Analytics Story: Disk Wiper

Description

This malware sample is identified as a destructive disk wiper designed to irreversibly erase data on infected systems. Once executed, it overwrites or corrupts disk partitions, rendering files and operating systems unusable. Often deployed in targeted attacks or sabotage campaigns, it aims to cripple victims by destroying critical data rather than stealing it. Analysis on VirusTotal shows multiple detections labeling it as “Trojan.Wiper” or “DiskWiper,” indicating destructive intent and possible use of raw disk access to bypass file-level recovery. Such tools are frequently employed in cyber warfare, ransomware incidents (as fake “wipers”), or hacktivist attacks to maximize damage and disruption.

Why it matters

When this wiper malware lands on a system, it doesn’t bother with stealth or theft—it’s here to destroy. Once launched, it hunts for disks and partitions to corrupt, overwriting data in a deliberate act of sabotage. Victims see their machines reduced to useless bricks, with operating systems unbootable and files lost forever. Security analysts on VirusTotal tag it plainly a wiper, engineered to inflict maximum damage. It’s the kind of tool favored in cyberwarfare and hacktivist attacks, leaving no ransom note—just devastation. For its operators, data isn’t treasure to steal; it’s fuel to burn in a campaign of pure destruction.

Detections

Name ▲▼ Technique ▲▼ Type ▲▼
Windows Data Destruction Recursive Exec Files Deletion Data Destruction TTP
Windows Raw Access To Disk Volume Partition Disk Structure Wipe Anomaly
Windows Raw Access To Master Boot Record Drive Disk Structure Wipe TTP

Data Sources

Name ▲▼ Platform ▲▼ Sourcetype ▲▼ Source ▲▼
Sysmon EventID 23 Windows icon Windows xmlwineventlog XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Sysmon EventID 26 Windows icon Windows xmlwineventlog XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Sysmon EventID 9 Windows icon Windows xmlwineventlog XmlWinEventLog:Microsoft-Windows-Sysmon/Operational

References


Source: GitHub | Version: 1