{"id":6567,"date":"2023-12-28T09:05:54","date_gmt":"2023-12-28T09:05:54","guid":{"rendered":"\/cybersecurity-blog\/?p=6567"},"modified":"2023-12-28T10:10:26","modified_gmt":"2023-12-28T10:10:26","slug":"release-notes-december-2023","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2023\/","title":{"rendered":"Release Notes: Automated Interactivity (ML), New YARA Rules, and Network Signatures\u00a0"},"content":{"rendered":"\n<p>Welcome to <a href=\"http:\/\/any.run\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_2023&amp;utm_content=linktolanding&amp;utm_term=281223\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>\u2019s monthly update series, where we share what the team has been working on this past month.&nbsp;&nbsp;<\/p>\n\n\n\n<p>In December, ANY.RUN introduced Automated Interactivity using Machine Learning. New YARA rules were added for malware families such as W4SP Stealer, Klippr, OriginBotnet, DarkGate, and IcedId. Suricata signatures were updated, adding detection for AxileStealer, Vidar, AlbumStealer and more.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">New features&nbsp;<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Automated interactivity (ML)&nbsp;<\/h3>\n\n\n\n<p>ANY.RUN can now intelligently mimic human actions during task execution. Think of it as an advanced auto-clicker \u2014 the new feature uses Machine Learning to detect and sort buttons based on their importance, always choosing options that move the task forward. This includes navigating through setup forms or getting past captchas.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-video\"><video controls src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/automated-interactivity-captcha-mitm-new-1-1-1.mp4\"><\/video><\/figure>\n\n\n\n<p>For API tasks, this feature is always on and will kick in when manual input is needed \u2014 such as to bypass a CAPTCHA on phishing site. This drastically increases detection rate of samples that use advanced evasion tactics.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"560\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/5-2-1024x560.png\" alt=\"\" class=\"wp-image-6569\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/5-2-1024x560.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/5-2-300x164.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/5-2-768x420.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/5-2-1536x840.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/5-2-370x202.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/5-2-270x148.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/5-2-740x405.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/5-2.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Via the interface, the feature is disabled by default. When enabled, tasks can now run autonomously in the background, letting you focus elsewhere. And if you ever want to jump back in, you have the flexibility to take over and guide the task to completion manually.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/cybersecurity-blog\/automated-interactivity\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read about automated interactivity in more details<\/a>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Expanded Suricata rules&nbsp;<\/h2>\n\n\n\n<p>ANY.RUN already utilizes Suricata for network rules detection. We&#8217;re now broadening the scope of information displayed to the user when a detection occurs. Now, you\u2019ll be able to see which specific rule was triggered, identify the traffic segment affected, detail the relevant fields, and often, even see the rule itself within the interface.&nbsp;<\/p>\n\n\n\n<p>This will allow you to understand each detection better and apply our rules in your own detection processes and incident investigations.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">New YARA Rules&nbsp;<\/h2>\n\n\n\n<p>We\u2019ve added 3 new signatures to detect various activities within the task. Our latest YARA rules cover these malware families:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/app.any.run\/tasks\/13ad8cc3-bfe7-4549-94a2-0bae38a30f62\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_2023&amp;utm_content=linktoservice&amp;utm_term=281223\" target=\"_blank\" rel=\"noreferrer noopener\">W4SP Stealer<\/a><\/strong>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/app.any.run\/tasks\/b31ebe6d-72fe-44e8-8bd9-da9f8188f755\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_2023&amp;utm_content=linktoservice&amp;utm_term=281223\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Klippr<\/strong><\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/app.any.run\/tasks\/81d45046-0053-4477-8237-b18d99add345\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_2023&amp;utm_content=linktoservice&amp;utm_term=281223\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>OriginBotnet<\/strong><\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/app.any.run\/tasks\/f20aca5f-9bf8-48f3-83b7-998e75640e26\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_2023&amp;utm_content=linktoservice&amp;utm_term=281223\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>DarkGate<\/strong><\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/app.any.run\/tasks\/d0bda069-725f-4d1b-aac1-3643a3f4f9f6\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_2023&amp;utm_content=linktoservice&amp;utm_term=281223\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>IcedId<\/strong><\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nEasily analyze emerging malware with <span class=\"highlight\">ANY.RUN<\/span> cloud malware sandbox&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/#register\/\" rel=\"noopener\" target=\"_blank\">\nRegister for free\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">New rules and updates: December overview&nbsp;<\/h2>\n\n\n\n<p>We\u2019ve also added multiple new Suricata signatures. Here\u2019s the breakdown:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Stealers<\/strong>: This month, we&#8217;ve added detection for <a href=\"https:\/\/app.any.run\/tasks\/aa69fc8f-7fd0-438a-b325-dadd6d130f4f\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_2023&amp;utm_content=linktoservice&amp;utm_term=281223\" target=\"_blank\" rel=\"noreferrer noopener\">AxileStealer<\/a>, an updated version of <a href=\"https:\/\/app.any.run\/tasks\/4a5b92e9-7d92-46da-9d28-b1502a5ea1bc\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_2023&amp;utm_content=linktoservice&amp;utm_term=281223\" target=\"_blank\" rel=\"noreferrer noopener\">Vidar<\/a>, and <a href=\"https:\/\/app.any.run\/tasks\/4a5b92e9-7d92-46da-9d28-b1502a5ea1bc\/\" target=\"_blank\" rel=\"noreferrer noopener\">AlbumStealer<\/a>.&nbsp;<\/li>\n\n\n\n<li><strong>Backdoors<\/strong>: ANY.RUN now detects <a href=\"https:\/\/app.any.run\/tasks\/67151e58-80f5-45e9-bbcf-6e34b4e40ce7\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_2023&amp;utm_content=linktoservice&amp;utm_term=281223\" target=\"_blank\" rel=\"noreferrer noopener\">Gh0stRat<\/a>&#8216;s encrypted dll which can be hidden within jpeg files.&nbsp;<\/li>\n\n\n\n<li><strong>Phishing<\/strong>: Added detection of a <a href=\"https:\/\/app.any.run\/tasks\/6f3a42ec-3af3-4d36-b855-74daf295f25a\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_2023&amp;utm_content=linktoservice&amp;utm_term=281223\" target=\"_blank\" rel=\"noreferrer noopener\">new chain of suspicious activities.<\/a>&nbsp;<\/li>\n\n\n\n<li><strong>Loaders<\/strong>: Updated a signature for <a href=\"https:\/\/app.any.run\/tasks\/f20aca5f-9bf8-48f3-83b7-998e75640e26\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_2023&amp;utm_content=linktoservice&amp;utm_term=281223\" target=\"_blank\" rel=\"noreferrer noopener\">DarkGate<\/a>, which altered its activities following our recent <a href=\"https:\/\/app.any.run\/tasks\/9757a61a-db53-45c6-bceb-0db663066645\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_2023&amp;utm_content=linktoservice&amp;utm_term=281223\" target=\"_blank\" rel=\"noreferrer noopener\">Twitter post<\/a> on its new techniques. Also added are <a href=\"https:\/\/app.any.run\/tasks\/9757a61a-db53-45c6-bceb-0db663066645\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_2023&amp;utm_content=linktoservice&amp;utm_term=281223\" target=\"_blank\" rel=\"noreferrer noopener\">Pikabot<\/a> and QakBot, which we also covered on <a href=\"https:\/\/x.com\/anyrun_app\/status\/1736740233922609586?s=20\" target=\"_blank\" rel=\"noreferrer noopener\">Twitter<\/a>.&nbsp;<\/li>\n\n\n\n<li><strong>Proxy<\/strong>: Now detecting <a href=\"https:\/\/app.any.run\/tasks\/b74fe56e-5537-47b9-a2b6-42b3024853a3\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_2023&amp;utm_content=linktoservice&amp;utm_term=281223\" target=\"_blank\" rel=\"noreferrer noopener\">GoProxy<\/a>.&nbsp;&nbsp;<\/li>\n\n\n\n<li><strong>Ransomware<\/strong>: Added detection for <a href=\"https:\/\/app.any.run\/tasks\/91eb1f93-e5d3-4774-8670-ba206e8c62fd\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_2023&amp;utm_content=linktoservice&amp;utm_term=281223\" target=\"_blank\" rel=\"noreferrer noopener\">DirCrypt<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Tell us about your experience using ANY.RUN&nbsp;<\/h2>\n\n\n\n<p>We&#8217;re always improving and growing our sandbox features. If there\u2019s anything specific, you&#8217;d like us to add, or something you&#8217;re missing in your daily tasks with ANY.RUN, we&#8217;d love to hear your thoughts in the comments below.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>About ANY.RUN&nbsp;<\/strong>&nbsp;<\/h3>\n\n\n\n<p>ANY.RUN is a cloud malware sandbox that handles the heavy lifting of malware analysis for SOC and DFIR teams. Every day, 300,000 professionals use our platform to investigate incidents and streamline threat analysis.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>Request a demo today and enjoy 14 days of free access to our Enterprise plan.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"http:\/\/any.run\/demo\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_dec_2023&amp;utm_content=linktodemo&amp;utm_term=281223\" target=\"_blank\" rel=\"noreferrer noopener\">Request demo \u2192<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to ANY.RUN\u2019s monthly update series, where we share what the team has been working on this past month.&nbsp;&nbsp; In December, ANY.RUN introduced Automated Interactivity using Machine Learning. New YARA rules were added for malware families such as W4SP Stealer, Klippr, OriginBotnet, DarkGate, and IcedId. Suricata signatures were updated, adding detection for AxileStealer, Vidar, AlbumStealer [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":6571,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[57,10,54,34,55,56],"class_list":["post-6567","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-anyrun","tag-cybersecurity","tag-features","tag-malware-analysis","tag-release","tag-update"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Release Notes: Automated Interactivity, YARA Rules, Signatures<\/title>\n<meta name=\"description\" content=\"In December, ANY.RUN released a feature for automating interactive malware analysis, as well as added new YARA rules and network signatures.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2023\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vlad Ananin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2023\/\"},\"author\":{\"name\":\"Vlad Ananin\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Release Notes: Automated Interactivity (ML), New YARA Rules, and Network Signatures\u00a0\",\"datePublished\":\"2023-12-28T09:05:54+00:00\",\"dateModified\":\"2023-12-28T10:10:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2023\/\"},\"wordCount\":589,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"features\",\"malware analysis\",\"release\",\"update\"],\"articleSection\":[\"Service Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2023\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2023\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2023\/\",\"name\":\"Release Notes: Automated Interactivity, YARA Rules, Signatures\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2023-12-28T09:05:54+00:00\",\"dateModified\":\"2023-12-28T10:10:26+00:00\",\"description\":\"In December, ANY.RUN released a feature for automating interactive malware analysis, as well as added new YARA rules and network signatures.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2023\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2023\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service Updates\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Release Notes: Automated Interactivity (ML), New YARA Rules, and Network Signatures\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"Vlad Ananin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/564ed55b05884a34062108096c0ed973?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/564ed55b05884a34062108096c0ed973?s=96&d=mm&r=g\",\"caption\":\"Vlad Ananin\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/vlad-ananin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Release Notes: Automated Interactivity, YARA Rules, Signatures","description":"In December, ANY.RUN released a feature for automating interactive malware analysis, as well as added new YARA rules and network signatures.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2023\/","twitter_misc":{"Written by":"Vlad Ananin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2023\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2023\/"},"author":{"name":"Vlad Ananin","@id":"https:\/\/any.run\/"},"headline":"Release Notes: Automated Interactivity (ML), New YARA Rules, and Network Signatures\u00a0","datePublished":"2023-12-28T09:05:54+00:00","dateModified":"2023-12-28T10:10:26+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2023\/"},"wordCount":589,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","features","malware analysis","release","update"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2023\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2023\/","url":"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2023\/","name":"Release Notes: Automated Interactivity, YARA Rules, Signatures","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2023-12-28T09:05:54+00:00","dateModified":"2023-12-28T10:10:26+00:00","description":"In December, ANY.RUN released a feature for automating interactive malware analysis, as well as added new YARA rules and network signatures.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2023\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-december-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Service Updates","item":"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/"},{"@type":"ListItem","position":3,"name":"Release Notes: Automated Interactivity (ML), New YARA Rules, and Network Signatures\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"Vlad Ananin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/564ed55b05884a34062108096c0ed973?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/564ed55b05884a34062108096c0ed973?s=96&d=mm&r=g","caption":"Vlad Ananin"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/vlad-ananin\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/6567"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=6567"}],"version-history":[{"count":3,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/6567\/revisions"}],"predecessor-version":[{"id":6574,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/6567\/revisions\/6574"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/6571"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=6567"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=6567"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=6567"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}