APT44 / Sandworm
Threat Hunting Guide • 4-6 hours
Russian GRU Unit 74455 - one of the most dangerous cyber threat actors globally. Responsible for NotPetya ($10B+ damages), Ukraine power grid attacks, and Olympic Destroyer. Specializes in ICS/SCADA targeting and destructive wiper operations.
Download Full Hunting Guide
Complete guide with 10 hunt modules, ICS/SCADA detection queries, wiper malware indicators, and IOCs.
10 Hunt Modules
Detection Rules
Copy these queries to detect APT44/Sandworm activity in your environment.
Office Document Spawning Suspicious Process
index=windows sourcetype=WinEventLog:Security EventCode=4688
| where (ParentImage="*\\WINWORD.EXE" OR ParentImage="*\\EXCEL.EXE")
| where (Image="*\\cmd.exe" OR Image="*\\powershell.exe" OR Image="*\\wscript.exe")
| stats count by ParentImage, Image, CommandLine, ComputerName
Windows Event Log Clearing
index=windows (EventCode=1102 OR EventCode=104)
| stats count by ComputerName, User, EventCode
| where count > 0
Wiper Pre-Encryption Commands
index=windows sourcetype=WinEventLog CommandLine=*
| where (CommandLine="*vssadmin*delete*" OR CommandLine="*bcdedit*" OR CommandLine="*wbadmin*delete*")
| stats count by ComputerName, User, CommandLine
Need More Detection Rules?
The full guide includes 25+ additional detection signatures for ICS/SCADA and wiper malware.
Disclaimer: These detection rules are provided for defensive security purposes. Always test rules in a non-production environment before deployment. Rules may require tuning for your specific environment. Sources: Mandiant APT44 Report, CISA Ukraine Cyber Advisory.
Notable Operations
NotPetya (2017)
Ukraine Power Grid (2015/2016/2022)
Olympic Destroyer (2018)
Wiper Arsenal
Protect Critical Infrastructure
BRACE monitors for APT44 indicators including wiper malware signatures, ICS/SCADA targeting patterns, and destructive attack precursors.