Today > 1 Critical | 6 High | 24 Medium vulnerabilities   -   You can now download lists of IOCs here!

Zoom-In: A Closer Look into the Malware Artifacts, Behaviors and Network Communications

Nov. 20, 2024, 9:22 a.m.

Description

FrostyGoop, an operational technology (OT) malware, disrupted critical infrastructure in Ukraine in early 2024, affecting heating systems for over 600 apartment buildings. It is the first OT-centric malware to use Modbus TCP communications for such an impact. The malware can operate both within compromised networks and externally if devices are internet-accessible. It sends Modbus commands to read or modify data on industrial control systems. New samples and indicators were uncovered, including configuration files and libraries. The malware is compiled using Go and leverages specific open-source libraries. It implements debugger evasion techniques and can encrypt configuration files. Analysis revealed over 1 million Modbus TCP devices exposed to the internet, highlighting the increasing threat to critical infrastructure.

Date

Published: Nov. 19, 2024, 9:59 p.m.

Created: Nov. 19, 2024, 9:59 p.m.

Modified: Nov. 20, 2024, 9:22 a.m.

Indicators

c64b67c116044708e282d0d1a8caea2360270a7fc679befa5e28d1ca15f6714c

a63ba88ad869085f1625729708ba65e87f5b37d7be9153b3db1a1b0e3fed309c

a25f91b6133cb4eb3ecb3e0598bbab16b80baa40059e623e387a6b1082d6f575

9cf30d82a86a9485f7bbd0786a5de207cf4902691a3efcfc966248cb1e87d5b7

91062ed8cc5d92a3235936fb93c1e9181b901ce6fb9d4100cc01167cdc08745f

5d2e4fd08f81e3b2eb2f3eaae16eb32ae02e760afc36fa17f4649322f6da53fb

2fd9cb69ef30c0d00a61851b2d96350a9be68c7f1f25a31f896082cfbf39559a

06919e6651820eb7f783cea8f5bc78184f3d437bc9c6cde9bfbe1e38e5c73160

d23491dd351f43f0efad5cee2be80c4049349a7695c0e7de1de632c791356183

c43e506c9b964dddf6fd784bf0cc78b4a2396f47257361dc22e1070e249eae16

bda2503fc02b11258399cfabd0778a997654b5bd7d30e5e3f5bef54a74b914e1

b351e3f475681ab2e8db5b2bbd2beaf26e5b4fd082ca08eba6fffbc76370113c

8891e7562eb4db253a8582376083ca99b19457680f9d36a5ba4108790740785e

7bcfcc90d0bd6c85b5b1cc9f287e161020571a0418afb50f2dd67685e9d3a4fc

716778bab5fb2c439a51362be5941a50d587714d58a6faa39eefa96aa79c1561

564b21c293bc9d0885dc7a87dbf488a497c98d2103d91f5bbcfdb476eb8b6f4c

4dce8b3beba71b8b44b6576ff2497ed68c6fafebd046822f0d60f8758238e900

01082cd4733e5f3e2c3f642fa6c0afb5a9489d39ff26a35549263fc0e02ebad3

http://slackforbusiness.net/main.php

http://slackforbusiness.net/api.php

slackcomtop.aab-e-pak.com

wooofi.com

slackforbusiness.net

nextnovatech.com

macpaw.us

Attack Patterns

BUSTLEBERM

FrostyGoop

T1588.001

T1588.002

T1571

T1497

T1095

T1573

T1106

T1082

T1057

T1083

T1140

T1132

T1027

T1059

CVE-2023-33538

CVE-2024-0012

CVE-2023-50358

Additional Informations

Energy

Romania

Ukraine