If I was still with CERT/CC, I know I'd be patiently awaiting the teardown analysis of that DLL. I bet it's an interesting bit of code. I remember being shown the clever obfuscations through JMPs that many mal-devs put in their code to remain harder to decode intention & methods.
CISA's latest analysis of the SolarWinds backdoor is a great reminder of how careful and clever its developers were. us-cert.cisa.gov/ncas/analys…
1
2
6
To note, the CISA report here does remind me of the stuff we used to do on more impactful incidents. I'm appreciating the detail and what you can learn from those code segments about what they were doing. Highly advise folks to read that link @ericgeller included.
1
1
2
What would be very interesting, and I know doubtful, but maybe @C_C_Krebs & @alexstamos can convince their client to do so, since we're talking transparency... is to show the "before" & "afters" of where in the overall codebase these actually sat from the source code in Orion.
1
Note to @CISAgov & @USCERT_gov the report has some HTML element translation issues (such as "<<" instead of <<) which hurts some readability.
1
Also, if any enterprising person may want to annotate some of the functions... those hashes is say "UploadSystemDescription Function" could do well with linking, rather than hopping around the doc.
2
I'm wondering how the malware/trojan may have dealt with updating some of the blocked processes/commands/features if they were updated/replaced/modified during an upgrade (such as AV or OS updates), & how they were tracking that over the period. Seems a pretty static hash list.
1
I'm guessing what I'm getting at that if the hard-coded block list existed, it should have been present in SolarWInd's own build repo... & they sacrificed some stealth by letting that possibly not get updated in these cases, but if they were updated.... 1/2
1
A single source code file was temporarily replaced while the build was ongoing, and then the original file put back after the object had been created from the attackers’ code. I would be utterly shocked to find any build/QA process that would have flagged this.
Feb 8, 2021 · 6:29 PM UTC
1
1



