Company
Date Published
Author
Ploutus
Word count
4448
Language
English
Hacker News points
None

Summary

The article delves into the challenges of analyzing Ploutus ATM malware, which targets ATMs for jackpotting attacks, using sophisticated obfuscation techniques implemented with the .NET framework. Ploutus employs commercial obfuscators like .NET Reactor to complicate the analysis by encrypting method bodies, utilizing control-flow obfuscation, and employing a technique called method body encryption to hinder decompilation efforts. This encryption is particularly challenging due to the use of runtime-generated keys and constants, making static analysis difficult without executing the malware. The article provides insights into the process of deobfuscating this type of malware, emphasizing the need for a strong understanding of .NET internals and the use of dynamic analysis tools such as dnSpy to extract necessary decryption keys and constants. Despite the obstacles presented by the obfuscation, it is possible to create a deobfuscator that can restore the original method bodies, allowing for a more thorough analysis of the malware's functionality.