Confusing .NET Decompilers: The Call OpCode
Tags
attack-pattern: | Direct Connection Proxy - T1090 |
Common Information
Type | Value |
---|---|
UUID | b1e482a9-57d3-4451-b2b7-e51b25ad70f4 |
Fingerprint | 2f78cb80bc7753c2 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Nov. 6, 2022, 1 p.m. |
Added to db | Jan. 19, 2023, 12:06 a.m. |
Last updated | Nov. 17, 2024, 4:47 p.m. |
Headline | Confusing .NET Decompilers: The Call OpCode |
Title | Confusing .NET Decompilers: The Call OpCode |
Detected Hints/Tags/Attributes | 25/1/10 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | http://washi.dev/blog/posts/confusing-decompilers-with-call/ |
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 56 | vb.net |
|
Details | Domain | 1 | base.foo |
|
Details | Domain | 9 | opcodes.call |
|
Details | File | 1 | original.exe |
|
Details | File | 41 | system.obj |
|
Details | File | 58 | test.exe |
|
Details | File | 1 | test-using-callvirt.exe |
|
Details | File | 1 | z:\original.exe |
|
Details | File | 2 | reflection.tar |
|
Details | File | 1 | z:\program.cs |