Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Save shiftybitshiftr/96be756d725f7453ec7caf083b09a04d to your computer and use it in GitHub Desktop.
Save shiftybitshiftr/96be756d725f7453ec7caf083b09a04d to your computer and use it in GitHub Desktop.
collection of EDR/SIEM queries based on FireEye, Microsoft, and other IOCs
--(Known) hashes of backdoored SolarWinds.Orion.Core.BusinessLayer.dll; Ref: https://msrc-blog.microsoft.com/2020/12/13/customer-guidance-on-recent-nation-state-cyber-attacks/
Sha256 in ( "32519b85c0b422e4656de6e6c41878e95fd95026267daab4215ee59c107d6c77, dab758bf98d9b36fa057a66cd0284737abf89857b73ca89280267ee7caf62f3b, eb6fab5a2964c5817fb239a7a5079cabca0a00464fb3e07155f28b0a57a2c0ed, c09040d35630d75dfef0f804f320f8b3d16a481071076918e9b236a321c1ea77, ac1b2b89e60707a20e9eb1ca480bc3410ead40643b386d624c5d21b47c02917c, 019085a76ba7126fff22770d71bd901c325fc68ac55aa743327984e89f4b0134, ce77d116a074dab7a22a0fd4f2c1ab475f16eec42e1ded3c0b0aa8211fe858d6, a25cadd48d70f6ea0c4a241d99c5241269e6faccb4054e62d16784640f8e53bc, d3c6785e18fba3749fb785bc313cf8346182f532c59172b69adfb31b96a5d0af" )
--Known SUNBURST domains created by Subdomain Generation Algorithm; Ref: https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html
URL In Contains AnyCase "avsvmcloud.com, freescanonline.com, thedoccloud.com, deftsecurity.com, virtualdataserver.com, digitalcollege.org"
OR
DNSRequest In Contains AnyCase "avsvmcloud.com, freescanonline.com, thedoccloud.com, deftsecurity.com, virtualdataserver.com, digitalcollege.org"
--Known BEACON domains
URL In Contains AnyCase "incomeupdate.com, zupertech.com, databasegalore.com, panhardware.com"
OR
DNSRequest In Contains AnyCase "incomeupdate.com, zupertech.com, databasegalore.com, panhardware.com"
--Windows Defender events
IndicatorName containsCIS "ExploitGuardNonMicrosoftSignedBlocked"
AND
(ParentProcessName = "svchost.exe" AND FileFullName containsCIS "NetSetupSvc.dll")
--Abnormal child process creation
ParentProcessName = "solarwinds.businesslayerhost.exe"
AND
ProcessName Not In Contains AnyCase ("APMServiceControl.exe, ExportToPDFCmd.Exe, SolarWinds.Credentials.Orion.WebApi.exe, SolarWinds.Orion.Topology.Calculator.exe, Database-Maint.exe, SolarWinds.Orion.ApiPoller.Service.exe, WerFault.exe")
--Abnormal file creation events
ParentProcessName = "solarwinds.businesslayerhost.exe"
AND
TgtFileExtension In Contains AnyCase ("exe, dll, ps1, jpg, png")
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment