| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
SUNSPOT was identified on disk with a filename of |
| Enterprise | T1195 | .002 | 供应链破坏: Compromise Software Supply Chain |
SUNSPOT malware was designed and used to insert SUNBURST into software builds of the SolarWinds Orion IT management product.[1] |
| Enterprise | T1140 | 反混淆/解码文件或信息 |
SUNSPOT decrypts SUNBURST, which was stored in AES128-CBC encrypted blobs.[1] |
|
| Enterprise | T1480 | 执行保护 |
SUNSPOT only replaces SolarWinds Orion source code if the MD5 checksums of both the original source code file and backdoored replacement source code match hardcoded values.[1] |
|
| .002 | Mutual Exclusion |
SUNSPOT creates a mutex using the hard-coded value |
||
| Enterprise | T1565 | .001 | 数据操控: Stored Data Manipulation |
SUNSPOT created a copy of the SolarWinds Orion software source file with a |
| Enterprise | T1083 | 文件和目录发现 |
SUNSPOT enumerated the Orion software Visual Studio solution directory path.[1] |
|
| Enterprise | T1106 | 本机API |
SUNSPOT used Windows API functions such as |
|
| Enterprise | T1027 | 混淆文件或信息 |
SUNSPOT encrypted log entries it collected with the stream cipher RC4 using a hard-coded key. It also uses AES128-CBC encrypted blobs for SUNBURST source code and data extracted from the SolarWinds Orion <MsBuild.exe process.[1] |
|
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
Following the successful injection of SUNBURST, SUNSPOT deleted a temporary file it created named |
| Enterprise | T1134 | 访问令牌操控 |
SUNSPOT modified its security token to grants itself debugging privileges by adding |
|
| Enterprise | T1057 | 进程发现 |
SUNSPOT monitored running processes for instances of |
|
| ID | Name | Description |
|---|---|---|
| C0024 | SolarWinds Compromise |