On Adding Context to Automated .NET Malware Analysis

Authors

  • Chaitanya Rahalkar Georgia Institute of Technology
  • Anushka Virgaonkar Georgia Institute of Technology

DOI:

https://doi.org/10.34190/iccws.20.1.3275

Keywords:

Malware analysis, .NET, Reverse engineering, .Net malware

Abstract

Malware analysis benefits substantially with the help of automation. When it comes to analysing .NET malware samples, there is a dearth of automated analysis tools that provide quality results. Streamlining the malware analysis workflow to assist in completing the process in a timely manner is another challenging task. We determine that adding context to each piece of extractable information could help an analyst in understanding the functionality of the .NET sample better. In this paper, we introduce a standalone command-line application developed in Python, designed to assist analysts in .NET malware analysis. We follow a static analysis approach to extract features from the samples, to identify higher-level capabilities and to provide exact indicators of compromise. We do not rely on dynamic analysis as it only follows one path of execution. We compare the results of the tool with similar existing tools that can analyse .NET samples. Through a qualitative evaluation, we showcase the utility of the tool in terms of providing significant insights to a malware analyst. We study openly published Malware Analysis Reports (MARs) that are generated through extensive analysis and observe how the tool can provide the same insights in a simple and reliable manner.

Author Biography

Chaitanya Rahalkar, Georgia Institute of Technology

Chaitanya Rahalkar is a software security engineer with expertise in cloud-native security pipelines, detection systems, and robust DevOps practices. With a Master’s in Cybersecurity from the Georgia Institute of Technology, Chaitanya excels in the development and implementation of innovative security solutions. His professional journey includes impactful roles at Block Inc., Praetorian Security, and Meta, where he contributed to security engineering, vulnerability detection, and fuzzing systems.

Downloads

Published

24-03-2025