SameCoin

Description

(HarfangLab) Following an X post by IntezerLab about an attack campaign that they dubbed “SameCoin”, we analyzed the samples they discovered and found a few identical variants. The infection vector appears to be an email impersonating the Israeli National Cyber Directorate, which tricks the reader into downloading malicious files which are presented as ‘security patches’.

Victims who download and execute linked files are infected with a wiper which, under certain circumstances, could also infect other hosts in the network. We assess that the campaign’s reach was limited, evidenced by the fact that the malware linked in the email was downloaded only a few dozen times.

Names

Name
SameCoin

Category

Malware

Type

  • Wiper

Information

Other Information

Uuid

2e249efb-70a3-40b4-b21d-ee20a3bec3b8

Last Card Change

2024-12-26