Meteor is a wiper that was used against Iranian government organizations, including Iranian Railways, the Ministry of Roads, and Urban Development systems, in July 2021. Meteor is likely a newer version of similar wipers called Stardust and Comet that were reportedly used by a group called "Indra" since at least 2019 against private companies in Syria.[1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1531 | Account Access Removal |
Meteor has the ability to change the password of local users on compromised hosts and can log off users.[1] |
|
Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
Meteor can use PowerShell commands to disable the network adapters on a victim machines.[1] |
.003 | Command and Scripting Interpreter: Windows Command Shell |
Meteor can run |
||
Enterprise | T1485 | Data Destruction |
Meteor can fill a victim's files and directories with zero-bytes in replacement of real content before deleting them.[1] |
|
Enterprise | T1491 | .001 | Defacement: Internal Defacement |
Meteor can change both the desktop wallpaper and the lock screen image to a custom image.[1] |
Enterprise | T1484 | .001 | Domain or Tenant Policy Modification: Group Policy Modification |
Meteor can use group policy to push a scheduled task from the AD to all network machines.[1] |
Enterprise | T1564 | .003 | Hide Artifacts: Hidden Window |
Meteor can hide its console window upon execution to decrease its visibility to a victim.[1] |
Enterprise | T1562 | .001 | Impair Defenses: Disable or Modify Tools |
Meteor can attempt to uninstall Kaspersky Antivirus or remove the Kaspersky license; it can also add all files and folders related to the attack to the Windows Defender exclusion list.[1] |
Enterprise | T1070 | .001 | Indicator Removal: Clear Windows Event Logs |
Meteor can use Wevtutil to remove Security, System and Application Event Viewer logs.[1] |
.004 | Indicator Removal: File Deletion |
Meteor will delete the folder containing malicious scripts if it detects the hostname as |
||
Enterprise | T1105 | Ingress Tool Transfer |
Meteor has the ability to download additional files for execution on the victim's machine.[1] |
|
Enterprise | T1490 | Inhibit System Recovery |
Meteor can use |
|
Enterprise | T1036 | .004 | Masquerading: Masquerade Task or Service |
Meteor has been disguised as the Windows Power Efficiency Diagnostics report tool.[1] |
Enterprise | T1106 | Native API |
Meteor can use |
|
Enterprise | T1057 | Process Discovery |
Meteor can check if a specific process is running, such as Kaspersky's |
|
Enterprise | T1053 | .005 | Scheduled Task/Job: Scheduled Task |
Meteor execution begins from a scheduled task named |
Enterprise | T1489 | Service Stop |
Meteor can disconnect all network adapters on a compromised host using |
|
Enterprise | T1518 | .001 | Software Discovery: Security Software Discovery |
Meteor has the ability to search for Kaspersky Antivirus on a victim's machine.[1] |
Enterprise | T1082 | System Information Discovery |
Meteor has the ability to discover the hostname of a compromised host.[1] |
|
Enterprise | T1047 | Windows Management Instrumentation |
Meteor can use |