April 29, 2024, 2:20 p.m. | JustAnother-Engineer

InfoSec Write-ups - Medium infosecwriteups.com

Hello Everybody! Today i will be conducting an analysis of a .NET information stealer.

MD5 hash: DC4200AC514006F084EAD7F83B84C928
Virus Total Link: https://www.virustotal.com/gui/file/a850de0705c0f6095910aa1d5ed0e73a49581aa7427fcfaf2ff5144e93b047c1/community

Analysis

File version/name information

The sample effectively disguises itself as a Data Recovery tool to bypass user detection. It is a 32-bit .NET binary, which allows for the conversion of the binary back to Intermediate Language (IL). This can be done using tools designed for such purposes, with DNSpy being a prime example.

Upon closer examination of the binary, …

cybersecurity hacking malware programming windows

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Lead Security Architect

@ Fireblocks | Tel Aviv-Yafo, Tel Aviv District, Israel

Senior Software Development Engineer, AWS Security SecDevOps

@ Amazon.com | Courbevoie, Ile-de-France, FRA

Senior Professional Services Consultant XSIAM - Spain

@ Palo Alto Networks | Madrid, Spain