misp-circl-feed/feeds/circl/stix-2.1/57c4400e-1420-46f0-8837-41d7950d210f.json

594 lines
24 KiB
JSON
Raw Permalink Normal View History

2023-04-21 14:44:17 +00:00
{
"type": "bundle",
"id": "bundle--57c4400e-1420-46f0-8837-41d7950d210f",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-08-30T07:53:34.000Z",
"modified": "2016-08-30T07:53:34.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--57c4400e-1420-46f0-8837-41d7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-08-30T07:53:34.000Z",
"modified": "2016-08-30T07:53:34.000Z",
"name": "Bitcoinminer installed by malware",
"published": "2016-08-30T09:10:11Z",
"object_refs": [
"indicator--57c4432c-2de8-499d-bcf9-4c4f950d210f",
"indicator--57c4432c-8644-4b21-9209-4c9d950d210f",
"indicator--57c4432c-7768-4255-949d-4002950d210f",
"indicator--57c4432c-7a84-40b9-a708-4f5e950d210f",
"indicator--57c4432c-b47c-4a54-9a04-48bb950d210f",
"observed-data--57c4432d-1628-4864-90b6-4022950d210f",
"file--57c4432d-1628-4864-90b6-4022950d210f",
"indicator--57c4432d-91fc-478e-b028-4461950d210f",
"observed-data--57c4432d-a410-4823-b08c-407c950d210f",
"file--57c4432d-a410-4823-b08c-407c950d210f",
"indicator--57c4432d-4014-4f4a-a1af-4983950d210f",
"indicator--57c4432d-96e0-4a33-aaa9-4b25950d210f",
"indicator--57c4432e-2a60-42d3-9feb-4642950d210f",
"indicator--57c4432e-63cc-418d-b582-407d950d210f",
"indicator--57c4432e-80f4-4a6a-9396-446e950d210f",
"indicator--57c4432e-9cf8-47cf-a50b-497d950d210f",
"indicator--57c4432e-08f0-4bc4-9131-49f0950d210f",
"indicator--57c4432f-7134-4967-b629-42fa950d210f",
"x-misp-attribute--57c44374-c6e8-489b-8533-461e950d210f",
"observed-data--57c53ab1-dec0-4c3d-9169-479202de0b81",
"url--57c53ab1-dec0-4c3d-9169-479202de0b81",
"observed-data--57c53ab1-b66c-48cd-819d-47d302de0b81",
"url--57c53ab1-b66c-48cd-819d-47d302de0b81",
"observed-data--57c53ab1-e668-4000-8b97-4ecd02de0b81",
"url--57c53ab1-e668-4000-8b97-4ecd02de0b81",
"observed-data--57c53ab1-c5e4-4fda-b253-418902de0b81",
"url--57c53ab1-c5e4-4fda-b253-418902de0b81",
"indicator--57c54b87-75b0-4d73-b816-4de3950d210f"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"circl:incident-classification=\"malware\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--57c4432c-2de8-499d-bcf9-4c4f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-08-29T14:14:04.000Z",
"modified": "2016-08-29T14:14:04.000Z",
"description": "Imported via the Freetext Import Tool",
"pattern": "[file:hashes.SHA1 = '36d7f7a57e2a8ec953940d15099cae2fc565c16e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-08-29T14:14:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--57c4432c-8644-4b21-9209-4c9d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-08-29T14:14:04.000Z",
"modified": "2016-08-29T14:14:04.000Z",
"description": "Bitcoin miner",
"pattern": "[file:name = 'SIMBA-Service.exe']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-08-29T14:14:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"filename\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--57c4432c-7768-4255-949d-4002950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-08-29T14:14:04.000Z",
"modified": "2016-08-29T14:14:04.000Z",
"description": "Imported via the Freetext Import Tool",
"pattern": "[file:hashes.SHA1 = '89a47c316b114685a3fa5b7671b416cb9116d266']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-08-29T14:14:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--57c4432c-7a84-40b9-a708-4f5e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-08-29T14:14:04.000Z",
"modified": "2016-08-29T14:14:04.000Z",
"description": "Watchdog for SIMBA-Service",
"pattern": "[file:name = 'msttsc.exe']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-08-29T14:14:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"filename\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--57c4432c-b47c-4a54-9a04-48bb950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-08-29T14:14:04.000Z",
"modified": "2016-08-29T14:14:04.000Z",
"description": "Imported via the Freetext Import Tool",
"pattern": "[file:hashes.SHA1 = 'eec193dd4a06fbb5ca6163bd97622f545bd01d91']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-08-29T14:14:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--57c4432d-1628-4864-90b6-4022950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-08-30T07:50:46.000Z",
"modified": "2016-08-30T07:50:46.000Z",
"first_observed": "2016-08-30T07:50:46Z",
"last_observed": "2016-08-30T07:50:46Z",
"number_observed": 1,
"object_refs": [
"file--57c4432d-1628-4864-90b6-4022950d210f"
],
"labels": [
"misp:type=\"filename\"",
"misp:category=\"Payload delivery\""
]
},
{
"type": "file",
"spec_version": "2.1",
"id": "file--57c4432d-1628-4864-90b6-4022950d210f",
"name": "csrss.exe"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--57c4432d-91fc-478e-b028-4461950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-08-29T14:14:05.000Z",
"modified": "2016-08-29T14:14:05.000Z",
"description": "Imported via the Freetext Import Tool",
"pattern": "[file:hashes.SHA1 = '03c63636c242bfa147fd60497f97f27ea9837f31']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-08-29T14:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--57c4432d-a410-4823-b08c-407c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-08-30T07:50:25.000Z",
"modified": "2016-08-30T07:50:25.000Z",
"first_observed": "2016-08-30T07:50:25Z",
"last_observed": "2016-08-30T07:50:25Z",
"number_observed": 1,
"object_refs": [
"file--57c4432d-a410-4823-b08c-407c950d210f"
],
"labels": [
"misp:type=\"filename\"",
"misp:category=\"Payload delivery\""
]
},
{
"type": "file",
"spec_version": "2.1",
"id": "file--57c4432d-a410-4823-b08c-407c950d210f",
"name": "1.exe"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--57c4432d-4014-4f4a-a1af-4983950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-08-29T14:14:05.000Z",
"modified": "2016-08-29T14:14:05.000Z",
"description": "Imported via the Freetext Import Tool",
"pattern": "[file:hashes.MD5 = 'af26e16ea9b044d13425f8b17e5cde37']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-08-29T14:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--57c4432d-96e0-4a33-aaa9-4b25950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-08-29T14:14:05.000Z",
"modified": "2016-08-29T14:14:05.000Z",
"description": "Imported via the Freetext Import Tool",
"pattern": "[file:hashes.MD5 = '23dbf4e0f0e49a649fd2c06de75d5e4e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-08-29T14:14:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--57c4432e-2a60-42d3-9feb-4642950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-08-29T14:14:06.000Z",
"modified": "2016-08-29T14:14:06.000Z",
"description": "Imported via the Freetext Import Tool",
"pattern": "[file:hashes.MD5 = 'bd9e20dc0a4c89bfe034a177900016e2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-08-29T14:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--57c4432e-63cc-418d-b582-407d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-08-29T14:14:06.000Z",
"modified": "2016-08-29T14:14:06.000Z",
"description": "Imported via the Freetext Import Tool",
"pattern": "[file:hashes.MD5 = '806779989c6ea355a1abf4f6c7cb646c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-08-29T14:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--57c4432e-80f4-4a6a-9396-446e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-08-29T14:14:06.000Z",
"modified": "2016-08-29T14:14:06.000Z",
"description": "Imported via the Freetext Import Tool",
"pattern": "[file:hashes.SHA256 = 'eaafbe1e54ccdcce487b6fb00fa4b0d366fd87deb400b0558a3a029800632ce4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-08-29T14:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--57c4432e-9cf8-47cf-a50b-497d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-08-29T14:14:06.000Z",
"modified": "2016-08-29T14:14:06.000Z",
"description": "Imported via the Freetext Import Tool",
"pattern": "[file:hashes.SHA256 = '84ec419f00674a81b4efe4d5495022eac7e7299dd1aab306c44703a467d752a0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-08-29T14:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--57c4432e-08f0-4bc4-9131-49f0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-08-29T14:14:06.000Z",
"modified": "2016-08-29T14:14:06.000Z",
"description": "Imported via the Freetext Import Tool",
"pattern": "[file:hashes.SHA256 = '95219933fa3f4178076f9e5306bc35753e35a58f147ed710fb3d644a22fffedb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-08-29T14:14:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--57c4432f-7134-4967-b629-42fa950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-08-29T14:14:07.000Z",
"modified": "2016-08-29T14:14:07.000Z",
"description": "Imported via the Freetext Import Tool",
"pattern": "[file:hashes.SHA256 = '126395638de030e60d4a3a5cf7a8f8b664aac9ca37dc9a766182f8dfd5228fe4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-08-29T14:14:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--57c44374-c6e8-489b-8533-461e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-08-30T07:51:41.000Z",
"modified": "2016-08-30T07:51:41.000Z",
"labels": [
"misp:type=\"threat-actor\"",
"misp:category=\"Attribution\"",
"misp:to_ids=\"True\""
],
"x_misp_category": "Attribution",
"x_misp_comment": "Bitcoin miner sent to this address",
"x_misp_type": "threat-actor",
"x_misp_value": "wowamen41@gmail.com"
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--57c53ab1-dec0-4c3d-9169-479202de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-08-30T07:50:09.000Z",
"modified": "2016-08-30T07:50:09.000Z",
"first_observed": "2016-08-30T07:50:09Z",
"last_observed": "2016-08-30T07:50:09Z",
"number_observed": 1,
"object_refs": [
"url--57c53ab1-dec0-4c3d-9169-479202de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--57c53ab1-dec0-4c3d-9169-479202de0b81",
"value": "https://www.virustotal.com/file/126395638de030e60d4a3a5cf7a8f8b664aac9ca37dc9a766182f8dfd5228fe4/analysis/1472200480/"
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--57c53ab1-b66c-48cd-819d-47d302de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-08-30T07:50:09.000Z",
"modified": "2016-08-30T07:50:09.000Z",
"first_observed": "2016-08-30T07:50:09Z",
"last_observed": "2016-08-30T07:50:09Z",
"number_observed": 1,
"object_refs": [
"url--57c53ab1-b66c-48cd-819d-47d302de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--57c53ab1-b66c-48cd-819d-47d302de0b81",
"value": "https://www.virustotal.com/file/95219933fa3f4178076f9e5306bc35753e35a58f147ed710fb3d644a22fffedb/analysis/1472259147/"
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--57c53ab1-e668-4000-8b97-4ecd02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-08-30T07:50:09.000Z",
"modified": "2016-08-30T07:50:09.000Z",
"first_observed": "2016-08-30T07:50:09Z",
"last_observed": "2016-08-30T07:50:09Z",
"number_observed": 1,
"object_refs": [
"url--57c53ab1-e668-4000-8b97-4ecd02de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--57c53ab1-e668-4000-8b97-4ecd02de0b81",
"value": "https://www.virustotal.com/file/84ec419f00674a81b4efe4d5495022eac7e7299dd1aab306c44703a467d752a0/analysis/1472271937/"
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--57c53ab1-c5e4-4fda-b253-418902de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-08-30T07:50:09.000Z",
"modified": "2016-08-30T07:50:09.000Z",
"first_observed": "2016-08-30T07:50:09Z",
"last_observed": "2016-08-30T07:50:09Z",
"number_observed": 1,
"object_refs": [
"url--57c53ab1-c5e4-4fda-b253-418902de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--57c53ab1-c5e4-4fda-b253-418902de0b81",
"value": "https://www.virustotal.com/file/eaafbe1e54ccdcce487b6fb00fa4b0d366fd87deb400b0558a3a029800632ce4/analysis/1472271938/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--57c54b87-75b0-4d73-b816-4de3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-08-30T09:01:59.000Z",
"modified": "2016-08-30T09:01:59.000Z",
"pattern": "[windows-registry-key:key = 'Software\\\\Wow6432Node\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run' AND windows-registry-key:values.data = '\\\\%APPDATA\\\\%\\\\BT\\\\csrss.exe']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-08-30T09:01:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Persistence mechanism"
}
],
"labels": [
"misp:type=\"regkey|value\"",
"misp:category=\"Persistence mechanism\"",
"misp:to_ids=\"True\""
]
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}