新.NET多阶段加载器攻击Windows系统以部署恶意负载
一种复杂的.NET多阶段恶意软件加载器自2022年初起活跃于Windows系统,采用三阶段部署机制分发信息窃取器和远程访问木马等危险负载。该加载器通过加密组件和位图资源隐藏恶意代码,并不断进化以规避检测。研究人员通过代码复用分析追踪到约2万份样本,揭示其稳定第三阶段代码结构及其对常见恶意软件的传播作用。 2025-5-15 17:5:39 Author: cybersecuritynews.com(查看原文) 阅读量:1 收藏

New .NET Multi-stage Loader Attacking Windows Systems to Deploy Malicious Payloads

A sophisticated .NET multi-stage malware loader has been actively targeting Windows systems since early 2022, serving as a distribution channel for dangerous payloads including information stealers and remote access trojans.

This loader employs a complex three-stage deployment mechanism that helps it evade detection while delivering malicious software to compromised machines.

The threat has been continuously evolving, with recent versions implementing more advanced obfuscation techniques to hide their activities from security solutions.

Google News

The malware begins its infection chain with a seemingly innocuous .NET executable that contains encrypted components of subsequent stages.

Loader stages (Source – ThreatRay)

While earlier variants embedded the second stage as hardcoded strings, newer versions have adopted more sophisticated concealment methods, hiding malicious code within bitmap resources to avoid triggering security alerts.

This evolution demonstrates the operators’ commitment to maintaining the loader’s effectiveness against modern security solutions.

ThreatRay researchers identified this loader through code reuse analysis, establishing connections between approximately 20,000 samples collected over a three-year period.

Their tracking revealed that despite frequent changes to the first two stages, the third stage maintains a relatively stable code structure, providing a consistent signature for detection.

The research team noted that the primary value of monitoring this loader lies in obtaining fresh samples and indicators of compromise rather than early detection of new malware families.

The impact of this loader has been significant across the cybersecurity landscape, with the malware predominantly distributing commodity threats including AgentTesla, Formbook, Remcos, and 404Keylogger.

Multiple Stages

Statistical analysis covering March 2022 through February 2025 shows consistent deployment patterns for these payloads, highlighting the loader’s reliability as a malware delivery mechanism for cybercriminals.

The loader’s technical sophistication is most evident in its staged execution process. The initial .NET executable extracts and decrypts embedded data before executing the second stage in memory.

This second stage, a .NET DLL, processes three crucial parameters to locate and XOR-decrypt a bitmap resource from the first stage, as shown in the code example below:-

public static void main(string ResourceName, string XORKey, string ModuleName)
{
    MainForm.loops_1(); // loops and arithmetic operations
    MainForm.sleep(); // sleeps several seconds
    ResourceName = MainForm.decode_string(ResourceName);
    MainForm.loops_2(); // loops and arithmetic operations
    XORKey = MainForm.decode_string(XORKey);
    Bitmap bitmap = MainForm.get_resource(ResourceName, ModuleName);
    MainForm.loops_1(); // loops and arithmetic operations
    byte[] array = MainForm.convert_bitmap_to_array(bitmap);
    array = MainForm.decrypt_array(array, XORKey);
    Assembly assembly = MainForm.assembly_load(array);
    MainForm.get_type_20_method_29_and_invoke(assembly);
    MainForm.loops_2(); // loops and arithmetic operations
    MainForm.exit();
}

The third stage then manages the deployment of the final payload in memory, completing the infection chain while minimizing detection risk.

This carefully orchestrated process demonstrates the sophisticated techniques modern malware employs to compromise systems while remaining undetected.

How SOC Teams Save Time and Effort with ANY.RUN - Live webinar for SOC teams and managers


文章来源: https://cybersecuritynews.com/new-net-multi-stage-loader-attacking-windows-systems/
如有侵权请联系:admin#unsafe.sh