{"rendered":"\/cybersecurity-blog\/?p=5406"},"modified":"2023-07-18T08:28:56","modified_gmt":"2023-07-18T08:28:56","slug":"malware-trends-q2-2023","status":"publish","type":"post","link":"\/cybersecurity-blog\/malware-trends-q2-2023\/","title":{"rendered":"Malware Trends Report: Q2, 2023\u00a0"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p>Welcome to <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=trendsq2&amp;utm_content=landing\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>\u2019s Q2 2023 malware trends report. We\u2019re continuing to share quarterly breakdowns of the most popular malware types, families, and TTPs. &nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Summary<\/strong>&nbsp;<\/h2>\n\n\n\n<p>In our most recent quarterly review, ANY.RUN received 758,582 <a href=\"https:\/\/app.any.run\/submissions\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=trendsq2&amp;utm_content=publicsubmissions\" target=\"_blank\" rel=\"noreferrer noopener\">submissions<\/a>. From this pool, we classified 226,418 tasks, or 29.9%, as malicious, and another 34,285, or 4.5%, as suspicious. &nbsp;<\/p>\n\n\n\n<p>Our users, through their analysis of these tasks, managed to gather approximately 45 million unique Indicators of Compromise (IOCs) and an accumulative total of 240,581,447 IOCs.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"566\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-1-1024x566.png\" alt=\"\" class=\"wp-image-5408\" srcset=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-1-1024x566.png 1024w, \/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-1-300x166.png 300w, \/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-1-768x425.png 768w, \/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-1-370x205.png 370w, \/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-1-270x149.png 270w, \/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-1-740x409.png 740w, \/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-1.png 1264w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>In this report, we\u2019ll:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Look at the most widespread malware types and families in Q2 2023&nbsp;<\/li>\n\n\n\n<li>Compare our findings to <a href=\"https:\/\/any.run\/cybersecurity-blog\/malware-trends-q1-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">Q1 2023 report<\/a>.&nbsp;<\/li>\n\n\n\n<li>And provide insights into the most used MITRE ATT&amp;CK TTPs &nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Top Malware Types in Q2 2023&nbsp;<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"842\" height=\"721\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-3.png\" alt=\"Top Malware Types in Q2 2023\u00a0\" class=\"wp-image-5410\" srcset=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-3.png 842w, \/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-3-300x257.png 300w, \/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-3-768x658.png 768w, \/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-3-370x317.png 370w, \/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-3-270x231.png 270w, \/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-3-740x634.png 740w\" sizes=\"(max-width: 842px) 100vw, 842px\" \/><\/figure>\n\n\n\n<p><strong>Highlights&nbsp;<\/strong><\/p>\n\n\n\n<p>In Q2 2023, the three most prevalent types of malware remained RAT, loader, and trojan, mirroring the trends from Q1 2023.&nbsp;<\/p>\n\n\n\n<p>Specifically, we observed a 12.8% increase in RAT instances, rising from 5296 in Q1 to 5974 in Q2. Conversely, loader instances saw a decrease of 27.3%, dropping from 7820 in Q1 to 5685 in Q2. Most notably, trojan instances experienced a significant decrease of 44.8%, plummeting from 7696 in Q1 to just 4246 in Q2.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Top Malware Families in Q2 2023&nbsp;<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"842\" height=\"594\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-2.png\" alt=\"Top Malware Families in Q2 2023\u00a0\" class=\"wp-image-5409\" srcset=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-2.png 842w, \/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-2-300x212.png 300w, \/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-2-768x542.png 768w, \/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-2-370x261.png 370w, \/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-2-270x190.png 270w, \/cybersecurity-blog\/wp-content\/uploads\/2023\/07\/image-2-740x522.png 740w\" sizes=\"(max-width: 842px) 100vw, 842px\" \/><\/figure>\n\n\n\n<p><strong>Highlights:&nbsp;<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The hierarchy of top malware families remains unchanged. <a href=\"https:\/\/any.run\/malware-trends\/redline\" target=\"_blank\" rel=\"noreferrer noopener\">RedLine<\/a>, the most prevalent malware family, saw a significant surge in instances, jumping 80.2% from 1895 in Q1 to 3415 in Q2.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/any.run\/malware-trends\/remcos\" target=\"_blank\" rel=\"noreferrer noopener\">Remcos<\/a>, holding steady as the second most frequently uploaded malware on ANY.RUN, experienced a marginal decrease of 1.2%, with instances dipping slightly from 1385 in Q1 to 1368 in Q2.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Rounding out the top three, the <a href=\"https:\/\/any.run\/malware-trends\/njrat\" target=\"_blank\" rel=\"noreferrer noopener\">njRat<\/a> family exhibited a modest increase of 4.2%, with instances rising from 1096 in Q1 to 1142 in Q2.&nbsp;<\/li>\n<\/ul>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nAnalyze malware and <span class=\"highlight\">collect IOCs<\/span> in ANY.RUN&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/#register\" rel=\"noopener\" target=\"_blank\">\nCreate free account\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Top MITRE ATT&amp;CK techniques in Q2 2023&nbsp;<\/h2>\n\n\n\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-7\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"2\"\n           data-rows=\"11\"\n           data-wpID=\"7\"\n           data-responsive=\"0\"\n           data-has-header=\"0\">\n\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-valign-top wpdt-wrap-text wpdt-align-left wpdt-bold wpdt-bc-F2F2F2\"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:79.123173277662%;                    padding:10px;\n                    \"\n                    >\n                                        MITRE ATT&CK Technique\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-valign-top wpdt-wrap-text wpdt-align-left wpdt-bold wpdt-bc-F2F2F2\"\n                                            data-cell-id=\"B1\"\n                    data-col-index=\"1\"\n                    data-row-index=\"0\"\n                    style=\" width:20.876826722338%;                    padding:10px;\n                    \"\n                    >\n                                        Count\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"A2\"\n                    data-col-index=\"0\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        T1059.003 Command and Scripting Interpreter: Windows Command Shell\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"B2\"\n                    data-col-index=\"1\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        14,233\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"A3\"\n                    data-col-index=\"0\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        T1059.001 Command and Scripting Interpreter: PowerShell\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"B3\"\n                    data-col-index=\"1\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        9,081\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"A4\"\n                    data-col-index=\"0\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        T1497.003 Virtualization\/Sandbox Evasion: Time Based Evasion\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"B4\"\n                    data-col-index=\"1\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        8,130\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"A5\"\n                    data-col-index=\"0\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        T1218.011 System Binary Proxy Execution: Rundll32\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"B5\"\n                    data-col-index=\"1\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        5,505\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"A6\"\n                    data-col-index=\"0\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        T1053.005 Scheduled Task\/Job: Scheduled Task\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"B6\"\n                    data-col-index=\"1\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        5,450\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"A7\"\n                    data-col-index=\"0\"\n                    data-row-index=\"6\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        T1547.001 Boot or Logon Autostart Execution: Registry Run Keys \/ Startup Folder\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"B7\"\n                    data-col-index=\"1\"\n                    data-row-index=\"6\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        4,919\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"A8\"\n                    data-col-index=\"0\"\n                    data-row-index=\"7\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        T1574.002 Hijack Execution Flow: DLL Side-Loading\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"B8\"\n                    data-col-index=\"1\"\n                    data-row-index=\"7\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        3,817\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"A9\"\n                    data-col-index=\"0\"\n                    data-row-index=\"8\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        T1059.005 Command and Scripting Interpreter: Visual Basic\t\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"B9\"\n                    data-col-index=\"1\"\n                    data-row-index=\"8\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        3,672\u00a0\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"A10\"\n                    data-col-index=\"0\"\n                    data-row-index=\"9\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        T1059.007 Command and Scripting Interpreter: JavaScript\t\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"B10\"\n                    data-col-index=\"1\"\n                    data-row-index=\"9\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        3,054                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"A11\"\n                    data-col-index=\"0\"\n                    data-row-index=\"10\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        T1222.001 File and Directory Permissions Modification: Windows File and Directory Permissions Modification\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left wpdt-valign-top wpdt-wrap-text\"\n                                            data-cell-id=\"B11\"\n                    data-col-index=\"1\"\n                    data-row-index=\"10\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        2,986\u00a0                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><style id='wpdt-custom-style-7'>\n.wpdt-bc-F2F2F2 { background-color: #F2F2F2 !important;}\n<\/style>\n\n\n\n\n<p><strong>Highlights:&nbsp;<\/strong><\/p>\n\n\n\n<p>The data we\u2019ve collected during the second quarter of 2023 indicates a significant shift in most-used TTPs. Here are some of the highlights:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>T1059.003, Command and Scripting Interpreter<\/strong>: Windows Command Shell, despite experiencing a significant drop in instances from 22,030 in Q1 to 14,233 in Q2 (a decrease of 35.4%), has moved up in the ranking to become the most prevalent technique in Q2.&nbsp;<\/li>\n\n\n\n<li><strong>T1059.001, Command and Scripting Interpreter: PowerShell<\/strong>, has also climbed in the ranking, moving from the tenth position in Q1 to the second in Q2. This is in spite of a relatively small increase in instances from 8,209 in Q1 to 9,081 in Q2 (an increase of 10.6%).&nbsp;<\/li>\n\n\n\n<li><strong>T1497.003<\/strong>, <strong>Virtualization\/Sandbox Evasion: Time Based Evasion<\/strong>, has also risen in the ranking, moving from the seventh position in Q1 to the third in Q2.&nbsp;<\/li>\n\n\n\n<li><strong>Notably, T1036.005, Masquerading: Match Legitimate Name or Location<\/strong>, which was the most prevalent technique in Q1 with 78,101 instances, is no longer in the top ten in Q2.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Report methodology&nbsp;<\/h2>\n\n\n\n<p>We\u2019ve examined data submitted to our public threat database by a diverse community of researchers, who have opted to make their analyses public, totaling 758,582 tasks.&nbsp;<\/p>\n\n\n\n<p>ANY.RUN is a cloud malware sandbox that handles the heavy lifting of malware analysis for SOC and DFIR teams. Every day, 300,000 professionals use our platform to investigate incidents and streamline threat analysis.&nbsp;<\/p>\n\n\n\n<p>Request a demo today and enjoy 14 days of free access to our Enterprise plan. &nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\" target=\"_blank\" rel=\"noreferrer noopener\">Request demo \u2192<\/a>&nbsp;<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to ANY.RUN\u2019s Q2 2023 malware trends report. We\u2019re continuing to share quarterly breakdowns of the most popular malware types, families, and TTPs. &nbsp; Summary&nbsp; In our most recent quarterly review, ANY.RUN received 758,582 submissions. From this pool, we classified 226,418 tasks, or 29.9%, as malicious, and another 34,285, or 4.5%, as suspicious. &nbsp; Our [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4686,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[10,15,70],"class_list":["post-5406","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lifehacks","tag-cybersecurity","tag-malware","tag-malware-analysis-report"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Malware Trends Report: Q2, 2023\u00a0 - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"We identified top malware types &amp; families, and most-used MITRE ATT&amp;CK techniques. Read malware trends report Q2, 2023!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/malware-trends-q2-2023\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\n\t    \"@context\": \"https:\/\/schema.org\",\n\t    \"@graph\": [\n\t        {\n\t            \"@type\": \"Article\",\n\t            \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/malware-trends-q2-2023\/#article\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/malware-trends-q2-2023\/\"\n\t            },\n\t            \"author\": {\n\t                \"name\": \"ANY.RUN\",\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"headline\": \"Malware Trends Report: Q2, 2023\u00a0\",\n\t            \"datePublished\": \"2023-07-13T06:32:31+00:00\",\n\t            \"dateModified\": \"2023-07-18T08:28:56+00:00\",\n\t            \"mainEntityOfPage\": {\n\t                \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/malware-trends-q2-2023\/\"\n\t            },\n\t            \"wordCount\": 552,\n\t            \"commentCount\": 0,\n\t            \"publisher\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"keywords\": [\n\t                \"cybersecurity\",\n\t                \"malware\",\n\t                \"malware analysis report\"\n\t            ],\n\t            \"articleSection\": [\n\t                \"Cybersecurity Lifehacks\"\n\t            ],\n\t            \"inLanguage\": \"en-US\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"CommentAction\",\n\t                    \"name\": \"Comment\",\n\t                    \"target\": [\n\t                        \"https:\/\/any.run\/cybersecurity-blog\/malware-trends-q2-2023\/#respond\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"WebPage\",\n\t            \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/malware-trends-q2-2023\/\",\n\t            \"url\": \"https:\/\/any.run\/cybersecurity-blog\/malware-trends-q2-2023\/\",\n\t            \"name\": \"Malware Trends Report: Q2, 2023\u00a0 - ANY.RUN&#039;s Cybersecurity Blog\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"datePublished\": \"2023-07-13T06:32:31+00:00\",\n\t            \"dateModified\": \"2023-07-18T08:28:56+00:00\",\n\t            \"description\": \"We identified top malware types & families, and most-used MITRE ATT&CK techniques. Read malware trends report Q2, 2023!\",\n\t            \"breadcrumb\": {\n\t                \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/malware-trends-q2-2023\/#breadcrumb\"\n\t            },\n\t            \"inLanguage\": \"en-US\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"ReadAction\",\n\t                    \"target\": [\n\t                        \"https:\/\/any.run\/cybersecurity-blog\/malware-trends-q2-2023\/\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"BreadcrumbList\",\n\t            \"@id\": \"https:\/\/any.run\/cybersecurity-blog\/malware-trends-q2-2023\/#breadcrumb\",\n\t            \"itemListElement\": [\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 1,\n\t                    \"name\": \"Home\",\n\t                    \"item\": \"https:\/\/any.run\/cybersecurity-blog\/\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 2,\n\t                    \"name\": \"Cybersecurity Lifehacks\",\n\t                    \"item\": \"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 3,\n\t                    \"name\": \"Malware Trends Report: Q2, 2023\u00a0\"\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"WebSite\",\n\t            \"@id\": \"https:\/\/any.run\/\",\n\t            \"url\": \"https:\/\/any.run\/\",\n\t            \"name\": \"ANY.RUN&#039;s Cybersecurity Blog\",\n\t            \"description\": \"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\n\t            \"publisher\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"SearchAction\",\n\t                    \"target\": {\n\t                        \"@type\": \"EntryPoint\",\n\t                        \"urlTemplate\": \"https:\/\/any.run\/?s={search_term_string}\"\n\t                    },\n\t                    \"query-input\": \"required name=search_term_string\"\n\t                }\n\t            ],\n\t            \"inLanguage\": \"en-US\"\n\t        },\n\t        {\n\t            \"@type\": \"Organization\",\n\t            \"@id\": \"https:\/\/any.run\/\",\n\t            \"name\": \"ANY.RUN\",\n\t            \"url\": \"https:\/\/any.run\/\",\n\t            \"logo\": {\n\t                \"@type\": \"ImageObject\",\n\t                \"inLanguage\": \"en-US\",\n\t                \"@id\": \"https:\/\/any.run\/\",\n\t                \"url\": \"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\n\t                \"contentUrl\": \"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\n\t                \"width\": 1,\n\t                \"height\": 1,\n\t                \"caption\": \"ANY.RUN\"\n\t            },\n\t            \"image\": {\n\t                \"@id\": \"https:\/\/any.run\/\"\n\t            },\n\t            \"sameAs\": [\n\t                \"https:\/\/www.facebook.com\/www.any.run\/\",\n\t                \"https:\/\/twitter.com\/anyrun_app\",\n\t                \"https:\/\/www.linkedin.com\/company\/30692044\",\n\t                \"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"Person\",\n\t            \"@id\": \"https:\/\/any.run\/\",\n\t            \"name\": \"ANY.RUN\",\n\t            \"image\": {\n\t                \"@type\": \"ImageObject\",\n\t                \"inLanguage\": \"en-US\",\n\t                \"@id\": \"https:\/\/any.run\/\",\n\t                \"url\": \"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\n\t                \"contentUrl\": \"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\n\t                \"caption\": \"ANY.RUN\"\n\t            },\n\t            \"url\": \"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"\n\t        }\n\t    ]\n\t}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malware Trends Report: Q2, 2023\u00a0 - ANY.RUN&#039;s Cybersecurity Blog","description":"We identified top malware types & families, and most-used MITRE ATT&CK techniques. Read malware trends report Q2, 2023!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/malware-trends-q2-2023\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/malware-trends-q2-2023\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/malware-trends-q2-2023\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Malware Trends Report: Q2, 2023\u00a0","datePublished":"2023-07-13T06:32:31+00:00","dateModified":"2023-07-18T08:28:56+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/malware-trends-q2-2023\/"},"wordCount":552,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["cybersecurity","malware","malware analysis report"],"articleSection":["Cybersecurity Lifehacks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/malware-trends-q2-2023\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/malware-trends-q2-2023\/","url":"https:\/\/any.run\/cybersecurity-blog\/malware-trends-q2-2023\/","name":"Malware Trends Report: Q2, 2023\u00a0 - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2023-07-13T06:32:31+00:00","dateModified":"2023-07-18T08:28:56+00:00","description":"We identified top malware types & families, and most-used MITRE ATT&CK techniques. Read malware trends report Q2, 2023!","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/malware-trends-q2-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/malware-trends-q2-2023\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/malware-trends-q2-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Lifehacks","item":"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/"},{"@type":"ListItem","position":3,"name":"Malware Trends Report: Q2, 2023\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/5406"}],"collection":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=5406"}],"version-history":[{"count":5,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/5406\/revisions"}],"predecessor-version":[{"id":5432,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/5406\/revisions\/5432"}],"wp:featuredmedia":[{"embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/4686"}],"wp:attachment":[{"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=5406"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=5406"},{"taxonomy":"post_tag","embeddable":true,"href":"\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=5406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}