Merge pull request #302 from Delta-Sierra/master

update oilrig related clusters + others
This commit is contained in:
Alexandre Dulaunoy 2018-11-19 15:31:04 +01:00 committed by GitHub
commit 708a79b418
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
2 changed files with 17 additions and 4 deletions

View file

@ -3286,9 +3286,19 @@
"https://www.theonespy.com/" "https://www.theonespy.com/"
] ]
}, },
"uuid": "4cbe8e38-ce07-427f-b435-30bc4e2a828a", "uuid": "da5feaef-d96f-46e2-aad7-bd2745801048",
"value": "TheOneSpy" "value": "TheOneSpy"
},
{
"description": "BONDUPDATER is a PowerShell-based Trojan first discovered by FireEye in mid-November 2017, when OilRig targeted a different Middle Eastern governmental organization.\nThe BONDUPDATER Trojan contains basic backdoor functionality, allowing threat actors to upload and download files, as well as the ability to execute commands. BONDUPDATER, like other OilRig tools, uses DNS tunneling to communicate with its C2 server. During the past month, Unit 42 observed several attacks against a Middle Eastern government leveraging an updated version of the BONDUPDATER malware, which now includes the ability to use TXT records within its DNS tunneling protocol for its C2 communications.",
"meta": {
"refs": [
"https://researchcenter.paloaltonetworks.com/2018/09/unit42-oilrig-uses-updated-bondupdater-target-middle-eastern-government/"
]
},
"uuid": "ef9f1592-0186-4f5d-a8ea-6c10450d2219",
"value": "BONDUPDATER"
} }
], ],
"version": 22 "version": 23
} }

View file

@ -2170,7 +2170,8 @@
"https://www2.fireeye.com/rs/848-DID-242/images/rpt-apt29-hammertoss.pdf", "https://www2.fireeye.com/rs/848-DID-242/images/rpt-apt29-hammertoss.pdf",
"https://www.us-cert.gov/sites/default/files/publications/AR-17-20045_Enhanced_Analysis_of_GRIZZLY_STEPPE_Activity.pdf", "https://www.us-cert.gov/sites/default/files/publications/AR-17-20045_Enhanced_Analysis_of_GRIZZLY_STEPPE_Activity.pdf",
"https://www.fireeye.com/blog/threat-research/2017/03/dissecting_one_ofap.html", "https://www.fireeye.com/blog/threat-research/2017/03/dissecting_one_ofap.html",
"https://www.cfr.org/interactive/cyber-operations/dukes" "https://www.cfr.org/interactive/cyber-operations/dukes",
"https://pylos.co/2018/11/18/cozybear-in-from-the-cold/"
], ],
"synonyms": [ "synonyms": [
"Dukes", "Dukes",
@ -3314,7 +3315,9 @@
"https://researchcenter.paloaltonetworks.com/2017/12/unit42-introducing-the-adversary-playbook-first-up-oilrig/", "https://researchcenter.paloaltonetworks.com/2017/12/unit42-introducing-the-adversary-playbook-first-up-oilrig/",
"https://pan-unit42.github.io/playbook_viewer/", "https://pan-unit42.github.io/playbook_viewer/",
"https://raw.githubusercontent.com/pan-unit42/playbook_viewer/master/playbook_json/oilrig.json", "https://raw.githubusercontent.com/pan-unit42/playbook_viewer/master/playbook_json/oilrig.json",
"https://www.cfr.org/interactive/cyber-operations/oilrig" "https://www.cfr.org/interactive/cyber-operations/oilrig",
"https://researchcenter.paloaltonetworks.com/2018/09/unit42-oilrig-uses-updated-bondupdater-target-middle-eastern-government/",
"https://researchcenter.paloaltonetworks.com/2018/11/unit42-analyzing-oilrigs-ops-tempo-testing-weaponization-delivery/"
], ],
"synonyms": [ "synonyms": [
"Twisted Kitten", "Twisted Kitten",