<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>C2 - Tag - b1n0x41</title><link>https://0x41.me/tags/c2/</link><description>C2 - Tag - b1n0x41</description><generator>Hugo -- gohugo.io</generator><language>en</language><lastBuildDate>Fri, 01 Aug 2025 00:00:00 +0000</lastBuildDate><atom:link href="https://0x41.me/tags/c2/" rel="self" type="application/rss+xml"/><item><title>The Trusted Trap</title><link>https://0x41.me/2025/08/thetrustedtrap/</link><pubDate>Fri, 01 Aug 2025 00:00:00 +0000</pubDate><author>xxxx</author><guid>https://0x41.me/2025/08/thetrustedtrap/</guid><description><![CDATA[<div class="featured-image">
                <img src="/images/TheTrustedTrap/home_page.png" referrerpolicy="no-referrer">
            </div><p>While digging into a GitHub CVE proof-of-concept, I found something no one expects: <strong>a live malware implant hiding inside a github repo files</strong>. Specifically, a Visual Studio <code>.suo</code> file.
the kind we all ignore. was secretly delivering and executing payloads using a sophisticated combination of <strong>XAML deserialization</strong>, <strong>base64 obfuscation</strong>, and <strong>registry persistence</strong>.</p>
<h2 id="what-is-the-trusted-trap">What Is the Trusted Trap?</h2>
<p>Visual Studio <code>.suo</code> files are supposed to be harmless — they&rsquo;re just project metadata, right?
Wrong.
They’re actually <strong>OLE compound files</strong> that can contain:</p>]]></description></item></channel></rss>