.NET malware analysis
As you may know, .NET applications are easy to disassemble and decompile so that they become as close to the original source code as possible. This leaves malware more exposed to reverse engineering. We will describe multiple obfuscation techniques in this section, together with the deobfuscation process. First, let’s explore the available tools for .NET reverse engineering.
.NET analysis tools
Here are the most well-known tools for decompiling and analysis:
- ILSpy: This is a good decompiler for static analysis, but it can’t debug malware.
- dnSpy: Based on ILSpy and dnlib, it’s a disassembler and decompiler that also allows you to debug and patch code.
- .NET reflector: A commercial decompiler tool for static analysis and debugging in Visual Studio.
- .NET IL Editor (DILE): Another powerful tool that allows you to disassemble and debug .NET applications.
- dotPeek: A tool that’s used to decompile malware into C...