All Posts
Cyber Threat Intelligence
Malware
Research
1
min read

New Shamoon V3 Malware Targets Oil and Gas Sector in the Middle East and Europe

A new version of destructive wiper malware Shamoon was first identified by security researchers on December 5, 2018.
Published on
December 13, 2018
Table of Contents
<p>A new version of destructive wiper malware Shamoon was first identified by security researchers on December 5, 2018. This malware dubbed Shamoon V3, appears to be a new version of the destructive malware, which has historically been associated with advanced persistent threat actors aligned with the interests of the Iranian state. It has targeted at least one European oil and gas company with operations in the Middle East and Asia. Unconfirmed reports also indicate possible entities in the UAE oil and gas industry are affected as well. A defining characteristic of this new Shamoon version is that it shares nearly 80 percent similarity with earlier versions of Shamoon and may use a historic trigger date, so that it can immediately perform destructive actions once infecting a user’s machine. Although not confirmed to be the work of Iranian APT groups, the malware’s codebase, targeted sector, and targeted geography have all been observed in historic attacks which were later attributed to adversaries from the region.</p><p>Anomali Labs researchers have identified what appears to be a sample from a second wave of the Shamoon V3 destructive malware attacks. The newly identified sample contains a detonation date of December 12, 2017 and is UPX packed. Other samples identified by security researchers utilized a detonation date of December 7, 2017 and were not packed utilizing UPX. Researchers believe that the detonation dates from 2017 represent attacker efforts to have malware samples detonate immediately upon infection of a victim system. This may be achieved by altering the detonation date to 1 year in the past. Therefore, it is possible that a sample with a detonation date of December 12, 2017 represents a second wave of Shamoon V3 malware that was utilized on December 12, 2018.</p><p>Additionally, this sample utilizes a different set of file names from earlier identified versions and a different executable file name. The sample was uploaded to VirusTotal on December 13, 2018 from a user in the Netherlands. The file description imitates the product name “VMware Workstation” in an attempt to utilize a legitimate software product as a lure to victims.</p><p><img alt="" src="https://cdn.filestackcontent.com/eED978b8S1WKHr5R2W1Y"/></p><p>Anomali Labs has not correlated this sample to an active cyber-attack at this time, however, analysts believe that it may represent additional targets as part of the Shamoon V3 campaign.</p><p>Additional details regarding Shamoon V3 can be found in the below Anomali Threat Bulletin:<br/> Anomali Threat Bulletin -- <a href="https://ui.threatstream.com/tip/233851" target="_blank">https://ui.threatstream.com/tip/233851</a></p><p><strong>IOCs</strong><br/> fa06a08c36bbd19c80c3831736020823<br/> dfb069d22be70888784a81948328ca1da6a7d38f<br/> 7f608f9783809d0165125a685e9b5537b9343f44b6d117b26be76b48b5c8f6d3<br/> <a href="http://​https://www.virustotal.com/#/file/7f608f9783809d0165125a685e9b5537b9343f44b6d117b26be76b48b5c8f6d3/detection" target="_blank">https://www.virustotal.com/#/file/7f608f9783809d0165125a685e9b5537b9343f44b6d117b26be76b48b5c8f6d3/detection</a></p>

FEATURED RESOURCES

January 29, 2026
Threat Intelligence Platform
Cyber Threat Intelligence

The Threat Intelligence Market Is Changing: Five Shifts Redefining How Intelligence Creates Value

Read More
January 27, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Evelyn Stealer Abuses, PDFSider Malware, Open-Source Tools Deploy RAT and more

Evelyn Stealer Abuses Developer Tooling to Harvest Credentials. Stealthy Backdoor Abuse: PDFSider Malware Evades Detection and Enables Persistent Access. Social Media Phishing Campaign Leverages Open-Source Tools to Deploy RAT. And More..
Read More
January 20, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Remcos RAT, BitB phishing, Linux Malware Framework, Supply Chain Intrusion and more

New Malware Campaign Delivers Remcos RAT Through Text-Only Staging and Living-Off-the-Land Execution. Browser-in-the-Browser Phishing Evolves into a High-Fidelity Credential Trap. Cloud-Aware Linux Malware Framework Poised for Future Threats. And More..
Read More
Explore All