misp-circl-feed/feeds/circl/stix-2.1/5980127d-ada0-479d-b976-c51d02de0b81.json

208 lines
11 KiB
JSON
Raw Permalink Normal View History

2023-04-21 14:44:17 +00:00
{
"type": "bundle",
"id": "bundle--5980127d-ada0-479d-b976-c51d02de0b81",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-08-01T08:04:33.000Z",
"modified": "2017-08-01T08:04:33.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--5980127d-ada0-479d-b976-c51d02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-08-01T08:04:33.000Z",
"modified": "2017-08-01T08:04:33.000Z",
"name": "OSINT - A new era in mobile banking Trojans",
"published": "2017-08-01T08:05:16Z",
"object_refs": [
"observed-data--5980129d-2974-4203-bdc2-c50502de0b81",
"url--5980129d-2974-4203-bdc2-c50502de0b81",
"x-misp-attribute--598012ae-e154-4183-ab6a-4c7202de0b81",
"indicator--598012cd-6988-42ec-85da-4dc702de0b81",
"indicator--5980131c-fe10-49da-a972-48b402de0b81",
"indicator--5980131c-a47c-4c4d-8f2e-44ba02de0b81",
"observed-data--5980131c-aff0-42c3-a038-468102de0b81",
"url--5980131c-aff0-42c3-a038-468102de0b81",
"x-misp-attribute--59803611-b3f4-48f0-9af1-471f950d210f"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"enisa:nefarious-activity-abuse=\"mobile-malware\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5980129d-2974-4203-bdc2-c50502de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-08-01T05:35:23.000Z",
"modified": "2017-08-01T05:35:23.000Z",
"first_observed": "2017-08-01T05:35:23Z",
"last_observed": "2017-08-01T05:35:23Z",
"number_observed": 1,
"object_refs": [
"url--5980129d-2974-4203-bdc2-c50502de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\"",
"osint:source-type=\"blog-post\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--5980129d-2974-4203-bdc2-c50502de0b81",
"value": "https://securelist.com/a-new-era-in-mobile-banking-trojans/79198/"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--598012ae-e154-4183-ab6a-4c7202de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-08-01T05:35:23.000Z",
"modified": "2017-08-01T05:35:23.000Z",
"labels": [
"misp:type=\"text\"",
"misp:category=\"External analysis\"",
"osint:source-type=\"blog-post\""
],
"x_misp_category": "External analysis",
"x_misp_type": "text",
"x_misp_value": "In mid-July 2017, we found a new modification of the well-known mobile banking malware family Svpeng \u00e2\u20ac\u201c Trojan-Banker.AndroidOS.Svpeng.ae. In this modification, the cybercriminals have added new functionality: it now also works as a keylogger, stealing entered text through the use of accessibility services.\r\n\r\nAccessibility services generally provide user interface (UI) enhancements for users with disabilities or those temporarily unable to interact fully with a device, perhaps because they are driving. Abusing this system feature allows the Trojan not only to steal entered text from other apps installed on the device, but also to grant itself more permissions and rights, and to counteract attempts to uninstall the Trojan.\r\n\r\nAttack data suggests this Trojan is not yet widely deployed. In the space of a week, we observed only a small number of users attacked, but these targets spanned 23 countries. Most attacked users were in Russia (29%), Germany (27%), Turkey (15%), Poland (6%) and France (3%). It is worth noting that, even though most attacked users are from Russia, this Trojan won\u00e2\u20ac\u2122t work on devices running the Russian language. This is a standard tactic for Russian cybercriminals looking to evade detection and arrest.\r\n\r\nThe Svpeng malware family is known for being innovative. Starting from 2013, it was among the first to begin attacking SMS banking, to use phishing pages to overlay other apps to steal credentials, and to block devices and demand money. In 2016, cybercriminals were actively distributing Svpeng through AdSense using a vulnerability in the Chrome browser. This makes Svpeng one of the most dangerous mobile malware families, and it is why we monitor the functionality of new versions."
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--598012cd-6988-42ec-85da-4dc702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-08-01T05:35:23.000Z",
"modified": "2017-08-01T05:35:23.000Z",
"description": "The Trojan-Banker.AndroidOS.Svpeng.ae is distributed from malicious websites as a fake flash player. Its malicious techniques work even on fully-updated devices with the latest Android version and all security updates installed. By accessing only one system feature this Trojan can gain all necessary additional rights and steal lots of data.",
"pattern": "[file:hashes.MD5 = 'f536bc5b79c16e9a84546c2049e810e1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-08-01T05:35:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5980131c-fe10-49da-a972-48b402de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-08-01T05:35:24.000Z",
"modified": "2017-08-01T05:35:24.000Z",
"description": "The Trojan-Banker.AndroidOS.Svpeng.ae is distributed from malicious websites as a fake flash player. Its malicious techniques work even on fully-updated devices with the latest Android version and all security updates installed. By accessing only one system feature this Trojan can gain all necessary additional rights and steal lots of data. - Xchecked via VT: f536bc5b79c16e9a84546c2049e810e1",
"pattern": "[file:hashes.SHA256 = '74cd5726209dee35f7284f27d08aa6265a54e7b338996db26f30140f92156494']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-08-01T05:35:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5980131c-a47c-4c4d-8f2e-44ba02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-08-01T05:35:24.000Z",
"modified": "2017-08-01T05:35:24.000Z",
"description": "The Trojan-Banker.AndroidOS.Svpeng.ae is distributed from malicious websites as a fake flash player. Its malicious techniques work even on fully-updated devices with the latest Android version and all security updates installed. By accessing only one system feature this Trojan can gain all necessary additional rights and steal lots of data. - Xchecked via VT: f536bc5b79c16e9a84546c2049e810e1",
"pattern": "[file:hashes.SHA1 = '04f97d1dffb518232e465a8c977f384cedbceaac']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-08-01T05:35:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5980131c-aff0-42c3-a038-468102de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-08-01T05:35:24.000Z",
"modified": "2017-08-01T05:35:24.000Z",
"first_observed": "2017-08-01T05:35:24Z",
"last_observed": "2017-08-01T05:35:24Z",
"number_observed": 1,
"object_refs": [
"url--5980131c-aff0-42c3-a038-468102de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--5980131c-aff0-42c3-a038-468102de0b81",
"value": "https://www.virustotal.com/file/74cd5726209dee35f7284f27d08aa6265a54e7b338996db26f30140f92156494/analysis/1501535676/"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--59803611-b3f4-48f0-9af1-471f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-08-01T08:04:33.000Z",
"modified": "2017-08-01T08:04:33.000Z",
"labels": [
"misp:type=\"datetime\"",
"misp:category=\"Other\""
],
"x_misp_category": "Other",
"x_misp_comment": "extracted from metadata 74cd5726209dee35f7284f27d08aa6265a54e7b338996db26f30140f92156494",
"x_misp_type": "datetime",
"x_misp_value": "2017-07-13T00:08:36"
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}