WhisperGate

Description

(Microsoft) The malware resides in various working directories, including C:\PerfLogs, C:\ProgramData, C:, and C:\temp, and is often named stage1.exe. In the observed intrusions, the malware executes via Impacket, a publicly available capability often used by threat actors for lateral movement and execution. The two-stage malware overwrites the Master Boot Record (MBR) on victim systems with a ransom note (Stage 1). The MBR is the part of a hard drive that tells the computer how to load its operating system. The ransom note contains a Bitcoin wallet and Tox ID (a unique account identifier used in the Tox encrypted messaging protocol) that have not been previously observed by MSTIC.

Names

Name
WhisperGate
WhisperKill
PAYWIPE

Category

Malware

Type

  • Ransomware
  • Wiper

Information

Mitre Attack

Malpedia

Other Information

Uuid

fb9145d6-3e77-48f0-80ae-a2897eaf49d3

Last Card Change

2022-12-30