misp-circl-feed/feeds/circl/misp/57a88345-5254-4c97-954d-4ff8950d210f.json

792 lines
30 KiB
JSON
Raw Permalink Normal View History

2023-04-21 13:25:09 +00:00
{
2023-12-14 14:30:15 +00:00
"Event": {
"analysis": "2",
"date": "2016-08-08",
"extends_uuid": "",
"info": "OSINT - Strider: Cyberespionage group turns eye of Sauron on targets",
"publish_timestamp": "1470751041",
"published": true,
"threat_level_id": "3",
"timestamp": "1470751030",
"uuid": "57a88345-5254-4c97-954d-4ff8950d210f",
"Orgc": {
"name": "CIRCL",
"uuid": "55f6ea5e-2c60-40e5-964f-47a8950d210f"
},
"Tag": [
{
"colour": "#ffffff",
2024-04-05 12:15:17 +00:00
"local": false,
2023-12-14 14:30:15 +00:00
"name": "tlp:white",
"relationship_type": ""
},
{
"colour": "#004646",
2024-04-05 12:15:17 +00:00
"local": false,
2023-12-14 14:30:15 +00:00
"name": "type:OSINT",
"relationship_type": ""
}
],
"Attribute": [
{
"category": "External analysis",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470661458",
"to_ids": false,
"type": "link",
"uuid": "57a88352-7acc-4ad7-be40-453d950d210f",
"value": "http://www.symantec.com/connect/blogs/strider-cyberespionage-group-turns-eye-sauron-targets"
},
{
"category": "External analysis",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470661498",
"to_ids": false,
"type": "comment",
"uuid": "57a8837a-a450-4ced-b08e-4905950d210f",
"value": "A previously unknown group called Strider has been conducting cyberespionage-style attacks against selected targets in Russia, China, Sweden, and Belgium. The group uses an advanced piece of malware known as Remsec (Backdoor.Remsec) to conduct its attacks. Remsec is a stealthy tool that appears to be primarily designed for spying purposes. Its code contains a reference to Sauron, the all-seeing antagonist in Lord of the Rings.\r\n\r\nStrider\u00e2\u20ac\u2122s attacks have tentative links with a previously uncovered group, Flamer. The use of Lua modules, which we\u00e2\u20ac\u2122ll discuss later, is a technique that has previously been used by Flamer. One of Strider\u00e2\u20ac\u2122s targets had also previously been infected by Regin."
},
{
"category": "Antivirus detection",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470661556",
"to_ids": false,
"type": "text",
"uuid": "57a883b4-fabc-4936-8e65-41c8950d210f",
"value": "Backdoor.Remsec"
},
{
"category": "Targeting data",
"comment": "Only a small number of organizations in four countries are impacted by Strider",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470661657",
"to_ids": false,
"type": "target-location",
"uuid": "57a88419-1900-403e-845c-47da950d210f",
"value": "Belgium"
},
{
"category": "Targeting data",
"comment": "Only a small number of organizations in four countries are impacted by Strider",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470661658",
"to_ids": false,
"type": "target-location",
"uuid": "57a8841a-455c-4b87-96a5-4325950d210f",
"value": "Sweden"
},
{
"category": "Targeting data",
"comment": "Only a small number of organizations in four countries are impacted by Strider",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470661658",
"to_ids": false,
"type": "target-location",
"uuid": "57a8841a-a3cc-457b-9a54-4e8c950d210f",
"value": "Russia"
},
{
"category": "Targeting data",
"comment": "Only a small number of organizations in four countries are impacted by Strider",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470661658",
"to_ids": false,
"type": "target-location",
"uuid": "57a8841a-f964-41c4-81a5-43e4950d210f",
"value": "China"
},
{
"category": "Artifacts dropped",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470661716",
"to_ids": true,
"type": "filename",
"uuid": "57a88454-b0c4-432b-ae28-4558950d210f",
"value": "MSAOSSPC.DLL"
},
{
"category": "External analysis",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662076",
"to_ids": false,
"type": "link",
"uuid": "57a885bc-1614-4e58-8e17-4457950d210f",
"value": "http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/Symantec_Remsec_IOCs.pdf"
},
{
"category": "Payload installation",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662141",
"to_ids": true,
"type": "filename|md5",
"uuid": "57a885fd-10f8-46fe-8f9d-44ca950d210f",
"value": "MSAOSSPC.DLL|2a8785bf45f4f03c10cd929bb0685c2d"
},
{
"category": "Artifacts dropped",
"comment": "The loaded executable blobs may be retrieved from the following path",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662256",
"to_ids": true,
"type": "filename",
"uuid": "57a88670-859c-439a-bd1d-4e63950d210f",
"value": "c:\\System Volume Information\\_restore{ED650925-A32C-4E9C-8A73-8E6F0509309A}\\RP0\\A0000002.dll"
},
{
"category": "Payload installation",
"comment": "is to receive executable modules from remote attackers and run them from memory on the local computer . (Network loader)",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662346",
"to_ids": true,
"type": "md5",
"uuid": "57a886ca-69c8-45d6-80ed-41fb950d210f",
"value": "90b4b5f0a475f3a028be2f71409e6d1a"
},
{
"category": "Payload delivery",
"comment": "Host loader",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662419",
"to_ids": true,
"type": "md5",
"uuid": "57a88713-13ec-49db-a8cf-4ccb950d210f",
"value": "7261230a43a40bb29227a169c2c8e1be"
},
{
"category": "Payload delivery",
"comment": "Host loader",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662419",
"to_ids": true,
"type": "md5",
"uuid": "57a88713-03d0-4507-a60c-4d2f950d210f",
"value": "48d0c8faaee08fc51346925090af89aa"
},
{
"category": "Payload installation",
"comment": "- Xchecked via VT: 2a8785bf45f4f03c10cd929bb0685c2d",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662438",
"to_ids": true,
"type": "sha256",
"uuid": "57a88726-e6ec-4913-926b-44f102de0b81",
"value": "6c8c93069831a1b60279d2b316fd36bffa0d4c407068dbef81b8e2fe8fd8e8cd"
},
{
"category": "Payload installation",
"comment": "- Xchecked via VT: 2a8785bf45f4f03c10cd929bb0685c2d",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662439",
"to_ids": true,
"type": "sha1",
"uuid": "57a88727-5970-4226-a94e-412602de0b81",
"value": "d18792a187d7567f3f31908c05a8b8a2647d365f"
},
{
"category": "External analysis",
"comment": "- Xchecked via VT: 2a8785bf45f4f03c10cd929bb0685c2d",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662439",
"to_ids": false,
"type": "link",
"uuid": "57a88727-6cfc-4135-9911-471d02de0b81",
"value": "https://www.virustotal.com/file/6c8c93069831a1b60279d2b316fd36bffa0d4c407068dbef81b8e2fe8fd8e8cd/analysis/1470296379/"
},
{
"category": "Payload delivery",
"comment": "Host loader - Xchecked via VT: 7261230a43a40bb29227a169c2c8e1be",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662440",
"to_ids": true,
"type": "sha256",
"uuid": "57a88728-93e0-497c-b71b-438402de0b81",
"value": "d737644d612e5051f66fb97a34ec592b3508be06e33f743a2fdb31cdf6bd2718"
},
{
"category": "Payload delivery",
"comment": "Host loader - Xchecked via VT: 7261230a43a40bb29227a169c2c8e1be",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662440",
"to_ids": true,
"type": "sha1",
"uuid": "57a88728-fd5c-4297-be69-470b02de0b81",
"value": "1bb7614bb7c3042796c8dc7befdd8042197f222d"
},
{
"category": "External analysis",
"comment": "Host loader - Xchecked via VT: 7261230a43a40bb29227a169c2c8e1be",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662441",
"to_ids": false,
"type": "link",
"uuid": "57a88729-dd00-4f3f-8a83-4f6602de0b81",
"value": "https://www.virustotal.com/file/d737644d612e5051f66fb97a34ec592b3508be06e33f743a2fdb31cdf6bd2718/analysis/1470649331/"
},
{
"category": "Artifacts dropped",
"comment": "The keylogger logs data to the following location",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662704",
"to_ids": true,
"type": "filename",
"uuid": "57a88830-f1b4-4a1e-b841-4c5c950d210f",
"value": "%WINDIR%\\\\temp\\\\bka*.da"
},
{
"category": "Artifacts dropped",
"comment": "The keylogger logs data to the following location",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662763",
"to_ids": true,
"type": "filename",
"uuid": "57a8886b-ba78-49a2-aadb-48cd950d210f",
"value": "%WINDIR%\\\\temp\\\\bka*.dat"
},
{
"category": "Artifacts dropped",
"comment": "The keylogger logs data to the following location",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662819",
"to_ids": true,
"type": "filename",
"uuid": "57a888a3-e1b0-4996-a918-4eca950d210f",
"value": "C:\\\\System Volume Information\\\\_restore{ED650925-A32C-4E9C-8A73-8E6F0509309A}\\\\RP0\\\\change.log"
},
{
"category": "Artifacts dropped",
"comment": "The keylogger logs data to the following location",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662896",
"to_ids": true,
"type": "filename",
"uuid": "57a888f0-ad44-4490-9f2f-4486950d210f",
"value": "C:\\\\System Volume Information\\\\_restore{ED650925-A32C-4E9C-8A73-8E6F0509309A}\\\\RP1\\\\A*"
},
{
"category": "Payload delivery",
"comment": "Network listeners",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662936",
"to_ids": true,
"type": "md5",
"uuid": "57a88918-641c-44a7-8ab9-453b950d210f",
"value": "0a0948d871ef5a3006c0ab2997ad330e"
},
{
"category": "Payload delivery",
"comment": "Network listeners",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662936",
"to_ids": true,
"type": "md5",
"uuid": "57a88918-cf7c-4e27-8853-4557950d210f",
"value": "113050c3e3140bf631d186d78d4b1dc0"
},
{
"category": "Payload delivery",
"comment": "Network listeners",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662936",
"to_ids": true,
"type": "md5",
"uuid": "57a88918-57d0-44b7-88a5-4a1b950d210f",
"value": "1d9d7d05ab7c68bdc257afb1c086fb88"
},
{
"category": "Payload delivery",
"comment": "Network listeners",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662936",
"to_ids": true,
"type": "md5",
"uuid": "57a88918-6ac0-43b5-a57a-485e950d210f",
"value": "1f316e14e773ca0f468d0d160b5d0307"
},
{
"category": "Payload delivery",
"comment": "Network listeners",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662937",
"to_ids": true,
"type": "md5",
"uuid": "57a88919-2298-4047-9466-4583950d210f",
"value": "7b8a3bf6fd266593db96eddaa3fae6f9"
},
{
"category": "Payload delivery",
"comment": "Network listeners",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662937",
"to_ids": true,
"type": "md5",
"uuid": "57a88919-8ba4-40f1-99fa-4e7b950d210f",
"value": "cf6c049bd7cd9e04cc365b73f3f6098e"
},
{
"category": "Payload delivery",
"comment": "Network listeners",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662937",
"to_ids": true,
"type": "md5",
"uuid": "57a88919-a6bc-4fea-910b-4aad950d210f",
"value": "7c3eecfb5174ca5cb1e03b8bf4b06f19"
},
{
"category": "Payload delivery",
"comment": "Network listeners - Xchecked via VT: 7c3eecfb5174ca5cb1e03b8bf4b06f19",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662958",
"to_ids": true,
"type": "sha256",
"uuid": "57a8892e-d428-466b-b840-469c02de0b81",
"value": "02a9b52c88199e5611871d634b6188c35a174944f75f6d8a2110b5b1c5e60a48"
},
{
"category": "Payload delivery",
"comment": "Network listeners - Xchecked via VT: 7c3eecfb5174ca5cb1e03b8bf4b06f19",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662958",
"to_ids": true,
"type": "sha1",
"uuid": "57a8892e-7f90-4990-85ac-49ae02de0b81",
"value": "b5fbba3182ef25b20fecfc537effeeede977a2fc"
},
{
"category": "External analysis",
"comment": "Network listeners - Xchecked via VT: 7c3eecfb5174ca5cb1e03b8bf4b06f19",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662958",
"to_ids": false,
"type": "link",
"uuid": "57a8892e-ef88-415d-80e0-498e02de0b81",
"value": "https://www.virustotal.com/file/02a9b52c88199e5611871d634b6188c35a174944f75f6d8a2110b5b1c5e60a48/analysis/1470649329/"
},
{
"category": "Payload delivery",
"comment": "Network listeners - Xchecked via VT: cf6c049bd7cd9e04cc365b73f3f6098e",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662959",
"to_ids": true,
"type": "sha256",
"uuid": "57a8892f-cc04-4152-9128-4b7302de0b81",
"value": "6b06522f803437d51c15832dbd6b91d8d8b244440b4d2f09bd952f335351b06d"
},
{
"category": "Payload delivery",
"comment": "Network listeners - Xchecked via VT: cf6c049bd7cd9e04cc365b73f3f6098e",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662959",
"to_ids": true,
"type": "sha1",
"uuid": "57a8892f-711c-446a-80a1-497e02de0b81",
"value": "90bead07f7c6c92c6ca2b34406c5ea516307ee4e"
},
{
"category": "External analysis",
"comment": "Network listeners - Xchecked via VT: cf6c049bd7cd9e04cc365b73f3f6098e",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662959",
"to_ids": false,
"type": "link",
"uuid": "57a8892f-24c4-458c-bc44-45d802de0b81",
"value": "https://www.virustotal.com/file/6b06522f803437d51c15832dbd6b91d8d8b244440b4d2f09bd952f335351b06d/analysis/1470649331/"
},
{
"category": "Payload delivery",
"comment": "Network listeners - Xchecked via VT: 7b8a3bf6fd266593db96eddaa3fae6f9",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662959",
"to_ids": true,
"type": "sha256",
"uuid": "57a8892f-c620-4e9f-915d-4c2b02de0b81",
"value": "3782b63d7f6f688a5ccb1b72be89a6a98bb722218c9f22402709af97a41973c8"
},
{
"category": "Payload delivery",
"comment": "Network listeners - Xchecked via VT: 7b8a3bf6fd266593db96eddaa3fae6f9",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662959",
"to_ids": true,
"type": "sha1",
"uuid": "57a8892f-3c50-45a8-a921-4c8102de0b81",
"value": "d18df80316160535aa798303b6f02b6ae8e04388"
},
{
"category": "External analysis",
"comment": "Network listeners - Xchecked via VT: 7b8a3bf6fd266593db96eddaa3fae6f9",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662960",
"to_ids": false,
"type": "link",
"uuid": "57a88930-d4d4-49f5-8125-433502de0b81",
"value": "https://www.virustotal.com/file/3782b63d7f6f688a5ccb1b72be89a6a98bb722218c9f22402709af97a41973c8/analysis/1470653929/"
},
{
"category": "Payload delivery",
"comment": "Network listeners - Xchecked via VT: 1f316e14e773ca0f468d0d160b5d0307",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662960",
"to_ids": true,
"type": "sha256",
"uuid": "57a88930-0918-4973-8a8e-454b02de0b81",
"value": "9572624b6026311a0e122835bcd7200eca396802000d0777dba118afaaf9f2a9"
},
{
"category": "Payload delivery",
"comment": "Network listeners - Xchecked via VT: 1f316e14e773ca0f468d0d160b5d0307",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662960",
"to_ids": true,
"type": "sha1",
"uuid": "57a88930-cfa4-41f9-96bd-40e802de0b81",
"value": "4bf1fd9c721d13b74a1aa18d4bf1981558697fc7"
},
{
"category": "External analysis",
"comment": "Network listeners - Xchecked via VT: 1f316e14e773ca0f468d0d160b5d0307",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662960",
"to_ids": false,
"type": "link",
"uuid": "57a88930-0520-41f5-adf5-4ba602de0b81",
"value": "https://www.virustotal.com/file/9572624b6026311a0e122835bcd7200eca396802000d0777dba118afaaf9f2a9/analysis/1470653936/"
},
{
"category": "Payload delivery",
"comment": "Network listeners - Xchecked via VT: 1d9d7d05ab7c68bdc257afb1c086fb88",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662961",
"to_ids": true,
"type": "sha256",
"uuid": "57a88931-8c58-4ed9-9396-471902de0b81",
"value": "c8f95bf8a76ff124cc1d7a8439beff360d0eb9c0972d42a8684c3bd4e91c6600"
},
{
"category": "Payload delivery",
"comment": "Network listeners - Xchecked via VT: 1d9d7d05ab7c68bdc257afb1c086fb88",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662961",
"to_ids": true,
"type": "sha1",
"uuid": "57a88931-ad84-4ded-b269-4cc802de0b81",
"value": "63b579b9671b45478b42a5f96110c9d4234f7c82"
},
{
"category": "External analysis",
"comment": "Network listeners - Xchecked via VT: 1d9d7d05ab7c68bdc257afb1c086fb88",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662961",
"to_ids": false,
"type": "link",
"uuid": "57a88931-d260-41f7-97d5-462202de0b81",
"value": "https://www.virustotal.com/file/c8f95bf8a76ff124cc1d7a8439beff360d0eb9c0972d42a8684c3bd4e91c6600/analysis/1470653946/"
},
{
"category": "Payload delivery",
"comment": "Network listeners - Xchecked via VT: 113050c3e3140bf631d186d78d4b1dc0",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662961",
"to_ids": true,
"type": "sha256",
"uuid": "57a88931-c5f0-4ac8-8a8d-4dda02de0b81",
"value": "bde264ceb211089f6a9c8cfbaf3974bf3d7bf4843d22186684464152c432f8a5"
},
{
"category": "Payload delivery",
"comment": "Network listeners - Xchecked via VT: 113050c3e3140bf631d186d78d4b1dc0",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662961",
"to_ids": true,
"type": "sha1",
"uuid": "57a88931-6a54-4009-af93-4c9002de0b81",
"value": "3ae2cafb053009c16dbec057184c6250b450b914"
},
{
"category": "External analysis",
"comment": "Network listeners - Xchecked via VT: 113050c3e3140bf631d186d78d4b1dc0",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662962",
"to_ids": false,
"type": "link",
"uuid": "57a88932-3ecc-484f-ab05-472002de0b81",
"value": "https://www.virustotal.com/file/bde264ceb211089f6a9c8cfbaf3974bf3d7bf4843d22186684464152c432f8a5/analysis/1470173246/"
},
{
"category": "Payload delivery",
"comment": "Network listeners - Xchecked via VT: 0a0948d871ef5a3006c0ab2997ad330e",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662962",
"to_ids": true,
"type": "sha256",
"uuid": "57a88932-98c0-474a-aaae-442002de0b81",
"value": "ab8181ae5cc205f1d3cae00d8b34011e47b735a553bd5a4f079f03052b74a06d"
},
{
"category": "Payload delivery",
"comment": "Network listeners - Xchecked via VT: 0a0948d871ef5a3006c0ab2997ad330e",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662962",
"to_ids": true,
"type": "sha1",
"uuid": "57a88932-6780-42a7-8138-4d6402de0b81",
"value": "ee9eccad334b3bd8874b7259555a93ccb23f7e59"
},
{
"category": "External analysis",
"comment": "Network listeners - Xchecked via VT: 0a0948d871ef5a3006c0ab2997ad330e",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470662962",
"to_ids": false,
"type": "link",
"uuid": "57a88932-72cc-46fd-b6ec-4cae02de0b81",
"value": "https://www.virustotal.com/file/ab8181ae5cc205f1d3cae00d8b34011e47b735a553bd5a4f079f03052b74a06d/analysis/1470649324/"
},
{
"category": "Payload delivery",
"comment": "Backdoor. Remsec",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470663912",
"to_ids": true,
"type": "sha256",
"uuid": "57a88ce8-5518-4f78-880b-4338950d210f",
"value": "6189b94c9f3982ce15015d68f280f5d7a87074b829edb87825cadab6ec1c7ec2"
},
{
"category": "Network activity",
"comment": "Imported via the Freetext Import Tool",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470664006",
"to_ids": true,
"type": "url",
"uuid": "57a88d46-5be8-43a8-a8f5-4214950d210f",
"value": "http://flowershop22.110mb.com/flowers.php"
},
{
"category": "Network activity",
"comment": "Imported via the Freetext Import Tool",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470664007",
"to_ids": true,
"type": "url",
"uuid": "57a88d47-6e64-4001-8edd-42cf950d210f",
"value": "http://flowershop22.110mb.com/shop.php"
},
{
"category": "Network activity",
"comment": "Imported via the Freetext Import Tool",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470664007",
"to_ids": true,
"type": "url",
"uuid": "57a88d47-85a0-4b82-aa20-4c86950d210f",
"value": "http://wildhorses.awardspace.info/hindex.php"
},
{
"category": "Network activity",
"comment": "Imported via the Freetext Import Tool",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470664007",
"to_ids": true,
"type": "url",
"uuid": "57a88d47-4ed8-406d-9b7a-4a15950d210f",
"value": "http://wildhorses.awardspace.info/horses.php"
},
{
"category": "Network activity",
"comment": "Imported via the Freetext Import Tool",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470664007",
"to_ids": true,
"type": "url",
"uuid": "57a88d47-781c-4701-b87b-4227950d210f",
"value": "http://www.myhomemusic.com/music.php"
},
{
"category": "Network activity",
"comment": "Imported via the Freetext Import Tool",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470664007",
"to_ids": true,
"type": "url",
"uuid": "57a88d47-8d90-4087-a16e-4007950d210f",
"value": "http://www.myhomemusic.com/mymusic.php"
},
{
"category": "Artifacts dropped",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470664161",
"to_ids": true,
"type": "yara",
"uuid": "57a88de1-7928-481d-8410-492e950d210f",
"value": "rule remsec_encrypted_api\r\n{\r\nmeta:\r\ncopyright = \"Symantec\"\r\nstrings:\r\n$open_process =\r\n/*\r\n\"OpenProcess\\x00\" in encrypted form\r\n*/\r\n{ 91 9A 8F B0 9C 90 8D AF 8C 8C 9A FF }\r\ncondition:\r\nall of them\r\n}"
},
{
"category": "Artifacts dropped",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470664197",
"to_ids": true,
"type": "yara",
"uuid": "57a88e05-98f4-47fc-8b65-4444950d210f",
"value": "rule remsec_packer_A\r\n{\r\nmeta:\r\ncopyright = \"Symantec\"\r\nstrings:\r\n$code =\r\n/*\r\n69 ?? AB 00 00 00\r\nimul\r\nr0, 0ABh\r\n81 C? CD 2B 00 00\r\nadd\r\nr0, 2BCDh\r\nF7 E?\r\nmul\r\nr0\r\nC1 E? 0D\r\nshr\r\nr1, 0Dh\r\n69 ?? 85 CF 00 00\r\nimul\r\nr1, 0CF85h\r\n2B\r\nsub\r\nr0, r1\r\n*/\r\n{\r\n69 ( C? | D? | E? | F? ) AB 00 00 00\r\n( 81 | 41 81 ) C? CD 2B 00 00\r\n( F7 | 41 F7 ) E?\r\n( C1 | 41 C1 ) E? 0D\r\n( 69 | 45 69 ) ( C? | D? | E? | F? ) 85 CF 00 00\r\n( 29 | 41 29 | 44 29 | 45 29 | 2B | 41 2B | 44 2B | 45 2B )\r\n}\r\ncondition:\r\nall of them\r\n}"
},
{
"category": "Artifacts dropped",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470664325",
"to_ids": true,
"type": "yara",
"uuid": "57a88e85-d6e8-46eb-9415-4da0950d210f",
"value": "rule remsec_packer_B\r\n{\r\nmeta:\r\ncopyright = \"Symantec\"\r\nstrings:\r\n$code =\r\n{\r\n48 8B 05 ?? ?? ?? ??\r\n48 89 44 24 ??\r\n48 8B 05 ?? ?? ?? ??\r\n48 8D 4C 24 ??\r\n48 89 44 24 ??\r\n48 8D ( 45 ?? | 84 24 ?? ?? 00 00 )\r\n( 44 88 6? 24 ?? | C6 44 24 ?? 00 )\r\n48 89 44 24 ??\r\n48 8D ( 45 ?? | 84 24 ?? ?? 00 00 )\r\nC7 44 24 ?? 0? 00 00 00\r\n2B ?8\r\n48 89 ?C 24 ??\r\n44 89 6? 24 ??\r\n83 C? 08\r\n89 ?C 24 ??\r\n( FF | 41 FF ) D?\r\n( 05 | 8D 88 ) 00 00 00 3A\r\n}\r\ncondition:\r\nall of them\r\n}"
},
{
"category": "Artifacts dropped",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470664392",
"to_ids": true,
"type": "yara",
"uuid": "57a88ec8-3460-42bf-adf3-4cb8950d210f",
"value": "rule remsec_executable_blob_32\r\n{\r\nmeta:\r\ncopyright = \"Symantec\"\r\nstrings:\r\n$code =\r\n{\r\n31 06\r\n83 C6 04\r\nD1 E8\r\n73 05\r\n35 01 00 00 D0\r\nE2 F0\r\n}\r\ncondition:\r\nall of them\r\n}"
},
{
"category": "Network activity",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470665034",
"to_ids": true,
"type": "hostname",
"uuid": "57a8914a-a938-4f12-a6d0-48e0950d210f",
"value": "flowershop22.110mb.com"
},
{
"category": "Network activity",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470665034",
"to_ids": true,
"type": "hostname",
"uuid": "57a8914a-dde8-4147-a826-4cea950d210f",
"value": "wildhorses.awardspace.info"
},
{
"category": "Network activity",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470665053",
"to_ids": true,
"type": "domain",
"uuid": "57a8915d-b784-457f-9ad3-45b7950d210f",
"value": "myhomemusic.com"
},
{
"category": "Artifacts dropped",
"comment": "Configuration data for host loader (version with MD5: 7261230a43a40bb29227a169c2c8e1be)",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470665114",
"to_ids": true,
"type": "filename",
"uuid": "57a8919a-b2a4-4d94-be0d-4e42950d210f",
"value": "c:\\\\System Volume Information\\\\{aa112c99-f343-4107-8ba1-22951714a641}"
},
{
"category": "Artifacts dropped",
"comment": "Configuration data for host loader (version with MD5: 7261230a43a40bb29227a169c2c8e1be)",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470665194",
"to_ids": true,
"type": "filename",
"uuid": "57a891ea-2728-4d10-bb9d-4a80950d210f",
"value": "c:\\\\System Volume Information\\\\{951841cb-d1a4-4d7c-b44e-2c3d25996e37}"
},
{
"category": "Artifacts dropped",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1470751030",
"to_ids": true,
"type": "mutex",
"uuid": "57a89eb7-8f40-4ab7-a7a4-4fe6950d210f",
"value": "Global\\\\{b3898039-f3d8-4965-b618-a8a0d031cc5a}"
}
2023-04-21 13:25:09 +00:00
]
2023-12-14 14:30:15 +00:00
}
2023-04-21 13:25:09 +00:00
}