AI-Powered Cyberattacks: How to Detect, Prevent & Defend Against Intelligent Threats

Read Now
We utilize artificial intelligence for site translations, and while we strive for accuracy, they may not always be 100% precise. Your understanding is appreciated.

MetaDefender™ Sandbox 2.4.0 Release Notes

Seamless Enterprise Integration, Streamlined User Access, and Powerful New Interface
by OPSWAT
Share this Post

MetaDefender Sandbox 2.4.0 marks a major leap forward in threat detection, enterprise integration, and user experience. With new emulation capabilities, seamless SSO support, and enriched UI workflows, this release empowers security teams to analyze threats faster and with greater accuracy. Explore what’s new, what’s improved, and how your threat defense just got smarter.

What's New

This release brings powerful new features designed to enhance enterprise readiness, user access, and analytical depth.

  • Report Overview Redesign 

    Explore a fully reimagined UI designed for clarity and speed—featuring intuitive navigation, dynamic filtering, and consolidated threat insights in a single streamlined view. 
A Newly Designed, High-Level Overview of the Report
  • Trends Page Redesign
    Seamlessly navigate the enhanced Trends page featuring a refreshed layout, and intuitive visuals — unlocking deeper visibility with updated charts on scan verdicts, average scan time, IOC generation, and leading threat indicators.
  • SAML 2.0 Identity provider (IDP) Integration
    Seamlessly integrate MetaDefender Sandbox with enterprise SSO solutions like OKTA, Ping, and Active Directory Federation Services (AD FS) using full SAML 2.0 Federation—streamlining user management and reinforcing your organization’s security posture.
  • Red Hat Offline Installation Mode
    Securely deploy Sandbox in air-gapped environments with full support for offline installation on Red Hat Enterprise Linux 9.
  • Advanced Windows PE Emulator (Beta)
    The Advanced Windows PE Emulator Beta already delivers significant value by unpacking dynamic payloads, revealing hidden IOCs, and exposing new threat indicators—contributing directly to a real-world impact as measured on Filescan.io: a +48% increase in high‑confidence (“malicious”) verdicts per day, +224% more IOCs extracted daily, and a +159% increase in tag generation.
PE Emulation Boosts Detection Accuracy
Scan Without PE Emulation — Malicious Activity Suspected

Together, these innovations make MetaDefender Sandbox more intuitive, scalable, and effective for modern security operations.

Improvements

Alongside new features, this release introduces targeted enhancements that streamline performance, resilience, and visibility.

  • Threat Indicator Overview Counts 

    Dashboards now surface distinct threat indicators, cutting through noise to deliver clearer, more actionable risk assessments.
  • Input Accessibility & Form Refactor 

    Revamped form components ensure consistent labeling, ARIA compliance, and accessible validation - enhancing usability and aligning with accessibility best practices.

These improvements reinforce MetaDefender Sandbox's role as a foundational tool for advanced threat analysis.

Next-Level Threat Detection

What's New

MetaDefender Sandbox 2.4.0 expands detection capabilities with smarter unpacking, deobfuscation, and variant recognition.

  • Updated YARA & Malware Config Extraction Logic
    Detection rules and config extraction logic have been updated to better identify Lumma Stealer (ChaCha), MetaStealer, and Snake Keylogger variants.
  • .NET Loader Unpacking Enhancements
    Added support for unpacking Roboski and ReZer0 loaders, along with control flow deobfuscation in .NET files to improve payload extraction.
.NET Loader Deobfuscated — Roboski and ReZer0 Modules Extracted
  • Control Flow Deobfuscation in .NET Files
    Implemented control flow deobfuscation to improve unpacking efficiency and expose hidden payloads in obfuscated .NET samples.
  • Early Detection for ClickFix Variants
    Enabled early-stage detection of ClickFix and related variants—addressing a rising trend in social engineering threats.
ClickFix is a social engineering attack that tricks users into executing malware by pasting manipulating clipboard and presenting fake prompts.
  • Automated Decoding of Base64 Commands
    Enabled automatic decoding of base64-encoded commands in Python and Bash scripts, revealing deeper obfuscation layers and improving detection accuracy.
Cracking Base64: Automated decoding for Python/Bash boosts detection
  • Support for ACCDE File Analysis
    Added support for analyzing ACCDE files, extending coverage to Microsoft Access applications and improving visibility into embedded threats.

These additions extend the depth of behavioral insights and surface hidden threats with greater precision.

Improvements

The enhancements in this section sharpen detection accuracy and contextual analysis across a broader threat surface.

  • Improved Detection of Suspicious .NET Binaries
    Enhanced detection by analyzing low-level anomalies—such as oversized static arrays, high-entropy resources, and irregular call patterns—for earlier identification of obfuscated .NET threats.
  • Enhanced HTML Threat Analysis
    Upgraded HTML parser and expanded detection indicators increase accuracy against evasive or malformed web-based threats.
  • Expanded IOC & MITRE ATT&CK Coverage
    Deeper LNK file parsing, smarter indicator enrichment, and flexible YARA-based tagging sharpen threat correlation and contextual analysis across reports.
Extended MITRE mapping reveals obfuscation, evasion, and execution tactics in .NET and PowerShell
  • DIE (Detect It Easy) Database Update
    Improved file type and packed binary identification boost classification accuracy across diverse and complex sample sets.
  • OSINT Lookup Optimization
    Disabled lookups for heuristically extracted domains to reduce false positives and improve overall verdict precision.

From static heuristics to dynamic enrichment, these improvements further arm analysts against today’s evasive threats.

Engine Release Notes

Advanced PE Emulator (Beta)

Enhancements

The Advanced PE Emulator (Beta) sees major upgrades in this release, unlocking deeper behavioral insights and uncovering threats that evade traditional analysis.

  • Shellcode Execution
    Added support for standalone shellcode and forwarder binding, enabling deeper analysis of low-level payloads.
  • Event Tracking
    Captures suspicious activity including memory and disk writes, protection changes, DNS resolution, HTTP requests, and more.
  • Relevant Dumps
    Automatically extracts memory dumps from key execution points—such as PE files—for deeper threat inspection.
  • Integration with Disassembly
    Routes meaningful memory dumps directly into the disassembler pipeline for enhanced in-depth analysis.
  • Overview and Trace
    Introduces summary stats, versioning, and configurable API log enhancements for richer execution trace visibility.
  • New Threat Indicators
    Adds PE-specific behavioral indicators to provide more targeted and meaningful analysis insights.
  • Additional IOC Extraction
    Leverages emulation to uncover IOCs not visible through static analysis, boosting detection completeness.
  • Defeating Evasion
    Implements advanced simulated fingerprinting to detect and bypass evasive malware behaviors.

These enhancements establish the emulator as a critical asset for detecting complex, multi-stage malware and extracting actionable IOCs with unmatched precision.

What's New

This engine update introduces expanded emulation, advanced indicator logic, and modern script analysis.

  • .lnk Batch Drop Detection
    Detects Windows shortcut files that generate and execute batch scripts—closing a critical gap exploited by “living-off-the-land” techniques.
  • Clipboard API Emulation
    Web emulation now captures modern clipboard operations like write() and writeText(), exposing techniques used in phishing kits and droppers.
  • ECMAScript 6 Support in Anesidora
    JavaScript emulation now supports ES6 syntax, significantly expanding coverage of advanced and modern malicious scripts.

Each new capability contributes to earlier threat detection and more confident verdicts, especially in complex environments.

Improvements

Performance, fidelity, and automation take a step forward in the engine’s latest refinement cycle.

  • Automated Button/Link Clicks in HTML Emulation
    Improved emulation triggers UI-driven scripts, increasing detection of drive-by downloads hidden behind interactive elements.
  • Event Handler Execution on onclick
    Inline onclick event handlers are now executed, enhancing detection of exploits embedded in HTML/JavaScript.
  • document.body.append() & Self-Read / Stage-Spawn Support
    Introduced high-fidelity DOM simulation and support for self-referential behaviors to better analyze multi-stage threats.
  • HtmlUnit Upgrades
Upgraded
    Java-based browser emulation brings JavaScript engine fixes, improved CSS rendering, and greater overall stability.

These backend improvements enhance scalability and precision across large volumes and advanced payloads.

Get Started with MetaDefender Sandbox 2.4.0

To learn more, request a demo, or speak with an OPSWAT expert, visit: 
https://www.opswat.com/products/metadefender/sandbox

Stay ahead of the threat curve.

Stay Up-to-Date With OPSWAT!

Sign up today to receive the latest company updates, stories, event info, and more.