Threat Coverage Digest: New Malware Reports and 2,400+ Detection Rules

February brought another round of major detection improvements across ANY.RUN’s threat intelligence and sandbox coverage. Alongside new Threat Intelligence reports, our analysts expanded behavioralvisibility across dozens of malware families, strengthened detection logic for modern phishing and data-stealing campaigns, and added thousands of new network detection rules. 

Introduction to Malware Binary Triage (IMBT) Course

Looking to level up your skills? Get 10% off using coupon code: MWNEWS10 for any flavor.

Enroll Now and Save 10%: Coupon Code MWNEWS10

Note: Affiliate link – your enrollment helps support this platform at no extra cost to you.

Let’s take a closer look at the updates delivered this month. 

Threat Intelligence Reports 

In February, we published several new Threat Intelligence Reports covering malware families and attack techniques currently observed in the wild. All reports are available to TI Lookup Premium users, along with related IOCs, detection guidance, and TI Lookup pivot queries. 

Threat Intelligence Reports on recent malware and phishing attacks written by ANY.RUN experts

The reports cover the following threats: 

  • Anypdf, Greenblood, Dynowiper: A credential-stealing trojan disguised as a PDF viewer, a Go-based ransomware with data-theft capabilities, and a destructive wiper designed to overwrite files and make recovery impossible. 

Improve SOC metrics and reduce business risk
Validate alerts in seconds with behavior-based proof   

Integrate now

Behavior Signatures 

In February, we expanded the malicious behavior coverage of ANY.RUN’s Interactive Sandbox with 150 new behavior signatures. These updates help teams surface malicious activity faster during analysis sessions and reduce investigation time by highlighting key indicators automatically. 

The new signatures cover a wide range of malware families, including loaders, stealers, ransomware strains, and remote access tools commonly used in modern intrusion campaigns. 

Among the threats now detected in the sandbox: 

Evasion and discovery techniques:

ANY.RUN’s Interactive Sandbox exposing Rutsstager attacks ANY.RUN’s Interactive Sandbox exposing Rutsstager attacks 

Loaders and droppers:

Power your SOC with fresh threat intel
from 15K organizations and 600K analysts  

Sign up now

Remote access and control:

EtherRAT detected by ANY.RUN sandbox 

Stealers and credential-focused threats: 

Malware families and tools observed in sessions:

Conspiration3001 attack analyzed inside ANY.RUN sandbox Conspiration3001 attack analyzed inside ANY.RUN sandbox 

YARA Rules 

To improve early-stage detection during static inspection, we added 2 new YARA rules targeting destructive malware and RAT activity. 

The new rules detect: 

  • DynoWiper: A destructive wiper capable of damaging systems and disrupting operations 
  • KarstoRAT: A remote access trojan capable of maintaining persistence and executing commands on infected machines 

These rules allow analysts to quickly flag suspicious samples before full execution, accelerating triage and investigation workflows. 

Detect malware & phishing in less than 60 seconds
Reduce investigation time  and unnecessary escalations

Register now

Suricata Rules 

In February, we significantly expanded network-level detection with 2,314 new Suricata rules

These additions strengthen monitoring capabilities for stealer activity, phishing infrastructure, and modern command-and-control communication patterns. 

A Suricata rule used for detecting a Tycoon URL pattern inside ANY.RUN’s sandbox 

Key examples include: 

  • PureLogs TCP C2 connection (sid: 85006096): Identifies PureLogs Stealer attempts to establish connection with its C2 host 

These new rules help SOC teams identify malicious network activity earlier and gain deeper visibility into attacker infrastructure and data exfiltration channels. 

About ANY.RUN 

ANY.RUN, a leading provider of interactive malware analysis and threat intelligence solutions, integrates into modern SOC operations and supports investigations from the first alert through containment and detection improvement. 

Security teams use ANY.RUN’s Interactive Sandbox to execute suspicious files and URLs safely, observe real behavior in a controlled environment, extract actionable indicators, and enrich findings instantly with Threat Intelligence Lookup and Threat Intelligence Feeds. This approach reduces uncertainty, improves validation accuracy, and keeps response consistent across the organization. 

Today, more than 600,000 security professionals across 15,000+ organizations rely on ANY.RUN to accelerate investigations, strengthen detection coverage, and stay ahead of evolving phishing and malware campaigns. 

Integrate ANY.RUN’s solution for Tier 1/2/3 in your organization → 

The post Threat Coverage Digest: New Malware Reports and 2,400+ Detection Rules   appeared first on ANY.RUN's Cybersecurity Blog.

Article Link: Threat Coverage Digest: New TI Reports and 2,400+ Detection Rules

1 post - 1 participant

Read full topic



Malware Analysis, News and Indicators - Latest topics
Next Post Previous Post