KillDisk is a disk-wiping tool designed to overwrite files with random data to render the OS unbootable. It was first observed as a component of BlackEnergy malware during cyber attacks against Ukraine in 2015. KillDisk has since evolved into stand-alone malware used by a variety of threat actors against additional targets in Europe and Latin America; in 2016 a ransomware component was also incorporated into some KillDisk variants.[1][2][3][4]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1036 | .004 | 伪装: Masquerade Task or Service |
KillDisk registers as a service under the Plug-And-Play Support name.[5] |
| Enterprise | T1129 | 共享模块 | ||
| Enterprise | T1486 | 数据加密以实现影响 |
KillDisk has a ransomware component that encrypts files with an AES key that is also RSA-1028 encrypted.[1] |
|
| Enterprise | T1485 | 数据销毁 |
KillDisk deletes system files to make the OS unbootable. KillDisk also targets and deletes files with 35 different file extensions.[2] |
|
| Enterprise | T1083 | 文件和目录发现 |
KillDisk has used the |
|
| Enterprise | T1489 | 服务停止 |
KillDisk terminates various processes to get the user to reboot the victim machine.[4] |
|
| Enterprise | T1106 | 本机API |
KillDisk has called the Windows API to retrieve the hard disk handle and shut down the machine.[3] |
|
| Enterprise | T1027 | 混淆文件或信息 |
KillDisk uses VMProtect to make reverse engineering the malware more difficult.[3] |
|
| Enterprise | T1561 | .002 | 磁盘擦除: Disk Structure Wipe |
KillDisk overwrites the first sector of the Master Boot Record with "0x00".[3] |
| Enterprise | T1070 | .001 | 移除指标: Clear Windows Event Logs |
KillDisk deletes Application, Security, Setup, and System Windows Event Logs.[2] |
| .004 | 移除指标: File Deletion | |||
| Enterprise | T1082 | 系统信息发现 |
KillDisk retrieves the hard disk name by calling the |
|
| Enterprise | T1529 | 系统关机/重启 |
KillDisk attempts to reboot the machine by terminating specific processes.[4] |
|
| Enterprise | T1134 | 访问令牌操控 |
KillDisk has attempted to get the access token of a process by calling |
|
| Enterprise | T1057 | 进程发现 | ||
| ICS | T0809 | Data Destruction |
KillDisk is able to delete system files to make the system unbootable and targets 35 different types of files for deletion. [6] |
|
| ICS | T0872 | Indicator Removal on Host |
KillDisk deletes application, security, setup, and system event logs from Windows systems. [6] |
|
| ICS | T0829 | Loss of View |
KillDisk erases the master boot record (MBR) and system logs, leaving the system unusable. [7] |
|
| ICS | T0881 | Service Stop |
KillDisk looks for and terminates two non-standard processes, one of which is an ICS application. [6] |
|
| ID | Name | Description |
|---|---|---|
| C0028 | 2015 Ukraine Electric Power Attack |