Uncovering .net malware obfuscated by encryption and virtualization

Intel Name: Uncovering .net malware obfuscated by encryption and virtualization

Date of Scan: March 4, 2025

Impact: High

Summary:
This article explores obfuscation techniques in popular malware families and highlights opportunities for automating the unpacking process. We analyze observed samples, demonstrating how to extract configuration parameters by unpacking each stage. Automating this process would enable sandboxes performing static analysis to retrieve critical malware configuration data. Adversaries use techniques like code virtualization, staged payload delivery, dynamic code loading, AES encryption, and multi-stage payloads to distribute malware such as Agent Tesla, XWorm, and FormBook/XLoader.

More Details