Behavioral task
behavioral1
Sample
sample.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
sample.dll
Resource
win10v20201028
General
-
Target
c15abaf51e78ca56c0376522d699c978217bf041a3bd3c71d09193efa5717c71.bin.sample.gz
-
Size
7KB
-
MD5
a191908d3d7dcb6ebf59dcecfedbdf60
-
SHA1
90c8c3e5066c194658f315f7d087a4b38abd092d
-
SHA256
2f6b20edaee4421bee9e3baf3c851a5f01cadbe261bc18e7f49bd8d41c77a0c0
-
SHA512
bac87b0ac20236dfaeafdb79520145f17f64a7c22b0df5639938a1f559edce44cc44ae4fb7f9b0c642c3a37c1e406c5d22074bff9db559304974d23714fd0322
Malware Config
Signatures
-
Detected SUPERNOVA .NET web shell 1 IoCs
SUPERNOVA is a .NET web shell backdoor masquerading as a legitimate SolarWinds web service handler. SUPERNOVA inspects and reponds to HTTP requests with the appropriate HTTP query strings, Cookies, and/or HTML form values (e.g. named codes, class, method, and args).
resource yara_rule static1/unpack001/sample family_supernova -
Supernova family
Files
-
c15abaf51e78ca56c0376522d699c978217bf041a3bd3c71d09193efa5717c71.bin.sample.gz.gz
-
sample.dll windows x86