ENT-11: Iranian APT Group's PowGoop Attacks Uncovered
- Actor Motivations: Espionage
- Attack Vectors: Backdoor,Malware
- Attack Complexity: High
- Threat Risk: High Impact/High Probability
Threat Overview
The Iranian APT group ENT-11, also known as MuddyWater, has been using a variant of the PowGoop malware, dubbed "E400", targeting foreign governments, telecommunications, energy sectors, intergovernmental economic cooperation organizations, and the banking sector, primarily in the Middle East. Insights from NTT Security revealed dozens of PowGoop command and control servers dating back to October 2020. The group appears to be winding down operations with the E400-PowGoop variant, but it is expected to continue modifying its tools and creating new variants.
Detected Targets
Type | Description | Confidence |
---|---|---|
Sector | Banking | High |
Sector | Financial | High |
Sector | Government Agencies and Services | High |
Region | Turkey | Medium |
Region | Middle East Countries | High |
Extracted IOCs
- a0421312705e847a1c8073001fd8499c
- 9cb79736302999a7ec4151a43e93cd51c97ede879194cece5e46b4ff471a7af7
- 104[.]168.98.148
- 107[.]172.165.17
- 107[.]172.165.182
- 107[.]175.57.83
- 107[.]175.95.101
- 107[.]175.95.102
- 164[.]132.237.65
- 164[.]132.237.66
- 164[.]132.237.79
- 172[.]245.157.101
- 172[.]245.81.135
- 178[.]32.30.1
- 185[.]141.27.143
- 185[.]141.27.248
- 185[.]183.96.44
- 185[.]183.96.7
- 185[.]45.192.228
- 192[.]210.191.188
- 192[.]210.226.128
- 192[.]3.161.182
- 192[.]3.161.218
- 198[.]144.190.132
- 23[.]94.24.76
- 23[.]94.24.77
- 23[.]94.24.78
- 23[.]94.7.134
- 23[.]94.7.9
- 23[.]95.8.149
- 37[.]187.204.27
- 51[.]255.19.178
- 51[.]255.19.179
- 80[.]85.158.49
- 96[.]8.121.101
- 96[.]8.121.193
Tip: 36 related IOCs (34 IP, 0 domain, 0 URL, 0 email, 2 file hash) to this threat have been found.
Overlaps
Source: Deep Instinct - November 2023
Detection (one case): 164[.]132.237.65
Source: Deep Instinct - June 2023
Detection (two cases): 164[.]132.237.79, 51[.]255.19.178
Source: Group-IB - April 2023
Detection (five cases): 164[.]132.237.65, 164[.]132.237.66, 178[.]32.30.1, 51[.]255.19.178, 51[.]255.19.179
Source: CISA - February 2022
Detection (four cases): 185[.]183.96.44, 185[.]183.96.7, 192[.]210.191.188, 9cb79736302999a7ec4151a43e93cd51c97ede879194cece5e46b4ff471a7af7
Source: CISA - February 2022
Detection (nine cases): 164[.]132.237.65, 185[.]141.27.143, 185[.]141.27.248, 185[.]183.96.44, 185[.]183.96.7, 185[.]45.192.228, 192[.]210.191.188, 192[.]210.226.128, 80[.]85.158.49
Source: Cisco Talos - January 2022
Detection (one case): 172[.]245.81.135
Hint: Overlaps are extracted automatically by examining the IOCs associated with all indexed threats and actors.