StoneDrill is wiper malware discovered in destructive campaigns against both Middle Eastern and European targets in association with APT33.[1][2]
| Name | Description |
|---|---|
| DROPSHOT |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
StoneDrill has used the WMI command-line (WMIC) utility to run tasks.[2] |
|
| Enterprise | T1059 | .005 | 命令与脚本解释器: Visual Basic |
StoneDrill has several VBS scripts used throughout the malware's lifecycle.[2] |
| Enterprise | T1113 | 屏幕捕获 |
StoneDrill can take screenshots.[2] |
|
| Enterprise | T1485 | 数据销毁 |
StoneDrill has a disk wiper module that targets files other than those in the Windows directory.[2] |
|
| Enterprise | T1012 | 查询注册表 |
StoneDrill has looked in the registry to find the default browser path.[2] |
|
| Enterprise | T1027 | .013 | 混淆文件或信息: Encrypted/Encoded File |
StoneDrill has obfuscated its module with an alphabet-based table or XOR encryption.[2] |
| Enterprise | T1561 | .001 | 磁盘擦除: Disk Content Wipe |
StoneDrill can wipe the accessible physical or logical drives of the infected machine.[3] |
| .002 | 磁盘擦除: Disk Structure Wipe |
StoneDrill can wipe the master boot record of an infected computer.[3] |
||
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
StoneDrill has been observed deleting the temporary files once they fulfill their task.[2] |
| Enterprise | T1082 | 系统信息发现 |
StoneDrill has the capability to discover the system OS, Windows version, architecture and environment.[2] |
|
| Enterprise | T1124 | 系统时间发现 |
StoneDrill can obtain the current date and time of the victim machine.[2] |
|
| Enterprise | T1497 | 虚拟化/沙盒规避 |
StoneDrill has used several anti-emulation techniques to prevent automated analysis by emulators or sandboxes.[2] |
|
| Enterprise | T1518 | .001 | 软件发现: Security Software Discovery |
StoneDrill can check for antivirus and antimalware programs.[2] |
| Enterprise | T1105 | 输入工具传输 |
StoneDrill has downloaded and dropped temporary files containing scripts; it additionally has a function to upload files from the victims machine.[2] |
|
| Enterprise | T1055 | 进程注入 |
StoneDrill has relied on injecting its payload directly into the process memory of the victim's preferred browser.[2] |
|