ANY.RUN
705 subscribers
725 photos
33 videos
608 links
Empowering businesses with proactive security solutions: Interactive Sandbox, TI Lookup and Feeds.
Official web: https://any.run Sign up: https://app.any.run/#register
Download Telegram
#ANYRUN's August updates:
πŸ”— New connectors for Microsoft Sentinel & OpenCTI
🐧 SDK upgrade with Linux Debian ARM support
⚑ 2,200+ new detection rules for broader coverage

πŸ‘‰ See how these upgrades boost detection.
❀7πŸ‘Ύ3πŸ‘1
🚨 Salty2FA is a new phishkit linked to Storm-1575. Active since June, it bypasses 2FA methods, giving attackers access beyond stolen creds.

With its unique domain pattern and multi-stage execution chain, it targets finance, energy, telecom and more.

πŸ‘‰ Read analysis.
πŸ‘Ύ7❀3πŸ‘1
Top 10 last week's threats by uploads 🌐
⬇️ #Lumma 746 (796)
⬆️ #Xworm 521 (407)
⬇️ #Quasar 388 (470)
⬇️ #Agenttesla 342 (344)
⬆️ #Vidar 282 (260)
⬆️ #Remcos 272 (169)
⬆️ #Hijackloader 267 (90)
⬇️ #Stealc 228 (229)
⬇️ #Dcrat 219 (245)
⬇️ #Amadey 200 (227)

πŸ‘‰ Track them all.
#Top10Malware
❀7πŸ‘Ύ2πŸ”₯1
🚨 ACR Stealer is a rising MaaS that steals credentials, crypto wallets and business data while evading defenses.

Its distribution has surged in 2025, targeting both enterprises and individuals.

πŸ‘‰ See how it works and how threat intelligence helps stop it.
❀9πŸ‘Ύ2πŸ”₯1
🐟 Phishing activity in the past 7 days.
Track latest phishing threats in TI Lookup, now available for free.
❀7πŸ‘Ύ3πŸ‘1
πŸ‘¨β€πŸ’» TI Lookup gives your SOC/DFIR instant access to live threat data and real-world attack context, helping optimize detection and response.

95% of teams already speed up investigations.
πŸ” Start for free.
❀7πŸ‘3πŸ‘Ύ2
πŸš€ #ANYRUN's TI Feeds now integrate with IBM QRadar SIEM.

Cut MTTR/D, boost KPIs & optimize SOC ROI.

πŸ‘‰ Achieve stronger security and business results now.
❀5πŸ†5πŸ‘2πŸ‘Ύ1
Evasive malware tactics bypass traditional defenses 🚨

Join our technical webinar where our experts will walk through real-world cases and share practical detection tips.
 
πŸ“… September 17 | Live session + Q&A
πŸ‘‰ Register and bring your team
❀6πŸ”₯3πŸ‘1
🚨 From fake interviews to hijacked open source packages, Lazarus Group escalated its operations in 2025

Discover all active campaigns and malware of this APT and get actionable advice for your SOC to be ready for the next attack. Read now.
❀5πŸ‘2😱2
🚨 Fileinfectors Evolved: Spreading Ransomware Across Enterprise Networks
⚠️ Fileinfector malware inserts its code into files. These threats once spread mainly through external drives and local systems. Today’s file infectors are mostly hybrid variants, frequently combined with ransomware.

These variants encrypt data and inject malicious code into files, enabling further spread when infected files are executed.

❗️ They are especially dangerous in corporate environments with shared folders, where a single infected file can rapidly spread across the network and cause widespread damage.
Such outbreaks overwhelm security teams, complicate incident response, and disrupt business continuity.

πŸ‘¨β€πŸ’» An optimized SOC that relies on early detection, behavioral analysis, and proactive hunting is critical to limiting impact. Let’s see malware execution on a live system.
πŸ‘‰ See analysis.

In this case, the malware is interacting with multiple files and modifying their content. The infected files became executables, with PE headers confirming injected malicious code.
The analysis revealed hybrid behavior: a fileinfector acting like ransomware, enabling further spread on execution.

πŸ” Use this TI Lookup search query to explore fileinfector activity and enrich IOCs with actionable threat context.
πŸ‘Ύ Gather malware hashes and infected files to power proactive hunting.

Hybrid fileinfectors pose a significant threat to enterprise networks. Leveraging #ANYRUN Sandbox and TI Lookup reduces MTTR by up to 21 minutes per case and gives access to 24x more IOCs from millions of past analyses.

Strengthen resilience and protect critical assets through proactive security with #ANYRUN πŸš€ #ExploreWithANYRUN
πŸ‘Ύ5❀4πŸ”₯1
πŸ‘Ύ 73% of attacks start with phishing, yet SOC teams often miss early signs. IOC enrichment helps detect them earlier and refine detection rules.

πŸ‘‰ See how context-rich data strengthens proactive defense.
πŸ”₯6❀2πŸ‘Ύ2
Which artifact is hardest to investigate without context?
Anonymous Poll
19%
Domains & URLs
46%
File hashes
19%
IP addresses
38%
TTPs
❀6πŸ‘¨β€πŸ’»2πŸ‘Ύ2
Top 10 last week's threats by uploads 🌐

⬆️ #Lumma 969 (726)
⬆️ #Quasar 399 (381)
⬆️ #Amadey 382 (192)
⬆️ #Redline 376 (179)
⬆️ #Vidar 365 (275)
⬇️ #Agenttesla 291 (336)
⬆️ #Remcos 274 (262)
⬇️ #Xworm 261 (515)
⬆️ #Dcrat 245 (209)
⬆️ #Stealc 233 (224)

πŸ‘‰ Track them all.
#Top10Malware
πŸ”₯5❀3πŸ‘Ύ2
🚨 How prepared is your SOC for evasive malware?
Get practical tips in our live technical #webinar on September 17.
 
Our experts will break down real cases β€” from #phishing kits and #ClickFix to Living-Off-the-Land attacks β€” and share detection methods teams can apply right away.
 
πŸ‘‰ Save your spot.
❀6πŸ”₯3πŸ‘1