If I was still with CERT/CC, I know I'd be patiently awaiting the teardown analysis of that DLL. I bet it's an interesting bit of code. I remember being shown the clever obfuscations through JMPs that many mal-devs put in their code to remain harder to decode intention & methods.
CISA's latest analysis of the SolarWinds backdoor is a great reminder of how careful and clever its developers were. us-cert.cisa.gov/ncas/analys…
1
2
6
To note, the CISA report here does remind me of the stuff we used to do on more impactful incidents. I'm appreciating the detail and what you can learn from those code segments about what they were doing. Highly advise folks to read that link @ericgeller included.
1
1
2
What would be very interesting, and I know doubtful, but maybe @C_C_Krebs & @alexstamos can convince their client to do so, since we're talking transparency... is to show the "before" & "afters" of where in the overall codebase these actually sat from the source code in Orion.
1
Note to @CISAgov & @USCERT_gov the report has some HTML element translation issues (such as "&lt;&lt;" instead of <<) which hurts some readability.
1
Also, if any enterprising person may want to annotate some of the functions... those hashes is say "UploadSystemDescription Function" could do well with linking, rather than hopping around the doc.
2
That custom Base-64 alphabet is clever AF.
1
I'm wondering how the malware/trojan may have dealt with updating some of the blocked processes/commands/features if they were updated/replaced/modified during an upgrade (such as AV or OS updates), & how they were tracking that over the period. Seems a pretty static hash list.
1
I'm guessing what I'm getting at that if the hard-coded block list existed, it should have been present in SolarWInd's own build repo... & they sacrificed some stealth by letting that possibly not get updated in these cases, but if they were updated.... 1/2
1
why wasn't that detected in the source control/QA management side of SolarWinds' own build and analysis. I do wonder what their CI/CD pipeline looks like, are they doing any major change analysis, smoke testing before releases & diffs?
2
2
Replying to @webjedi
A single source code file was temporarily replaced while the build was ongoing, and then the original file put back after the object had been created from the attackers’ code. I would be utterly shocked to find any build/QA process that would have flagged this.

Feb 8, 2021 · 6:29 PM UTC

1
1
Replying to @hal_pomeranz
yeah, as a call out to the last part of my thread, was maybe the next level up analysis on the process, policy and procedures as part of their CI/CD and general practices a maybe a "takeaway" for those who are looking at the non-technical aspects too.