![]() |
#1
|
|||
|
|||
Dump .net Assembly from c++ Loaders
Simple program to dump .net assembly,
uses hooking instead of a debugger https://github.com/0x410c/ClrDumper |
The Following 2 Users Gave Reputation+1 to 0xall0c For This Useful Post: | ||
Shub-Nigurrath (02-16-2022), user1 (04-06-2022) |
The Following 13 Users Say Thank You to 0xall0c For This Useful Post: | ||
ahmadmansoor (03-01-2022), besoeso (04-06-2022), dnvthv (06-03-2022), Dr.FarFar (02-20-2022), Fyyre (02-23-2022), h4sh3m (10-18-2022), kurt28 (04-11-2022), Mahmoudnia (04-06-2022), pnta (08-25-2022), skypeaful (06-06-2022), tonyweb (02-18-2022), user1 (04-06-2022), WRP (10-19-2022) |
#2
|
|||
|
|||
This seems really interesting, so it might work on x22 Loader as example? Have no Subscription to test it yet.
|
#3
|
|||
|
|||
i dont know about x22 loader, but to just give it clarity, the tool hooks a function SafeArrayUnaccessData which is called after the assembly bytes are placed in the buffer to load, with this function hooked the paramater to this function points to an array of byes of assembly, which then are written to disk by the tool.
Can be used to dump assemblies from a native loader, or in case from .net crypters, obfuscators etc. because there is no debugger or anything else, it basically just works with complex samples too. Last edited by 0xall0c; 04-14-2022 at 17:00. |
The Following User Says Thank You to 0xall0c For This Useful Post: | ||
niculaita (06-09-2022) |
#4
|
|||
|
|||
new release, now u can dump assemblies loaded from Assembly.Load(byte[]), from managed assemblies!
![]() |
The Following 4 Users Say Thank You to 0xall0c For This Useful Post: | ||
besoeso (06-10-2022), niculaita (06-09-2022), user_hidden (05-24-2022), wilson bibe (05-25-2022) |
#5
|
|||
|
|||
Quote:
Excellent work btw. Thank you. |
#6
|
|||
|
|||
i have tried it with a sample of confuserex i guess, not sure if it was confuserEx,didnt test against anything else, if you could provide samples, may be i can test
|
#7
|
|||
|
|||
I am thinking to add dumping of jscript,vbscript from processes, so it will be able to dump vba code for example from office applicaiton, anyone thinks it will be usefull?
|
#8
|
|||
|
|||
Yes, i think it can be useful. Can you specify what kind of data output format will have dumps?
![]() |
#9
|
|||
|
|||
pure vbscript or jscript, also im thinking of a monitor mode, which will decrypt and dump diffrent layers of the script, something like when the code decrypts and evals it!
|
#10
|
|||
|
|||
exactly, about that i was thinking ... maybe add some powershell stuff?
|
#11
|
|||
|
|||
powershell stuff can you elaborate? like dumping if a process create a powershell process and tries to execute powershell script?
|
#12
|
|||
|
|||
Create a powershell process is not a problem, maybe some "EVAL" stuff if it's even possible. But i don't know if its "compiled" in one shot or its divided in multiple "evaluation batches" in whole execution process (this can be also based on multiple eval techniques)
In past i have one ps that has 3 layers of "eval" obfuscations. |
#13
|
|||
|
|||
ohh got the idea, sure i can add that too after vbscript and js, nad then the inter mingling like if vbscript later on run powershell or load a .net assembly
|
The Following User Says Thank You to 0xall0c For This Useful Post: | ||
DARKER (06-15-2022) |
#14
|
|||
|
|||
vbscript dumping supprt added, check it out!
edit: jscript support also added Last edited by 0xall0c; 06-16-2022 at 19:27. Reason: new info |
The Following User Says Thank You to 0xall0c For This Useful Post: | ||
besoeso (06-16-2022) |
#15
|
|||
|
|||
added powershell support :P
|
The Following 3 Users Say Thank You to 0xall0c For This Useful Post: | ||
![]() |
Thread Tools | |
Display Modes | |
|
|