Olympic Destroyer is malware that was used by Sandworm Team against the 2018 Winter Olympics, held in Pyeongchang, South Korea. The main purpose of the malware was to render infected computer systems inoperable. The malware leverages various native Windows utilities and API calls to carry out its destructive tasks. Olympic Destroyer has worm-like features to spread itself across a computer network in order to maximize its destructive impact.[1][2]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
Olympic Destroyer uses WMI to help propagate itself across a network.[1] |
|
| Enterprise | T1555 | .003 | 从密码存储中获取凭证: Credentials from Web Browsers |
Olympic Destroyer contains a module that tries to obtain stored credentials from web browsers.[1] |
| Enterprise | T1003 | .001 | 操作系统凭证转储: LSASS Memory |
Olympic Destroyer contains a module that tries to obtain credentials from LSASS, similar to Mimikatz. These credentials are used with PsExec and Windows Management Instrumentation to help the malware propagate itself across a network.[1] |
| Enterprise | T1485 | 数据销毁 |
Olympic Destroyer overwrites files locally and on remote shares.[1][2] |
|
| Enterprise | T1489 | 服务停止 |
Olympic Destroyer uses the API call |
|
| Enterprise | T1570 | 横向工具传输 |
Olympic Destroyer attempts to copy itself to remote machines on the network.[1] |
|
| Enterprise | T1070 | .001 | 移除指标: Clear Windows Event Logs |
Olympic Destroyer will attempt to clear the System and Security event logs using |
| Enterprise | T1529 | 系统关机/重启 |
Olympic Destroyer will shut down the compromised system after it is done modifying system configuration settings.[1][2] |
|
| Enterprise | T1490 | 系统恢复抑制 |
Olympic Destroyer uses the native Windows utilities |
|
| Enterprise | T1569 | .002 | 系统服务: Service Execution |
Olympic Destroyer utilizes PsExec to help propagate itself across a network.[1] |
| Enterprise | T1016 | 系统网络配置发现 |
Olympic Destroyer uses API calls to enumerate the infected system's ARP table.[1] |
|
| Enterprise | T1135 | 网络共享发现 |
Olympic Destroyer will attempt to enumerate mapped network shares to later attempt to wipe all files on those shares.[1] |
|
| Enterprise | T1021 | .002 | 远程服务: SMB/Windows Admin Shares |
Olympic Destroyer uses PsExec to interact with the |
| Enterprise | T1018 | 远程系统发现 |
Olympic Destroyer uses Windows Management Instrumentation to enumerate all systems in the network.[1] |
|