Detection rules › Kusto Query Language

SUNBURST and SUPERNOVA backdoor hashes

Source
upstream

Identifies SolarWinds SUNBURST and SUPERNOVA backdoor file hash IOCs in DeviceFileEvents References: - https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html - https://gist.github.com/olafhartong/71ffdd4cab4b6acd5cbcd1a0691ff82f

MITRE ATT&CK coverage

TacticTechniques
Initial AccessT1195 Supply Chain Compromise
ExecutionT1059 Command and Scripting Interpreter
PersistenceT1546 Event Triggered Execution
Privilege EscalationT1546 Event Triggered Execution

Event coverage

ProviderEvent IDTitle
Sysmon11FileCreate
Security-Auditing4663An attempt was made to access an object.
Defender-DeviceFileEvents9002000File activity (any)

Stages and Predicates

Stage 1: source

DeviceFileEvents

Stage 2: where

or
  MD5 eq "SunburstMD5"
  MD5 eq "SupernovaMD5"

Stage 3: extend

Stage 4: extend

Stage 5: extend

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
MD5in
  • SunburstMD5
  • SupernovaMD5