Rewterz Threat Advisory – Industrial Control Moxa – IKS & EDS Multiple Vulnerabilities
March 1, 2019Rewterz Threat Advisory – CVE-2017-2302 – Juniper Junos OS RPD Denial of Service Vulnerability
March 4, 2019Rewterz Threat Advisory – Industrial Control Moxa – IKS & EDS Multiple Vulnerabilities
March 1, 2019Rewterz Threat Advisory – CVE-2017-2302 – Juniper Junos OS RPD Denial of Service Vulnerability
March 4, 2019Severity: High
Analysis Summary
The HatMan malware, also known as TRITON and TRISIS, affects Triconex Tricon safety controllers by modifying in-memory firmware to add additional programming. The extra functionality allows an attacker to read/modify memory contents and execute arbitrary code on demand through receiving specially-crafted network packets. HatMan consists of two pieces: a PCbased component to communicate with the safety controller and a malicious binary component that is downloaded to the controller. Safety controllers are used in a large number of environments, and the capacity to disable, inhibit, or modify the ability of a process to fail safely could result in physical consequences.
Impact
Arbitrary code execution
System access
Affected Products
Triconex MP3008 main processor modules running firmware versions 10.0–10.4 are vulnerable
Indicators of Compromise
Filename
- library.zip
- TsLow.pyc
- TsBase.pyc
- TsHi.pyc
- TS_cnames.pyc
- crc.pyc
- sh.pyc
- trilog.exe
- PresetStatus
- dummy
- inject.bin
- imain.bin
Malware Hash (MD5/SHA1/SH256)
- 1dd89871c4f8eca7a42642bf4c5ec2aa7688fd5c
- a6357a8792e68b05690a9736bc3051cba4b43227
- d6e997a4b6a54d1aeedb646731f3b0893aee4b82
- 66d39af5d61507cf7ea29e4b213f8d7dc9598bed
- 97e785e92b416638c3a584ffbfce9f8f0434a5fd
- 2262362200aa28b0eead1348cb6fda3b6c83ae01
- 25dd6785b941ffe6085dd5b4dbded37e1077e222
- dc81f383624955e0c0441734f9f1dabfe03f373c
- 78265509956028b34a9cb44d8df1fcc7d0690be2
- 1c7769053cfd6dd3466b69988744353b3abee013
- f403292f6cb315c84f84f6c51490e2e8cd03c686
- b47ad4840089247b058121e95732beb82e6311d0
Remediation
- Block the threat indicators at their respective controls.
- Never click on the attachments or links sent by unknown senders.
- Always look out for suspicious emails that are not relevant.