Excited to share our latest research release from Cyderes #HowlerCell. We took a step further by not just analyzing .NET AOT compiled malware, but also documenting a practical approach for reversing these binaries using #BinaryNinja. A big thanks to Vector 35 for supporting this effort and backing work that gives back to the community. Great work and effort by Rahul R. #ThreatResearch #MalwareAnalysis #ReverseEngineering #BinaryNinja #DotNet #AOT
Howler Cell’s latest research pulls back the curtain on a multistage malware campaign. The campaign uses .NET Native AOT to strip metadata, obscure functionality, and slow traditional analysis workflows. We break down the delivery chain and demonstrate a repeatable Binary Ninja methodology to recover hidden structures, rebuild runtime context, and restore visibility. If attackers are betting their code can’t be read, this guide shows how to read it anyway. Read the analysis: https://lnkd.in/gJvUu-vy