Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
AbyssWalker
ID: a0088daacd49e0dbad122c3558c1583077726
Cybercrime
Cybercriminal
Malware Dev
Ransomware Affiliate
Threat types: Ransomware, RaaS
Progress: 73%
Completeness: 66%
Freshness: 90%
Operation zone: —
Aliases
Limited alias preview
| ABYSSWORKER | EDR killer driver | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: medium
AbyssWalker (ABYSSWORKER) is a malicious Windows kernel driver used in ransomware intrusion chains (notably Medusa-associated activity) to disable or degrade endpoint security tooling. It exposes an IOCTL-driven interface to terminate processes, remove callbacks, detach minifilters, and interfere with other drivers. The driver is reported as signed with revoked certificates, enabling kernel loading in environments enforcing signing.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1211 | Exploitation for Defense Evasion | TA0005 |
|
| T1553.002 | Code Signing | TA0005 |
|
| T1562.001 | Disable or Modify Tools | TA0005 |
|
| T1105 | Ingress Tool Transfer | TA0011 |
|
| T1543.003 | Windows Service | TA0003 TA0004 |
|
Executive brief
now
Saved successfully.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.