SUNBURST

SUNBURST is a trojanized DLL designed to fit within the SolarWinds Orion software update framework. It was used by APT29 since at least February 2020.[1][2]

ID: S0559
Associated Software: Solorigate
Type: MALWARE
Platforms: Windows
Contributors: Daniyal Naeem, BT Security; Matt Brenton, Zurich Insurance Group
Version: 2.5
Created: 05 January 2021
Last Modified: 26 December 2023

Associated Software Descriptions

Name Description
Solorigate

[2]

Techniques Used

Domain ID Name Use
Enterprise T1047 Windows管理规范

SUNBURST used the WMI query Select * From Win32_SystemDriver to retrieve a driver listing.[3]

Enterprise T1546 .012 事件触发执行: Image File Execution Options Injection

SUNBURST created an Image File Execution Options (IFEO) Debugger registry value for the process dllhost.exe to trigger the installation of Cobalt Strike.[2]

Enterprise T1005 从本地系统获取数据

SUNBURST collected information from a compromised host.[4][3]

Enterprise T1036 .005 伪装: Match Legitimate Name or Location

SUNBURST created VBScripts that were named after existing services or folders to blend into legitimate activities.[2]

Enterprise T1112 修改注册表

SUNBURST had commands that allow an attacker to write or delete registry keys, and was observed stopping services by setting their HKLM\SYSTEM\CurrentControlSet\services\[service_name]\Start registry entries to value 4.[3][4] It also deleted previously-created Image File Execution Options (IFEO) Debugger registry values and registry keys related to HTTP proxy to clean up traces of its activity.[2]

Enterprise T1573 .001 加密通道: Symmetric Cryptography

SUNBURST encrypted C2 traffic using a single-byte-XOR cipher.[3]

Enterprise T1568 动态解析

SUNBURST dynamically resolved C2 infrastructure for randomly-generated subdomains within a parent domain.[3]

Enterprise T1059 .005 命令与脚本解释器: Visual Basic

SUNBURST used VBScripts to initiate the execution of payloads.[2]

Enterprise T1562 .001 妨碍防御: Disable or Modify Tools

SUNBURST attempted to disable software security services following checks against a FNV-1a + XOR hashed hardcoded blocklist.[5]

Enterprise T1071 .001 应用层协议: Web Protocols

SUNBURST communicated via HTTP GET or HTTP POST requests to third party servers for C2.[3]

.004 应用层协议: DNS

SUNBURST used DNS for C2 traffic designed to mimic normal SolarWinds API communications.[3]

Enterprise T1001 .001 数据混淆: Junk Data

SUNBURST added junk bytes to its C2 over HTTP.[3]

.002 数据混淆: Steganography

SUNBURST C2 data attempted to appear as benign XML related to .NET assemblies or as a faux JSON blob.[3][5][6]

.003 数据混淆: Protocol or Service Impersonation

SUNBURST masqueraded its network traffic as the Orion Improvement Program (OIP) protocol.[3]

Enterprise T1132 .001 数据编码: Standard Encoding

SUNBURST used Base64 encoding in its C2 traffic.[3]

Enterprise T1083 文件和目录发现

SUNBURST had commands to enumerate files and directories.[3][4]

Enterprise T1012 查询注册表

SUNBURST collected the registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid from compromised hosts.[3]

Enterprise T1027 混淆文件或信息

SUNBURST strings were compressed and encoded in Base64.[4] SUNBURST also obfuscated collected system information using a FNV-1a + XOR algorithm.[3]

.005 Indicator Removal from Tools

SUNBURST source code used generic variable names and pre-obfuscated strings, and was likely sanitized of developer comments before being added to SUNSPOT.[7]

Enterprise T1070 移除指标

SUNBURST removed HTTP proxy registry values to clean up traces of execution.[2]

.004 File Deletion

SUNBURST had a command to delete files.[3][4]

.007 Clear Network Connection History and Configurations

SUNBURST also removed the firewall rules it created during execution.[2]

.009 Clear Persistence

SUNBURST removed IFEO registry values to clean up traces of persistence.[2]

Enterprise T1218 .011 系统二进制代理执行: Rundll32

SUNBURST used Rundll32 to execute payloads.[2]

Enterprise T1082 系统信息发现

SUNBURST collected hostname and OS version.[3][4]

Enterprise T1033 系统所有者/用户发现

SUNBURST collected the username from a compromised host.[3][4]

Enterprise T1124 系统时间发现

SUNBURST collected device UPTIME.[3][4]

Enterprise T1007 系统服务发现

SUNBURST collected a list of service names that were hashed using a FNV-1a + XOR algorithm to check against similarly-hashed hardcoded blocklists.[3]

Enterprise T1016 系统网络配置发现

SUNBURST collected all network interface MAC addresses that are up and not loopback devices, as well as IP address, DHCP configuration, and domain information.[3]

Enterprise T1497 .001 虚拟化/沙盒规避: System Checks

SUNBURST checked the domain name of the compromised host to verify it was running in a real environment.[4]

.003 虚拟化/沙盒规避: Time Based Evasion

SUNBURST remained dormant after initial access for a period of up to two weeks.[3]

Enterprise T1518 .001 软件发现: Security Software Discovery

SUNBURST checked for a variety of antivirus/endpoint detection agents prior to execution.[4][5]

Enterprise T1105 输入工具传输

SUNBURST delivered different payloads, including TEARDROP in at least one instance.[3]

Enterprise T1057 进程发现

SUNBURST collected a list of process names that were hashed using a FNV-1a + XOR algorithm to check against similarly-hashed hardcoded blocklists.[3]

Enterprise T1553 .002 颠覆信任控制: Code Signing

SUNBURST was digitally signed by SolarWinds from March - May 2020.[3]

Groups That Use This Software

ID Name References
G0016 APT29

[3][8][9][10][11][12]

Campaigns

References