Cybersecurity Firm ANY.RUN Releases Reports on Four Active Malware Families
DUBAI, DUBAI, UNITED ARAB EMIRATES, August 13, 2024 /EINPresswire.com/ -- ANY.RUN, a leader in interactive malware analysis, has published detailed reports on four significant and active malware families: BlackBasta, DarkTortilla, SSLoad, and WarmCookie. These reports, now available on ANY.RUNโs Malware Trends Tracker page, allow cybersecurity professionals to collect necessary information to detect, analyze, and develop effective protection strategies against these evolving threats.
๐๐ฏ๐๐ซ๐ฏ๐ข๐๐ฐ ๐จ๐ ๐ฆ๐๐ฅ๐ฐ๐๐ซ๐ ๐๐๐ฆ๐ข๐ฅ๐ข๐๐ฌ
1. ๐๐ฅ๐๐๐ค๐๐๐ฌ๐ญ๐: A ransomware-as-a-service (RaaS) run by Storm-1811, known for double extortion: encrypting and stealing data for ransom. First identified in 2022, it often infiltrates systems via spear-phishing, using tools like QakBot and Cobalt Strike, making it a highly sophisticated threat.
ANY.RUNโs sandbox analysis has provided a detailed breakdown of BlackBastaโs infection process, from initial access to the final encryption stages.
2. ๐๐๐ซ๐ค๐๐จ๐ซ๐ญ๐ข๐ฅ๐ฅ๐: A multi-stage crypter used by attackers to spread a variety of harmful payloads, including RATs and information stealers. Active since 2015, DarkTortilla is known for its ability to evade detection by running payloads directly in memory and using social engineering tactics to remain hidden.
ANY.RUN has revealed how DarkTortilla operates, from its initial loading to injecting the main malicious payload into the system through the core processor.
3. ๐๐๐๐จ๐๐: A sophisticated malware loader that downloads and executes additional payloads on compromised systems. It evades detection using encryption and in-memory execution, often spread through phishing emails as part of a broader Malware-as-a-Service (MaaS) operation.
ANY.RUNโs analysis highlights SSLoadโs complex methods, including its use of MSI installers and DLL side-loading to bypass security measures.
4. ๐๐๐ซ๐ฆ๐๐จ๐จ๐ค๐ข๐: Also known as BadSpace, this two-stage backdoor malware spreads via phishing emails mimicking job sites, granting attackers remote access to steal data, deploy malware, and maintain control over infected systems.
ANY.RUNโs sandbox analysis demonstrates how WarmCookie establishes its foothold on targeted systems and communicates with its C2 servers.
๐๐จ๐ฐ ๐ญ๐จ ๐๐ง๐๐ฅ๐ฒ๐ณ๐ ๐ญ๐ก๐๐ฌ๐ ๐ญ๐ก๐ซ๐๐๐ญ๐ฌ ๐ฐ๐ข๐ญ๐ก ๐๐๐.๐๐๐
ANY.RUNโs interactive sandbox offers cybersecurity professionals the tools to deeply analyze these malware families. By uploading samples to the sandbox, users can observe real-time malware behavior, monitor network traffic, and extract valuable Indicators of Compromise (IOCs) to strengthen their defenses.
For a comprehensive look at how these malware operate and to explore the full reports, visit the ANY.RUNโs blog.
๐๐๐จ๐ฎ๐ญ ๐๐๐.๐๐๐
ANY.RUN supports over 400,000 cybersecurity professionals worldwide with its innovative sandbox and threat intelligence tools. Specializing in both Windows and Linux malware analysis, ANY.RUNโs platform provides fast and detailed insights, enabling users to detect, analyze, and respond to emerging threats effectively.
The ANY.RUN team
ANYRUN FZCO
+1 657-366-5050
email us here
Visit us on social media:
X
YouTube
Legal Disclaimer:
EIN Presswire provides this news content "as is" without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the author above.
