#SolarWinds#SUNBURST malware checks for a long list of security processes and services running on the endpoint to try and evade detection. It does this by hashing the lowercase process name and comparing it against hardcoded values. Thread 👇
The hashing function isn't one I'm familiar with, FNV1A, but seems pretty straight forward to understand
FireEye did a great job in brute-forcing many of the hardcoded hashes and identified a big list of security tools that the malware is checking for
There are many hashes that need to be identified so I've written a tool in Go which replicates the hashing algorithm.
Feed it a list of processes and it'll hash and compare them to the list of hardcoded hashes. I've already identified some that FireEye hadn't got to yet
You can grab a copy of my code here, hope it helps!