research.checkpoint.com Open in urlscan Pro
141.193.213.21  Public Scan

URL: https://research.checkpoint.com/2024/hamas-affiliated-threat-actor-expands-to-disruptive-activity/?_thumbnail_id=30812
Submission: On November 14 via api from IN — Scanned from US

Form analysis 1 forms found in the DOM

POST /2024/hamas-affiliated-threat-actor-expands-to-disruptive-activity/?_thumbnail_id=30812#wpcf7-f26727-o1

<form action="/2024/hamas-affiliated-threat-actor-expands-to-disruptive-activity/?_thumbnail_id=30812#wpcf7-f26727-o1" method="post" class="wpcf7-form demo resetting" aria-label="Contact form" novalidate="novalidate" data-status="resetting">
  <div style="display: none;">
    <input type="hidden" name="_wpcf7" value="26727">
    <input type="hidden" name="_wpcf7_version" value="6.0">
    <input type="hidden" name="_wpcf7_locale" value="en_US">
    <input type="hidden" name="_wpcf7_unit_tag" value="wpcf7-f26727-o1">
    <input type="hidden" name="_wpcf7_container_post" value="0">
    <input type="hidden" name="_wpcf7_posted_data_hash" value="">
  </div>
  <div class="contact-form-outer">
    <div class="flex-row">
      <div class="flex-12">
        <div class="col-margin">
          <p><label>First Name<span class="wpcf7-form-control-wrap" data-name="your-first-name"><input size="40" maxlength="400" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required form-control" aria-required="true" aria-invalid="false"
                  value="" type="text" name="your-first-name"></span></label>
          </p>
        </div>
      </div>
      <div class="flex-12">
        <div class="col-margin">
          <p><label>Last Name<span class="wpcf7-form-control-wrap" data-name="your-last-name"><input size="40" maxlength="400" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required form-control" aria-required="true" aria-invalid="false"
                  value="" type="text" name="your-last-name"></span></label>
          </p>
        </div>
      </div>
      <div class="flex-12">
        <div class="col-margin">
          <p><label>Country<span class="wpcf7-form-control-wrap" data-name="country"><select class="wpcf7-form-control wpcf7-select classform-control" aria-invalid="false" name="country">
                  <option value="">—Please choose an option—</option>
                  <option value="China">China</option>
                  <option value="India">India</option>
                  <option value="United States">United States</option>
                  <option value="Indonesia">Indonesia</option>
                  <option value="Brazil">Brazil</option>
                  <option value="Pakistan">Pakistan</option>
                  <option value="Nigeria">Nigeria</option>
                  <option value="Bangladesh">Bangladesh</option>
                  <option value="Russia">Russia</option>
                  <option value="Japan">Japan</option>
                  <option value="Mexico">Mexico</option>
                  <option value="Philippines">Philippines</option>
                  <option value="Vietnam">Vietnam</option>
                  <option value="Ethiopia">Ethiopia</option>
                  <option value="Egypt">Egypt</option>
                  <option value="Germany">Germany</option>
                  <option value="Iran">Iran</option>
                  <option value="Turkey">Turkey</option>
                  <option value="Democratic Republic of the Congo">Democratic Republic of the Congo</option>
                  <option value="Thailand">Thailand</option>
                  <option value="France">France</option>
                  <option value="United Kingdom">United Kingdom</option>
                  <option value="Italy">Italy</option>
                  <option value="Burma">Burma</option>
                  <option value="South Africa">South Africa</option>
                  <option value="South Korea">South Korea</option>
                  <option value="Colombia">Colombia</option>
                  <option value="Spain">Spain</option>
                  <option value="Ukraine">Ukraine</option>
                  <option value="Tanzania">Tanzania</option>
                  <option value="Kenya">Kenya</option>
                  <option value="Argentina">Argentina</option>
                  <option value="Algeria">Algeria</option>
                  <option value="Poland">Poland</option>
                  <option value="Sudan">Sudan</option>
                  <option value="Uganda">Uganda</option>
                  <option value="Canada">Canada</option>
                  <option value="Iraq">Iraq</option>
                  <option value="Morocco">Morocco</option>
                  <option value="Peru">Peru</option>
                  <option value="Uzbekistan">Uzbekistan</option>
                  <option value="Saudi Arabia">Saudi Arabia</option>
                  <option value="Malaysia">Malaysia</option>
                  <option value="Venezuela">Venezuela</option>
                  <option value="Nepal">Nepal</option>
                  <option value="Afghanistan">Afghanistan</option>
                  <option value="Yemen">Yemen</option>
                  <option value="North Korea">North Korea</option>
                  <option value="Ghana">Ghana</option>
                  <option value="Mozambique">Mozambique</option>
                  <option value="Taiwan">Taiwan</option>
                  <option value="Australia">Australia</option>
                  <option value="Ivory Coast">Ivory Coast</option>
                  <option value="Syria">Syria</option>
                  <option value="Madagascar">Madagascar</option>
                  <option value="Angola">Angola</option>
                  <option value="Cameroon">Cameroon</option>
                  <option value="Sri Lanka">Sri Lanka</option>
                  <option value="Romania">Romania</option>
                  <option value="Burkina Faso">Burkina Faso</option>
                  <option value="Niger">Niger</option>
                  <option value="Kazakhstan">Kazakhstan</option>
                  <option value="Netherlands">Netherlands</option>
                  <option value="Chile">Chile</option>
                  <option value="Malawi">Malawi</option>
                  <option value="Ecuador">Ecuador</option>
                  <option value="Guatemala">Guatemala</option>
                  <option value="Mali">Mali</option>
                  <option value="Cambodia">Cambodia</option>
                  <option value="Senegal">Senegal</option>
                  <option value="Zambia">Zambia</option>
                  <option value="Zimbabwe">Zimbabwe</option>
                  <option value="Chad">Chad</option>
                  <option value="South Sudan">South Sudan</option>
                  <option value="Belgium">Belgium</option>
                  <option value="Cuba">Cuba</option>
                  <option value="Tunisia">Tunisia</option>
                  <option value="Guinea">Guinea</option>
                  <option value="Greece">Greece</option>
                  <option value="Portugal">Portugal</option>
                  <option value="Rwanda">Rwanda</option>
                  <option value="Czech Republic">Czech Republic</option>
                  <option value="Somalia">Somalia</option>
                  <option value="Haiti">Haiti</option>
                  <option value="Benin">Benin</option>
                  <option value="Burundi">Burundi</option>
                  <option value="Bolivia">Bolivia</option>
                  <option value="Hungary">Hungary</option>
                  <option value="Sweden">Sweden</option>
                  <option value="Belarus">Belarus</option>
                  <option value="Dominican Republic">Dominican Republic</option>
                  <option value="Azerbaijan">Azerbaijan</option>
                  <option value="Honduras">Honduras</option>
                  <option value="Austria">Austria</option>
                  <option value="United Arab Emirates">United Arab Emirates</option>
                  <option value="Israel">Israel</option>
                  <option value="Switzerland">Switzerland</option>
                  <option value="Tajikistan">Tajikistan</option>
                  <option value="Bulgaria">Bulgaria</option>
                  <option value="Hong Kong (China)">Hong Kong (China)</option>
                  <option value="Serbia">Serbia</option>
                  <option value="Papua New Guinea">Papua New Guinea</option>
                  <option value="Paraguay">Paraguay</option>
                  <option value="Laos">Laos</option>
                  <option value="Jordan">Jordan</option>
                  <option value="El Salvador">El Salvador</option>
                  <option value="Eritrea">Eritrea</option>
                  <option value="Libya">Libya</option>
                  <option value="Togo">Togo</option>
                  <option value="Sierra Leone">Sierra Leone</option>
                  <option value="Nicaragua">Nicaragua</option>
                  <option value="Kyrgyzstan">Kyrgyzstan</option>
                  <option value="Denmark">Denmark</option>
                  <option value="Finland">Finland</option>
                  <option value="Slovakia">Slovakia</option>
                  <option value="Singapore">Singapore</option>
                  <option value="Turkmenistan">Turkmenistan</option>
                  <option value="Norway">Norway</option>
                  <option value="Lebanon">Lebanon</option>
                  <option value="Costa Rica">Costa Rica</option>
                  <option value="Central African Republic">Central African Republic</option>
                  <option value="Ireland">Ireland</option>
                  <option value="Georgia">Georgia</option>
                  <option value="New Zealand">New Zealand</option>
                  <option value="Republic of the Congo">Republic of the Congo</option>
                  <option value="Palestine">Palestine</option>
                  <option value="Liberia">Liberia</option>
                  <option value="Croatia">Croatia</option>
                  <option value="Oman">Oman</option>
                  <option value="Bosnia and Herzegovina">Bosnia and Herzegovina</option>
                  <option value="Puerto Rico">Puerto Rico</option>
                  <option value="Kuwait">Kuwait</option>
                  <option value="Moldov">Moldov</option>
                  <option value="Mauritania">Mauritania</option>
                  <option value="Panama">Panama</option>
                  <option value="Uruguay">Uruguay</option>
                  <option value="Armenia">Armenia</option>
                  <option value="Lithuania">Lithuania</option>
                  <option value="Albania">Albania</option>
                  <option value="Mongolia">Mongolia</option>
                  <option value="Jamaica">Jamaica</option>
                  <option value="Namibia">Namibia</option>
                  <option value="Lesotho">Lesotho</option>
                  <option value="Qatar">Qatar</option>
                  <option value="Macedonia">Macedonia</option>
                  <option value="Slovenia">Slovenia</option>
                  <option value="Botswana">Botswana</option>
                  <option value="Latvia">Latvia</option>
                  <option value="Gambia">Gambia</option>
                  <option value="Kosovo">Kosovo</option>
                  <option value="Guinea-Bissau">Guinea-Bissau</option>
                  <option value="Gabon">Gabon</option>
                  <option value="Equatorial Guinea">Equatorial Guinea</option>
                  <option value="Trinidad and Tobago">Trinidad and Tobago</option>
                  <option value="Estonia">Estonia</option>
                  <option value="Mauritius">Mauritius</option>
                  <option value="Swaziland">Swaziland</option>
                  <option value="Bahrain">Bahrain</option>
                  <option value="Timor-Leste">Timor-Leste</option>
                  <option value="Djibouti">Djibouti</option>
                  <option value="Cyprus">Cyprus</option>
                  <option value="Fiji">Fiji</option>
                  <option value="Reunion (France)">Reunion (France)</option>
                  <option value="Guyana">Guyana</option>
                  <option value="Comoros">Comoros</option>
                  <option value="Bhutan">Bhutan</option>
                  <option value="Montenegro">Montenegro</option>
                  <option value="Macau (China)">Macau (China)</option>
                  <option value="Solomon Islands">Solomon Islands</option>
                  <option value="Western Sahara">Western Sahara</option>
                  <option value="Luxembourg">Luxembourg</option>
                  <option value="Suriname">Suriname</option>
                  <option value="Cape Verde">Cape Verde</option>
                  <option value="Malta">Malta</option>
                  <option value="Guadeloupe (France)">Guadeloupe (France)</option>
                  <option value="Martinique (France)">Martinique (France)</option>
                  <option value="Brunei">Brunei</option>
                  <option value="Bahamas">Bahamas</option>
                  <option value="Iceland">Iceland</option>
                  <option value="Maldives">Maldives</option>
                  <option value="Belize">Belize</option>
                  <option value="Barbados">Barbados</option>
                  <option value="French Polynesia (France)">French Polynesia (France)</option>
                  <option value="Vanuatu">Vanuatu</option>
                  <option value="New Caledonia (France)">New Caledonia (France)</option>
                  <option value="French Guiana (France)">French Guiana (France)</option>
                  <option value="Mayotte (France)">Mayotte (France)</option>
                  <option value="Samoa">Samoa</option>
                  <option value="Sao Tom and Principe">Sao Tom and Principe</option>
                  <option value="Saint Lucia">Saint Lucia</option>
                  <option value="Guam (USA)">Guam (USA)</option>
                  <option value="Curacao (Netherlands)">Curacao (Netherlands)</option>
                  <option value="Saint Vincent and the Grenadines">Saint Vincent and the Grenadines</option>
                  <option value="Kiribati">Kiribati</option>
                  <option value="United States Virgin Islands (USA)">United States Virgin Islands (USA)</option>
                  <option value="Grenada">Grenada</option>
                  <option value="Tonga">Tonga</option>
                  <option value="Aruba (Netherlands)">Aruba (Netherlands)</option>
                  <option value="Federated States of Micronesia">Federated States of Micronesia</option>
                  <option value="Jersey (UK)">Jersey (UK)</option>
                  <option value="Seychelles">Seychelles</option>
                  <option value="Antigua and Barbuda">Antigua and Barbuda</option>
                  <option value="Isle of Man (UK)">Isle of Man (UK)</option>
                  <option value="Andorra">Andorra</option>
                  <option value="Dominica">Dominica</option>
                  <option value="Bermuda (UK)">Bermuda (UK)</option>
                  <option value="Guernsey (UK)">Guernsey (UK)</option>
                  <option value="Greenland (Denmark)">Greenland (Denmark)</option>
                  <option value="Marshall Islands">Marshall Islands</option>
                  <option value="American Samoa (USA)">American Samoa (USA)</option>
                  <option value="Cayman Islands (UK)">Cayman Islands (UK)</option>
                  <option value="Saint Kitts and Nevis">Saint Kitts and Nevis</option>
                  <option value="Northern Mariana Islands (USA)">Northern Mariana Islands (USA)</option>
                  <option value="Faroe Islands (Denmark)">Faroe Islands (Denmark)</option>
                  <option value="Sint Maarten (Netherlands)">Sint Maarten (Netherlands)</option>
                  <option value="Saint Martin (France)">Saint Martin (France)</option>
                  <option value="Liechtenstein">Liechtenstein</option>
                  <option value="Monaco">Monaco</option>
                  <option value="San Marino">San Marino</option>
                  <option value="Turks and Caicos Islands (UK)">Turks and Caicos Islands (UK)</option>
                  <option value="Gibraltar (UK)">Gibraltar (UK)</option>
                  <option value="British Virgin Islands (UK)">British Virgin Islands (UK)</option>
                  <option value="Aland Islands (Finland)">Aland Islands (Finland)</option>
                  <option value="Caribbean Netherlands (Netherlands)">Caribbean Netherlands (Netherlands)</option>
                  <option value="Palau">Palau</option>
                  <option value="Cook Islands (NZ)">Cook Islands (NZ)</option>
                  <option value="Anguilla (UK)">Anguilla (UK)</option>
                  <option value="Wallis and Futuna (France)">Wallis and Futuna (France)</option>
                  <option value="Tuvalu">Tuvalu</option>
                  <option value="Nauru">Nauru</option>
                  <option value="Saint Barthelemy (France)">Saint Barthelemy (France)</option>
                  <option value="Saint Pierre and Miquelon (France)">Saint Pierre and Miquelon (France)</option>
                  <option value="Montserrat (UK)">Montserrat (UK)</option>
                  <option value="Saint Helena, Ascension and Tristan da Cunha (UK)">Saint Helena, Ascension and Tristan da Cunha (UK)</option>
                  <option value="Svalbard and Jan Mayen (Norway)">Svalbard and Jan Mayen (Norway)</option>
                  <option value="Falkland Islands (UK)">Falkland Islands (UK)</option>
                  <option value="Norfolk Island (Australia)">Norfolk Island (Australia)</option>
                  <option value="Christmas Island (Australia)">Christmas Island (Australia)</option>
                  <option value="Niue (NZ)">Niue (NZ)</option>
                  <option value="Tokelau (NZ)">Tokelau (NZ)</option>
                  <option value="Vatican City">Vatican City</option>
                  <option value="Cocos (Keeling) Islands (Australia)">Cocos (Keeling) Islands (Australia)</option>
                  <option value="Pitcairn Islands (UK)">Pitcairn Islands (UK)</option>
                </select></span></label>
          </p>
        </div>
      </div>
      <div class="flex-12">
        <div class="col-margin">
          <p><label>Email<span class="wpcf7-form-control-wrap" data-name="your-email"><input size="40" maxlength="400" class="wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email form-control"
                  aria-required="true" aria-invalid="false" value="" type="email" name="your-email"></span></label>
          </p>
        </div>
      </div>
      <div class="flex-12">
        <div class="col-margin">
          <div class="button-wrap center relative">
            <p><input class="wpcf7-form-control wpcf7-submit has-spinner button font-white" type="submit" value="SUBMIT"><span class="wpcf7-spinner"></span>
            </p>
          </div>
        </div>
      </div>
    </div>
  </div>
  <div class="wpcf7-response-output" aria-hidden="true"></div>
</form>

Text Content

 * CONTACT US
 * DISCLOSURE POLICY
 * CHECKPOINT.COM
 * UNDER ATTACK?


 * Latest Publications
 * CPR Podcast Channel
 * Web 3.0 Security
 * Intelligence Reports
 * Resources
   * ThreatCloud AI
   * Threat Intelligence & Research
   * Zero Day Protection
   * Sandblast File Analysis
 * About Us
 * SUBSCRIBE


SUBSCRIBE




CATEGORIES

 * Android Malware 23
 * Artificial Intelligence 4
 * ChatGPT 3
 * Check Point Research Publications 391
 * Cloud Security 1
 * CPRadio 44
 * Crypto 2
 * Data & Threat Intelligence 1
 * Data Analysis 0
 * Demos 22
 * Global Cyber Attack Reports 329
 * How To Guides 12
 * Ransomware 1
 * Russo-Ukrainian War 1
 * Security Report 1
 * Threat and data analysis 0
 * Threat Research 172
 * Web 3.0 Security 9
 * Wipers 0


HAMAS-AFFILIATED THREAT ACTOR WIRTE CONTINUES ITS MIDDLE EAST OPERATIONS AND
MOVES TO DISRUPTIVE ACTIVITY

November 12, 2024
https://research.checkpoint.com/2024/hamas-affiliated-threat-actor-expands-to-disruptive-activity/



KEY FINDINGS:

 * Check Point Research has been tracking ongoing activity of WIRTE threat
   actor, previously associated with the Hamas-affiliated group Gaza Cybergang,
   despite the ongoing war in the region.
 * The conflict has not disrupted the WIRTE’s activity, and they continue to
   leverage recent events in the region in their espionage operations, likely
   targeting entities in the Palestinian Authority, Jordan, Iraq, Egypt, and
   Saudi Arabia.
 * Our research indicates that WIRTE group has expanded beyond espionage to
   conduct disruptive attacks. We have identified clear links between the custom
   malware used by the group and SameCoin, a wiper malware targeting Israeli
   entities in two waves in February and October 2024.
 * While WIRTE’s tools have evolved since the group emerged, key aspects of
   their operations remain consistent: domain naming conventions, communication
   via HTML tags, responses limited to specific user agents, and redirection to
   legitimate websites.


INTRODUCTION

WIRTE is a Middle Eastern Advanced Persistent Threat (APT) group active since at
least 2018. The group is primarily known for engaging in politically motivated
cyber-espionage, focusing on intelligence gathering likely linked to regional
geopolitical conflicts. WIRTE is believed to be a subgroup connected to Gaza
Cybergang, a cluster affiliated with Hamas.

Since late 2023, Check Point Research has been monitoring a campaign conducted
by the WIRTE group that targets entities in the Middle East, specifically the
Palestinian Authority, Jordan, Egypt, and Saudi Arabia. This campaign utilizes
custom loaders like IronWind, first disclosed in November 2023 as part of a
TA402 operation.

In addition to espionage, the threat actor recently engaged in at least two
waves of disruptive attacks against Israel. Unique code overlaps reveals ties
between the group’s custom malware and SameCoin, a custom wiper deployed in two
waves in February and October 2024.

Unlike other Hamas- associated threats, such as SysJoker, this cluster’s
activity has persisted throughout the war in Gaza. On one hand, the group’s
ongoing activity strengthens its affiliation with Hamas; on the other hand, it
complicates the geographical attribution of this activity specifically to Gaza.

In this publication, Check Point Research reveals the activities of WIRTE in
2024, provides a technical analysis of its campaigns, and connects the group’s
activities to previous activity of the group.


WIRTE – ESPIONAGE CAMPAIGNS

As tensions continue in the Middle East, multiple threat actors have exploited
the conflict to create deceptive lures in recent months. Among them, one
prominent group is WIRTE, which is believed to have ties to Hamas. WIRTE remains
highly active throughout the war, carrying out attacks across the region. The
group’s activities were first documented in 2019 by Lab52, with
further analysis released in 2021. In 2023, Proofpoint researchers identified a
campaign associated with a threat actor they refer to as TA402. The campaign
utilized IronWind, a loader that enables communication with command and control
(C2) servers and executes malicious code hidden within HTML elements. Since
then, we have observed multiple campaigns leveraging IronWind.

Check Point Research’s analysis suggests that this tool is primarily deployed by
the WIRTE group, which Proofpoint identifies as a subgroup of TA402.


SEPTEMBER 2024 CAMPAIGN – HAVOC DELIVERY

In September, we identified a new infection chain that began with a PDF file
showing an error and containing an embedded URL https://theshortner[.]com/fxT1j,
which mimics a URL shortener service.



Figure 1 – Lure PDF
(SHA-256:b7c5af2d7e1eb7651b1fe3a224121d3461f3473d081990c02ef8ab4ace13f785).

This link redirected users to a RAR archive named RAR 1178 - بيروت - تطورات
الحرب في لبنان2 (translated from Arabic: RAR 1178 - Beirut - Developments of the
War in Lebanon 2). The archive contained three files intended to employ
DLL-Sideloading:

 * PinEnrollmentBroker.exe, a legitimate executable that has been renamed to
   match the name of the archive.
 * A PDF lure.
 * propsys.dll, which serves as the first stage of the infection process.



Figure 2 – Havoc Infection Chain.

Figure 3 – Contents of the malicious archive.

Upon executing the legitimate executable file, the propsys.dll is side loaded.
The execution is divided into two threads:

 1. The first thread searches for a file named “Document,” appends a PDF
    extension to the found file, and then opens it using the command line. All
    strings in this process are XOR encrypted with the key 01-01-1900.
 2. The second thread reads the long list of embedded IP addresses and decodes
    them by calling the RtlIpv4StringToAddressA API, which converts an
    IP-formatted string to a byte array and concatenates the decoded bytes to
    create the next-stage payload.



Figure 4 – IP addresses that are converted into bytes of the payload.

The next-stage payload delivered by propsys.dll is Havoc Demon, the agent of an
open-source framework configured to communicate with the
domain master-dental[.]com. Havoc is an open-source post-exploitation framework
designed for advanced cyber operations. Havoc allows attackers to maintain
persistent access to compromised systems, facilitating various malicious
activities such as data exfiltration, lateral movement, and remote control.


EARLIER 2024 ACTIVITY – IRONWIND LOADER

Since October 2023, multiple cases observed use the IronWind loader as the
infection vector. The infection chain starts with a RAR archive which includes
three files: a legitimate executable setup_wm.exe renamed to لقاء الممثلون
الوطنيون لرؤساء الأركان للاتفاق على هيكل الأمن الإقليمي.exe (National
Representatives of Chiefs of Staff Meet to Agree on Regional Security
Architecture), a lure PDF and version.dll, which serves as the first stage of
the infection process.



Figure 5 – RAR archive.

The malware execution starts by saving the lure document as a PDF file and
opening it via CMD (Command Prompt). It then sends an HTTP request containing
the victim’s Office version, OS version, computer name, username, and list of
programs to requestinspector.com to inform the attackers about a new victim.



Figure 6 – Translated lure, allegedly written by Egypt Representative in
Ramallah about PA budget

Next, the malware decrypts the next-stage payload, propsys.dll, using Base64
decoding and an XOR operation with the key “53.” The primary function of this
payload (internally named stagerx64) is to send HTTP requests with a hardcoded
user agent to the C2 and scan for the encrypted payload embedded within HTML
tags.



Figure 7 – Basae64 encoded payload embedded between HTML tags.

The only final stage artifact we identified is donut shellcode loading a .NET
DLL named exit-DN4-core.dll. The sole function of this DLL is to terminate the
executing process, likely as a cleanup tactic pushed to infected machines that
the actors chose not to exploit.



Figure 8 – exit-DN4-core.dll.


SAMECOIN AND WIRTE – DISRUPTIVE OPERATIONS

In October 2024, a malicious email campaign was sent from the email address of a
legitimate email of Israeli ESET reseller, targeting multiple Israeli
organizations, including hospitals and municipalities. The email contained a
newly created version of the SameCoin Wiper, which was deployed in attacks
against Israel earlier this year. In addition to minor changes in the malware,
the newer version introduces a unique encryption function that has only been
seen in WIRTE malware.


ESET RESELLER SAMECOIN WIPER

The email alerts on alleged attack, and prompts recipients to click on the link
which directs victims to a ZIP file named ESETUnleashed_081024.zip, which
contains 4 legitimate DLLs and a malicious file Setup.exe.



Figure 9 – Malicious email delivering the wiper

When launched, Setup.exe tries to connect to the Israel Home Front Command
site oref.org.il. It then uses the first bytes of the response as its XOR key.
This website is accessible only from inside Israel; by using the response, the
malware additionally verifies that the target is indeed Israeli.



Figure 10 – Wiper Infection Chains.

The malware then drops and decrypts the next files to be executed:

 * image.jpg – A wallpaper.



Figure 11 – Translated wallpaper mentioning Al-Qassam Brigades, the military
wing of Hamas.

 * video.mp4 – Hamas propaganda video showing graphic attacks from October 7.
 * MicrosoftEdge.exe – A wiper component.
 * csrs.exe – An Infector component implementing two functions:
   * InfectOutlook: Sends Setup.exe as an attachment to other addresses in the
     same organization.
   * InfectAD: Copies the wiper file to remote machines within the same Active
     Directory and schedules it for execution using a Scheduled Task.

The wiper begins by listing all system files outside specified protected
directories (e.g., Program Files, Windows, and Users). If a file’s name doesn’t
contain “desktop.ini” or “conf.conf,” it is overwritten with random bytes.

The complete analysis of the malware components was published by other
researchers.


CODE OVERLAPS WITH IRONWIND LOADER

The XOR function used in the above wiper component (MicrosoftEdge.exe) is
unique. It can only be found in a newer IronWind loader variant (propsys.dll).
The IronWind variant uses the key msasn1.dll, and the wiper uses the
key Saturday, October 07, 2023, 6:29:00 AM:



Figure 12 – Comparison of the encryption function in the IronWind sample and
MicrosoftEdge.exe wiper.

This function implementation suggests that the same actor developed both tools
and possibly were compiled in the same environment.


INCD SAMECOIN WIPER

This ESET wiper is a newer version of a previously reported Samecoin wiper,
which was deployed on February 24 in a malicious campaign impersonating the
Israeli National Cyber Directorate (INCD). SameCoin is a multi-platform wiper
with Android and Windows versions, and in both cases, it impersonated an INCD
security update.

The Windows variant starts by checking if the system language is configured to
Hebrew, and if so, it drops 4 four additional files:

 * Video.mp4 – Pro-Hamas propaganda video.
 * Microsoft Connection Agent.jpg – Hamas wallpaper.
 * Microsoft System Manager.exe – A Wiper component.
 * Windows Defender Agent.exe – A Tasks Spreader: A component that tries to copy
   the loader to other machines in the network and executes tasks using remote
   schedule tasks.

The Android variant deployed as INCD-SecurityUpdate-FEB24.apk displays the same
propaganda video as the Windows version. The wiper’s functionality lies within
the native library libexampleone.so. It starts by listing the files to be
deleted, filling them with zeros, and then deleting them from the file system.

Figure 13 – Android Wiper main function.


INFRASTRUCTURE


C2 REDIRECTS

Each malware sample we observed is configured with a unique user agent string.
If this specific user agent is detected, the C2 server responds, otherwise, the
C2 redirects the request to a legitimate website. Among the redirection chains
we identified are:

 * saudiday[.]org —> saudi.org
 * jordansons[.]com —-> jordantimes.com
 * egyptican[.]com —> dailynewsegypt.com
 * inclusive-economy[.]com —> inclusiveeconomy.us
 * healthcarb[.]com —> healthline.com


PHISHING ACTIVITY

Some domains observed in the infrastructure were set up with phishing pages
designed to mimic the Docdroid file-uploading service.



Figure 14 -WIRTE phishing page

These legitimate-looking websites contain specific URLs designed for phishing.
When a victim accesses certain URLs, they are directed to phishing content or
legitimate documents, possibly depending on the victim’s IP address.



Figure 15 –
https://suppertools[.]com/s/?uid=181b9056-7420-4cde-8523-5c609aface73



Figure 16 –
https://healthscratches[.]com/s/?uid=06d32218-178c-49d77-b3cf-59df77c93469.


WIRTE ATTRIBUTION

We assess that WIRTE is likely connected to Hamas, based on the messaging
observed in disruptive attacks, its consistent targeting of the Palestinian
Authority (PA), and historical ties to groups associated with Hamas.

The most recent version of the SameCoin wiper alters the victim’s background to
display an image bearing the name of Hamas’s military wing, the Al-Qassam
Brigades. While this could be a potential false flag operation, we have not
observed similar mentions in wiper attacks linked to other actors, including
prominent Iranian groups.

The group’s victims align strongly with Hamas’s interests, focusing on
Palestinian issues and frequently targeting the Palestinian Authority, Hamas’s
rival in the Palestinian political sphere.

Historically, WIRTE has been associated with the Molerats and the Gaza Cyber
Gang, both of which have previously been connected to Hamas. This association
was first identified by Kaspersky and further supported by reports from
Proofpoint. In earlier WIRTE campaigns, the threat actor employed various tools,
such as VBS and PowerShell scripts, while the signature techniques remained the
same in the attacks discussed in this report:

 * The C2 server responds only to specific user agents unique to each sample;
   otherwise, it redirects to a legitimate site.
 * Retrieval of next-stage payloads embedded within HTML tags.
 * Utilization of CloudFlare services.
 * A consistent domain-naming theme focused on health, finance and countries in
   the region.


VICTIMOLOGY

The threat actor focused on various entities across the Middle East, mainly
targeting the Palestinian Authority and Jordan, based on volumes of samples from
those countries and the lures content Additional activity Indicators, including
file submissions, lures, and domain references, also suggest likely targeting
related to, Iraq, Saudi Arabia, and Egypt.

Samples in this campaign were uploaded from several major cities in the Middle
East, including Ramallah, Baghdad, and Amman, with the following names:

Original Sample NameSample Name Translationلقاء الممثلون الوطنيون لرؤساء الأركان
للاتفاق على هيكل الأمن الإقليميNational Representatives of Chiefs of Staff Meet
to Agree on Regional Security Architectureتقرير عن الوضع المالي للسلطة
الفلسطينيةReport on the financial situation of the Palestinian Authority12 سري –
موافقة الاردن عل اجراء حوار امني مع ايران12 Secret – Jordan agrees to hold
security dialogue with Iran1178 – بيروت – تطورات الحرب في لبنان21178 – Beirut –
Developments of the war in Lebanon 2

Additionally, the majority of the phishing URLs were initially submitted to
Virus Total from Jordan.



Figure 17 – Phishing Urls submissions

Some of the domains associated with this operation referenced specific
countries, which likely hints targeting of those :

 * saudiarabianow[.]org
 * saudiday[.]org
 * jordanrefugees[.]com
 * bankjordan[.]com
 * jordansons[.]com
 * egyptican[.]com
 * egyptskytours[.]com
 * egypttourism-online[.]com

On the disruptive side, the group solely focuses on Israel. The Wiper activity
utilized propaganda content and themes aimed explicitly at Israeli audiences,
with phishing emails targeting Israeli recipients. Additionally, the Wiper
activates only if the target country is Israel or the system language is set to
Hebrew.

The distinct techniques and payloads deployed against Israel differ from those
employed in other Middle Eastern countries, indicating a dual purpose: to cause
disruption in Israel and to conduct espionage in other Middle Eastern nations.


CONCLUSION

We revealed the activities and tools deployed by the longstanding WIRTE APT
group over the past year. Despite ongoing conflict in the Middle East, the group
has persisted with multiple campaigns, showcasing a versatile toolkit that
includes Wipers, Backdoors, and Phishing pages used for both espionage and
sabotage.

Our investigation also highlights WIRTE’s continued reliance on tactics such as
user agent filtering, payload building with HTML tags, redirection to news
sites, and a consistent infrastructure style.

Despite previous analyses lacking definitive conclusions, our evaluation
suggests that WIRTE is likely aligned with Hamas. This assessment is drawn from
a close examination of WIRTE’s operational history, which reveals patterns that
resonate with Hamas’s activities. Additionally, WIRTE’s selection of targets,
coupled with the nature of the content it distributes, further reinforces the
connection between the conclusion.


PROTECTIONS:

Threat Emulation:

 * APT.Wins.Wirte.ta.A/B/C/D/E/F

Harmony End Point:

 * ransom.win.honey
 * infoastealer.win.blackguard.d


IOCS

PE files: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Archives:
9fe7b2f4c17dd0c7a00aaa6a779c30e2cb3faa4b14766e02f616d00e6f6e9007
3d2409c7834287178f61116c9b653e3520172a10ebef58f58f99d27a34b839bd
5b7e8e685f6ee6b4810ed94b4420e08a10a977516b47fea356173cfaec2c41a0
41112f36fc17f57f0e476c9ffa9e1ecbff796dc31a7ff0372d0d8708a5e9c50b
2d55c68aa7781db7f2324427508947f057a6baca78073fee9a5ad254147c8232

PDF:
b7c5af2d7e1eb7651b1fe3a224121d3461f3473d081990c02ef8ab4ace13f785

Infrastructure:

DomainBackend Server
IPsaudiday[.]org185.158.248[.]161jordansons[.]com193.168.141[.]29egyptican[.]com140.99.164[.]56healthcarb[.]com160.119.251[.]181inclusive-economy[.]com188.92.78[.]148king-pharmacy[.]com185.165.169[.]76microsoftwindowshelp[.]com45.134.9[.]202economystocking[.]com37.120.247[.]22wellhealthtech[.]com195.123.210[.]42microsoftliveforums[.]com140.99.164[.]86master-dental[.]com213.252.244[.]234dentalaccord[.]com5.42.221[.]151economymentor[.]com37.221.65[.]254bankjordan[.]com80.77.25[.]49egyptskytours[.]com193.168.141[.]61microsoftteams365[.]com185.247.224[.]28finance-analyst[.]com185.158.248[.]201trendingcharts.finance-analyst[.]comfinances-news[.]com185.165.169[.]117pushservice_api.finances-news[.]comsupport-api.financecovers[.]com45.59.118[.]145jordanrefugees[.]com37.120.247[.]100egypttourism-online[.]com185.225.70[.]168healthoptionstoday[.]com80.77.25[.]216ellemedic[.]com38.180.151[.]206easybackupcloud[.]comfinanceinfoguide[.]comhealthscratches[.]comprintspoolerupdates[.]comsaudiarabianow[.]orgsuppertools[.]comtheshortner[.]com




GO UP
BACK TO ALL POSTS


POPULAR POSTS

 * Artificial Intelligence
 * ChatGPT
 * Check Point Research Publications

OPWNAI : Cybercriminals Starting to Use ChatGPT
 * Check Point Research Publications
 * Threat Research

Hacking Fortnite Accounts
 * Artificial Intelligence
 * ChatGPT
 * Check Point Research Publications

OpwnAI: AI That Can Save the Day or HACK it Away


BLOGS AND PUBLICATIONS

 * Check Point Research Publications

August 11, 2017


“THE NEXT WANNACRY” VULNERABILITY IS HERE

 * Check Point Research Publications

January 11, 2018


‘RUBYMINER’ CRYPTOMINER AFFECTS 30% OF WW NETWORKS

 * Check Point Research Publications
 * Global Cyber Attack Reports
 * Threat Research

February 17, 2020


“THE TURKISH RAT” EVOLVED ADWIND IN A MASSIVE ONGOING PHISHING CAMPAIGN

 * Check Point Research Publications

August 11, 2017


“THE NEXT WANNACRY” VULNERABILITY IS HERE

 * Check Point Research Publications

January 11, 2018


‘RUBYMINER’ CRYPTOMINER AFFECTS 30% OF WW NETWORKS

 * Check Point Research Publications
 * Global Cyber Attack Reports
 * Threat Research

February 17, 2020


“THE TURKISH RAT” EVOLVED ADWIND IN A MASSIVE ONGOING PHISHING CAMPAIGN

 * Check Point Research Publications

August 11, 2017


“THE NEXT WANNACRY” VULNERABILITY IS HERE

 * 1
 * 2
 * 3


 * Publications
   * Global cyber attack reports
   * Research publications
   * IPS advisories
   * Check point blog
   * Demos
 * Tools
   * Sandblast file analysis
   * ThreatCloud
   * Threat Intelligence
   * Zero day protection
   * Live threat map
 * About Us
   * Contact Us


LET’S GET IN TOUCH

Subscribe for cpr blogs, news and more

Subscribe Now

© 1994-2024 Check Point Software Technologies LTD. All rights reserved.

Property of CheckPoint.com

Privacy Policy


SUBSCRIBE TO CYBER INTELLIGENCE REPORTS

First Name

Last Name

Country—Please choose an option—ChinaIndiaUnited
StatesIndonesiaBrazilPakistanNigeriaBangladeshRussiaJapanMexicoPhilippinesVietnamEthiopiaEgyptGermanyIranTurkeyDemocratic
Republic of the CongoThailandFranceUnited KingdomItalyBurmaSouth AfricaSouth
KoreaColombiaSpainUkraineTanzaniaKenyaArgentinaAlgeriaPolandSudanUgandaCanadaIraqMoroccoPeruUzbekistanSaudi
ArabiaMalaysiaVenezuelaNepalAfghanistanYemenNorth
KoreaGhanaMozambiqueTaiwanAustraliaIvory CoastSyriaMadagascarAngolaCameroonSri
LankaRomaniaBurkina
FasoNigerKazakhstanNetherlandsChileMalawiEcuadorGuatemalaMaliCambodiaSenegalZambiaZimbabweChadSouth
SudanBelgiumCubaTunisiaGuineaGreecePortugalRwandaCzech
RepublicSomaliaHaitiBeninBurundiBoliviaHungarySwedenBelarusDominican
RepublicAzerbaijanHondurasAustriaUnited Arab
EmiratesIsraelSwitzerlandTajikistanBulgariaHong Kong (China)SerbiaPapua New
GuineaParaguayLaosJordanEl SalvadorEritreaLibyaTogoSierra
LeoneNicaraguaKyrgyzstanDenmarkFinlandSlovakiaSingaporeTurkmenistanNorwayLebanonCosta
RicaCentral African RepublicIrelandGeorgiaNew ZealandRepublic of the
CongoPalestineLiberiaCroatiaOmanBosnia and HerzegovinaPuerto
RicoKuwaitMoldovMauritaniaPanamaUruguayArmeniaLithuaniaAlbaniaMongoliaJamaicaNamibiaLesothoQatarMacedoniaSloveniaBotswanaLatviaGambiaKosovoGuinea-BissauGabonEquatorial
GuineaTrinidad and
TobagoEstoniaMauritiusSwazilandBahrainTimor-LesteDjiboutiCyprusFijiReunion
(France)GuyanaComorosBhutanMontenegroMacau (China)Solomon IslandsWestern
SaharaLuxembourgSurinameCape VerdeMaltaGuadeloupe (France)Martinique
(France)BruneiBahamasIcelandMaldivesBelizeBarbadosFrench Polynesia
(France)VanuatuNew Caledonia (France)French Guiana (France)Mayotte
(France)SamoaSao Tom and PrincipeSaint LuciaGuam (USA)Curacao (Netherlands)Saint
Vincent and the GrenadinesKiribatiUnited States Virgin Islands
(USA)GrenadaTongaAruba (Netherlands)Federated States of MicronesiaJersey
(UK)SeychellesAntigua and BarbudaIsle of Man (UK)AndorraDominicaBermuda
(UK)Guernsey (UK)Greenland (Denmark)Marshall IslandsAmerican Samoa (USA)Cayman
Islands (UK)Saint Kitts and NevisNorthern Mariana Islands (USA)Faroe Islands
(Denmark)Sint Maarten (Netherlands)Saint Martin (France)LiechtensteinMonacoSan
MarinoTurks and Caicos Islands (UK)Gibraltar (UK)British Virgin Islands
(UK)Aland Islands (Finland)Caribbean Netherlands (Netherlands)PalauCook Islands
(NZ)Anguilla (UK)Wallis and Futuna (France)TuvaluNauruSaint Barthelemy
(France)Saint Pierre and Miquelon (France)Montserrat (UK)Saint Helena, Ascension
and Tristan da Cunha (UK)Svalbard and Jan Mayen (Norway)Falkland Islands
(UK)Norfolk Island (Australia)Christmas Island (Australia)Niue (NZ)Tokelau
(NZ)Vatican CityCocos (Keeling) Islands (Australia)Pitcairn Islands (UK)

Email







WE VALUE YOUR PRIVACY!

BFSI uses cookies on this site. We use cookies to enable faster and easier
experience for you. By continuing to visit this website you agree to our use of
cookies.

ACCEPT
REJECT




This website uses cookies in order to optimize your user experience as well as
for advertising and analytics.  For further information, please read our Privacy
Policy and ourCookie Notice.

DISMISS
Manage Preferences


404 Not Found


404 NOT FOUND

--------------------------------------------------------------------------------

nginx




When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Back Button


PERFORMANCE COOKIES



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Reject All Confirm My Choices