Concrete signature match: Trojan - Appears legitimate but performs malicious actions for .NET (Microsoft Intermediate Language) platform, family Solorigate
This is a concrete detection of Trojan:MSIL/Solorigate.BR!dha, identifying the notorious SUNBURST backdoor. This highly sophisticated threat, originating from a supply chain attack on SolarWinds, enables remote code execution, lateral movement, persistence, and data exfiltration through compromised `SolarWinds.Orion.Core.BusinessLayer.dll`.
Relevant strings associated with this threat: - \SolarWinds\Orion\SolarWinds.Orion.Core.BusinessLayer.dll (ASEP_FILEPATH) - (x86)\SolarWinds\Orion\SolarWinds.Orion.Core.BusinessLayer.dll (ASEP_FILEPATH) Relevant strings associated with this threat: - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
Immediately isolate affected systems from the network. Conduct a thorough forensic investigation to identify the full scope of compromise, including lateral movement, additional backdoors, and data exfiltration. Rebuild all compromised systems from trusted, clean backups, and reset all credentials that may have been exposed. Implement strong network segmentation and enhanced threat hunting.