Aggregator
Story of a Pentester Recruitment 2025
Demonstrating reduction of vulnerability classes: a key step in CISA’s “Secure by Design” pledge
Navigating DORA Compliance: A Roadmap to Operational Resilience with Trustwave
Accelerate Your Journey to DORA Compliance
Backscatter: Automated Configuration Extraction
Written by: Josh Triplett
Executive SummaryBackscatter is a tool developed by the Mandiant FLARE team that aims to automatically extract malware configurations. It relies on static signatures and emulation to extract this information without dynamic execution, bypassing anti-analysis logic present in many modern families. This complements dynamic analysis, providing faster threat identification and high-confidence malware family attribution. Google SecOps reverse engineers ensure precise indicators of compromise (IOC) extraction, empowering security teams with actionable threat intelligence to proactively neutralize attacks.
OverviewThe ability to quickly detect and respond to threats has a significant impact on potential outcomes. Indicators of compromise (IOCs) serve as crucial breadcrumbs, allowing cybersecurity teams to identify and mitigate potential attacks while expanding their search for related activity. VirusTotal's existing suite of tools to analyze and understand malware IOCs, and thus the Google Threat Intelligence platform by extension, is further enhanced with Backscatter.
VirusTotal has traditionally utilized dynamic analysis methods, like sandboxes, to observe malware behavior and capture IOCs. However, these methods can be time-consuming and may not yield actionable data if the malware employs anti-analysis techniques. Backscatter, a service developed by the Mandiant FLARE team, complements these methods by offering a static analysis capability that directly examines malware without executing it, leading to faster and more efficient IOC collection and high-confidence malware family identification. Additionally, Backscatter is capable of analyzing sandbox artifacts, including memory dumps, to improve support for packed and obfuscated malware that does successfully execute in dynamic environments.
Within the Google Threat Intelligence platform, Backscatter shines by identifying configuration data, embedded IOCs, and other malicious artifacts hidden within malware uploaded by users. It can pinpoint command-and-control (C2 or C&C) servers, dropped files, and other signs of malware presence, rapidly generating actionable threat intelligence. All of the extracted IOCs and configuration attributes become immediately pivotable in the Google Threat Intelligence platform, allowing users to identify additional malware related to that threat actor or activity.
Complementing Dynamic AnalysisBackscatter enables security teams to quickly understand and defend against attacks. By leveraging Backscatter's extracted IOCs in conjunction with static, dynamic, and reputational data, analysts gain a more comprehensive view of potential threats, enabling them to block malicious communication, detect and remove dropped files, and ultimately neutralize attacks.
Backscatter's static analysis approach, available in Google Threat Intelligence, provides a valuable addition to the platform's existing dynamic analysis capabilities. This combination offers a more comprehensive threat intelligence strategy, allowing users to leverage the strengths of both approaches for a more robust security posture.
Backscatter in GTI and VirusTotalBackscatter is available to Google SecOps customers, including VirusTotal Enterprise and its superseding long-term Google Threat Intelligence platform. While detecting a file as malicious can be useful, more clarity about the specific threat provides defenders with actionable intelligence. By providing a higher confidence attribution to a malware family, capabilities and behaviors can be approximated from previous reporting without requiring manual analysis.
Figure 1: Google Threat Intelligence identifies that a service has extracted DONUT and ASYNCRAT malware configurations from the file (link)
Embedded data such as C2 servers, campaign identifiers, file paths, and registry keys can provide analysts with additional contextual information around a specific event. Google Threat Intelligence helps link that event to related activity by providing pivots to related IOCs, reports, and threat actor profiles. This additional context allows defenders to search their environment and expand remediation efforts.
Figure 2: Google Threat Intelligence displays that Backscatter was able to extract the DONUT payload
Figure 3: Google Threat Intelligence displays that Backscatter was able to extract the DONUT payload's ASYNCRAT configuration
By taking a static approach to extracting data from malware, Backscatter is able to handle files targeting different environments, operating systems, and execution mechanisms. In the previous example, the DONUT malware sample is x86 shellcode and was not able to be executed directly by a sandbox.
Backscatter in the FieldMandiant Managed Defense leverages Backscatter to deliver faster and more accurate identification and analysis of rapidly emerging malware families. This enables them to more quickly scope threat activity and more rapidly provide customers with pertinent contextual information. From distribution campaigns providing initial access, to ransomware operations, to targeted attacks by state-sponsored actors, Backscatter aims to provide actionable threat intelligence to enable security teams and protect customers.
Figure 4: Google Threat Intelligence displays a phishing campaign involving UNC2500 using the BLACKWIDOW and DARKGATE backdoors
One example threat group is UNC2500, which primarily distributes malware via email attachments and links to compromised websites. Many of the malware families used by this group, such as QAKBOT and DARKGATE, are supported by Backscatter, allowing Managed Defense customers to proactively block IOCs extracted by Backscatter.
Figure 5: UNC2500 provides initial access to UNC4393 to deploy BASTA ransomware
Looking AheadBackscatter stands as a testament to Google SecOps' commitment to providing cutting-edge tools for combating cyber threats. By offering a fast and efficient way to extract IOCs through static analysis, Backscatter empowers security teams to stay one step ahead of attackers. Incorporating Backscatter into their workflow, Google Threat Intelligence customers can strengthen their cybersecurity defenses and safeguard their valuable assets.
Demonstrating reduction of vulnerability classes: a key step in CISA’s “Secure by Design” pledge
CVE-2019-9680 | Dahua IPC-HDW1X2X Packet IP Address information disclosure (Duplicate CVE-2024-13131 / Replaces VDB-290205)
«Sign in with Google»: инструмент быстрой аутентификации раскрывает данные компаний-призраков
Commvault strengthens Microsoft Active Directory protection
Commvault introduced an expansion of its platform to provide full and automated forest recovery for the world’s most widely used enterprise identity and access solution, Microsoft Active Directory. As organizations continue to combat non-stop cyberattacks and threats, Commvault Cloud Backup & Recovery for Active Directory Enterprise Edition is the latest addition to the Commvault Cloud platform, which already protects a vast array of workloads and is designed to keep customers resilient, operational, and in a … More →
The post Commvault strengthens Microsoft Active Directory protection appeared first on Help Net Security.
Russia warned its 'shadow fleet' could face action from NATO allies
共赴商用密码盛事,开启创新发展新篇--2025第三届商用密码展将于6月11日-13日在上海举办!
What I should learn about ethical hacking? Or Kali Linux
CVE-2024-13131 | Dahua IPC-HFW1200S up to 20241222 Web Interface /web_caps/webCapsConfig information disclosure (Replaced by VDB-141992)
微软工程师向 Linux 6.13 贡献的代码在发布前夕被禁用
微软工程师向 Linux 6.13 贡献的代码在发布前夕被禁用
Commvault Adds Ability to Recover Entire Instances of Active Directory
Commvault Adds Ability to Recover Entire Instances of Active Directory
Commvault today added an ability to automatically recover the instances of Microsoft Active Directory (AD) that have become primary targets of cybersecurity attacks.
The post Commvault Adds Ability to Recover Entire Instances of Active Directory appeared first on Security Boulevard.