Reversing Csharp And DotNET Framework

Sample Details


Sample Name-Malware.cryptlib64.dll Malware Type- C2 Dropper

Analysis


Upon running floss we see some interesting strings-

mscorelib is a part of a C# binary. Thus this is a C# binary and a part of the .NET framework.

Note-

C# is part of the .NET framework. C# binaries don't interact directly with the OS but with the .NET framework. C# is executed by the CLR(common Language Runtime). After C# is compiled, it is converted to IL(Intermediary Language) which is further run by the CLR.

Turn on inetsim on REMnux and use DNSspy on flare-vm

On dnspy we get-

The dll has two classes - Cryptor and Program

Cryptor-

Program-

We see a base64 string in Program function.

Also a xml and a vbs file is being created. Now we run the dll using rundll32 and the main method of the dll - embed.

	 rundll32.exe .\Malware.cryptlib64.dll,embed

After running, we find the xml file -

Also a registry key has been created by the dll pointing to the vbs file-

The xml file is using MSBuild to execute malware. Running it-

It is requesting for something off of -http://ocsp.digicert.com and srv.masterchiefsgruntemporium.local.

Conclusion


This is a C2 dropper from the Covenant C2 framework. When run, a grunt from the c2 framework will deliver the malware to the system.

Last updated