Names | Hatef Wiper | |
Category | Malware | |
Type | Wiper | |
Description | (Intezer) The malware wipes key system paths across all connected drives, focusing on directories within “Users,” “Program Files,” “Program Files (x86),” and “Windows,” employing the ProcessDirectory method to enumerate all files within these paths recursively. Once files are deleted, and directories are left empty, it uses an incorrectly spelled method, DeleteDrirectorys, to remove these now-obsolete directories. During its operation, the wiper sends periodic updates to a predetermined Telegram chat, likely to inform its controllers about the ongoing progress or notify them when the task is completed. The dispatched information comprises the external IP address of the infected computer, the hostname, a timestamp, and a count of “Undeleted files” within critical file system locations such as the Windows directory and Program Files directories. This count is formatted to show the number of files that the malware has not managed to delete up to that point. This communication strategy serves as a means of real-time reporting on malicious activities, offering the attackers updates and insights into the efficacy of their attack. | |
Information | <https://intezer.com/blog/research/stealth-wiper-israeli-infrastructure/> |
Last change to this tool card: 16 January 2024
Download this tool card in JSON format
Previous: Harpoon
Next: HATVIBE
Changed | Name | Country | Observed | ||
Other groups | |||||
Handala Hack Team | [Unknown] | 2023-Dec 2023 |
1 group listed (0 APT, 1 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |