Monday, May 12, 2025
Homecyber securityNew Stealthy .NET Malware Hiding Malicious Payloads Within Bitmap Resources

New Stealthy .NET Malware Hiding Malicious Payloads Within Bitmap Resources

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity researchers at Palo Alto Networks’ Unit 42 have uncovered a novel obfuscation method employed by threat actors to conceal malware within bitmap resources of seemingly benign 32-bit .NET applications.

This advanced steganography technique embeds malicious payloads in bitmap files, initiating a multi-stage infection chain that ultimately delivers destructive malware families such as Agent Tesla, Remcos RAT, and XLoader.

Stealthy .NET Malware
Loading the malicious bitmap resource.

Obfuscation Technique Unveiled

Observed primarily between late 2024 and early 2025, these campaigns targeted critical sectors like finance in Türkiye and logistics in Asia, distributing over 250 emails with malicious Windows executables disguised as legitimate documents related to procurement or financial transactions.

- Advertisement - Google News

The attack begins with an семьдесят два (72) in Russian, meaning “seventy-two,” is often used as a placeholder or filler text.

In the context of this malware, it appears to reference a bitmap resource named “rbzR,” which is deobfuscated into the Montero.dll assembly during the second stage of the unpacking process.

The final payload, often named something innocuous like Remington.exe, is extracted through intricate XOR encryption and subtraction algorithms using keys such as “opIaZhYa.”

Stealthy .NET Malware
 XOR encryption with subtraction algorithm.

This process is designed to evade traditional security mechanisms by loading and executing payloads dynamically via reflection and late binding techniques.

Technical Breakdown of the Multi-Stage Attack

Additional obfuscation methods, including metadata obfuscation, opcode replacement, control flow flattening, and string encryption, further complicate reverse engineering efforts.

Researchers noted that timestamps on these files are often manipulated (timestomped) to display misleading dates, such as a futuristic “2102-09-02,” adding another layer of deception.

The sophistication of this approach underscores the evolving tactics of cybercriminals, who leverage legitimate applications like Windows Forms OCR to mask their intent, making detection by standard antivirus solutions challenging.

The payloads, once detonated, establish communication with command-and-control (C2) servers or exfiltrate data via SMTP servers, with specific configurations identified for Agent Tesla variants.

Palo Alto Networks has responded by updating their Advanced WildFire machine-learning models and enhancing protections through Cortex XDR and XSIAM to counter both known and unknown threats using behavioral threat protection.

Security practitioners are urged to adopt advanced debugging techniques, such as hooking .NET Framework APIs like ResourceManager::GetObject and Assembly::Load, to intercept and analyze embedded resources during execution. Understanding these mechanisms is crucial for defenders to stay ahead of such stealthy threats.

Indicators of Compromise (IoCs)

Below are key IoCs associated with the malware variants discussed:

Malware FamilySHA-256 HashC2/Exfiltration Details
Agent Tesla Variantac5fc65ae9500c1107cdd72ae9c271ba9981d22c4d0c632d388b0d8a3acb68f4Server: hosting2.ro.hostsailor[.]com:587, Sender: packagelog@gtpv[.]online
XLoader511af3c08bd8c093029bf2926b0a1e6c8263ceba3885e3fec9b59b28cd79075dhxxp[://]www.sixfiguredigital[.]group/aoc3/
Remcos RAT3b83739da46e20faebecf01337ee9ff4d8f81d61ecbb7e8c9d9e792bb3922b76myhost001.myddns[.]me:9373, 103.198.26[.]222:9373

Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

VMware Tools Vulnerability Allows Attackers to Modify Files and Launch Malicious Operations

Broadcom-owned VMware has released security patches addressing a moderate severity insecure file handling vulnerability...

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new...

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an...

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

VMware Tools Vulnerability Allows Attackers to Modify Files and Launch Malicious Operations

Broadcom-owned VMware has released security patches addressing a moderate severity insecure file handling vulnerability...

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new...

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an...