[ESET] IsaacWiper and HermeticWizard: New wiper and worm targeting Ukraine
Marqueurs issus d'un blog post présentant un maliciel destructeur, IsaacWiper, ainsi qu'un mécanisme de propagation utilisé par HermeticWiper utilisant notamment du WMI et du SMB.
AI Analysis
Technical Summary
The threat described involves two malicious components: IsaacWiper, a destructive wiper malware, and HermeticWizard, a worm-like propagation mechanism. IsaacWiper is designed to irreversibly delete data on infected systems, causing significant damage to the confidentiality, integrity, and availability of data. HermeticWizard facilitates the spread of this destructive payload across networks by leveraging Windows Management Instrumentation (WMI) and Server Message Block (SMB) protocols. These propagation techniques allow the malware to move laterally within a network, exploiting administrative privileges and network shares to infect multiple systems rapidly. The use of WMI and SMB indicates a focus on Windows environments, particularly those with enabled remote management and file sharing capabilities. The malware was notably observed targeting Ukraine, suggesting a geopolitical motivation behind the attack. No patches or known exploits are currently available, and the threat level is assessed as medium by the source. The lack of CVSS scoring and limited technical details restrict a full vulnerability assessment, but the destructive nature of the wiper combined with worm-like propagation mechanisms indicates a significant risk to affected environments. The malware's ability to propagate without requiring user interaction, relying instead on network protocols and administrative access, increases its potential impact and speed of infection.
Potential Impact
For European organizations, the impact of IsaacWiper and HermeticWizard could be severe, especially for entities with critical infrastructure, government networks, and industries reliant on Windows-based systems with networked environments. The destructive payload can lead to permanent data loss, operational downtime, and disruption of essential services. The worm-like propagation increases the risk of rapid spread within corporate networks, potentially affecting multiple departments or subsidiaries. Organizations involved in sectors such as energy, finance, telecommunications, and government services are particularly vulnerable due to their strategic importance and potential targeting in geopolitical conflicts. The attack could result in significant financial losses, reputational damage, and compromise of sensitive information. Additionally, recovery from such an attack would be complex and resource-intensive, requiring comprehensive incident response and data restoration efforts. The threat also underscores the risk posed by sophisticated malware that combines destructive payloads with advanced propagation techniques, challenging traditional perimeter defenses.
Mitigation Recommendations
To mitigate the risk posed by IsaacWiper and HermeticWizard, European organizations should implement the following specific measures: 1) Restrict and monitor the use of WMI and SMB protocols, especially limiting SMBv1 usage and enforcing SMB signing and encryption where possible to reduce exploitation risk. 2) Enforce the principle of least privilege for administrative accounts and network shares to prevent unauthorized lateral movement. 3) Deploy network segmentation to contain potential infections and limit worm propagation across critical systems. 4) Implement robust endpoint detection and response (EDR) solutions capable of identifying suspicious WMI and SMB activities indicative of worm behavior. 5) Regularly back up critical data with offline or immutable storage to ensure recovery from destructive attacks. 6) Conduct continuous monitoring and logging of WMI and SMB usage to detect anomalies early. 7) Apply strict access controls and multi-factor authentication (MFA) for remote management interfaces. 8) Educate IT and security teams about the specific threat vectors used by this malware to enhance detection and response capabilities. 9) Collaborate with national cybersecurity agencies for threat intelligence sharing and incident response support. These targeted actions go beyond generic advice by focusing on the specific propagation methods and destructive nature of the malware.
Affected Countries
Ukraine, Poland, Germany, France, Italy, United Kingdom, Netherlands, Belgium
Indicators of Compromise
- comment: Marqueurs issus d'un blog post présentant un maliciel destructeur, IsaacWiper, ainsi qu'un mécanisme de propagation utilisé par HermeticWiper utilisant notamment du WMI et du SMB.
- hash: 3c54c9a49a8ddca02189fe15fea52fe24f41a86f
- file: c9EEAF78C9A12.dat
- hash: ad602039c6f0237d4a997d5640e92ce5e2b3bba3
- file: cl64.dll
- hash: 736a4cfad1ed83a6a0b75b0474d5e01a3a36f950
- file: cld.dll
- hash: e9b96e9b86fad28d950ca428879168e0894d854f
- file: clean.exe
- file: cc2.exe
- size-in-bytes: 3295232
- float: 5.9679556846481
- hash: d5d2c4ac6c724cd63b69ca054713e278
- hash: f32d791ec9e6385a91b45942c230f52aff1626df
- hash: 4dc13bb83a16d4ff9865a51b3e4d24112327c526c1392e14d56f20d6f4eaf382
- hash: 9c2e86ff9da4e8b8e7caa62cd298f5725a459151dc655845fe614bf33639ed975850b3e9ae204d8a9d145a86214c35a486c06787a7ad8a88a85d121d3ee50c91
- mime-type: PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
- file: conhosts.exe
- size-in-bytes: 117000
- float: 6.3853905802374
- hash: 3f4a16b29f2f0532b7ce3e7656799125
- hash: 61b25d11392172e587d8da3045812a66c3385451
- hash: 1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591
- hash: 32acaceda42128ef9e0a9f36ee2678d2fc296fda2df38629eb223939c8a9352b3bb2b7021bb84e9f223a4a26df57b528a711447b1451213a013fe00f9b971d80
- mime-type: PE32 executable (GUI) Intel 80386, for MS Windows
- file: com.exe
- size-in-bytes: 117000
- float: 6.3817850700557
- hash: 84ba0197920fd3e2b7dfa719fee09d2f
- hash: 912342f1c840a42f6b74132f8a7c4ffe7d40fb77
- hash: 0385eeab00e946a302b24a91dea4187c1210597b8e17cd9e2230450f5ece21da
- hash: bbd4f0263abc71311404c55cb3e4711b707a71e28dcc1f08abd533a4c7f151db9cc40697105d76f1c978000e8fa7aa219adb65b31fb196b08f1ae003e04b9d23
- mime-type: PE32 executable (GUI) Intel 80386, for MS Windows
- file: XqoYMlBX.exe
- size-in-bytes: 56320
- float: 6.2650543077112
- hash: 6983f7001de10f4d19fc2d794c3eb534
- hash: 23873bf2670cf64c2440058130548d4e4da412dd
- hash: 3c2fe308c0a563e06263bbacf793bbe9b2259d795fcc36b953793a7e499e7f71
- hash: 0b04be07d5b3a6b9526a4ae8050861d260bd5334b5320a6d7e6d0f7016199c98d82e5e520fe489e13b0db5146579037c24a22ae6674e9e7b6749b9bf90ad02aa
- mime-type: PE32 executable (console) Intel 80386, for MS Windows
[ESET] IsaacWiper and HermeticWizard: New wiper and worm targeting Ukraine
Description
Marqueurs issus d'un blog post présentant un maliciel destructeur, IsaacWiper, ainsi qu'un mécanisme de propagation utilisé par HermeticWiper utilisant notamment du WMI et du SMB.
AI-Powered Analysis
Technical Analysis
The threat described involves two malicious components: IsaacWiper, a destructive wiper malware, and HermeticWizard, a worm-like propagation mechanism. IsaacWiper is designed to irreversibly delete data on infected systems, causing significant damage to the confidentiality, integrity, and availability of data. HermeticWizard facilitates the spread of this destructive payload across networks by leveraging Windows Management Instrumentation (WMI) and Server Message Block (SMB) protocols. These propagation techniques allow the malware to move laterally within a network, exploiting administrative privileges and network shares to infect multiple systems rapidly. The use of WMI and SMB indicates a focus on Windows environments, particularly those with enabled remote management and file sharing capabilities. The malware was notably observed targeting Ukraine, suggesting a geopolitical motivation behind the attack. No patches or known exploits are currently available, and the threat level is assessed as medium by the source. The lack of CVSS scoring and limited technical details restrict a full vulnerability assessment, but the destructive nature of the wiper combined with worm-like propagation mechanisms indicates a significant risk to affected environments. The malware's ability to propagate without requiring user interaction, relying instead on network protocols and administrative access, increases its potential impact and speed of infection.
Potential Impact
For European organizations, the impact of IsaacWiper and HermeticWizard could be severe, especially for entities with critical infrastructure, government networks, and industries reliant on Windows-based systems with networked environments. The destructive payload can lead to permanent data loss, operational downtime, and disruption of essential services. The worm-like propagation increases the risk of rapid spread within corporate networks, potentially affecting multiple departments or subsidiaries. Organizations involved in sectors such as energy, finance, telecommunications, and government services are particularly vulnerable due to their strategic importance and potential targeting in geopolitical conflicts. The attack could result in significant financial losses, reputational damage, and compromise of sensitive information. Additionally, recovery from such an attack would be complex and resource-intensive, requiring comprehensive incident response and data restoration efforts. The threat also underscores the risk posed by sophisticated malware that combines destructive payloads with advanced propagation techniques, challenging traditional perimeter defenses.
Mitigation Recommendations
To mitigate the risk posed by IsaacWiper and HermeticWizard, European organizations should implement the following specific measures: 1) Restrict and monitor the use of WMI and SMB protocols, especially limiting SMBv1 usage and enforcing SMB signing and encryption where possible to reduce exploitation risk. 2) Enforce the principle of least privilege for administrative accounts and network shares to prevent unauthorized lateral movement. 3) Deploy network segmentation to contain potential infections and limit worm propagation across critical systems. 4) Implement robust endpoint detection and response (EDR) solutions capable of identifying suspicious WMI and SMB activities indicative of worm behavior. 5) Regularly back up critical data with offline or immutable storage to ensure recovery from destructive attacks. 6) Conduct continuous monitoring and logging of WMI and SMB usage to detect anomalies early. 7) Apply strict access controls and multi-factor authentication (MFA) for remote management interfaces. 8) Educate IT and security teams about the specific threat vectors used by this malware to enhance detection and response capabilities. 9) Collaborate with national cybersecurity agencies for threat intelligence sharing and incident response support. These targeted actions go beyond generic advice by focusing on the specific propagation methods and destructive nature of the malware.
Affected Countries
Technical Details
- Threat Level
- 4
- Analysis
- 0
- Uuid
- 621f4e53-cd54-4194-8d8f-4a6e0abe1822
- Original Timestamp
- 1664880655
Indicators of Compromise
Comment
| Value | Description | Copy |
|---|---|---|
commentMarqueurs issus d'un blog post présentant un maliciel destructeur, IsaacWiper, ainsi qu'un mécanisme de propagation utilisé par HermeticWiper utilisant notamment du WMI et du SMB. | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash3c54c9a49a8ddca02189fe15fea52fe24f41a86f | — | |
hashad602039c6f0237d4a997d5640e92ce5e2b3bba3 | — | |
hash736a4cfad1ed83a6a0b75b0474d5e01a3a36f950 | — | |
hashe9b96e9b86fad28d950ca428879168e0894d854f | — | |
hashd5d2c4ac6c724cd63b69ca054713e278 | — | |
hashf32d791ec9e6385a91b45942c230f52aff1626df | — | |
hash4dc13bb83a16d4ff9865a51b3e4d24112327c526c1392e14d56f20d6f4eaf382 | — | |
hash9c2e86ff9da4e8b8e7caa62cd298f5725a459151dc655845fe614bf33639ed975850b3e9ae204d8a9d145a86214c35a486c06787a7ad8a88a85d121d3ee50c91 | — | |
hash3f4a16b29f2f0532b7ce3e7656799125 | — | |
hash61b25d11392172e587d8da3045812a66c3385451 | — | |
hash1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591 | — | |
hash32acaceda42128ef9e0a9f36ee2678d2fc296fda2df38629eb223939c8a9352b3bb2b7021bb84e9f223a4a26df57b528a711447b1451213a013fe00f9b971d80 | — | |
hash84ba0197920fd3e2b7dfa719fee09d2f | — | |
hash912342f1c840a42f6b74132f8a7c4ffe7d40fb77 | — | |
hash0385eeab00e946a302b24a91dea4187c1210597b8e17cd9e2230450f5ece21da | — | |
hashbbd4f0263abc71311404c55cb3e4711b707a71e28dcc1f08abd533a4c7f151db9cc40697105d76f1c978000e8fa7aa219adb65b31fb196b08f1ae003e04b9d23 | — | |
hash6983f7001de10f4d19fc2d794c3eb534 | — | |
hash23873bf2670cf64c2440058130548d4e4da412dd | — | |
hash3c2fe308c0a563e06263bbacf793bbe9b2259d795fcc36b953793a7e499e7f71 | — | |
hash0b04be07d5b3a6b9526a4ae8050861d260bd5334b5320a6d7e6d0f7016199c98d82e5e520fe489e13b0db5146579037c24a22ae6674e9e7b6749b9bf90ad02aa | — |
File
| Value | Description | Copy |
|---|---|---|
filec9EEAF78C9A12.dat | — | |
filecl64.dll | — | |
filecld.dll | — | |
fileclean.exe | — | |
filecc2.exe | — | |
fileconhosts.exe | — | |
filecom.exe | — | |
fileXqoYMlBX.exe | — |
Size in-bytes
| Value | Description | Copy |
|---|---|---|
size-in-bytes3295232 | — | |
size-in-bytes117000 | — | |
size-in-bytes117000 | — | |
size-in-bytes56320 | — |
Float
| Value | Description | Copy |
|---|---|---|
float5.9679556846481 | — | |
float6.3853905802374 | — | |
float6.3817850700557 | — | |
float6.2650543077112 | — |
Mime type
| Value | Description | Copy |
|---|---|---|
mime-typePE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows | — | |
mime-typePE32 executable (GUI) Intel 80386, for MS Windows | — | |
mime-typePE32 executable (GUI) Intel 80386, for MS Windows | — | |
mime-typePE32 executable (console) Intel 80386, for MS Windows | — |
Threat ID: 682c7adce3e6de8ceb7783a7
Added to database: 5/20/2025, 12:51:40 PM
Last enriched: 6/19/2025, 2:17:10 PM
Last updated: 2/7/2026, 8:44:53 AM
Views: 63
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.