Malware Trends Overview Report: 2024

Post a Comment

2024 has been an eventful year in the world of cybersecurity, with new trends emerging and malware families evolving at an alarming rate. Our analysis highlights the most prevalent malware families, types, and TTPs of the year, giving you a snapshot of the changing threat landscape. 

Introduction to Malware Binary Triage (IMBT) Course

Looking to level up your skills? Get 10% off using coupon code: MWNEWS10 for any flavor.

Enroll Now and Save 10%: Coupon Code MWNEWS10

Note: Affiliate link – your enrollment helps support this platform at no extra cost to you.

The number of sandbox sessions in ANY.RUN has grown by 33% in 2024

This report is based on the analysis of 4,001,036 public sessions conducted by ANY.RUN’s community inside the Interactive Sandbox over the last 12 months, which is 1 million more than the 2,991,551 sessions in 2023. Of these, 790,549 were tagged as malicious and 211,517 as suspicious, reflecting a rise in suspicious activity compared to the 148,124 suspicious sessions identified in 2023. 

ANY.RUN identified an astonishing 1,872,273,168 IOCs in 2024—nearly three times more than the 640,158,713 IOCs uncovered in 2023. This sharp growth highlights not only the expanding use of the platform but also the improved threat coverage and detection capabilities of ANY.RUN

Top Malware Types in 2024 

In 2024, Stealers dominated with 51,291 detections, marking a significant rise compared to 2023, when they were in second place with just 18,290 detections. This highlights their growing popularity among attackers for data theft. 

Loaders moved to second place in 2024 with 28,754 detections, a slight increase from their leading position in 2023, where they accounted for 24,136 detections. Despite the shift, Loaders remain a critical component in delivering malware payloads. 

RATs (Remote Access Trojans) maintained their third position but saw an increase from 17,431 detections in 2023 to 24,430 detections in 2024, reflecting their continued importance in providing attackers remote control over compromised systems. 

Stealers made a jump from the second spot in 2023 to being the most common malware type in 2024
                <thead>        <tr>
                            <th>
                                    #                    </th>
                                            <th>
                                    Type                    </th>
                                            <th>
                                    Detections                    </th>
                                    </tr>
                </thead><tbody>        <tr>
                            <td>
                                    1                    </td>
                                            <td>
                                    <a href="https://any.run/malware-trends/stealer" rel="noreferrer" target="_blank">Stealer</a>                    </td>
                                            <td>
                                    51,291                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    2                    </td>
                                            <td>
                                    <a href="https://any.run/malware-trends/loader" rel="noreferrer" target="_blank">Loader</a>                    </td>
                                            <td>
                                    28,754                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    3                    </td>
                                            <td>
                                    <a href="https://any.run/malware-trends/rat" rel="noreferrer" target="_blank">RAT</a>                    </td>
                                            <td>
                                    24,430                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    4                    </td>
                                            <td>
                                    <a href="https://any.run/malware-trends/ransomware" rel="noreferrer" target="_blank">Ransomware</a>                    </td>
                                            <td>
                                    21,434                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    5                    </td>
                                            <td>
                                    <a href="https://any.run/malware-trends/keylogger" rel="noreferrer" target="_blank">Keylogger</a>                    </td>
                                            <td>
                                    8,119                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    6                    </td>
                                            <td>
                                    <a href="https://any.run/malware-trends/trojan" rel="noreferrer" target="_blank">Trojan</a>                    </td>
                                            <td>
                                    6,156                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    7                    </td>
                                            <td>
                                    <a href="https://any.run/malware-trends/miner" rel="noreferrer" target="_blank">Miner</a>                    </td>
                                            <td>
                                    5,803                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    8                    </td>
                                            <td>
                                    <a href="https://any.run/malware-trends/adware" rel="noreferrer" target="_blank">Adware</a>                    </td>
                                            <td>
                                    4,591                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    9                    </td>
                                            <td>
                                    Exploit                    </td>
                                            <td>
                                    4,271                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    10                    </td>
                                            <td>
                                    <a href="https://any.run/malware-trends/backdoor" rel="noreferrer" target="_blank">Backdoor</a>                    </td>
                                            <td>
                                    2,808                    </td>
                                    </tr>
                </tbody></table>

To collect fresh threat intelligence on emerging cyber threats, make sure to use TI Lookup, a service that lets you search ANY.RUN’s vast database of the latest threat data.

Search results in TI Lookup for RAT malware targeting users in Colombia

It features over 40 search parameters, including IPs, mutexes, and even YARA rules, allowing you to pin the tiniest artifacts to specific malware and phishing attacks and enrich your TI with additional context and actionable indicators.

Learn more about Threat Intelligence Lookup →

Enrich your threat knowledge with TI Lookup


Enrich your threat knowledge with TI Lookup

Learn about TI Lookup and its capabilities to see how it can contribute to your company’s security

Top Malware Families in 2024 

In 2024, Lumma Stealer jumped straight to the top with 12,655 detections, taking over the ranking from nowhere as it wasn’t seen in the 2023 report. Its rapid rise shows how quickly cybercriminals have adopted it. 

Agent Tesla moved up to second place in 2024 with 8,443 detections, compared to 4,215 detections in 2023 when it was in third place. Its continued presence shows it remains a go-to choice for attackers. 

AsyncRAT claimed third place in 2024 with 8,257 detections, while in 2023, Redline was the most popular malware family with 9,205 detections, and Remcos followed with 4,407 detections. 

Lumma dominated the threat landscape in 2024
                <thead>        <tr>
                            <th>
                                    #                    </th>
                                            <th>
                                    Name                    </th>
                                            <th>
                                    Detections                    </th>
                                    </tr>
                </thead><tbody>        <tr>
                            <td>
                                    1                    </td>
                                            <td>
                                    <a href="https://any.run/malware-trends/lumma" rel="noreferrer" target="_blank">Lumma</a>                    </td>
                                            <td>
                                    12,655                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    2                    </td>
                                            <td>
                                    <a href="https://any.run/malware-trends/agenttesla" rel="noreferrer" target="_blank">Agent Tesla</a>                    </td>
                                            <td>
                                    8,443                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    3                    </td>
                                            <td>
                                    <a href="https://any.run/malware-trends/asyncrat" rel="noreferrer" target="_blank">AsyncRAT</a>                    </td>
                                            <td>
                                    8,257                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    4                    </td>
                                            <td>
                                    <a href="https://any.run/malware-trends/remcos" rel="noreferrer" target="_blank">Remcos</a>                    </td>
                                            <td>
                                    8,004                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    5                    </td>
                                            <td>
                                    <a href="https://any.run/malware-trends/stealc" rel="noreferrer" target="_blank">Stealc</a>                    </td>
                                            <td>
                                    7,653                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    6                    </td>
                                            <td>
                                    <a href="https://any.run/malware-trends/xworm" rel="noreferrer" target="_blank">Xworm</a>                    </td>
                                            <td>
                                    7,237                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    7                    </td>
                                            <td>
                                    <a href="https://any.run/malware-trends/redline" rel="noreferrer" target="_blank">Redline</a>                    </td>
                                            <td>
                                    7,189                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    8                    </td>
                                            <td>
                                    <a href="https://any.run/malware-trends/amadey" rel="noreferrer" target="_blank">Amadey</a>                    </td>
                                            <td>
                                    5,902                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    9                    </td>
                                            <td>
                                    <a href="https://any.run/malware-trends/snakekeylogger" rel="noreferrer" target="_blank">Snake</a>                    </td>
                                            <td>
                                    4,304                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    10                    </td>
                                            <td>
                                    <a href="https://any.run/malware-trends/njrat" rel="noreferrer" target="_blank">njRAT</a>                    </td>
                                            <td>
                                    3,522                    </td>
                                    </tr>
                </tbody></table>

With TI Lookup, you can track all of these and other malware families and stay updated on their evolving infrastructure. Here is an example of a request to TI Lookup to find Lumma domains:

                <tbody>        <tr>
                            <td>
                                    <a href="https://intelligence.any.run/analysis/lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=malware_report_2024&amp;utm_term=160125&amp;utm_content=linktolookup#%7B%2522query%2522:%2522threatName:%255C%2522lumma%255C%2522%2520AND%2520domainName:%255C%2522%255C%2522%2522,%2522dateRange%2522:180%7D" rel="noreferrer" target="_blank">threatName:"lumma" AND domainName:""</a>                    </td>
                                    </tr>
                </tbody></table>
TI Lookup can provide you with auto updates on specific queries

The service provides a list of relevant domain names used by the malware. Many of them are marked with the malconf tag, indicating that these domains were extracted from Lumma samples’ configurations.

Get 50 free search requests to test TI Lookup 

Contact us

Top MITRE ATT&CK Techniques in 2024 

The MITRE ATT&CK framework is a globally recognized resource that breaks down how attackers operate, mapping their tactics and techniques into clear categories. It’s an invaluable tool for cybersecurity professionals to understand and respond to threats effectively. 

2024 results show an increase in the abuse of PowerShell by attackers

In 2024, ANY.RUN recorded over 1.4 million matches to ATT&CK techniques, a noticeable increase from 1.2 million matches in 2023.  

The rankings saw some significant changes: Masquerading (T1036.005), the top technique in 2023 with 486,058 matches, was overtaken in 2024 by PowerShell (T1059.001) and CMD (T1059.003), which led the list with 162,814 and 148,443 matches, respectively. 

In 2024, new techniques appeared that were absent in 2023, including Python scripting (T1059.004) with 50,002 matches, System Checks for Sandbox Evasion (T1497.001) with 47,630 matches, and Linux Permissions Modification (T1222.002) with 38,760 matches. 

                <thead>        <tr>
                            <th>
                                    Rank&nbsp;                    </th>
                                            <th>
                                    Technique ID&nbsp;                    </th>
                                            <th>
                                    Technique Name&nbsp;                    </th>
                                            <th>
                                    Detections                    </th>
                                    </tr>
                </thead><tbody>        <tr>
                            <td>
                                    1&nbsp;                    </td>
                                            <td>
                                    T1059.001&nbsp;                    </td>
                                            <td>
                                    Command and Scripting Interpreter: PowerShell&nbsp;                    </td>
                                            <td>
                                    162,814                     </td>
                                    </tr>
                        <tr>
                            <td>
                                    2&nbsp;                    </td>
                                            <td>
                                    T1059.003&nbsp;                    </td>
                                            <td>
                                    Command and Scripting Interpreter: Windows CMD&nbsp;                    </td>
                                            <td>
                                    148,443&nbsp;                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    3&nbsp;                    </td>
                                            <td>
                                    T1497.003&nbsp;                    </td>
                                            <td>
                                    Virtualization/Sandbox Evasion: Time-Based&nbsp;                    </td>
                                            <td>
                                    134,260&nbsp;                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    4&nbsp;                    </td>
                                            <td>
                                    T1036.003&nbsp;                    </td>
                                            <td>
                                    Masquerading: Rename System Utilities&nbsp;                    </td>
                                            <td>
                                    126,008&nbsp;                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    5&nbsp;                    </td>
                                            <td>
                                    T1562.002&nbsp;                    </td>
                                            <td>
                                    Impair Defenses: Disable Antivirus Tools&nbsp;                    </td>
                                            <td>
                                    122,256&nbsp;                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    6&nbsp;                    </td>
                                            <td>
                                    T1218.011&nbsp;                    </td>
                                            <td>
                                    System Binary Proxy Execution: Rundll32&nbsp;                    </td>
                                            <td>
                                    86,760&nbsp;                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    7&nbsp;                    </td>
                                            <td>
                                    T1114.001&nbsp;                    </td>
                                            <td>
                                    Email Collection: Local Email Collection&nbsp;                    </td>
                                            <td>
                                    85,546&nbsp;                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    8&nbsp;                    </td>
                                            <td>
                                    T1547.001&nbsp;                    </td>
                                            <td>
                                    Boot or Logon Autostart Execution: Registry Run Keys&nbsp;                    </td>
                                            <td>
                                    73,842&nbsp;                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    9&nbsp;                    </td>
                                            <td>
                                    T1053.005&nbsp;                    </td>
                                            <td>
                                    Scheduled Task/Job: Scheduled Task&nbsp;                    </td>
                                            <td>
                                    68,423&nbsp;                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    10&nbsp;                    </td>
                                            <td>
                                    T1569.002&nbsp;                    </td>
                                            <td>
                                    System Services: Service Execution&nbsp;                    </td>
                                            <td>
                                    51,345&nbsp;                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    11&nbsp;                    </td>
                                            <td>
                                    T1059.004&nbsp;                    </td>
                                            <td>
                                    Command and Scripting Interpreter: Python&nbsp;                    </td>
                                            <td>
                                    50,002&nbsp;                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    12&nbsp;                    </td>
                                            <td>
                                    T1036.005&nbsp;                    </td>
                                            <td>
                                    Masquerading: Match Legitimate Name or Location&nbsp;                    </td>
                                            <td>
                                    49,031&nbsp;                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    13&nbsp;                    </td>
                                            <td>
                                    T1497.001&nbsp;                    </td>
                                            <td>
                                    Virtualization/Sandbox Evasion: System Checks&nbsp;                    </td>
                                            <td>
                                    47,630&nbsp;                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    14&nbsp;                    </td>
                                            <td>
                                    T1543.002&nbsp;                    </td>
                                            <td>
                                    Create or Modify System Process: Windows Service&nbsp;                    </td>
                                            <td>
                                    39,231&nbsp;                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    15&nbsp;                    </td>
                                            <td>
                                    T1053.006&nbsp;                    </td>
                                            <td>
                                    Scheduled Task/Job: Cron&nbsp;                    </td>
                                            <td>
                                    39,228&nbsp;                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    16&nbsp;                    </td>
                                            <td>
                                    T1222.002&nbsp;                    </td>
                                            <td>
                                    File and Directory Permissions Modification: Linux&nbsp;                    </td>
                                            <td>
                                    38,760&nbsp;                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    17&nbsp;                    </td>
                                            <td>
                                    T1566.002&nbsp;                    </td>
                                            <td>
                                    Phishing: Spearphishing Link&nbsp;                    </td>
                                            <td>
                                    35,272&nbsp;                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    18&nbsp;                    </td>
                                            <td>
                                    T1059.005&nbsp;                    </td>
                                            <td>
                                    Command and Scripting Interpreter: Visual Basic&nbsp;                    </td>
                                            <td>
                                    27,213&nbsp;                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    19&nbsp;                    </td>
                                            <td>
                                    T1562.001&nbsp;                    </td>
                                            <td>
                                    Impair Defenses: Disable or Modify Tools&nbsp;                    </td>
                                            <td>
                                    24,133&nbsp;                    </td>
                                    </tr>
                        <tr>
                            <td>
                                    20&nbsp;                    </td>
                                            <td>
                                    T1222.001&nbsp;                    </td>
                                            <td>
                                    File and Directory Permissions Modification: Windows&nbsp;                    </td>
                                            <td>
                                    19,275&nbsp;                    </td>
                                    </tr>
                </tbody></table>

Top TTPs highlights: 

  • Scripting Dominance (T1059.001 & T1059.003): 
    PowerShell and Windows CMD remain the top tools for attackers, with over 310,000 detections combined. Their flexibility and integration with systems make them ideal for executing malicious commands. Monitoring script activity and implementing strict execution policies are critical defenses. 
  • Evasion Tactics on the Rise (T1497.003 & T1036.003): 
    Sandbox evasion through time-based delays (134,260 detections) and masquerading via renamed system utilities (126,008 detections) highlight attackers’ focus on stealth. Behavioral analysis and anomaly detection can help counter these techniques. 
  • Targeting Defenses (T1562.002): 
    Disabling antivirus tools was detected 122,256 times in 2024, showcasing its effectiveness for attackers. Organizations must invest in layered defenses that can identify and respond to tampering attempts in real-time. 
  • Exploiting System Services (T1569.002 & T1218.011): 
    Adversaries frequently used system services like Rundll32 (86,760 detections) and service execution (51,345 detections) to execute malicious code while blending into normal operations.  
  • Phishing and Email Collection (T1114.001 & T1566.002): 
    Techniques like local email collection (85,546 detections) and spearphishing links (35,272 detections) remained effective, especially in targeted attacks. Robust email filtering and user training remain vital for reducing these risks. 

Report Methodology 

This report is built on insights from 4,001,036 tasks submitted to our public threat database in 2024. Each task represents the hard work and curiosity of our community of researchers, who used ANY.RUN to uncover threats and analyze malware.  

About ANY.RUN  

ANY.RUN helps more than 500,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, TI LookupYARA Search and Feeds, help you find IOCs or files to learn more about the threats and respond to incidents faster.  

Get a 14-day free trial of ANY.RUN’s products →

The post Malware Trends Overview Report: 2024 appeared first on ANY.RUN's Cybersecurity Blog.

Article Link: Malware Trends Overview Report: 2024 - ANY.RUN's Cybersecurity Blog

1 post - 1 participant

Read full topic



Malware Analysis, News and Indicators - Latest topics
Sp123
"The real threat is actually not when the computer begins to think like a human, but when humans begin to think like computers."

Post a Comment