WIRTE is a cyberespionage actor, believed to be a subgroup of the Hamas-affiliated Gaza Cybergang, that has been active since at least August 2018. WIRTE has targeted diplomatic, financial, military, legal, and technology organizations across the Middle East, North Africa, and in Europe to gather intelligence. WIRTE has remained persistently active despite the ongoing Israel-Hamas conflict and has expanded their operations to include wiper malware attacks against Israeli targets.[1][2][3][4]
| Name | Description |
|---|---|
| Ashen Lepus |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1583 | .001 | Acquire Infrastructure: Domains |
WIRTE has registered domains designed to mimic legitimate sites for use in phishing campaigns.[3][4] |
| Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols | |
| Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell | |
| .003 | Command and Scripting Interpreter: Windows Command Shell |
WIRTE has used the Windows command line as part of infection chains to open documents.[3] |
||
| .005 | Command and Scripting Interpreter: Visual Basic | |||
| Enterprise | T1586 | .002 | Compromise Accounts: Email Accounts |
WIRTE has used compromised emails, including one belonging to an Israel-based technology reseller, to deliver targeted spearphishing messages.[3] |
| Enterprise | T1074 | .001 | Data Staged: Local Data Staging |
WIRTE has staged collected documents of interest in |
| Enterprise | T1140 | Deobfuscate/Decode Files or Information | ||
| Enterprise | T1114 | .001 | Email Collection: Local Email Collection |
WIRTE has collected documents from victims' email accounts.[4] |
| Enterprise | T1041 | Exfiltration Over C2 Channel |
WIRTE has exfiltrated collected victim data to C2 infrastructure.[4] |
|
| Enterprise | T1574 | .001 | Hijack Execution Flow: DLL |
WIRTE has used RAR archives containing a legitimate executable and a lure document to execute malicious DLLs via sideloading.[3] |
| Enterprise | T1105 | Ingress Tool Transfer |
WIRTE has downloaded PowerShell code from the C2 server to be executed.[1] |
|
| Enterprise | T1036 | .005 | Masquerading: Match Legitimate Resource Name or Location |
WIRTE has used security service provider naming conventions such as ESET and Kasperky ("Kaspersky Update Agent") in order to appear legitimate.[2][3] |
| Enterprise | T1106 | Native API |
WIRTE has used the |
|
| Enterprise | T1571 | Non-Standard Port | ||
| Enterprise | T1027 | .010 | Obfuscated Files or Information: Command Obfuscation |
WIRTE has XOR encrypted command line strings to conceal malware execution chains.[3] |
| .015 | Obfuscated Files or Information: Compression |
WIRTE has compressed malicious files within RAR and ZIP archives for obfuscation. [3][4] |
||
| Enterprise | T1588 | .002 | Obtain Capabilities: Tool |
WIRTE has obtained and used Empire and Rclone for post-exploitation activities.[1][4] |
| Enterprise | T1566 | .001 | Phishing: Spearphishing Attachment |
WIRTE has sent emails to intended victims with malicious MS Word and Excel attachments.[2] |
| .002 | Phishing: Spearphishing Link |
WIRTE has sent targeted spearphishing emails with malicious links directing victims to malware downloads.[3] |
||
| Enterprise | T1684 | .001 | Social Engineering: Impersonation |
WIRTE has used utilized look-alike domains and graphics of trusted security solution providers to entice victims to click on phishing links.[3] |
| Enterprise | T1608 | .001 | Stage Capabilities: Upload Malware |
WIRTE has directed victims to malicious payloads staged on file sharing services.[4] |
| Enterprise | T1218 | .010 | System Binary Proxy Execution: Regsvr32 |
WIRTE has used |
| Enterprise | T1204 | .001 | User Execution: Malicious Link |
WIRTE has used links embedded in emails to lure users into downloading malicious files.[3] |
| .002 | User Execution: Malicious File |
WIRTE has attempted to lure users into opening malicious documents including MS Word and Excel files, at times using a decoy document to encourage execution of malicious payloads.[2][3][4] |
||
| Enterprise | T1497 | .001 | Virtualization/Sandbox Evasion: System Checks |
WIRTE has configured C2 servers to check location and user-agent strings for victim endpoints to prevent sending a payload to sandboxed environments.[4] |