Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. StoneDrill

StoneDrill

StoneDrill is wiper malware discovered in destructive campaigns against both Middle Eastern and European targets in association withAPT33.[1][2]

ID: S0380
Associated Software: DROPSHOT
Type: MALWARE
Platforms: Windows
Version: 1.2
Created: 14 May 2019
Last Modified: 11 April 2024

Associated Software Descriptions

NameDescription
DROPSHOT

[1]

Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1059.005Command and Scripting Interpreter:Visual Basic

StoneDrill has several VBS scripts used throughout the malware's lifecycle.[2]

EnterpriseT1485Data Destruction

StoneDrill has a disk wiper module that targets files other than those in the Windows directory.[2]

EnterpriseT1561.001Disk Wipe:Disk Content Wipe

StoneDrill can wipe the accessible physical or logical drives of the infected machine.[3]

.002Disk Wipe:Disk Structure Wipe

StoneDrill can wipe the master boot record of an infected computer.[3]

EnterpriseT1070.004Indicator Removal:File Deletion

StoneDrill has been observed deleting the temporary files once they fulfill their task.[2]

EnterpriseT1105Ingress Tool Transfer

StoneDrill has downloaded and dropped temporary files containing scripts; it additionally has a function to upload files from the victims machine.[2]

EnterpriseT1027.013Obfuscated Files or Information:Encrypted/Encoded File

StoneDrill has obfuscated its module with an alphabet-based table or XOR encryption.[2]

EnterpriseT1055Process Injection

StoneDrill has relied on injecting its payload directly into the process memory of the victim's preferred browser.[2]

EnterpriseT1012Query Registry

StoneDrill has looked in the registry to find the default browser path.[2]

EnterpriseT1113Screen Capture

StoneDrill can take screenshots.[2]

EnterpriseT1518.001Software Discovery:Security Software Discovery

StoneDrill can check for antivirus and antimalware programs.[2]

EnterpriseT1082System Information Discovery

StoneDrill has the capability to discover the system OS, Windows version, architecture and environment.[2]

EnterpriseT1124System Time Discovery

StoneDrill can obtain the current date and time of the victim machine.[2]

EnterpriseT1497Virtualization/Sandbox Evasion

StoneDrill has used several anti-emulation techniques to prevent automated analysis by emulators or sandboxes.[2]

EnterpriseT1047Windows Management Instrumentation

StoneDrill has used the WMI command-line (WMIC) utility to run tasks.[2]

Groups That Use This Software

IDNameReferences
G0064APT33

[1]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp