{"id":4189,"date":"2022-01-10T17:45:14","date_gmt":"2022-01-10T12:15:14","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=4189"},"modified":"2022-01-10T17:45:17","modified_gmt":"2022-01-10T12:15:17","slug":"a-dnspy-malware-drops-a-cocktail-on-developers-and-researchers","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/a-dnspy-malware-drops-a-cocktail-on-developers-and-researchers\/","title":{"rendered":"A dnspy Malware Drops a Cocktail on Developers and Researchers"},"content":{"rendered":"\n<p><p style=\"text-align: justify;\">Attackers targeted the Cybersecurity Developers and Investigators this week in a sophisticated malware operation distributing a malicious version of the dnspy .NET application to install cryptocurrency hijacker, remote access malware, and miners.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Dnspy is a well-known debugger and .NET assembly editor utilized to debug, modify or decompile .NET programs. Cybersecurity investigators usually utilize this program when analyzing .NET malware and software.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Malicious dnSpy Distribute a Cocktail of Malware&nbsp;<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify;\">An attacker created a GitHub repository with a compiled version of dnSpy that installs a cocktail of malware this week, consisting of the clipboard hijackers to hijack the cryptocurrency, the Quasar remote access Trojan, a miner, and a collection of unknown payloads.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">This new operation was discovered by the security investigators day enthusiast and the investigators who saw the malicious dnSpy project initially hosted at Github and then switched to GitHub to appear more convincing.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"489\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image1-1024x489.jpg\" alt=\"A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image1\" class=\"wp-image-4191\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image1-1024x489.jpg 1024w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image1-300x143.jpg 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image1-768x367.jpg 768w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image1.jpg 1425w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify;\">The attackers also created a website at dnSpy.net that was nicely designed and professional-looking. This site is now down, but you can see a screenshot of the archived version below.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image2-1024x676.jpg\" alt=\"A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image2\" class=\"wp-image-4192\" width=\"606\" height=\"399\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image2-1024x676.jpg 1024w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image2-300x198.jpg 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image2-768x507.jpg 768w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image2.jpg 1380w\" sizes=\"(max-width: 606px) 100vw, 606px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify;\">To promote the website, the attackers performed prosperous search engine optimization to get dnSpy.net listed on the first page of Google. This domain was also listed certainly on Yahoo, Bing, AOL, Yandex, and Ask.com.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">As a backup plan, they also took out search engine ads to come as the first item in search results, as given below:<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image3-1024x702.jpg\" alt=\"A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image3\" class=\"wp-image-4193\" width=\"661\" height=\"452\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image3-1024x702.jpg 1024w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image3-300x206.jpg 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image3-768x526.jpg 768w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image3.jpg 1427w\" sizes=\"(max-width: 661px) 100vw, 661px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify;\">The malicious dnSpy application looks like the normal program when executed. It allows you to open .NET applications, debug them, and perform all the normal functions of the program.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image4-1024x566.jpg\" alt=\"A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image4\" class=\"wp-image-4194\" width=\"684\" height=\"378\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image4-1024x566.jpg 1024w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image4-300x166.jpg 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image4-768x424.jpg 768w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image4.jpg 1309w\" sizes=\"(max-width: 684px) 100vw, 684px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify;\">However, when the malicious dnSpy application VirusTotal is launched, it will execute a series of commands that create scheduled tasks that run with elevated permissions.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">In a list of the commands shared with Xiarch by MalwareHunterTeam, the malware performs the following actions:<\/p><\/p>\n\n\n\n<ul><li>Disables Microsoft Defender<\/li><li>Uses bitsadmin.exe to download curl.exe to %windir%\\system32\\curl.exe.<\/li><li>Uses curl.exe and bitsadmin.exe to download a variety of payloads to the C:\\Trash folder and launch them.<\/li><li>Disables User Account Control.<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image5-1024x775.jpg\" alt=\"A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image5\" class=\"wp-image-4195\" width=\"625\" height=\"472\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image5-1024x775.jpg 1024w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image5-300x227.jpg 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image5-768x581.jpg 768w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image5-1536x1162.jpg 1536w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-image5.jpg 1579w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify;\">The payloads are downloaded from http:\/\/4api[.]net\/ and include a variety of malware listed below:<\/p><\/p>\n\n\n\n<ul><li>%windir%\\system32\\curl.exe &#8211; The curl program.<\/li><li>C:\\Trash\\c.exe &#8211; Unknown [VirusTotal]<\/li><li>C:\\Trash\\ck.exe &#8211; Unknown<\/li><li>C:\\Trash\\cbot.exe &#8211; Clipboard Hijacker [VirusTotal]<\/li><li>C:\\Trash\\cbo.exe &#8211; Unknown [VirusTotal]<\/li><li>C:\\Trash\\qs.exe &#8211; Quasar RAT [VirusTotal]<\/li><li>C:\\Trash\\m.exe &#8211; Miner [VirusTotal]<\/li><li>C:\\Trash\\d.exe &#8211; Legitimate Defender Control application to disable Microsoft Defender. [VirusTotal]<\/li><li>C:\\Trash\\nnj.exe &#8211; Unknown<\/li><\/ul>\n\n\n\n<p><p style=\"text-align: justify;\">The clipboard hijacker (cbot.exe) uses cryptocurrency addresses used in previous attacks with some success. The bitcoin address has stolen 68 bitcoin transactions totaling approximately $4,200.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">The cryptocurrency addresses used as part of this campaign are:<\/p><\/p>\n\n\n\n<ul><li>Bitcoin: 175A7JNERg82zY3xwGEEMq8EyCnKn797Z4<\/li><li>Ethereum: 0x4dd10a91e43bc7761e56da692471cd38c4aaa426<\/li><li>Tron?: TPRNNuj6gpBQt4PLsNv7ZVeYHyRJGgJA61<\/li><li>Litecoin: LQFiuJQCfRqcR9TjqYmi1ne7aANpyKdQpX<\/li><\/ul>\n\n\n\n<p><p style=\"text-align: justify;\">At this time, both the dnSpy[.]net and the GitHub repository used to power this campaign is shut down.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">However, security researchers and developers need to constantly be on the lookout for malicious clones of popular projects that install malware on their devices. Attacks on cybersecurity researchers and developers are not new and are increasingly becoming more common to steal undisclosed vulnerabilities, source code, or gain access to sensitive networks.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Last year, Google and security investigators found that state-sponsored North Korean hackers targeted exposure investigators utilizing a type of trick. These appeals contained fake Visual Studio projects, Internet Explorer zero-day vulnerabilities, malicious cybersecurity companies, and malicious IDA Pro downloads.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>IOCs:<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-group is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<p><p style=\"text-align: justify;\">dnSpy-net-win32.zip &#8211; 6112e0aa2a53b6091b3d7834b60da6cd2b3c7bf19904e05765518460ac513bfa<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">dnSpy-net-win64.zip &#8211; 005526de4599f96a4a1eba9de9d6ad930de13d5ea1a23fada26e1575f4e3cf85<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">curl.exe &#8211; 0ba1c44d0ee5b34b45b449074cda51624150dc16b3b3c38251df6c052adba205<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">c.exe &#8211; cabc62b3077c2df3b69788e395627921c309e112b555136e99949c5a2bbab4f2<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">ck.exe &#8211; NA<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">cbot.exe &#8211; 746a7a64ec824c63f980ed2194eb7d4e6feffc2dd6b0055ac403fac57c26f783<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">cbo.exe &#8211; e998df840b687ec58165355c1d60938b367edc2967df2a9d44b74ad38f75f439\/<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">qs.exe &#8211; 70ad9112a3f0af66db30ebc1ab3278296d7dc36e8f6070317765e54210d06074<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">m.exe &#8211; 8b7874d328da564aca73e16ae4fea2f2c0a811ec288bd0aba3b55241242be40d<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">d.exe &#8211; 6606d759667fbdfaa46241db7ffb4839d2c47b88a20120446f41e916cad77d0b<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">nnj.exe &#8211; NA&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<\/p><\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Attackers targeted the Cybersecurity Developers and Investigators this week in a sophisticated malware operation distributing a malicious version of the dnspy .NET application to install cryptocurrency hijacker, remote access malware, and miners. Dnspy is a well-known debugger and .NET assembly editor utilized to debug, modify or decompile .NET programs. Cybersecurity investigators usually utilize this program [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4196,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A dnspy Malware Drops a Cocktail on Developers and Researchers - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/a-dnspy-malware-drops-a-cocktail-on-developers-and-researchers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A dnspy Malware Drops a Cocktail on Developers and Researchers - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"Attackers targeted the Cybersecurity Developers and Investigators this week in a sophisticated malware operation distributing a malicious version of the dnspy .NET application to install cryptocurrency hijacker, remote access malware, and miners. Dnspy is a well-known debugger and .NET assembly editor utilized to debug, modify or decompile .NET programs. Cybersecurity investigators usually utilize this program [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/a-dnspy-malware-drops-a-cocktail-on-developers-and-researchers\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-10T12:15:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-10T12:15:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-featured-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/a-dnspy-malware-drops-a-cocktail-on-developers-and-researchers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/a-dnspy-malware-drops-a-cocktail-on-developers-and-researchers\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"A dnspy Malware Drops a Cocktail on Developers and Researchers\",\"datePublished\":\"2022-01-10T12:15:14+00:00\",\"dateModified\":\"2022-01-10T12:15:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/a-dnspy-malware-drops-a-cocktail-on-developers-and-researchers\/\"},\"wordCount\":788,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Vulnerabilities\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/a-dnspy-malware-drops-a-cocktail-on-developers-and-researchers\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/a-dnspy-malware-drops-a-cocktail-on-developers-and-researchers\/\",\"url\":\"https:\/\/xiarch.com\/blog\/a-dnspy-malware-drops-a-cocktail-on-developers-and-researchers\/\",\"name\":\"A dnspy Malware Drops a Cocktail on Developers and Researchers - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2022-01-10T12:15:14+00:00\",\"dateModified\":\"2022-01-10T12:15:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/a-dnspy-malware-drops-a-cocktail-on-developers-and-researchers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/a-dnspy-malware-drops-a-cocktail-on-developers-and-researchers\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/a-dnspy-malware-drops-a-cocktail-on-developers-and-researchers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A dnspy Malware Drops a Cocktail on Developers and Researchers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A dnspy Malware Drops a Cocktail on Developers and Researchers - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/a-dnspy-malware-drops-a-cocktail-on-developers-and-researchers\/","og_locale":"en_US","og_type":"article","og_title":"A dnspy Malware Drops a Cocktail on Developers and Researchers - Xiarch Solutions Private Limited","og_description":"Attackers targeted the Cybersecurity Developers and Investigators this week in a sophisticated malware operation distributing a malicious version of the dnspy .NET application to install cryptocurrency hijacker, remote access malware, and miners. Dnspy is a well-known debugger and .NET assembly editor utilized to debug, modify or decompile .NET programs. Cybersecurity investigators usually utilize this program [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/a-dnspy-malware-drops-a-cocktail-on-developers-and-researchers\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2022-01-10T12:15:14+00:00","article_modified_time":"2022-01-10T12:15:17+00:00","og_image":[{"width":1000,"height":525,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2022\/01\/A-dnspy-Malware-Drops-a-Cocktail-on-Developers-and-Researchers-featured-image.jpg","type":"image\/jpeg"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/a-dnspy-malware-drops-a-cocktail-on-developers-and-researchers\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/a-dnspy-malware-drops-a-cocktail-on-developers-and-researchers\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"A dnspy Malware Drops a Cocktail on Developers and Researchers","datePublished":"2022-01-10T12:15:14+00:00","dateModified":"2022-01-10T12:15:17+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/a-dnspy-malware-drops-a-cocktail-on-developers-and-researchers\/"},"wordCount":788,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Vulnerabilities"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/a-dnspy-malware-drops-a-cocktail-on-developers-and-researchers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/a-dnspy-malware-drops-a-cocktail-on-developers-and-researchers\/","url":"https:\/\/xiarch.com\/blog\/a-dnspy-malware-drops-a-cocktail-on-developers-and-researchers\/","name":"A dnspy Malware Drops a Cocktail on Developers and Researchers - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2022-01-10T12:15:14+00:00","dateModified":"2022-01-10T12:15:17+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/a-dnspy-malware-drops-a-cocktail-on-developers-and-researchers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/a-dnspy-malware-drops-a-cocktail-on-developers-and-researchers\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/a-dnspy-malware-drops-a-cocktail-on-developers-and-researchers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"A dnspy Malware Drops a Cocktail on Developers and Researchers"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/4189"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=4189"}],"version-history":[{"count":1,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/4189\/revisions"}],"predecessor-version":[{"id":4197,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/4189\/revisions\/4197"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/4196"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=4189"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=4189"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=4189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}