κατασκευή ιστοσελίδων ρόδος

TECH - WEB DEVELOPMENT NEWS

Get the latest tech - web development news and analysis on industry around the world.

  • HOME
You are here: Home / INDUSTRY NEWS / Palo Alto Networks Released A Mega Malware Analysis Tutorials Useful for Every Malware Analyst
άμυνα
.

Palo Alto Networks Released A Mega Malware Analysis Tutorials Useful for Every Malware Analyst

15/08/2025

Palo Alto Networks has published an extensive malware analysis tutorial detailing the dissection of a sophisticated .NET-based threat that delivers the Remcos remote access trojan (RAT).

The malware’s emergence highlights a trend in which threat actors increasingly abuse legitimate development environments and tools—such as the Microsoft .NET runtime—to execute complex, multi-stage infection campaigns.

This particular sample demonstrates an elevated level of evasion capability, including managed-to-unmanaged code transitions, runtime API resolution, and process injection against benign executables.

The attack chain begins with a seemingly innocuous .NET executable, obfuscated to conceal its intent. This initial loader retrieves an online payload masquerading as a PDF from a compromised Bitbucket repository.

Instead of document data, the file contains Donut-generated shellcode designed to execute directly in memory. By avoiding disk writes, the attackers significantly reduce the risk of detection by traditional antivirus engines that rely on static signature scanning.

Palo Alto Networks analysts identified the sample during a targeted threat hunting operation and noted its ability to transition execution between different runtime environments, a hallmark of advanced intrusion techniques.

Once downloaded, the payload undergoes a simple ASCII-hexadecimal decoding routine to reconstruct the actual shellcode.

The loader uses .NET’s interop services to invoke native Windows API calls dynamically, allocating executable memory with VirtualAlloc before copying the decoded payload into it.

This combination of obfuscated managed code and late-bound unmanaged calls complicates static analysis, while also bypassing many heuristics that flag suspicious imports.

Palo Alto Networks researchers noted that this deliberate API resolution at runtime allowed the attacker to omit sensitive imports from the Portable Executable (PE) header, further evading static detection.

From a technical standpoint, the payload’s sophistication is evident when examining the in-memory AMSI and ETW bypass routines.

In-memory AMSI and ETW bypass routines (Source – GitHub)

AMSI functions such as AmsiScanBuffer are patched directly in memory with instructions that force them to always return AMSI_RESULT_CLEAN.

A representative snippet illustrates this patching mechanism:-

byte[] patch = { 0x33, 0xC0, 0xC2, 0x18, 0x00 }; // xor eax,eax; ret 0x18
Marshal.Copy(patch, 0, amsiScanBufferPtr, patch.Length);

This ensures that even if security tools hook these functions, malicious buffers will appear harmless.

Similarly, calls to EtwEventWrite are replaced with a single ret instruction, effectively blinding Event Tracing for Windows, which many endpoint detection products use to correlate malicious behaviors.

One of the most technically intriguing aspects of the infection mechanism is its creation of a Common Language Runtime (CLR) instance from unmanaged shellcode.

CLRCreateInstance (Source – GitHub)

After disabling defensive hooks, the shellcode uses CLRCreateInstance and ICLRMetaHost::GetRuntime to spawn a new .NET runtime within the same process, then loads an obfuscated .NET assembly into an AppDomain.

Persistence of this execution chain

The final stage leverages the _Type.InvokeMember method to execute a specific entry point method inside that assembly, which in turn spawns InstallUtil.exe in a suspended state.

The persistence of this execution chain relies heavily on process injection. The malicious assembly writes a decrypted Remcos payload into the suspended process’s memory via multiple WriteProcessMemory calls before changing the memory protection back to PAGE_EXECUTE_READ with VirtualProtectEx and resuming execution.

This multi-chunk injection method may help evade memory scanners designed to detect large, contiguous malicious allocations.

While the dynamic analysis, conclusively shows the Remcos RAT ASCII banner embedded in the injected executable, confirming the campaign’s end goal.

Remcos RAT ASCII banner (Source – GitHub)

By walking readers through every stage from initial obfuscation to final payload activation, Palo Alto Networks’ tutorial not only dissects a live threat but also arms analysts with repeatable techniques for dissecting complex, hybrid-runtime malware.

This release stands out as both a detailed forensic walkthrough and a practical lab guide, making it a valuable resource for reverse engineers confronting threats that blend managed code obfuscation with native API exploitation in modern attack chains.

Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.
Source: cybersecuritynews.com

Filed Under: INDUSTRY NEWS Tagged With: Source-10

3 Windows File Explorer add-ons that fix Microsoft's biggest pain points

File Explorer is one of the oldest parts of Windows, and you can tell. Microsoft has added tabs and refreshed the icons, but the core experience still needs work. For example, the layout looks rigid, and everyday actions like batch renaming need third-party help to be more complete. File Explorer also feels flat to look at, with almost no way to change its appearance. Small pain points like these … [Read More...]

The single Docker container that made me a home lab power user

For years, I treated my home lab like a necessary chore – a collection of services running on command line interfaces that required constant SSH logins just to check logs or reboot a container. I knew the power of Docker, but managing multiple environments across different hardware was often a confusing, time-consuming mess. Source: xda-developers.com … [Read More...]

Intel N150 mini PC: The ultimate starter home lab device

If you've started on your home lab journey by heavily reading subreddits and networking forums, you probably have a vision of ex-enterprise hardware in a rack that stretches from floor to ceiling. Which is cool, and gives the desired visual effect, but it's not the only way to do things. And for those starting out, it might not even be the best way, as the hidden costs of self-hosting mount up … [Read More...]

Newsom signs bill giving Uber and Lyft drivers in California the right to unionize

Drivers for ride-hailing apps like Uber and Lyft will soon have the right to unionize in California as independent contractors, thanks to a bill signed Friday by Governor Gavin Newsom. This is part of a larger deal between lawmakers, unions, and ride-hailing companies, resulting in the passage of separate bills supporting lower insurance requirements for Uber and Lyft, along with union rights for … [Read More...]

Stop trusting your ISP's router blindly

Of all the exciting things about getting a new internet connection, the router is probably the least thrilling. It's the beige box of networking, the unglamorous gatekeeper to the digital world. Your Internet Service Provider (ISP) is aware of this. They make setup and maintenance incredibly simple. Most providers offer or bundle a router with your new connection. If you agree, a technician shows … [Read More...]

Chromebooks are better than cheap Windows laptops

There are a few things in tech more depressing than a cheap Windows laptop. Between sluggish performance, application timeouts, dim displays, and poor battery life, you sacrifice a great deal to buy a sub-$600 Windows machine. Source: xda-developers.com … [Read More...]

If you’re not an AI startup, good luck raising money from VCs

New PitchBook data illustrates how dramatically AI is dominating startup investment, with 2025 on-track to become the first year when AI accounts for more than half of all VC money invested. PitchBook reports that VCs have poured $192.7 billion into the industry so far this year, out of a total $366.8 billion, according to Bloomberg. In the most recent quarter, AI accounted for 62.7% of the money … [Read More...]

7 unusual Linux distros built for one purpose (and why you should try them)

I often talk about switching to Linux as an alternative to Windows 11, something I've done myself on many of my machines. But while it's common to put Linux on the same playing field as Windows, it bears repeating that Linux itself isn't an operating system, and as a kernel, it's an extremely versatile piece of software that can be used for a lot of things. Source: xda-developers.com … [Read More...]

This self-hosted dashboard is the perfect hub for your family’s daily needs

If your family is anything like mine, you probably have sticky notes stuck all over your fridge, a WhatsApp chat dedicated to shopping lists, and chores that are barely tracked. It's a mess, and it only gets worse as more people are added to the mix. I've tried integrating apps and shared to-do lists, but they never stuck. The apps were, largely, too complicated for what should be everyday needs … [Read More...]

OpenAI acquires an AI-powered personal investing app

Just a day after dethroning SpaceX as the most valuable private company in the world, OpenAI has acquired another startup. This time, the AI giant acquired Roi, an app that offers a one-stop shop for all your financial portfolios and an AI chatbot that provides personalized investing advice. Details of the acquisition weren't made public, but TechCrunch reported that Sujith Vishwajith, the … [Read More...]

Tags

Source-1 Source-2 Source-3 Source-4 Source-5 Source-6 Source-7 Source-8 Source-9 Source-10 Source-12 Source-13 Source-15 Source-16

Tech Web Development News

This is a PERSONAL and PRIVATE WEBPAGE. Please leave this page. Contact me via email : admin@news-6.com about anything you would like to ask or problem.

Tech News

Disclaimer!
In every post is written below the original source of the post. Copyrights belong on their owners.

Web Development News

HOTELS – CRUISES – CARS – TRAVEL

Recent Posts

  • 3 Windows File Explorer add-ons that fix Microsoft's biggest pain points
  • The single Docker container that made me a home lab power user
  • Intel N150 mini PC: The ultimate starter home lab device
  • Newsom signs bill giving Uber and Lyft drivers in California the right to unionize
  • Stop trusting your ISP's router blindly

Technology - Seo

Categories

  • INDUSTRY NEWS

World Industry News

Privacy & Cookies: This site uses cookies.
To find out more, as well as how to remove or block these, see here: Our Cookie Policy
TECH - WEB DEVELOPMENT NEWS @ COPYRIGHTS 2023