“Handala Hack” – Unveiling Group’s Modus Operandi
Handala Hack, an Iranian MOIS-affiliated threat actor also known as Void Manticore, conducts destructive wiping and hack-and-leak operations against US, Israeli, and Albanian targets. The group leverages compromised VPN credentials for initial access, uses NetBird for internal tunneling, and deploys multiple parallel wiping techniques—including custom MBR wipers, PowerShell scripts, and VeraCrypt—distributed via Active Directory Group Policy.
Authors: Check Point Research
Source:Check Point
- md53cb9dea916432ffb8784ac36d1f2d3cdHash of the AI-assisted Handala PowerShell Wiper script.
- md55986ab04dd6b3d259935249741d3eff2Hash of the custom Handala Wiper executable (MBR wiping).
- md5e035c858c1969cffc1a4978b86e90a30Hash of the NetBird tunneling tool used for lateral movement.
Key Takeaways
- Handala Hack (Void Manticore) is an Iranian MOIS-affiliated actor conducting destructive wiping and hack-and-leak operations.
- The group uses compromised VPN accounts and default hostnames for initial access, recently leveraging Starlink and Iranian IPs.
- Lateral movement relies heavily on RDP and the manual deployment of NetBird for zero-trust mesh network tunneling.
- Destructive phases employ multiple parallel techniques: a custom Handala Wiper (MBR wiping), an AI-assisted PowerShell wiper, VeraCrypt disk encryption, and manual deletion.
- Wipers are distributed via Group Policy (GPO) logon scripts, executing directly from the Domain Controller's SYSVOL share.
Affected Systems
- Windows environments
- Active Directory
- VPN infrastructure
- Virtualization platforms
Attack Chain
Handala Hack gains initial access by compromising VPN accounts, often using default hostnames and commercial VPN nodes. Once inside, they perform reconnaissance using ADRecon and extract credentials by dumping LSASS and exporting registry hives via WMIC. Lateral movement is conducted manually via RDP, and NetBird is deployed to tunnel traffic and establish a zero-trust mesh network for internal access. Finally, the group deploys multiple destructive tools simultaneously via Group Policy logon scripts, including a custom MBR wiper, an AI-assisted PowerShell file deletion script, and VeraCrypt for disk encryption, while also manually deleting virtual machines.
Detection Availability
- YARA Rules: No
- Sigma Rules: No
- Snort/Suricata Rules: No
- KQL Queries: No
- Splunk SPL Queries: No
- EQL Queries: No
- Other Detection Logic: No
The article does not provide specific detection rules (YARA, Sigma, etc.), but it does provide detailed behavioral indicators, file hashes, and IP addresses for custom detection engineering.
Detection Engineering Assessment
EDR Visibility: High — EDR can easily detect LSASS dumping via comsvcs.dll, WMIC shadow copy extraction, execution of unauthorized tunneling tools (NetBird), and mass file deletion/MBR wiping behaviors. Network Visibility: Medium — Network monitoring can identify connections from known bad VPN/Starlink IPs and unusual RDP traffic, but internal tunneling via NetBird may obscure lateral movement. Detection Difficulty: Moderate — While the destructive actions are noisy and easy to detect, the initial access and lateral movement rely heavily on living-off-the-land techniques (RDP, WMIC) and legitimate tools (NetBird, VeraCrypt), which can blend in with normal administrative activity.
Required Log Sources
- Windows Security Event Log (Event ID 4624, 4625)
- Sysmon Event ID 1 (Process Creation)
- Sysmon Event ID 3 (Network Connection)
- Sysmon Event ID 11 (File Create)
- Sysmon Event ID 13 (Registry Event)
Hunting Hypotheses
| Hypothesis | Telemetry | ATT&CK Stage | FP Risk |
|---|---|---|---|
| Look for WMIC executions spawning cmd.exe to copy files from Volume Shadow Copies, indicating potential registry hive extraction. | Process creation logs (Sysmon Event ID 1) showing wmic.exe with 'process call create' and 'HarddiskVolumeShadowCopy'. | Credential Access | Low |
| Identify the execution of rundll32.exe loading comsvcs.dll with the MiniDump function, a common technique for LSASS memory dumping. | Process creation and command line logs (Sysmon Event ID 1). | Credential Access | Low |
| Detect the presence and execution of NetBird or VeraCrypt binaries downloaded directly from web browsers on server infrastructure. | File creation logs (Sysmon Event ID 11) and process creation logs (Sysmon Event ID 1) linked to browser processes. | Lateral Movement / Impact | Medium |
| Monitor for unusual RDP connections originating from machines with default Windows naming conventions (e.g., DESKTOP-XXXXXX or WIN-XXXXXX) outside of normal business hours. | Windows Security Event Logs (Event ID 4624 - Logon) focusing on Logon Type 10 (RemoteInteractive). | Lateral Movement | Medium |
| Search for the execution of executables or batch scripts (e.g., handala.bat, handala.exe) directly from the SYSVOL share via Group Policy logon scripts. | Process creation logs showing execution paths containing '\SYSVOL' and '\scripts'. | Execution | Low |
Control Gaps
- Lack of MFA on VPN/Remote Access
- Permissive RDP access across the internal network
- Unrestricted outbound internet access from servers (allowing tool downloads)
Key Behavioral Indicators
- WMIC copying from HarddiskVolumeShadowCopy
- rundll32.exe executing comsvcs.dll MiniDump
- Executables launching from SYSVOL share
- Mass file deletion via PowerShell
- RDP logins from default DESKTOP-/WIN- hostnames
False Positive Assessment
- Low
Recommendations
Immediate Mitigation
- Block inbound connections from Iran and known Handala VPS/VPN IP ranges (e.g., Starlink, commercial VPNs).
- Search for and terminate unauthorized instances of NetBird, VeraCrypt, and ADRecon (dra.ps1) in the environment.
- Review and remove any suspicious Group Policy Objects (GPOs) or logon scripts, particularly those referencing 'handala'.
Infrastructure Hardening
- Enforce Multi-Factor Authentication (MFA) on all remote access and privileged accounts.
- Restrict and harden RDP access across the environment, disabling it where not operationally required.
- Implement conditional access controls and restrict VPN connectivity to business-related countries only.
User Protection
- Monitor for unusual access patterns, such as first-time logins outside typical hours or multiple failed logins followed by success.
- Deploy EDR solutions configured to block LSASS memory dumping and unauthorized Volume Shadow Copy access.
Security Awareness
- Train administrative staff to recognize and report the unauthorized installation of remote management or tunneling tools like NetBird.
MITRE ATT&CK Mapping
- T1133 - External Remote Services
- T1078.002 - Valid Accounts: Domain Accounts
- T1199 - Trusted Relationship
- T1110 - Brute Force
- T1003.001 - OS Credential Dumping: LSASS Memory
- T1003.002 - OS Credential Dumping: Security Account Manager
- T1087.002 - Account Discovery: Domain Account
- T1021.001 - Remote Services: Remote Desktop Protocol
- T1572 - Protocol Tunneling
- T1105 - Ingress Tool Transfer
- T1047 - Windows Management Instrumentation
- T1484.001 - Domain Policy Modification: Group Policy Modification
- T1037.003 - Boot or Logon Initialization Scripts: Network Logon Script
- T1053.005 - Scheduled Task/Job: Scheduled Task
- T1059.001 - Command and Scripting Interpreter: PowerShell
- T1561.002 - Disk Wipe: Disk Structure Wipe
- T1485 - Data Destruction
- T1486 - Data Encrypted for Impact
Additional IOCs
- Ips:
82[.]25[.]35[.]25- Handala VPS31[.]57[.]35[.]223- Handala VPS146[.]185[.]219[.]235- VPN exit node used by Handala188[.]92[.]255[.]X- Starlink IP range used by Handala209[.]198[.]131[.]X- Starlink IP range used by Handala149[.]88[.]26[.]X- Commercial VPN IP range used by Handala169[.]150[.]227[.]X- Commercial VPN IP range used by Handala
- File Hashes:
3236facc7a30df4ba4e57fddfba41ec5(MD5) - VeraCrypt Installer used for disk encryption impact3dfb151d082df7937b01e2bb6030fe4a(MD5) - NetBird Installer used for internal tunneling
- File Paths:
c:\users\public- Destination path for copied registry hives during credential extraction\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\windows\system32\config\system- Source path for SYSTEM hive extraction via Volume Shadow Copy\\[REDACTED]\\SYSVOL\\[REDACTED]\\scripts\\Administtration\\install\\handala.rar- Source path for propaganda image referenced in the PowerShell wiper script\\[REDACTED]\\sysvol\\[REDACTED]\\scripts\\administtration\\install\\handala.exe- Execution path of the Handala wiper triggered via GPO
- Command Lines:
- Purpose: Extract SYSTEM registry hive from Volume Shadow Copy for credential dumping | Tools:
wmic.exe,cmd.exe| Stage: Credential Access - Purpose: Dump LSASS memory for credential extraction | Tools:
rundll32.exe,comsvcs.dll| Stage: Credential Access |rundll32.exe comsvcs.dll MiniDump
- Purpose: Extract SYSTEM registry hive from Volume Shadow Copy for credential dumping | Tools:
- Other:
WIN-P1B7V100IIS- Handala Machine NameDESKTOP-FK1NPHF- Handala Machine NameDESKTOP-R1FMLQP- Handala Machine NameWIN-DS6S0HEU0CA- Handala Machine NameDESKTOP-T3SOB36- Handala Machine NameWIN-GPPA5GI4QQJ- Handala Machine NameVULTR-GUEST- Handala Machine NameDESKTOP-HU45M79- Handala Machine NameDESKTOP-TNFP4JF- Handala Machine NameDESKTOP-14O69KQ- Handala Machine NameDESKTOP-9KG46L1- Handala Machine NameDESKTOP-G2MH4KD- Handala Machine Namehandala.gif- Propaganda image dropped by the PowerShell wiper