{"id":6404,"date":"2023-12-04T06:56:56","date_gmt":"2023-12-04T06:56:56","guid":{"rendered":"\/cybersecurity-blog\/?p=6404"},"modified":"2023-12-04T10:32:12","modified_gmt":"2023-12-04T10:32:12","slug":"release-notes-november-2023","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/release-notes-november-2023\/","title":{"rendered":"Release Notes: Script Tracer, Uploading Files Into Active Tasks, New Rules, and More"},"content":{"rendered":"\n<p>This is <a href=\"http:\/\/any.run\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_nov_2023&amp;utm_content=linktolanding&amp;utm_term=041223\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>\u2019s monthly update, where we keep you posted on our progress.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>In November, we added new functionality that enables step-by-step analysis of script execution in ANY.RUN. We also introduced the capability to upload additional files to a virtual machine during active interactive sessions. This allows you to bring your own tooling, malware stages, or dependencies into active tasks.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Product updates<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"2048\" height=\"1142\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/1-1024x571.png\" alt=\"\" class=\"wp-image-6405\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/1-1024x571.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/1-300x167.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/1-768x428.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/1-1536x857.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/1-370x206.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/1-270x151.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/1-740x413.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/1.png 2048w\" sizes=\"(max-width: 2048px) 100vw, 2048px\" \/><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>Script tracer<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Tracer can help you deobfuscate the execution flow of scripting programs written in JScript, VB Script, VBA, and Macro 4.0. This feature works in all of our supported OS versions, from Windows 7 to Windows 11.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/cybersecurity-blog\/script-tracer\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read about Script tracer in more details<\/a><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"670\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/2-1024x670.png\" alt=\"\" class=\"wp-image-6406\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/2-1024x670.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/2-300x196.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/2-768x502.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/2-1536x1004.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/2-370x242.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/2-270x177.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/2-740x484.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/2.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>Uploading files into active tasks<\/strong>&nbsp;<\/h3>\n\n\n\n<p>You can now upload additional files to a VM, including while it is running. The sandbox allows for uploading a total of up to 500 MB of files. Hunter and Enterprise subscribers gain access to the Collection tab, where they can store their favorite files for quick and easy access.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/cybersecurity-blog\/upload-files-to-active-tasks\/\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more about uploading files to running tasks in ANY.RUN<\/a><\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\"> \nANY.RUN Enterprise plan at a discount\n<br>\nUse promo:<span class=\"highlight\"> SANDBOXSAVER<\/span>&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/calendly.com\/svasiliev\/\" rel=\"noopener\" target=\"_blank\">\nBook a call\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">New YARA&nbsp;<\/h2>\n\n\n\n<p>In November, we added YARA rules for new malware families:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/c51ca2a8-7e08-4f03-a1c8-db8f0eb89839\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_nov_2023&amp;utm_content=linktoservice&amp;utm_term=041223\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>AlfaC2<\/strong><\/a>: Introduced YARA rules for this malware, which is based on the merged CHAOS framework.&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/app.any.run\/tasks\/492b9f3c-b841-4a27-9cba-6f4435f89118\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_nov_2023&amp;utm_content=linktoservice&amp;utm_term=041223\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>PureLogs<\/strong><\/a>: Added detection for this multifunctional stealer from the PureCode group. Notable for being packed with NetReactor.&nbsp;<\/li>\n\n\n\n<li><strong>PureCrypter<\/strong>: Implemented rules for this multifunctional obfuscator-cryptor, also from the PureCode group, featuring a smart assembler cover.&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/app.any.run\/tasks\/2cdf9d84-132a-4af8-9718-9989458a9f9c\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_nov_2023&amp;utm_content=linktoservice&amp;utm_term=041223\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>SheetRAT<\/strong><\/a>: Developed YARA rules for this malware, known to originate from Discord channels.&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/app.any.run\/tasks\/69084726-97d7-49f0-8677-a9d3d7a2f55f\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_nov_2023&amp;utm_content=linktoservice&amp;utm_term=041223\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>GrMsk<\/strong><\/a>: Our analysts have named this new threat &#8220;GrMsk&#8221;. YARA rules have been formulated for its detection.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">New signatures&nbsp;<\/h2>\n\n\n\n<p>We\u2019ve also added multiple new Suricata rules. Here are some of the highlights:&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/7f1ebba3-f030-4647-94f9-6e95ecec2f67\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_nov_2023&amp;utm_content=linktoservice&amp;utm_term=041223\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Phishing<\/strong><\/a>: New signatures for IPFSQuery, CapSeg, <a href=\"https:\/\/app.any.run\/tasks\/7f1ebba3-f030-4647-94f9-6e95ecec2f67\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_nov_2023&amp;utm_content=linktoservice&amp;utm_term=041223\" target=\"_blank\" rel=\"noreferrer noopener\">EvilProxy<\/a>, and Tycoon. The first two phishing signatures (IPFSQuery, CapSeg) are codenames for as-yet-unknown phishing services.&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/any.run\/malware-trends\/loader\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Loaders<\/strong><\/a>: Added detection for PureLoader, Talisman, and <a href=\"https:\/\/app.any.run\/tasks\/b84d8f50-639c-4c7a-b7cc-c99210f5aea7\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_nov_2023&amp;utm_content=linktoservice&amp;utm_term=041223\" target=\"_blank\" rel=\"noreferrer noopener\">Smokeloader<\/a>. The Pureloader signature relates to the activity of PureCrypter, specifically its module loading capabilities, as researched by ANY.RUN\u2019s <a href=\"https:\/\/any.run\/cybersecurity-blog\/authors\/khr0x\/\" target=\"_blank\" rel=\"noreferrer noopener\">khr0x<\/a>.&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/any.run\/malware-trends\/stealer\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Stealers<\/strong><\/a>: Updated with signatures for <a href=\"https:\/\/app.any.run\/tasks\/8d787f27-abf1-47f7-b5e9-4af0877abe6d\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_nov_2023&amp;utm_content=linktoservice&amp;utm_term=041223\" target=\"_blank\" rel=\"noreferrer noopener\">UmbralStealer<\/a>, <a href=\"https:\/\/app.any.run\/tasks\/d2608bd9-3ccd-49c8-903d-30d16bda5985\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_nov_2023&amp;utm_content=linktoservice&amp;utm_term=041223\" target=\"_blank\" rel=\"noreferrer noopener\">BlankGrabber<\/a>, FtpFileStealer, Vidar, and GreedyStealer. The names FtpFileStealer and GreedyStealer were coined by ANY.RUN.&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/any.run\/malware-trends\/ransomware\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Ransomware<\/strong><\/a>: Introduced signatures for <a href=\"https:\/\/app.any.run\/tasks\/1acd836e-7c71-4f2a-a04a-6d085c42e184\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_nov_2023&amp;utm_content=linktoservice&amp;utm_term=041223\" target=\"_blank\" rel=\"noreferrer noopener\">CryptGh0st<\/a> and <a href=\"https:\/\/app.any.run\/tasks\/c6267202-6d0c-49bc-aaa3-d97476df6511\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_nov_2023&amp;utm_content=linktoservice&amp;utm_term=041223\" target=\"_blank\" rel=\"noreferrer noopener\">CryptoLocker<\/a>.&nbsp;<\/li>\n\n\n\n<li><strong>Proxy<\/strong>: Now detecting <a href=\"https:\/\/app.any.run\/tasks\/18ece415-2abf-4c98-82f4-dcc3ac47d614\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_nov_2023&amp;utm_content=linktoservice&amp;utm_term=041223\" target=\"_blank\" rel=\"noreferrer noopener\">Socks5Systemz<\/a>.&nbsp;<\/li>\n\n\n\n<li><strong>Backdoors<\/strong>: Enhanced detection for JinxV2DEV, Gh0stRat, and BrushaLoader. JinxV2DEV, a new backdoor, was identified through its unique user agent. BrushaLoader is a new version of the previously known backdoor (read its analysis from 2018 <a href=\"https:\/\/blog.talosintelligence.com\/combing-through-brushaloader\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">here<\/a>).\u00a0<\/li>\n\n\n\n<li><strong>Tracer signatures<\/strong>: Enhanced script analysis capabilities with new signatures for using a tracer. This aids in understanding the activities within scripts more effectively.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Wrapping up&nbsp;<\/h2>\n\n\n\n<p>We\u2019re continuing to work on and expand our sandbox capabilities. What feature would you most like to see, or what are you currently missing in your day-to-day work with ANY.RUN? Let us know in the comments below \u2014 we\u2019d really appreciate your feedback.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>About ANY.RUN<\/strong>&nbsp;<\/h3>\n\n\n\n<p>ANY.RUN is a cloud malware sandbox that handles the heavy lifting of malware analysis for SOC and DFIR teams. Every day, 300,000 professionals use our platform to investigate incidents and streamline threat analysis.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>Request a demo today and enjoy 14 days of free access to our Enterprise plan.&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_nov_2023&amp;utm_content=linktodemo&amp;utm_term=041223\" target=\"_blank\" rel=\"noreferrer noopener\">Request demo \u2192<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is ANY.RUN\u2019s monthly update, where we keep you posted on our progress.&nbsp;&nbsp;&nbsp; In November, we added new functionality that enables step-by-step analysis of script execution in ANY.RUN. We also introduced the capability to upload additional files to a virtual machine during active interactive sessions. This allows you to bring your own tooling, malware stages, [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":6408,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[55,56],"class_list":["post-6404","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-release","tag-update"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Release Notes: Script Tracer, Extra File Uploads, and New Rules<\/title>\n<meta name=\"description\" content=\"In November, ANY.RUN released a tool for script analysis, made it possible to upload files to running VMs, added new Suricata rules, and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/release-notes-november-2023\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vlad Ananin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-november-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-november-2023\/\"},\"author\":{\"name\":\"Vlad Ananin\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Release Notes: Script Tracer, Uploading Files Into Active Tasks, New Rules, and More\",\"datePublished\":\"2023-12-04T06:56:56+00:00\",\"dateModified\":\"2023-12-04T10:32:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-november-2023\/\"},\"wordCount\":588,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"release\",\"update\"],\"articleSection\":[\"Service Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/release-notes-november-2023\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-november-2023\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-november-2023\/\",\"name\":\"Release Notes: Script Tracer, Extra File Uploads, and New Rules\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2023-12-04T06:56:56+00:00\",\"dateModified\":\"2023-12-04T10:32:12+00:00\",\"description\":\"In November, ANY.RUN released a tool for script analysis, made it possible to upload files to running VMs, added new Suricata rules, and more.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-november-2023\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/release-notes-november-2023\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-november-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service Updates\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Release Notes: Script Tracer, Uploading Files Into Active Tasks, New Rules, and More\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"Vlad Ananin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/564ed55b05884a34062108096c0ed973?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/564ed55b05884a34062108096c0ed973?s=96&d=mm&r=g\",\"caption\":\"Vlad Ananin\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/vlad-ananin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Release Notes: Script Tracer, Extra File Uploads, and New Rules","description":"In November, ANY.RUN released a tool for script analysis, made it possible to upload files to running VMs, added new Suricata rules, and more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/release-notes-november-2023\/","twitter_misc":{"Written by":"Vlad Ananin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-november-2023\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-november-2023\/"},"author":{"name":"Vlad Ananin","@id":"https:\/\/any.run\/"},"headline":"Release Notes: Script Tracer, Uploading Files Into Active Tasks, New Rules, and More","datePublished":"2023-12-04T06:56:56+00:00","dateModified":"2023-12-04T10:32:12+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-november-2023\/"},"wordCount":588,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["release","update"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-november-2023\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-november-2023\/","url":"https:\/\/any.run\/cybersecurity-blog\/release-notes-november-2023\/","name":"Release Notes: Script Tracer, Extra File Uploads, and New Rules","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2023-12-04T06:56:56+00:00","dateModified":"2023-12-04T10:32:12+00:00","description":"In November, ANY.RUN released a tool for script analysis, made it possible to upload files to running VMs, added new Suricata rules, and more.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-november-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-november-2023\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-november-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Service Updates","item":"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/"},{"@type":"ListItem","position":3,"name":"Release Notes: Script Tracer, Uploading Files Into Active Tasks, New Rules, and More"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"Vlad Ananin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/564ed55b05884a34062108096c0ed973?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/564ed55b05884a34062108096c0ed973?s=96&d=mm&r=g","caption":"Vlad Ananin"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/vlad-ananin\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/6404"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=6404"}],"version-history":[{"count":6,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/6404\/revisions"}],"predecessor-version":[{"id":6416,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/6404\/revisions\/6416"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/6408"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=6404"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=6404"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=6404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}