Uncovering .NET Malware Obfuscated by Encryption and Virtualization

Uncovering .NET Malware Obfuscated by Encryption and Virtualization

This article explores advanced obfuscation techniques utilized in malware families, specifically focusing on methods to automate the unpacking of malware samples. It details how these techniques complicate static analysis and enhance malware delivery through various methods. The malware families examined include Agent Tesla, XWorm, and FormBook/XLoader. Affected: Agent Tesla, XWorm, FormBook/XLoader, cybersecurity, malware analysts

Keypoints :

  • Malware authors use advanced obfuscation techniques to evade detection.
  • Techniques discussed include code virtualization, staged payload delivery, and AES encryption.
  • Staged payloads help attackers prevent detection by modularizing their malware delivery.
  • The PE overlay technique hides malicious payloads, often skipped by static analysis tools.
  • Dynamic code loading utilizes .NET reflection for execution, complicating detection efforts.
  • Palo Alto Networks offers enhanced protection against these threats.
  • Incident response contact details for potential compromises are provided.
  • Indicators of compromise (IOCs) include hashes and other evidence relating to specific malware families.

MITRE Techniques :

  • Obfuscated Files or Information (T1027) – Utilizes AES encryption and code virtualization to conceal payloads.
  • Command and Control (C2) (T1071) – Uses connections to malicious servers indicated by specified C2 traffic.
  • Data Encrypted (T1049) – Applies AES encryption at each stage of the payload delivery process.
  • Execution through API (T1505) – Dynamic code loading through .NET reflection introduces and executes malicious objects.
  • Multi-Stage Malware (T1489) – Uses multiple stages of payload delivery, ensuring modular and evasive payload execution.

Indicator of Compromise :

  • [SHA-256] a02bdd3db4dfede3d6d8db554a266bf9f87f4fa55ee6cde5cbe1ed77c514cdee
  • [SHA-256] 3d8187853d481c74408d56759f427e2c3446e9310c2d109fd38a0f200696c32d
  • [IP Address] 66[.]63[.]168[.]133:7000
  • [Domain] weidmachane[.]zapto[.]org:7000
  • [Email Address] admin@iaa-airferight[.]com

Full Story: https://unit42.paloaltonetworks.com/malware-obfuscation-techniques/