Skip to main content

SameCoin

This is a defensive tool-intelligence page. It is intended for analyst navigation, source review, and hunt planning. It is not a malware-analysis report and does not contain sample code or binaries.

Summary

  • Associated actor(s): WIRTE
  • Tool type(s): Wiper
  • Confidence level(s): High
  • Source ID(s): SRC-CP-WIRTE-2024

Behavior

ActorBehavior Summary
WIRTECheck Point reports SameCoin as a WIRTE-linked multi-platform wiper used in disruptive Israeli campaigns; behavior includes INCD/ESET security-update impersonation, oref.org.il reachability/XOR guardrail, Active Directory propagation through scheduled tasks, file overwrite with random bytes, Android zero-fill/delete logic, and propaganda wallpaper/video artifacts.

Hash And IOC Status

ActorStatusReference
WIRTECheck Point publishes lure hash b7c5af2d7e1eb7651b1fe3a224121d3461f3473d081990c02ef8ab4ace13f785; component hashes should be pulled from the primary Check Point/HarfangLab references before blocking.SRC-CP-WIRTE-2024

Hashes and IOCs on this page are source pointers or representative public indicators. They SHOULD be refreshed from the linked source before operational use and MUST NOT be used alone for actor attribution.

Defensive Hunting Notes

ActorHunting Notes
WIRTEHunt non-browser requests to oref.org.il from newly dropped binaries, fake INCD/ESET update execution, mass file overwrite, remote scheduled-task propagation, suspicious desktop changes, and Android security-update APK side-loads.

Handling Notes

ActorHandling Notes
WIRTEDo not store samples; treat geofenced behavior as high-value defensive signal for Israeli environments.

Mapped ATT&CK Techniques For Associated Actor(s)

ActorTechniqueTacticMapping QualitySource
WIRTET1566 PhishingInitial AccessM2SRC-CP-WIRTE-2024
WIRTET1574.001 DLL Search Order HijackingDefense EvasionM3SRC-CP-WIRTE-2024
WIRTET1485 Data DestructionImpactM2SRC-CP-WIRTE-2024
WIRTET1105 Ingress Tool TransferCommand and ControlM3SRC-UNIT42-ASHTAG-2025
WIRTET1567.002 Exfiltration to Cloud StorageExfiltrationM3SRC-UNIT42-ASHTAG-2025

These detections are mapped through the associated actor or scenario and are not automatically tool-specific. Promote a tool-specific detection only after the behavior is tied to telemetry and test evidence.

ActorDetectionRelease StatusDRLRule
WIRTEDET-001 - Intune Bulk Device Wipe AnomalyHunt5detections/kql/intune-bulk-device-wipe-anomaly.kql
WIRTEDET-004 - Mail Click To Execution CorrelationHunt4detections/kql/mail-click-to-exec-correlation.kql

These hunts are mapped through the associated actor or scenario and may need narrowing before they are used for this specific tool.

ActorHuntHypothesisQuery
WIRTEHUNT-001If identity-plane destructive tradecraft is attempted then privileged role activation or bulk device actions will appear in audit logsdetections/kql/intune-bulk-device-wipe-anomaly.kql
WIRTEHUNT-004If VIP phishing is active then mail click events will correlate to risky sign-in or executiondetections/kql/mail-click-to-exec-correlation.kql

Source Review

SourcePublisherDateReliabilityTypeLast Reviewed
SRC-CP-WIRTE-2024Check Point Research2024-11-12AVendor CTI2026-05-14

If a source publishes a large or frequently changing IOC appendix, keep the current IOC list in the source system or TIP and store only the pointer here.