Threat Coverage Digest: New Malware Reports and 2,400+ Detection Rules
好的,我现在需要帮用户总结这篇文章的内容,控制在100个字以内。首先,我得快速浏览文章,抓住主要信息。 文章主要讲的是ANY.RUN在2月份进行了威胁情报和沙盒检测的改进。他们发布了新的威胁情报报告,覆盖了多个恶意软件家族和攻击技术。此外,他们还增加了行为签名、YARA规则和Suricata规则,以提升检测能力。 接下来,我需要将这些要点浓缩成一句话。要确保涵盖威胁情报报告、行为检测、网络规则等方面,并且提到这些改进帮助安全团队更早地识别威胁。 最后,检查字数是否在100字以内,并且表达清晰简洁。 </think> ANY.RUN在2月份提升了威胁情报和沙盒检测能力,新增行为签名、网络规则及YARA规则,覆盖多种恶意软件家族和攻击技术,帮助安全团队更早识别威胁。 2026-3-5 10:48:59 Author: any.run(查看原文) 阅读量:8 收藏

February brought another round of major detection improvements across ANY.RUN’s threat intelligence and sandbox coverage. Alongside new Threat Intelligence reports, our analysts expanded behavioral visibility across dozens of malware families, strengthened detection logic for modern phishing and data-stealing campaigns, and added thousands of new network detection rules. 

Let’s take a closer look at the updates delivered this month. 

Threat Intelligence Reports 

In February, we published several new Threat Intelligence Reports covering malware families and attack techniques currently observed in the wild. All reports are available to TI Lookup Premium users, along with related IOCs, detection guidance, and TI Lookup pivot queries. 

Threat Intelligence Reports on recent malware and phishing attacks written by ANY.RUN experts

The reports cover the following threats: 

  • Anypdf, Greenblood, Dynowiper: A credential-stealing trojan disguised as a PDF viewer, a Go-based ransomware with data-theft capabilities, and a destructive wiper designed to overwrite files and make recovery impossible. 

Behavior Signatures 

In February, we expanded the malicious behavior coverage of ANY.RUN’s Interactive Sandbox with 150 new behavior signatures. These updates help teams surface malicious activity faster during analysis sessions and reduce investigation time by highlighting key indicators automatically. 

The new signatures cover a wide range of malware families, including loaders, stealers, ransomware strains, and remote access tools commonly used in modern intrusion campaigns. 

Among the threats now detected in the sandbox: 

Evasion and discovery techniques:

ANY.RUN’s Interactive Sandbox exposing Rutsstager attacks 
ANY.RUN’s Interactive Sandbox exposing Rutsstager attacks 

Loaders and droppers:

Remote access and control:

EtherRAT detected by ANY.RUN sandbox 

Stealers and credential-focused threats: 

Malware families and tools observed in sessions:

Conspiration3001 attack analyzed inside ANY.RUN sandbox 
Conspiration3001 attack analyzed inside ANY.RUN sandbox 

YARA Rules 

To improve early-stage detection during static inspection, we added 2 new YARA rules targeting destructive malware and RAT activity. 

The new rules detect: 

  • DynoWiper: A destructive wiper capable of damaging systems and disrupting operations 
  • KarstoRAT: A remote access trojan capable of maintaining persistence and executing commands on infected machines 

These rules allow analysts to quickly flag suspicious samples before full execution, accelerating triage and investigation workflows. 

Suricata Rules 

In February, we significantly expanded network-level detection with 2,314 new Suricata rules

These additions strengthen monitoring capabilities for stealer activity, phishing infrastructure, and modern command-and-control communication patterns. 

A Suricata rule used for detecting a Tycoon URL pattern inside ANY.RUN’s sandbox 

Key examples include: 

  • PureLogs TCP C2 connection (sid: 85006096): Identifies PureLogs Stealer attempts to establish connection with its C2 host 

These new rules help SOC teams identify malicious network activity earlier and gain deeper visibility into attacker infrastructure and data exfiltration channels. 

About ANY.RUN 

ANY.RUN, a leading provider of interactive malware analysis and threat intelligence solutions, integrates into modern SOC operations and supports investigations from the first alert through containment and detection improvement. 

Security teams use ANY.RUN’s Interactive Sandbox to execute suspicious files and URLs safely, observe real behavior in a controlled environment, extract actionable indicators, and enrich findings instantly with Threat Intelligence Lookup and Threat Intelligence Feeds. This approach reduces uncertainty, improves validation accuracy, and keeps response consistent across the organization. 

Today, more than 600,000 security professionals across 15,000+ organizations rely on ANY.RUN to accelerate investigations, strengthen detection coverage, and stay ahead of evolving phishing and malware campaigns. 

Integrate ANY.RUN’s solution for Tier 1/2/3 in your organization → 


文章来源: https://any.run/cybersecurity-blog/threat-coverage-digest-february-2026/
如有侵权请联系:admin#unsafe.sh