{"id":6924,"date":"2024-02-01T06:35:40","date_gmt":"2024-02-01T06:35:40","guid":{"rendered":"\/cybersecurity-blog\/?p=6924"},"modified":"2025-12-09T10:27:05","modified_gmt":"2025-12-09T10:27:05","slug":"release-notes-january-2024","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2024\/","title":{"rendered":"Release Notes: Linux Support, New Signatures, and Coverage of Emerging Threats\u00a0\u00a0"},"content":{"rendered":"\n<p>Welcome to ANY.RUN\u2019s monthly update series, where we share what the team has been working on this past month.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>In January, we expanded ANY.RUN\u2019s capabilities, with the support of Linux, improved phishing coverage, detected new threats like Bitter-wmRAT and MustangPanda-Toneshell, introduced over 17 new signatures, including Linux ones, and added multiple new Yara rules.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">New features&nbsp;<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Linux&nbsp;<\/h3>\n\n\n\n<p>We&#8217;ve expanded our capabilities to include support for analyzing Linux-based malware. Now, you can research malware samples targeting Linux right in your browser!&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"588\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/image-1024x588.png\" alt=\"Linux VM running in ANY.RUN \u2014 a miner is detected on Linux \" class=\"wp-image-6925\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/image-1024x588.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/image-300x172.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/image-768x441.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/image-1536x882.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/image-370x213.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/image-270x155.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/image-740x425.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/image.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Linux VM running in ANY.RUN \u2014 a miner is detected on Linux&nbsp;<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>This is a significant step for ANY.RUN as we extend our interactive analysis capabilities to the Linux platform, specifically Ubuntu 22.04.2. Our service offers real-time monitoring of suspicious activities and provides access to IOCs even before task completion. Additionally, you will receive detailed reports like MITTRE ATT&amp;CK Matrix, Process Graph, and IOCs Report to help you extract actionable information quickly.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"584\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/image-1-1024x584.png\" alt=\"MITRE ATT&amp;CK Matrix is available for Linux tasks in ANY.RUN \" class=\"wp-image-6926\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/image-1-1024x584.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/image-1-300x171.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/image-1-768x438.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/image-1-1536x876.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/image-1-370x211.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/image-1-270x154.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/image-1-740x422.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/02\/image-1.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">MITRE ATT&amp;CK Matrix is available for Linux tasks in ANY.RUN&nbsp;<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/cybersecurity-blog\/linux-in-anyrun\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read about introduction of Linux support to ANY.RUN<\/a>&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nReady to analyze <span class=\"highlight\">Linux-based malware<\/span> in ANY.RUN? Get started today&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/#register\/\" rel=\"noopener\" target=\"_blank\">\nRegister for free\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Improved phishing coverage&nbsp;<\/h3>\n\n\n\n<p>In January, we enhanced our network detection capabilities by introducing new phishing rules. These rules not only include <a href=\"https:\/\/app.any.run\/tasks\/a6d39b66-4615-457c-ae7c-fc0b2bd6136e\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_2024&amp;utm_content=task&amp;utm_term=010224\/\" target=\"_blank\" rel=\"noreferrer noopener\">specific domains<\/a>, but also domain correlations but also address the <a href=\"https:\/\/app.any.run\/tasks\/a6d39b66-4615-457c-ae7c-fc0b2bd6136e\/\" target=\"_blank\" rel=\"noreferrer noopener\">RDGA threat<\/a> associated with MageCart. We gave particular attention to monitoring the <a href=\"https:\/\/app.any.run\/tasks\/3b1bfd13-9ac2-4ee2-944b-03182efb6650\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_2024&amp;utm_content=task&amp;utm_term=010224\/\" target=\"_blank\" rel=\"noreferrer noopener\">Caffeine phishing kit<\/a>.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">New threats detected in January&nbsp;<\/h2>\n\n\n\n<p>We&#8217;ve detected the actions of two backdoors used by APT groups. The first one is associated with <a href=\"https:\/\/app.any.run\/tasks\/9afe3fda-bba7-4c18-8964-7f027e5bc35b?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_2024&amp;utm_content=task&amp;utm_term=010224\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bitter-wmRAT<\/a>. The second one is linked to <a href=\"https:\/\/app.any.run\/tasks\/8fb3665a-4fb2-4538-8d78-01cd0f604d81?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_2024&amp;utm_content=task&amp;utm_term=010224\/\" target=\"_blank\" rel=\"noreferrer noopener\">MustangPanda-Toneshell<\/a>.&nbsp;<\/p>\n\n\n\n<p>Additionally, we&#8217;ve identified a new remote access tool called RadX. Learn more about it <a href=\"https:\/\/app.any.run\/tasks\/c26179af-250f-4525-a43e-21ee43c6bcef?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_2024&amp;utm_content=task&amp;utm_term=010224\/\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">New Signatures and Yara Rules&nbsp;<\/h2>\n\n\n\n<p>We have introduced 17 new signatures for our production system, along with approximately 14 new Linux signatures. We have also added a Yara rule for BazaLoader, which we\u2019ve shared with the community in our GitHub repository <a href=\"https:\/\/github.com\/anyrun\/YARA\/blob\/main\/BazaLoader.yar\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">here<\/a>\u2014 feel free to use it for your own work.&nbsp;<\/p>\n\n\n\n<p><strong>Other updated and added rules include:&nbsp;<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/9cb090b7-7bc1-45f5-b755-4f3c9b1c9b1a\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_2024&amp;utm_content=task&amp;utm_term=010224\/\" target=\"_blank\" rel=\"noreferrer noopener\">BazaLoader<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/app.any.run\/tasks\/eba36a46-f3d7-40db-a9dc-05949049d6d0\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_2024&amp;utm_content=task&amp;utm_term=010224\/\" target=\"_blank\" rel=\"noreferrer noopener\">GCleaner<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/app.any.run\/tasks\/4836c03c-0895-4a04-a5dc-58c5247d1659?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_2024&amp;utm_content=task&amp;utm_term=010224\/\" target=\"_blank\" rel=\"noreferrer noopener\">Xeno-RAT backdoor<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/app.any.run\/tasks\/1354f6ed-6c06-4064-8ab0-1a750b7078a2?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_2024&amp;utm_content=task&amp;utm_term=010224\/\" target=\"_blank\" rel=\"noreferrer noopener\">Zima<\/a> and <a href=\"https:\/\/app.any.run\/tasks\/fee16fba-d4ff-4d0d-8316-bbde5674aaca?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_2024&amp;utm_content=task&amp;utm_term=010224\/\" target=\"_blank\" rel=\"noreferrer noopener\">Rust<\/a> miners.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>We\u2019ve also shared detection rules with <a href=\"https:\/\/community.emergingthreats.net\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The ET community<\/a>, including ZharkBot, RadX, and Xeno-RAT.&nbsp;<\/p>\n\n\n\n<p>In addition, we&#8217;ve added detection for the <a href=\"http:\/\/app.any.run\/tasks\/fa12c9c1-9032-48f1-b9a3-085603e206e3?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_2024&amp;utm_content=task&amp;utm_term=010224\/\" target=\"_blank\" rel=\"noreferrer noopener\">CoinSurf proxy<\/a>, and our new rules proved effective in detecting the <a href=\"https:\/\/app.any.run\/tasks\/17930022-2d96-4be0-bf80-6176cc9ef42b?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_2024&amp;utm_content=task&amp;utm_term=010224\/\" target=\"_blank\" rel=\"noreferrer noopener\">Lumma Stealer<\/a>, even when it attempts to hide under TLS encryption.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nEasily analyze emerging malware with <span class=\"highlight\">ANY.RUN<\/span> cloud malware sandbox&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/#register\/\" rel=\"noopener\" target=\"_blank\">\nRegister for free\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">Various fixes&nbsp;&nbsp;<\/h2>\n\n\n\n<p>We\u2019ve implemented multiple fixes, including one related to <a href=\"https:\/\/app.any.run\/tasks\/9ca615a7-0346-4c5a-8b06-ea147a76b589?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_2024&amp;utm_content=task&amp;utm_term=010224\/\" target=\"_blank\" rel=\"noreferrer noopener\">BazaLoader<\/a> and another for <a href=\"https:\/\/app.any.run\/tasks\/296cae8b-164b-495b-bb5f-e2c0d4914cb2?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_2024&amp;utm_content=task&amp;utm_term=010224\/\" target=\"_blank\" rel=\"noreferrer noopener\">RADX<\/a>.&nbsp; Issues with SystemBC Yara and the extractor were resolved. We\u2019ve also implemented fixes for PrivateLoader and GCleaner, regarding their detection and C2 extraction.&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>About ANY.RUN&nbsp;&nbsp;<\/strong>&nbsp;<\/p>\n\n\n\n<p>ANY.RUN is a cloud malware sandbox that handles the heavy lifting of malware analysis for SOC and DFIR teams. Every day, 300,000 professionals use our platform to investigate incidents and streamline threat analysis.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>Request a demo today and enjoy 14 days of free access to our Enterprise plan.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"http:\/\/any.run\/demo\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=release_notes_jan_2024&amp;utm_content=linktolanding&amp;utm_term=010224\" target=\"_blank\" rel=\"noreferrer noopener\">Request demo \u2192<\/a>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to ANY.RUN\u2019s monthly update series, where we share what the team has been working on this past month.&nbsp;&nbsp;&nbsp; In January, we expanded ANY.RUN\u2019s capabilities, with the support of Linux, improved phishing coverage, detected new threats like Bitter-wmRAT and MustangPanda-Toneshell, introduced over 17 new signatures, including Linux ones, and added multiple new Yara rules.&nbsp; New [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":6408,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[57,10,54,34,55,56],"class_list":["post-6924","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-anyrun","tag-cybersecurity","tag-features","tag-malware-analysis","tag-release","tag-update"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Release Notes: Linux, Signatures, and Coverage of New Threats\u00a0\u00a0<\/title>\n<meta name=\"description\" content=\"In January, ANY.RUN released Linux support, new Signatures, coverage of emerging threats\u00a0and more. Read our new blog post.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2024\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2024\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Release Notes: Linux Support, New Signatures, and Coverage of Emerging Threats\u00a0\u00a0\",\"datePublished\":\"2024-02-01T06:35:40+00:00\",\"dateModified\":\"2025-12-09T10:27:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2024\/\"},\"wordCount\":561,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"features\",\"malware analysis\",\"release\",\"update\"],\"articleSection\":[\"Service Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2024\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2024\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2024\/\",\"name\":\"Release Notes: Linux, Signatures, and Coverage of New Threats\u00a0\u00a0\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2024-02-01T06:35:40+00:00\",\"dateModified\":\"2025-12-09T10:27:05+00:00\",\"description\":\"In January, ANY.RUN released Linux support, new Signatures, coverage of emerging threats\u00a0and more. Read our new blog post.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2024\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service Updates\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Release Notes: Linux Support, New Signatures, and Coverage of Emerging Threats\u00a0\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Release Notes: Linux, Signatures, and Coverage of New Threats\u00a0\u00a0","description":"In January, ANY.RUN released Linux support, new Signatures, coverage of emerging threats\u00a0and more. Read our new blog post.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2024\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2024\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2024\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Release Notes: Linux Support, New Signatures, and Coverage of Emerging Threats\u00a0\u00a0","datePublished":"2024-02-01T06:35:40+00:00","dateModified":"2025-12-09T10:27:05+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2024\/"},"wordCount":561,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","features","malware analysis","release","update"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2024\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2024\/","url":"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2024\/","name":"Release Notes: Linux, Signatures, and Coverage of New Threats\u00a0\u00a0","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2024-02-01T06:35:40+00:00","dateModified":"2025-12-09T10:27:05+00:00","description":"In January, ANY.RUN released Linux support, new Signatures, coverage of emerging threats\u00a0and more. Read our new blog post.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2024\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/release-notes-january-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Service Updates","item":"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/"},{"@type":"ListItem","position":3,"name":"Release Notes: Linux Support, New Signatures, and Coverage of Emerging Threats\u00a0\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/6924"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=6924"}],"version-history":[{"count":3,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/6924\/revisions"}],"predecessor-version":[{"id":17290,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/6924\/revisions\/17290"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/6408"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=6924"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=6924"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=6924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}