SandWorm GRU Unit 74455 Red-Team Wiper Released as Training Sample

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer

Key Takeaways

A new open-source wiper, SandWorm11-24-25.exe, has been released by red-team operator Andres Mercado as a powerful cybersecurity training tool. The malware is designed to emulate the destructive kill chain used by sophisticated threat actors like the Russian GRU Unit 74455, also known as Sandworm. 

Written in just 90 lines of AI-generated Go code, the tool is notable for its reliance on "living-off-the-land" (LotL) methods, using only built-in Windows binaries to achieve its objectives on a fully patched Windows 11 system. This approach avoids dropping external payloads like Mimikatz or Cobalt Strike, making detection significantly more challenging.

Analysis of Key MITRE ATT&CK Techniques

The SandWorm red-team wiper executes a sequence of high-impact Tactics, Techniques, and Procedures (TTPs) within a single binary. It demonstrates how an attacker can achieve complete system destruction and inhibit recovery. 

GRU hackers wanted by the FBI
GRU hackers wanted by the FBI | Source: FBI via Andres Mercado on LinkedIn

Key techniques include T1490 (Inhibit System Recovery), using vssadmin and bcdedit to delete shadow copies and disable recovery options. 

It also performs disk content wipes (T1561.001) with cipher and fsutil to make forensic recovery nearly impossible. 

Furthermore, it showcases credential access through LSASS memory dumping (T1003.001) and defense evasion by disabling Windows Defender (T1562.001) and clearing event logs (T1070.001), effectively blinding security operations centers.

Implications for Cybersecurity Defensive Training

The release of this tool serves as a critical resource for blue teams and cybersecurity professionals. Andres Mercado said it provides a tangible artifact for security teams to:

By training on this sample, Mercado said defenders can build the "muscle memory" needed to respond to a fast-moving, destructive attack where every second counts. 

The malware’s sequence—using native command-line tools like cmd, vssadmin, bcdedit, and cipher—is what organizations are likely to face in a real state-sponsored cyberattack, making hands-on analysis an essential preparatory step.

Active since at least 2009, Sandworm operates under Russia's Military Unit 74455 of the Main Intelligence Directorate (GRU), focusing on destructive and disruptive cyberattacks predominantly targeting Ukraine – with a cyber espionage campaign that distributed trojanized Microsoft KMS activation tools that disseminate DarkCrystal RAT (DcRAT) earlier this year.

In October, the open-source Red Team tool Adaptix was exploited by cybercriminals with Russian Ties, including Akira Ransomware.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: