Note: There may be duplicate values posted as many sources are cross-referencing each other but function > beauty for now
Source: https://www.zscaler.com/blogs/security-research/hermeticwiper-resurgence-targeted-attacks-ukraine
e5f3ef69a534260e899a36cec459440dc572388defd8f1d98760d31c700f42d5 b01e0c6ac0b8bcde145ab7b68cf246deea9402fa7ea3aede7105f7051fe240c1 b6f2e008967c5527337448d768f2332d14b92de22a1279fd4d91000bb3d4a0fd fd7eacc2f87aceac865b0aa97a50503d44b799f27737e009f91f3c281233c17d 96b77284744f8761c4f2558388e0aee2140618b484ff53fa8b222b340d2a9c84 8c614cf476f871274aa06153224e8f7354bf5e23e6853358591bf35a381fb75b 23ef301ddba39bb00f0819d2061c9c14d17dc30f780a945920a51bc3ba0198a4 2c7732da3dcfc82f60f063f2ec9fa09f9d38d5cfbe80c850ded44de43bdb666d
912342f1c840a42f6b74132f8a7c4ffe7d40fb77
61b25d11392172e587d8da3045812a66c3385451
a952e288a1ead66490b3275a807f52e5
231b3385ac17e41c5bb1b1fcb59599c4
095a1678021b034903c85dd5acb447ad
eb845b7a16ed82bd248e395d9852f467
1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591
912342f1c840a42f6b74132f8a7c4ffe7d40fb77
61b25d11392172e587d8da3045812a66c3385451
eb845b7a16ed82bd248e395d9852f467
a952e288a1ead66490b3275a807f52e5
231b3385ac17e41c5bb1b1fcb59599c4
095a1678021b034903c85dd5acb447ad
ca3c4cd3c2edc816c1130e6cac9bdd08f83aef0b8e6f3d09c2172c854fab125f
a196c6b8ffcb97ffb276d04f354696e2391311db3841ae16c8c9f56f36a38e92
dcbbae5a1c61dbbbb7dcd6dc5dd1eb1169f5329958d38b58c3fd9384081c9b78
912342F1C840A42F6B74132F8A7C4FFE7D40FB77
61B25D11392172E587D8DA3045812A66C3385451
912342f1c840a42f6b74132f8a7c4ffe7d40fb77
61b25d11392172e587d8da3045812a66c3385451
a952e288a1ead66490b3275a807f52e5
231b3385ac17e41c5bb1b1fcb59599c4
095a1678021b034903c85dd5acb447ad
eb845b7a16ed82bd248e395d9852f467
1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591
0385eeab00e946a302b24a91dea4187c1210597b8e17cd9e2230450f5ece21da
a64c3e0522fad787b95bfb6a30c3aed1b5786e69e88e023c062ec7e5cebf4d3e
4dc13bb83a16d4ff9865a51b3e4d24112327c526c1392e14d56f20d6f4eaf382
Source: https://unit42.paloaltonetworks.com/preparing-for-cyber-impact-russia-ukraine-crisis/#indicators-of-compromise
1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591
0385eeab00e946a302b24a91dea4187c1210597b8e17cd9e2230450f5ece21da
a64c3e0522fad787b95bfb6a30c3aed1b5786e69e88e023c062ec7e5cebf4d3e
3c557727953a8f6b4788984464fb77741b821991acbf5e746aebdd02615b1767
2c10b2ec0b995b88c27d141d6f7b14d6b8177c52818687e4ff8e6ecf53adf5bf
06086c1da4590dcc7f1e10a6be3431e1166286a9e7761f2de9de79d7fda9c397
Source: https://www.zscaler.com/blogs/security-research/hermeticwiper-resurgence-targeted-attacks-ukraine
e5f3ef69a534260e899a36cec459440dc572388defd8f1d98760d31c700f42d5
96b77284744f8761c4f2558388e0aee2140618b484ff53fa8b222b340d2a9c84
b01e0c6ac0b8bcde145ab7b68cf246deea9402fa7ea3aede7105f7051fe240c1
8c614cf476f871274aa06153224e8f7354bf5e23e6853358591bf35a381fb75b
b6f2e008967c5527337448d768f2332d14b92de22a1279fd4d91000bb3d4a0fd
23ef301ddba39bb00f0819d2061c9c14d17dc30f780a945920a51bc3ba0198a4
fd7eacc2f87aceac865b0aa97a50503d44b799f27737e009f91f3c281233c17d
2c7732da3dcfc82f60f063f2ec9fa09f9d38d5cfbe80c850ded44de43bdb666d
74ce360565fa23d9730fe0c5227c22e0
9fe8203b06c899d15cb20d2497103dbb
178b0739ac2668910277cbf13f6386e8
fd4de6bb19fac13487ea72d938999fbd
714f8341bd1c4bc1fc38a5407c430a1a
8293816be7f538ec6b37c641e9f9287f
Source: https://www.virustotal.com/gui/file/1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591/detection
1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591
Source: https://www.welivesecurity.com/2022/03/01/isaacwiper-hermeticwizard-wiper-worm-targeting-ukraine/
0E84AFF18D42FC691CB1104018F44403C325AD21
379FF9236F0F72963920232F4A0782911A6BD7F7
87BD9404A68035F8D70804A5159A37D1EB0A3568
B33DD3EE12F9E6C150C964EA21147BF6B7F7AFA9
912342F1C840A42F6B74132F8A7C4FFE7D40FB77
6B5958BFABFE7C731193ADB96880B225C8505B73
AC5B6F16FC5115F0E2327A589246BA00B41439C2
912342F1C840A42F6B74132F8A7C4FFE7D40FB77
61B25D11392172E587D8DA3045812A66C3385451
3C54C9A49A8DDCA02189FE15FEA52FE24F41A86F
F32D791EC9E6385A91B45942C230F52AFF1626DF
AD602039C6F0237D4A997D5640E92CE5E2B3BBA3
736A4CFAD1ED83A6A0B75B0474D5E01A3A36F950
E9B96E9B86FAD28D950CA428879168E0894D854F
23873BF2670CF64C2440058130548D4E4DA412DD
Source: https://www.cyber.gov.au/acsc/view-all-content/advisories/2022-02-australian-organisations-should-urgently-adopt-enhanced-cyber-security-posture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231b3385ac17e41c5bb1b1fcb59599c4
095a1678021b034903c85dd5acb447ad
eb845b7a16ed82bd248e395d9852f467
a64c3e0522fad787b95bfb6a30c3aed1b5786e69e88e023c062ec7e5cebf4d3e
4dc13bb83a16d4ff9865a51b3e4d24112327c526c1392e14d56f20d6f4eaf382
3c557727953a8f6b4788984464fb77741b821991acbf5e746aebdd02615b1767
2c10b2ec0b995b88c27d141d6f7b14d6b8177c52818687e4ff8e6ecf53adf5bf
06086c1da4590dcc7f1e10a6be3431e1166286a9e7761f2de9de79d7fda9c397
ad602039c6f0237d4a997d5640e92ce5e2b3bba3
736a4cfad1ed83a6a0b75b0474d5e01a3a36f950
e9b96e9b86fad28d950ca428879168e0894d854f