New SUNSHUTTLE/GoldMax Second-Stage Backdoor Targeting U.S. Based Entity
released on 2021-03-04 @ 08:02:25 PM
Mandiant Threat Intelligence discovered a new backdoor uploaded by a U.S.-based entity to a public malware repository in August 2020 that we have named SUNSHUTTLE. SUNSHUTTLE is written in GO, and reads an embedded or local configuration file, communicates with a hard-coded command and control (C2) server over HTTPS, and supports commands including remotely uploading its configuration, file upload and download, and arbitrary command execution.
Mandiant observed SUNSHUTTLE at a victim compromised by UNC2452, and have indications that it is linked to UNC2542, but we have not fully verified this connection.
Additional reporting by Microsoft Threat Intelligence Center (MSTIC) names the actor behind the attacks against SolarWinds, the SUNBURST backdoor, TEARDROP malware, and related components as NOBELIUM.