SUNSPOT

Malware updated 6 months ago (2024-05-04T16:52:22.869Z)
Download STIX
Preview STIX
Sunspot is a sophisticated and novel malware associated with the SolarWinds intrusion that occurred in December 2020. This malicious software, linked to COZY BEAR (also known as APT29 or "The Dukes"), infiltrates systems undetected, often through suspicious downloads, emails, or websites. Once inside, it can steal personal information, disrupt operations, or even hold data hostage for ransom. The Sunspot malware cleverly masquerades as a legitimate Windows Binary, monitoring running processes for instances of MsBuild.exe, and writing its logs in a fake VMWare log file, making detection and mitigation particularly challenging. This malware's entry point was added to the legitimate Orion software RefreshInternal function, enabling it to monitor the execution of a SolarWinds build and insert malicious code during any such execution. If the decryption of the parameters is successful and if the MD5 checks pass, Sunspot proceeds with the replacement of the source file content. In one example, the MD5 hash for the backdoored source code was identified as 5f40b59ee2a9ac94ddb6ab9e3bd776ca. The configuration in Sunspot is encrypted using AES128-CBC, while the log file it writes is encrypted using RC4, further complicating efforts to understand and combat this threat. Since the initial discovery of Sunspot, the security community has identified an expanding collection of payloads attributed to the actor, including GoldMax, GoldFinder, Sibot, TEARDROP, Raindrop, and most recently, FLIPFLOP. These discoveries were made possible through collaborative efforts by several cybersecurity firms, including CrowdStrike, Microsoft, FireEye, Symantec, and KPMG. The persistent presence and cunning nature of Sunspot, along with its focus on the build process during a major supply chain attack, make it comparable only to the CozyDuke/DarkHalo/APT29/NOBELIUM SolarWinds compromise.
Description last updated: 2024-04-24T11:16:00.859Z
What's your take? (Question 1 of 0)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Implant
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the SUNSPOT Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more