• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Advisory – Industrial Control Moxa – IKS & EDS Multiple Vulnerabilities
March 1, 2019
Rewterz Threat Advisory – CVE-2017-2302 – Juniper Junos OS RPD Denial of Service Vulnerability
March 4, 2019

Rewterz Threat Alert – HatMan—Safety System Targeted by Malware

March 2, 2019

Severity: High

Analysis Summary

The HatMan malware, also known as TRITON and TRISIS, affects Triconex Tricon safety controllers by modifying in-memory firmware to add additional programming. The extra functionality allows an attacker to read/modify memory contents and execute arbitrary code on demand through receiving specially-crafted network packets. HatMan consists of two pieces: a PCbased component to communicate with the safety controller and a malicious binary component that is downloaded to the controller. Safety controllers are used in a large number of environments, and the capacity to disable, inhibit, or modify the ability of a process to fail safely could result in physical consequences.

Impact

Arbitrary code execution

System access

Affected Products

Triconex MP3008 main processor modules running firmware versions 10.0–10.4 are vulnerable

Indicators of Compromise

Filename

  • library.zip
  • TsLow.pyc
  • TsBase.pyc
  • TsHi.pyc
  • TS_cnames.pyc
  • crc.pyc
  • sh.pyc
  • trilog.exe
  • PresetStatus
  • dummy
  • inject.bin
  • imain.bin

Malware Hash (MD5/SHA1/SH256)

  • 1dd89871c4f8eca7a42642bf4c5ec2aa7688fd5c
  • a6357a8792e68b05690a9736bc3051cba4b43227
  • d6e997a4b6a54d1aeedb646731f3b0893aee4b82
  • 66d39af5d61507cf7ea29e4b213f8d7dc9598bed
  • 97e785e92b416638c3a584ffbfce9f8f0434a5fd
  • 2262362200aa28b0eead1348cb6fda3b6c83ae01
  • 25dd6785b941ffe6085dd5b4dbded37e1077e222
  • dc81f383624955e0c0441734f9f1dabfe03f373c
  • 78265509956028b34a9cb44d8df1fcc7d0690be2
  • 1c7769053cfd6dd3466b69988744353b3abee013
  • f403292f6cb315c84f84f6c51490e2e8cd03c686
  • b47ad4840089247b058121e95732beb82e6311d0

Remediation

  • Block the threat indicators at their respective controls.
  • Never click on the attachments or links sent by unknown senders.
  • Always look out for suspicious emails that are not relevant.
  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.