The binary doesn't execute standard x64 instructions for its main logic. Instead, it uses a custom-built virtual machine with its own bytecode and registers.
Mandiant usually publishes a PDF with the intended solution path for every challenge.
The name likely refers to a specific trick within the binary that manipulates the instruction pointer or stack to hide the true entry point of the malicious payload. Recommended Resources
The challenge involves a 64-bit Windows executable that acts as a custom "loader." Its primary goal is to execute a hidden payload, but it employs several layers of complexity to thwart standard analysis:
Navigating the custom VM loop in IDA Pro or Ghidra. Analysts look for the "fetch-decode-execute" cycle to understand how the custom bytecode is processed.