Iran, the cyber shooting range, new malware detected

On December 16th the Iranian Maher center issued an advisory warning of a new “targeted data wiping” malware discovered during an investigation.

First analysis of the center revealed that the malicious code has a simple as efficient design that allow it to wipe files on different drives in various predefined times. The malware wipes disk partitions and user profile directories avoiding ordinary anti-virus software detection, Maher advisory provided the list of components of the malware

 

Ame

MD5

GrooveMonitor.exe [dropper]

f3dd76477e16e26571f8c64a7fd4a97b

juboot.exe

fa0b300e671f73b3b0f7f415ccbe9d41

jucheck.exe

c4cd216112cbc5b8c046934843c579f6

SLEEP.EXE

ea7ed6b50a9f7b31caeea372a327bd37

WmiPrv.exe

b7117b5d8281acd56648c9d08fadf630

 

Juboot.exe and jucheck.exe components mask disguise themselves as a Java auto update program, meanwhile the SLEEP.EXE application is a freeware tool to delay application startup.
The Trojan is distributed as a self-extracting WinRAR archive named GrooveMonitor.exe that once executed drops the components juboot.exe, jucheck.exe and SLEEP.EXE.
The malware seems to have no links with precedent cyber threats that hit the countries such as Stuxnet, Duqu and Shamoon.

 

Of course many antivirus producer and security companies has started the researches on the malware. SophosLabs confirmed the malware presence and the capabilities described by Maher center but doesn’t share Iranian conviction that it’s a targeted attack.

The Sophos blog reported:

“Juboot.exe is actually a simple DOS BAT file that has been converted to a Windows PE (Portable Executable) file using a Batch to Exe Converter. It uses SLEEP.EXE to wait for two seconds, then sets a registry key to start jucheck.exe on system boot.
Upon execution jucheck.exe waits two seconds, erases GrooveMonitor.exe and juboot.exe, then checks to see if the date matches any of the following:
10-December-2012 to 12-December-2012
21-January-2013 to 23-January-2013
06-May-2013 to 08-May-2013
22-July-2013 to 24-July-2013
11-November-2013 to 13-November-2013
3-February-2014 to 5-February-2014
5-May-2014 to 7-May-2014
11-August-2014 to 13-August-2014
2-February-2015 to 4-February-2015.
If the date matches, it waits for 50 minutes, then performs a recursive delete on the aforementioned drive letters and deletes everything from the user’s desktop.”

As explained by Sophos experts the malicious payload is very simple,  it will also wipe all files from the victim’s desktop.

Sophos research team also discovered a different variant of the malware that replaced jucheck.exe component with a new on called Wmiprv.exe and that tries to delete GrooveMonitor.exe from

C:\Documents and settings\All Users\Start Menu\Programs\Startup\

and runs in an endless loop every 50 minutes to erase the drives. Sophos commented this discovery with following statement:

“This is likely indicative of a more advanced dropper file and a way to be sure to harm machines that are not rebooted during the specified time windows.”

Roel Schouwenberg from Kaspersky lab added further interesting details revealed by the analysis conducted by his team on the malware named GrooveMonitor.

“After trying to delete all the files on a particular partition the malware runs chkdsk on said partition. I assume the attacker is trying to make the loss of all files look like a software or hardware failure. Next to these BAT2EXE files there’s also a 16-bit SLEEP file, which is not malicious. 16-bit files don’t actually run on 64-bit versions of Windows. This immediately gives away the malware’s presence on a x64 machine.”

 

Symantec identified the cyber threat as Trojan.Batchwiper sharing same information of Kaspersky and Sophos.

Despite the malware appears really simple and hasn’t created great problems to the victim country it could be indicator of ongoing development of a new cyber weapon. The detected module could be designed for testing purposes or as a part of a of a broader project.
Roel Schouwenberg concluded his analysis with a very meaningful statement:

“The era of cyber-sabotage has arrived. Be prepared.”

Pierluigi Paganini

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

20 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

21 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.