{"Event":{"info":"OSINT - Rehashed RAT Used in APT Campaign Against Vietnamese Organizations","Tag":[{"colour":"#0088cc","exportable":true,"name":"misp-galaxy:rat=\"NewCore\""},{"colour":"#004646","exportable":true,"name":"type:OSINT"},{"colour":"#ffffff","exportable":true,"name":"tlp:white"},{"colour":"#00223b","exportable":true,"name":"osint:source-type=\"blog-post\""},{"colour":"#3b0020","exportable":true,"name":"workflow:todo=\"expansion\""},{"colour":"#4bec00","exportable":true,"name":"enisa:nefarious-activity-abuse=\"remote-access-tool\""}],"publish_timestamp":"0","timestamp":"1513605457","analysis":"2","Attribute":[{"comment":"","category":"External analysis","uuid":"5a37c310-fe98-4e0c-8a85-ed7e950d210f","timestamp":"1513603886","to_ids":false,"value":"Recently, FortiGuard Labs came across several malicious documents that exploit the vulnerability CVE-2012-0158. To evade suspicion from the victim, these RTF files drop decoy documents containing politically themed texts about a variety of Vietnamese government-related information. It was believed in a recent report that the hacking campaign where these documents were used was led by the Chinese hacking group 1937CN. The link to the group was found through malicious domains used as command and control servers by the attacker. In this blog, we will delve into the malware used in this campaign and will try to provide more clues as to the instigator of this campaign.","Tag":[{"colour":"#00223b","exportable":true,"name":"osint:source-type=\"blog-post\""}],"disable_correlation":false,"object_relation":null,"type":"comment"},{"comment":"","category":"External analysis","uuid":"5a37c320-10e0-40fe-b101-41be950d210f","timestamp":"1513603879","to_ids":false,"value":"https://blog.fortinet.com/2017/09/05/rehashed-rat-used-in-apt-campaign-against-vietnamese-organizations","Tag":[{"colour":"#00223b","exportable":true,"name":"osint:source-type=\"blog-post\""}],"disable_correlation":false,"object_relation":null,"type":"link"},{"comment":"Lure","category":"Payload delivery","uuid":"5a37c39a-e51c-4e94-aa70-4624950d210f","timestamp":"1513603994","to_ids":true,"value":"2a4e8ae006be3a5ed2327b6422c4c6f8f274cfa9385c4a540bc617bff6a0f060","disable_correlation":false,"object_relation":null,"type":"sha256"},{"comment":"Lure","category":"Payload delivery","uuid":"5a37c39a-94b4-4e3c-9920-487e950d210f","timestamp":"1513603994","to_ids":true,"value":"3faacef20002f9deb1305c43ea75b8422fd29a1559c0cf01cf1cee6a1b94fc0e","disable_correlation":false,"object_relation":null,"type":"sha256"},{"comment":"Lure","category":"Payload delivery","uuid":"5a37c39a-0990-4dee-807d-412e950d210f","timestamp":"1513603994","to_ids":true,"value":"5bdbf536e12c9150d15ae4af2d825ff2ec432d5147b0c3404c5d24655d9ebe52","disable_correlation":false,"object_relation":null,"type":"sha256"},{"comment":"Lure","category":"Payload delivery","uuid":"5a37c39a-11b0-4a56-ad0d-4a9b950d210f","timestamp":"1513603994","to_ids":true,"value":"14b4d8f787d11c7d72f66231e80997ef6ffa1d868d9d8f964bea36871e1c2ff2","disable_correlation":false,"object_relation":null,"type":"sha256"},{"comment":"Lure","category":"Payload delivery","uuid":"5a37c39a-2b88-49d7-9d70-4995950d210f","timestamp":"1513603994","to_ids":true,"value":"637c156508949c881763c019d2dca7c912da9ec63f01e3d3ba604f31b36e52ab","disable_correlation":false,"object_relation":null,"type":"sha256"},{"comment":"Lure","category":"Payload delivery","uuid":"5a37c39a-2b98-44e8-b2a8-40de950d210f","timestamp":"1513603994","to_ids":true,"value":"5573f6ec22026b0c00945eec177f04212492bb05c33b4b80f73c65ce7fe5119a","disable_correlation":false,"object_relation":null,"type":"sha256"},{"comment":"Lure","category":"Payload delivery","uuid":"5a37c39a-e7a4-4601-8090-44dd950d210f","timestamp":"1513603994","to_ids":true,"value":"00466938836129a634b573d2b57311200ab04aba7252cfbf6b77f435612ca6c6","disable_corre