Draft:ANY.RUN

From Wikipedia, the free encyclopedia

ANY.RUN
Company typePrivate
IndustryCybersecurity
FounderAleksey Lapshin
HeadquartersDubai, UAE
ProductsMalware sandbox

ANY.RUN is a cybersecurity company headquartered in Dubai, the United Arab Emirates.[1] It is a vendor of an interactive sandbox for malware analysis.[2] [3]

The company was founded in 2016 by Aleksey Lapshin and has a team of 70 people working on its products.[4] [5]

The ANY.RUN Sandbox[edit]

ANY.RUN provides a cloud-based sandbox environment for analyzing potentially malicious software and URLs.[6] [7] Users can upload samples to conduct dynamic malware analysis and observe their behavior in real time, as well as to collect indicators of compromise (IoCs) and enrich security information and event management (SIEM) systems.[8] [9]

ANY.RUN offers a free public community plan with limited features, including analysis in a Windows 7 32-bit VM.[10] [11] The free version offers detailed information about the uploaded file's execution, including the launched processes, network and registry activity, and file data, while upgraded paid plans provide additional functionalities.[11] [12] [13] The sandbox provides several operating system options for analysis.[14]

References[edit]

  1. ^ "ANY.RUN - Crunchbase Company Profile & Funding".
  2. ^ "ANY.RUN - Interactive Online Malware Sandbox". any.run. Retrieved 2024-02-22.
  3. ^ Yahia, Mostafa (2024-02-22). Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs. Packt Publishing (published 2023). pp. 24–26. ISBN 9781837638758.
  4. ^ "Aleksey Lapshin | CEO - ANY.RUN". Forbes Technology Council. Retrieved 2024-03-01.
  5. ^ "Any.Run - An Interactive Malware Analysis Tool - Is Now Open To The Public". BleepingComputer. Retrieved 2024-02-22.
  6. ^ Kleymenov, Alexey; Thabet, Amr (2022). Mastering Malware Analysis: A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks (2nd ed.). Packt Publishing Ltd. pp. 112–113. ISBN 9781803230818.
  7. ^ Ahmed, Mohiuddin; Moustafa, Nour; Barkat, Abu; Haskell-Dowland, Paul, eds. (2022). Next-Generation Enterprise Security and Governance. CRC Press. p. 27. ISBN 9781000569797.
  8. ^ Dahj, Jean Nestor M. (2022). Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense. Packt Publishing Ltd. p. 206. ISBN 9781800208285.
  9. ^ Muñoz, Diego; Cordero, David; Barría Huidobro, Cristian (2019). "Methodology for Malware Scripting Analysis in Controlled Environments Based on Open Source Tools". In Mata-Rivera, Miguel Felix; Zagal-Flores, Roberto; Barría-Huidobro, Cristian (eds.). Telematics and Computing. Communications in Computer and Information Science. Vol. 1053. Cham: Springer International Publishing. p. 348. doi:10.1007/978-3-030-33229-7_29. ISBN 978-3-030-33229-7.
  10. ^ Davidoff, Sherri; Durrin, Matt; Sprenger, Karen (2022). Ransomware and Cyber Extortion: Response and Prevention. Addison-Wesley Professional. ISBN 9780137450435.
  11. ^ a b Dawson, Maurice; Tabona, Oteng; Maupong, Thabiso (2022). Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security. IGI Global. p. 208. ISBN 9781799886938.
  12. ^ Marais, Benjamin; Quertier, Tony; Chesneau, Christophe (2022). "Malware Analysis with Artificial Intelligence and a Particular Attention on Results Interpretability". In Matsui, Kenji; Omatu, Sigeru; Yigitcanlar, Tan; González, Sara Rodríguez (eds.). Distributed Computing and Artificial Intelligence, Volume 1: 18th International Conference. Lecture Notes in Networks and Systems. Vol. 327. Cham: Springer International Publishing. pp. 43–55. arXiv:2107.11100. doi:10.1007/978-3-030-86261-9_5. ISBN 978-3-030-86261-9. S2CID 236318540.
  13. ^ Preeti; Agrawal, A. K. (2022). "A Comparative Analysis of Open Source Automated Malware Tools". 2022 9th International Conference on Computing for Sustainable Global Development (INDIACom). pp. 226–230. doi:10.23919/indiacom54597.2022.9763227. ISBN 978-93-80544-44-1. S2CID 248518588. Retrieved 2024-03-01.
  14. ^ Wilhoit, Kyle; Opacki, Joseph (2022). Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs. Packt Publishing ltd. ISBN 9781801818667.