←back to thread

Cyber Scarecrow

(www.cyberscarecrow.com)
606 points toby_tw | 2 comments | | HN request time: 0s | source
Show context
mafriese ◴[] No.40715995[source]
I don't understand why the software is built how it's built. Why would you want to implement licensing in the future for a software product that only creates fake processes and registry keys from a list: https://pastebin.com/JVZy4U5i . The limitation to 3 processes and license dialog make me feel uncomfortable using the software. All the processes are 14.1MB in size (and basically the scarecrow_process.dll - https://www.virustotal.com/gui/file/83ea1c039f031aa2b05a082c...). I just don't understand why you create such a complex piece of software if you can just use a Powershell script that does exactly the same using less resources. The science behind it only kinda makes sense. There is some malware that is using techniques to check if there are those processes are running but by no means is this a good way to keep you protected. Most common malware like credential stealers (redline, vidar, blahblah) don't care about that and they are by far the most common type of malware deployed. Even ransomware like Lockbit doesn't care, even if it's attached to a debugger. I think this mostly creates a false sense of security and if you plan to grow a business out of this, it would probably only take hours until there would be an open source option available. Don't get me wrong - I like the idea of creating new ways of defending malware, what I don't like is the way you try to "sell" it.
replies(4): >>40716046 #>>40716158 #>>40716939 #>>40722787 #
batch12 ◴[] No.40716939[source]
To your point, I made this a few years ago using powershell. I just created a stub .exe using csc on install and renamed it to match a similar list of binary names. Maybe I will dig it up...
replies(1): >>40720868 #
1. batch12 ◴[] No.40720868[source]
I uploaded it here. I haven't tested it in years though- https://github.com/0xDigest/odoshi
replies(1): >>40735778 #
2. pogue ◴[] No.40735778[source]
Looks good! Maybe you could update it to use the list of processes Scarecrow uses? https://pastebin.com/JVZy4U5i