It’s programmed to delete data from entire logical partitions managed by infected systems. It ‘s simple, not well cared or optimized, but effective in its minimalistic design.
It was discovered very recently by iranian CERT, and soon became quite famous among the “experts”.
This analysis takes into consideration the phases of reverse engineering and study of one of these samples.
It’s available for download a detailed report in English.
This article can also be viewed at InfoSec Institute clicking on the logo below: