AI-Powered Cyberattacks: How to Detect, Prevent & Defend Against Intelligent Threats

Read Now
We utilize artificial intelligence for site translations, and while we strive for accuracy, they may not always be 100% precise. Your understanding is appreciated.

Adaptive Sandbox for MetaDefender Core 2.4.0 Release Notes

Seamless Enterprise Integration, Streamlined User Access, and Powerful New Interface
by OPSWAT
Share this Post

Adaptive Sandbox for MetaDefender Core 2.4.0 marks a major leap forward in threat detection and enterprise integration. This release empowers security teams to analyze threats faster and with greater accuracy. Explore what’s new and how your threat defenses just got smarter.

Embedded Engine: Next-Level Threat Detection

What's New

Expand detection capabilities with smarter unpacking, deobfuscation, and variant recognition.

  • Updated YARA & Malware Config Extraction Logic
    Detection rules and config extraction logic have been updated to better identify Lumma Stealer (ChaCha), MetaStealer, and Snake Keylogger variants. 
  • .NET Loader Unpacking Enhancements
    Support added for unpacking Roboski and ReZer0 loaders, along with control flow deobfuscation in .NET files to improve payload extraction.
MetaDefender Core 2.4.0 sandbox release notes UI showing malware analysis results and threat indicators
.NET Loader Deobfuscated — Roboski and ReZer0 Modules Extracted
  • Control Flow Deobfuscation in .NET Files
    Improves unpacking efficiency and exposes hidden payloads in obfuscated .NET samples. 
  • Early Detection for ClickFix Variants
    Enabled early-stage detection of ClickFix and related variants addresses a rising trend in social engineering threats. 
MetaDefender Core 2.4.0 sandbox release notes for malware analysis showing threat indicators and verdicts in scan report
ClickFix is a social engineering attack that tricks users into executing malware by pasting manipulating clipboard content and presenting fake prompts.
  • Automated Decoding of Base64 Commands
    Enabled automatic decoding of base64-encoded commands in Python and Bash scripts, revealing deeper obfuscation layers and improving detection accuracy.
MetaDefender Core 2.4.0 sandbox release notes for malware analysis showing threat indicators and verdicts in What's New section
Cracking Base64: Automated decoding for Python/Bash boosts detection
  • Support for ACCDE File Analysis
    Support added for analyzing ACCDE files, extending coverage to Microsoft Access applications and improving visibility into embedded threats.

These additions extend the depth of behavioral insights and surface hidden threats with greater precision.

Remote Engine: Traffic distribution & high availability

What's New

  • Load Balancing / Failover: Implemented Round Robin load balancing and failover to ensure even traffic distribution and high availability during node failures.

You may find the standalone release note for your Remote engine, here: Release Notes for v2.3.0 - MetaDefender Sandbox

To learn more, request a demo, or speak with an OPSWAT expert, visit: 
https://www.opswat.com/products/metadefender/sandbox

Stay ahead of the threat curve.

Stay Up-to-Date With OPSWAT!

Sign up today to receive the latest company updates, stories, event info, and more.