TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

ScatterBrain: Unmasking the shadow of PoisonPlug's obfuscator

88 点作者 tux33 个月前

9 条评论

tux33 个月前
The source for the de-obfuscator: <a href="https:&#x2F;&#x2F;github.com&#x2F;mandiant&#x2F;poisonplug-scatterbrain">https:&#x2F;&#x2F;github.com&#x2F;mandiant&#x2F;poisonplug-scatterbrain</a>
ElectRabbit3 个月前
This is the result when an elite attacker meets an elite analyst group.<p>That&#x27;s some very heavy stuff.
ycombiredd3 个月前
They mention that they do not have access to the threat actor’s obfuscating compiler itself, but while reading the analysis it occurs to me that given they have released a purpose-built deobfuscator, that they could certainly <i>develop</i> a ScatterBrain-like compiler and then I wonder if doing so might enable creation of useful heuristics that might reveal the quiet existence of ScatterBrain compiler in some sample, archive, darknet tools repo, compromised host, torrent, etc.<p>Just as they have supplied IOCs, perhaps they could provide reasonable signatures or heuristic rules that scanners in various places might ingest and apply that might allow for the discovery of some latent copy of the compiler itself, which could be useful in and of itself, as well as for all of the possible breadcrumbs and inferences that could be made based on where&#x2F;when it was spotted, if it was.
评论 #42916798 未加载
zb33 个月前
Given that this was made by a nation-state attacker I&#x27;d expect something more sophisticated than pairipcore VM..<p>So, still waiting for full pairipcore (the newer one) writeup.
评论 #42945837 未加载
egberts13 个月前
That moment when such a explosion of hash values will flood the likes of VirusTotal.<p>I am quite reasonably sure this has been happening way before now based on my observation on prior control-flow obfuscators.<p>I worked on Unicorn, not the startup kind, but the multi-CPU-architecture emulator kind.
ur-whale3 个月前
I&#x27;d be curious to see how obfuscated code produced like this fares when analyzed with ghidra augmented with AI plugins.<p>Also, I&#x27;m surprised there seems to be no mention in the article of why standard decompilation techniques fail (I might have missed it).
评论 #42917543 未加载
gcorre013 个月前
This is very cool. Can someone help me understand the behind the scenes, what’s their strategy? Their motivations? Are they targeting specific industries or nations for a reason?
评论 #42912975 未加载
bredren3 个月前
Is it correct to presume that the obfuscated samples might be hard to come by for the average interested viewer?
评论 #42913259 未加载
Trung02463 个月前
Imagine if the attacker employs DRM-esque&#x2F;anticheat technique.