检查SolarWinds Orion版本
Get-ItemProperty -Path "HKLM:\SOFTWARE\WOW6432Node\SolarWinds\Orion\" | Select-Object "VersionString"
检测恶意DLL文件
C:\Windows\System32\SolarWinds.Orion.Core.BusinessLayer.dll
Get-ChildItem "C:\Windows\System32\SolarWinds.Orion.Core.BusinessLayer.dll" -Recurse -Force | Get-FileHash
网络连接检查
avsvmcloud[.]com
databasegalore[.]com
deftsecurity[.]com
freescanonline[.]com
highdatabase[.]com
incomeupdate[.]com
panhardware[.]com
solartrackingsystem[.]net
thedoccloud[.]com
websitetheme[.]com
zupertech[.]com
// Microsoft Sentinel查询示例
let maliciousDomains = dynamic(["avsvmcloud.com", "databasegalore.com", "deftsecurity.com"]);
SecurityEvent
| where EventID == 3
| where RemoteIP has_any (maliciousDomains)
| project TimeGenerated, Computer, AccountName, RemoteIP, RemotePort
Invoke-SunBurstScan.ps1
# 检查进程注入
Get-Process | Where-Object {$_.Modules.ModuleName -contains "SolarWinds.Orion.Core.BusinessLayer.dll"}
rule Sunburst_Backdoor {
meta:
description = "Detects Sunburst backdoor DLL"
author = "Florian Roth"
reference = "https://github.com/Neo23x0/signature-base"
date = "2020-12-13"
strings:
$s1 = "SolarWinds.Orion.Core.BusinessLayer" fullword ascii
$s2 = "OrionImprovementBusinessLayer" fullword ascii
$s3 = "SolarWinds.BusinessLayerHost" fullword ascii
condition:
all of them
}
立即隔离受影响系统
凭证重置
补丁和更新
深度检测
如需更详细的定制化排查方案,请提供您的具体环境信息(如使用的安全产品、网络架构等)。