| Name | Description |
|---|---|
| Solorigate |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
SUNBURST used the WMI query |
|
| Enterprise | T1546 | .012 | 事件触发执行: Image File Execution Options Injection |
SUNBURST created an Image File Execution Options (IFEO) Debugger registry value for the process |
| Enterprise | T1005 | 从本地系统获取数据 |
SUNBURST collected information from a compromised host.[4][3] |
|
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
SUNBURST created VBScripts that were named after existing services or folders to blend into legitimate activities.[2] |
| Enterprise | T1112 | 修改注册表 |
SUNBURST had commands that allow an attacker to write or delete registry keys, and was observed stopping services by setting their |
|
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography |
SUNBURST encrypted C2 traffic using a single-byte-XOR cipher.[3] |
| Enterprise | T1568 | 动态解析 |
SUNBURST dynamically resolved C2 infrastructure for randomly-generated subdomains within a parent domain.[3] |
|
| Enterprise | T1059 | .005 | 命令与脚本解释器: Visual Basic |
SUNBURST used VBScripts to initiate the execution of payloads.[2] |
| Enterprise | T1562 | .001 | 妨碍防御: Disable or Modify Tools |
SUNBURST attempted to disable software security services following checks against a FNV-1a + XOR hashed hardcoded blocklist.[5] |
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
SUNBURST communicated via HTTP GET or HTTP POST requests to third party servers for C2.[3] |
| .004 | 应用层协议: DNS |
SUNBURST used DNS for C2 traffic designed to mimic normal SolarWinds API communications.[3] |
||
| Enterprise | T1001 | .001 | 数据混淆: Junk Data | |
| .002 | 数据混淆: Steganography |
SUNBURST C2 data attempted to appear as benign XML related to .NET assemblies or as a faux JSON blob.[3][5][6] |
||
| .003 | 数据混淆: Protocol or Service Impersonation |
SUNBURST masqueraded its network traffic as the Orion Improvement Program (OIP) protocol.[3] |
||
| Enterprise | T1132 | .001 | 数据编码: Standard Encoding | |
| Enterprise | T1083 | 文件和目录发现 |
SUNBURST had commands to enumerate files and directories.[3][4] |
|
| Enterprise | T1012 | 查询注册表 |
SUNBURST collected the registry value |
|
| Enterprise | T1027 | 混淆文件或信息 |
SUNBURST strings were compressed and encoded in Base64.[4] SUNBURST also obfuscated collected system information using a FNV-1a + XOR algorithm.[3] |
|
| .005 | Indicator Removal from Tools |
SUNBURST source code used generic variable names and pre-obfuscated strings, and was likely sanitized of developer comments before being added to SUNSPOT.[7] |
||
| Enterprise | T1070 | 移除指标 |
SUNBURST removed HTTP proxy registry values to clean up traces of execution.[2] |
|
| .004 | File Deletion | |||
| .007 | Clear Network Connection History and Configurations |
SUNBURST also removed the firewall rules it created during execution.[2] |
||
| .009 | Clear Persistence |
SUNBURST removed IFEO registry values to clean up traces of persistence.[2] |
||
| Enterprise | T1218 | .011 | 系统二进制代理执行: Rundll32 | |
| Enterprise | T1082 | 系统信息发现 | ||
| Enterprise | T1033 | 系统所有者/用户发现 |
SUNBURST collected the username from a compromised host.[3][4] |
|
| Enterprise | T1124 | 系统时间发现 | ||
| Enterprise | T1007 | 系统服务发现 |
SUNBURST collected a list of service names that were hashed using a FNV-1a + XOR algorithm to check against similarly-hashed hardcoded blocklists.[3] |
|
| Enterprise | T1016 | 系统网络配置发现 |
SUNBURST collected all network interface MAC addresses that are up and not loopback devices, as well as IP address, DHCP configuration, and domain information.[3] |
|
| Enterprise | T1497 | .001 | 虚拟化/沙盒规避: System Checks |
SUNBURST checked the domain name of the compromised host to verify it was running in a real environment.[4] |
| .003 | 虚拟化/沙盒规避: Time Based Evasion |
SUNBURST remained dormant after initial access for a period of up to two weeks.[3] |
||
| Enterprise | T1518 | .001 | 软件发现: Security Software Discovery |
SUNBURST checked for a variety of antivirus/endpoint detection agents prior to execution.[4][5] |
| Enterprise | T1105 | 输入工具传输 |
SUNBURST delivered different payloads, including TEARDROP in at least one instance.[3] |
|
| Enterprise | T1057 | 进程发现 |
SUNBURST collected a list of process names that were hashed using a FNV-1a + XOR algorithm to check against similarly-hashed hardcoded blocklists.[3] |
|
| Enterprise | T1553 | .002 | 颠覆信任控制: Code Signing |
SUNBURST was digitally signed by SolarWinds from March - May 2020.[3] |