Shamoon v3 is a modular virus, also known as W32.DisTrack, that has recently re-emerged and hit oil, gas, energy, telecom, and government organizations in the Middle East and southern Europe. The Security Operations Center of Obrela Security Industries wants to keep our customers continuously updated of the malware’s course through this and the campaigns to follow as well as to provide threat mitigation and prevention guidance. SOC is equipped to identify this threat with speed and precision.
What is it about?
Although there are few available details of how exactly the attack is delivered, phishing emails or stolen credentials are the most likely source. Following its delivery, the malware quickly takes measures in order to appear legitimate and maintain persistence. It then collects data regarding the target system and determines whether to drop the 32-bit or 64-bit version. It then proceeds to decrypt its contents and installs them into the system. The worm component, previously contained into its contents, uses spreading techniques to infect machines. Meanwhile, a system service, called MaintenaceSrv, will be created in order to later run the wiper component. This component will delete and overwrite files on the infected computer so they cannot be recovered, erase the master boot record of the computer and force a reboot, rendering it unusable, thus completing its purpose.
What is the impact of this attack?
As a result of this attack, machine’s infected files will be unrecoverable and the machines themselves unusable after either a blue screen or driver error.
What our customers should do as part of mitigation and prevention actions
- Utilize this signatures in AV/EDR tools to identify infection using specific hashes: