NHacker Next
  • new
  • past
  • show
  • ask
  • show
  • jobs
  • submit
ScatterBrain: Unmasking the shadow of PoisonPlug's obfuscator (cloud.google.com)
ycombiredd 54 minutes ago [-]
They mention that they do not have access to the threat actor’s obfuscating compiler itself, but while reading the analysis it occurs to me that given they have released a purpose-built deobfuscator, that they could certainly develop a ScatterBrain-like compiler and then I wonder if doing so might enable creation of useful heuristics that might reveal the quiet existence of ScatterBrain compiler in some sample, archive, darknet tools repo, compromised host, torrent, etc.

Just as they have supplied IOCs, perhaps they could provide reasonable signatures or heuristic rules that scanners in various places might ingest and apply that might allow for the discovery of some latent copy of the compiler itself, which could be useful in and of itself, as well as for all of the possible breadcrumbs and inferences that could be made based on where/when it was spotted, if it was.

tux3 12 hours ago [-]
The source for the de-obfuscator: https://github.com/mandiant/poisonplug-scatterbrain
ur-whale 29 minutes ago [-]
I'd be curious to see how obfuscated code produced like this fares when analyzed with ghidra augmented with AI plugins.

Also, I'm surprised there seems to be no mention in the article of why standard decompilation techniques fail (I might have missed it).

ElectRabbit 13 hours ago [-]
This is the result when an elite attacker meets an elite analyst group.

That's some very heavy stuff.

gcorre01 12 hours ago [-]
This is very cool. Can someone help me understand the behind the scenes, what’s their strategy? Their motivations? Are they targeting specific industries or nations for a reason?
RachelF 10 hours ago [-]
Yes, this in an interesting question. Are they just trying to hide from anti-virus signatures, or are they hiding code they perceive as valuable?
bredren 11 hours ago [-]
Is it correct to presume that the obfuscated samples might be hard to come by for the average interested viewer?
bflesch 9 hours ago [-]
You can search open threat exchange for files tagged with "scatterbrain" and it will give you various hashes: https://otx.alienvault.com/browse/global/indicators?q=scatte...

You can then use the hashes with platforms like virustotal to download some samples.

zb3 11 hours ago [-]
Given that this was made by a nation-state attacker I'd expect something more sophisticated than pairipcore VM..

So, still waiting for full pairipcore (the newer one) writeup.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact
Rendered at 09:02:33 GMT+0000 (Coordinated Universal Time) with Vercel.