PassKillDisk

PassKillDisk
(Type: Wiper)

A wiper.

[News Analysis] Trends:

Total Trend: 0

Trend Per Year


Trend Per Month



[News Analysis] News Mention Another Threat Name:



[TTP Analysis] Technique Performance:

reconnaissance
0/43
resource development
0/45
initial access
0/19
execution
2/36
persistence
0/113
privilege escalation
1/96
defense evasion
5/184
credential access
0/63
discovery
3/44
lateral movement
0/22
collection
0/37
command and control
0/39
exfiltration
0/18
impact
5/26


[TTP Analysis] Mitre Attack Matrix:

TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
T1106
Native Api
T1129
Shared Modules
T1134
Access Token Manipulation
T1134
Access Token Manipulation
T1070.001
Indicator Removal : Clear Windows Event Logs
T1070.004
Indicator Removal : File Deletion
T1036.004
Masquerading : Masquerade Task Or Service
T1027
Obfuscated Files Or Information
T1083
File And Directory Discovery
T1057
Process Discovery
T1082
System Information Discovery
T1485
Data Destruction
T1486
Data Encrypted For Impact
T1561.002
Disk Wipe : Disk Structure Wipe
T1489
Service Stop
T1529
System Shutdown/reboot


[Infrastructure Analysis] Based on Related IOC:

IP:Port Timestamp
Domain Timestamp
URL Timestamp


[Target Analysis] Region/Sector:

No information


References:

Basic Information (Credit @etda.or.th)

Tool: PassKillDisk

Names: PassKillDisk

Description: A wiper.

Category: Malware

Type: Wiper

Information: https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-january-voodoo-bear/

Last-card-change: 2020-04-20

Source: https://apt.etda.or.th/cgi-bin/listtools.cgi

TTP Info (Credit @Mitre)

TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
T1106
NATIVE API
killdisk has called the windows api to retrieve the hard disk handle and shut down the machine.
T1129
SHARED MODULES
killdisk loads and executes functions from a dll.
T1134
ACCESS TOKEN MANIPULATION
killdisk has attempted to get the access token of a process by calling openprocesstoken. if killdisk gets the access token, then it attempt to modify the token privileges with adjusttokenprivileges.
T1134
ACCESS TOKEN MANIPULATION
killdisk has attempted to get the access token of a process by calling openprocesstoken. if killdisk gets the access token, then it attempt to modify the token privileges with adjusttokenprivileges.
T1070.001
INDICATOR REMOVAL : CLEAR WINDOWS EVENT LOGS
killdisk deletes application, security, setup, and system windows event logs.
T1070.004
INDICATOR REMOVAL : FILE DELETION
killdisk has the ability to quit and delete itself.
T1036.004
MASQUERADING : MASQUERADE TASK OR SERVICE
killdisk registers as a service under the plug-and-play support name.
T1027
OBFUSCATED FILES OR INFORMATION
killdisk uses vmprotect to make reverse engineering the malware more difficult.
T1083
FILE AND DIRECTORY DISCOVERY
killdisk has used the findnextfile command as part of its file deletion process.
T1057
PROCESS DISCOVERY
killdisk has called getcurrentprocess.
T1082
SYSTEM INFORMATION DISCOVERY
killdisk retrieves the hard disk name by calling the createfilea to \.\physicaldrive0 api.
T1485
DATA DESTRUCTION
killdisk deletes system files to make the os unbootable. killdisk also targets and deletes files with 35 different file extensions.
T1486
DATA ENCRYPTED FOR IMPACT
killdisk has a ransomware component that encrypts files with an aes key that is also rsa-1028 encrypted.
T1561.002
DISK WIPE : DISK STRUCTURE WIPE
killdisk overwrites the first sector of the master boot record with "0x00".
T1489
SERVICE STOP
killdisk terminates various processes to get the user to reboot the victim machine.
T1529
SYSTEM SHUTDOWN/REBOOT
killdisk attempts to reboot the machine by terminating specific processes.