Last August, the #Splunk Threat Research Team (#STRT) shared a blog about a .NET steganography-based loader being used in campaigns involving Quasar, several Trojan stealers, and other RATs.
Picture Paints a Thousand Codes: Dissecting Image-Based Steganography in a .NET (Quasar) RAT Loader:
https://lnkd.in/dwDSUZyk
In our newest research, we came across an updated version of this loader. This one includes extra stages designed to slip past the static analysis using obfuscation and the simple extraction tool we originally built. In the new blog, we walk through what changed, the small updates we made to the PIXDIG extraction tool and our analysis of the Lokibot payload plus the associated MITRE ATT&CK mapping to help with #SPLUNK detection.
Hide Me Again: The Updated Multi-Payload .NET Steganography Loader That Includes Lokibot
I hope it helps đ

