Boost up Your SOC & DFIR Operations with ANY.RUN’s Threat Intelligence Feeds


Effective cyber threat detection and response depend on the ability to access actionable, real-time intelligence. ANY.RUN, a trusted name in interactive malware analysis, offers Threat Intelligence (TI) Feeds Integration that gives SOC (Security Operations Center) and DFIR (Digital Forensics and Incident Response) teams a real time intelligence feed.

By combining interactive sandbox analysis with freshly updated Indicators of Compromise (IOCs), ANY.RUN enables organizations to proactively detect, investigate, and prepare against emerging threats.

Incorporating data and technical references from ANY.RUN’s blog post on TI Feeds Integration, this article explores how this integration works and why it is essential and how to boost and simplyfy your SOC/DFIR teams operations.

Get 50 free requests in TI Lookup to enrich your threat investigations 

How Threat Intelligence Feeds Boost Business Performance

Aspect Details
Cost Savings TI feeds reduce costs by proactively identifying and mitigating threats, preventing data breaches, and minimizing reactive measures.
Better Decision-Making High-quality insights help organizations focus on the most critical threats, enabling effective resource allocation and maximizing impact.
Protecting Reputation Early threat detection prevents incidents that could harm a company’s brand, building trust with customers and stakeholders.
Enhanced Operational Efficiency Integrating TI feeds streamlines response processes, improving Mean Time to Resolution (MTTR) and ensuring faster containment and recovery.
Regulatory Compliance TI feeds support compliance with frameworks like GDPR, HIPAA, and PCI by documenting incidents and strengthening security posture.

Leveraging TI feeds is key to sustaining resilient and efficient operations in an increasingly complex threat landscape.

Features and Technical Functionality of ANY.RUN’s TI Feeds

ANY.RUN’s Threat Intelligence Feeds provide enriched IOC data, collected and pre-processed from malware and phishing samples uploaded by a global community of 500,000 cybersecurity researchers.

These feeds are designed to integrate seamlessly into SIEMs, TIPs, and other security platforms, offering both ease of use and context-rich insights.

Types of Indicators Provided

Malicious IP Addresses:

IPs linked to C2 (Command and Control) servers, phishing campaigns, and other malicious activities.

Use case: SOC teams can block these IPs in firewalls or investigate attack origins using contextual threat data.

type: ipv4-addr
      id: ipv4-addr--75725b48-17a3-575d-a5de-b5d9798bde8d
      value: 103.168.67.9
      created: '2024-06-13T06:26:00.704Z'
      modified: '2024-06-13T06:26:00.704Z'
      external_references:
        - source_name: ANY.RUN task 11ce507f-d535-4bf1-8973-989d7654017a
          url: https://app.any.run/tasks/11ce507f-d535-4bf1-8973-989d7654017a
      labels:
        - RedLine
      related_objects:
        - relationship_type: contains
          source_ref: ipv4-addr--75725b48-17a3-575d-a5de-b5d9798bde8d
          target_ref: file--49ef9153-94eb-5d05-bac2-19a54738afab
      created_by_ref: identity--96a9cd9c-2f73-5ad3-a2ab-c14b3eba65c7
      score: 90
      revoked: false

Example: An IP may be flagged as part of a ransomware C2 infrastructure, offering additional parameters such as detection timestamps or file associations.

Domains:

Domains used in web-based attacks: ANY.RUN enriches these with historical detection details, threat names, types, and associated hashes, helping analysts track the scope of a campaign.

type: domain-name
      id: domain-name--f17dd142-08ac-54cb-bb88-97f1e07fb6fc
      value: mail.sdil.ac.ir
      created: '2024-06-10T21:13:17.465Z'
      modified: '2024-06-17T13:37:53.620Z'
      external_references:
        - source_name: ANY.RUN task 64e1d470-dcd4-4d78-b1f0-aa4d9bd6f225
          url: https://app.any.run/tasks/64e1d470-dcd4-4d78-b1f0-aa4d9bd6f225
        - source_name: ANY.RUN task 090c21da-a050-4f88-bb09-1bae142df1cb
          url: https://app.any.run/tasks/090c21da-a050-4f88-bb09-1bae142df1cb
      labels:
        - AgentTesla
      related_objects:
        - relationship_type: contains
          source_ref: domain-name--f17dd142-08ac-54cb-bb88-97f1e07fb6fc
          target_ref: file--dbee2af2-3be4-5e2a-9bf3-94e3fe8637b3
        - relationship_type: contains
          source_ref: domain-name--f17dd142-08ac-54cb-bb88-97f1e07fb6fc
          target_ref: file--9794dd40-085a-5c84-8d95-70cbd8efcf1d
      created_by_ref: identity--96a9cd9c-2f73-5ad3-a2ab-c14b3eba65c7
      score: 100
      revoked: false

Example: A phishing domain distributing malware may provide insight into connected campaigns or additional compromised assets.

URLs:

URLs are frequently employed to distribute malware, initiate phishing attacks, or redirect users to malicious content.

type: url
      id: url--001c0f70-93f8-583d-96ce-7c260da3a193
      value: http://www.goog1evip15.com/dogw/
      created: '2024-06-11T21:35:59.640Z'
      modified: '2024-06-11T21:35:59.640Z'
      external_references:
        - source_name: ANY.RUN task 55051854-38c4-4d03-a70a-6dd2ce3d89ca
          url: https://app.any.run/tasks/55051854-38c4-4d03-a70a-6dd2ce3d89ca
      labels:
        - Formbook
      related_objects: []
      created_by_ref: identity--96a9cd9c-2f73-5ad3-a2ab-c14b3eba65c7
      score: 100
      revoked: false

ANY.RUN’s TI Feeds analyze these URLs, helping organizations block or investigate attack vectors in real time.

File Hashes and Ports:

File hashes tied to specific threats allow for cross-referencing against internal logs.

type: file
      id: file--249382b0-209d-5904-b725-b47663c6c412
      hashes:
        SHA-256: d564eb94afb174fe3b854de086eda2a4e015d778a9aea9806e79f82044eac74e
        SHA-1: 14b96459dff641245aea6dacd34512830d945ee2
        MD5: 5edee175c5003771dea841893ea46602
      created_by_ref: identity--96a9cd9c-2f73-5ad3-a2ab-c14b3eba65c7
      score: 100
      file_name: d564eb94afb174fe3b854de086eda2a4e015d778a9aea9806e79f82044eac74e.exe
    - type: url
      id: url--d65b67ec-39f2-5309-8cc9-56e016b6a48f
      value: http://109.248.151.196/rvBZyVEAb230.bin
      created: '2024-06-11T18:44:15.898Z'
      modified: '2024-06-11T18:44:15.898Z'
      external_references:
        - source_name: ANY.RUN task 35d75e14-c1a2-418c-b98f-f7d58cca93cb
          url: https://app.any.run/tasks/35d75e14-c1a2-418c-b98f-f7d58cca93cb
      labels:
        - guloader
      related_objects:
        - relationship_type: contains
          source_ref: url--d65b67ec-39f2-5309-8cc9-56e016b6a48f
          target_ref: file--249382b0-209d-5904-b725-b47663c6c412
      created_by_ref: identity--96a9cd9c-2f73-5ad3-a2ab-c14b3eba65c7
      score: 100
      revoked: false

Ports involved in malicious activity help trace usage patterns in C2 communication.

Malicious IP addresses are often linked to Command and Control (C2) servers, phishing campaigns, and other harmful activities.  

Core Advantages of ANY.RUN’s TI Feeds for SOC/DFIR Teams

Feature Details
1. Fresh, Processed Threat Intelligence
Real-time Updates IOCs are updated every few hours, leveraging the latest public data from malware samples uploaded to the ANY.RUN sandbox.
Pre-processed and Validated Data is filtered using advanced algorithms and proprietary technology to ensure accurate, actionable intelligence, reducing noise and false positives.
2. Rich Contextual Enrichment
Sandbox Insights Every IOC is enriched with direct links to the corresponding sandbox session, enabling analysts to view memory dumps, network traffic, behavior patterns, and more.
Threat Campaign Details Analysts can inspect associated threat names, detection timestamps, and related files to understand an attack’s broader context.
3. Seamless Integration with SIEMs and TIPs
Standardized Formats TI Feeds are delivered in widely-used formats such as STIX and MISP, ensuring compatibility with solutions like Splunk, OpenCTI, and ThreatConnect.
Plug-and-Play Compatibility Feeds can be integrated into existing systems with minimal configuration, enabling organizations to enhance their threat detection capabilities quickly.
4. Improved Operational Efficiency
Streamlined Threat Hunting Fresh IOCs empower threat hunters to focus on emerging threats with precision and speed.
Reduced MTTR SOC and DFIR teams can lower Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR) by accessing enriched threat intelligence directly in workflows.

How to Integrate ANY.RUN’s TI Feeds into Security Operations

Step 1: Setting Up the Integration

Log into the ANY.RUN dashboard with an account registered to a custom domain email.

First, navigate to the Feeds Dashboard and select the desired IOC categories (URLs, IPs, domains, etc.) and Copy the feed URL and API key.

Paste these credentials into the Threat Intelligence Feeds section of your SIEM or TIP system. Details vary by vendor but typically involve finding a “source input” for threat intelligence.

Contact ANY.RUN To integrate ANY.RUN TI Feeds in your organization 

ANY.RUN’s Threat Intelligence Feeds Integration offers a transformative approach to effective cybersecurity operations for SOC and DFIR teams.

By providing enriched, real-time IOC data collected from a global community of malware researchers, these feeds optimize threat detection and response processes.

The ability to integrate seamlessly with SIEMs and TIPs while providing direct access to sandbox-linked insights enables actionable, precise decision-making.

The emphasis on freshness, contextual enrichment, and compatibility with industry standards makes ANY.RUN’s TI Feeds indispensable for organizations aiming to strengthen their security posture.

Whether you are responding to incidents, hunting threats, or defending against evolving threats, ANY.RUN is a powerful partner in your cybersecurity strategy.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free



Source link