misp-circl-feed/feeds/circl/stix-2.1/5b17eaaf-783c-4624-b5f4-42d5950d210f.json

229 lines
9.5 KiB
JSON
Raw Permalink Normal View History

2023-04-21 14:44:17 +00:00
{
"type": "bundle",
"id": "bundle--5b17eaaf-783c-4624-b5f4-42d5950d210f",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-06-13T12:09:12.000Z",
"modified": "2018-06-13T12:09:12.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--5b17eaaf-783c-4624-b5f4-42d5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-06-13T12:09:12.000Z",
"modified": "2018-06-13T12:09:12.000Z",
"name": "OSINT - Sigrun Ransomware Author Decrypting Russian Victims for Free",
"published": "2018-06-13T15:39:44Z",
"object_refs": [
"observed-data--5b17ed4b-d91c-42b3-b3f5-4998950d210f",
"url--5b17ed4b-d91c-42b3-b3f5-4998950d210f",
"x-misp-attribute--5b17ed5f-5934-4b17-918d-4149950d210f",
"indicator--5b18e06d-07dc-4b4e-870e-262b950d210f",
"indicator--5b18e06e-0884-4617-8b91-262b950d210f",
"indicator--5b18e0b6-1ccc-41f1-b246-1dc5950d210f",
"indicator--5b18df00-e54c-4f8c-8aff-1dc7950d210f",
"x-misp-object--09bc113b-4699-4395-b2c8-f7e57415bab4",
"x-misp-object--7aeb92ee-c416-4eea-bd3d-bffb83f3b67c",
2024-08-07 08:13:15 +00:00
"relationship--b5e37887-74c6-4487-9cdb-e244dc7882d6"
2023-04-21 14:44:17 +00:00
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"malware_classification:malware-category=\"Ransomware\"",
"osint:source-type=\"blog-post\"",
"misp-galaxy:ransomware=\"Sigrun Ransomware\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5b17ed4b-d91c-42b3-b3f5-4998950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-06-06T14:21:09.000Z",
"modified": "2018-06-06T14:21:09.000Z",
"first_observed": "2018-06-06T14:21:09Z",
"last_observed": "2018-06-06T14:21:09Z",
"number_observed": 1,
"object_refs": [
"url--5b17ed4b-d91c-42b3-b3f5-4998950d210f"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\"",
"osint:source-type=\"blog-post\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--5b17ed4b-d91c-42b3-b3f5-4998950d210f",
"value": "https://www.bleepingcomputer.com/news/security/sigrun-ransomware-author-decrypting-russian-victims-for-free/"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--5b17ed5f-5934-4b17-918d-4149950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-06-06T14:21:02.000Z",
"modified": "2018-06-06T14:21:02.000Z",
"labels": [
"misp:type=\"text\"",
"misp:category=\"External analysis\"",
"osint:source-type=\"blog-post\""
],
"x_misp_category": "External analysis",
"x_misp_type": "text",
"x_misp_value": "The author of the Sigrun Ransomware is providing decryption for Russian victims for free, while asking for a ransom payment of $2,500 in Bitcoin or Dash for everyone else. It is not uncommon for Russian ransomware developers to purposely avoid targeting Russian citizens and to outwardly help such victims for free."
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b18e06d-07dc-4b4e-870e-262b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-06-07T07:36:13.000Z",
"modified": "2018-06-07T07:36:13.000Z",
"pattern": "[file:name = 'RESTORE-SIGRUN.txt']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-06-07T07:36:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"filename\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b18e06e-0884-4617-8b91-262b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-06-07T07:36:14.000Z",
"modified": "2018-06-07T07:36:14.000Z",
"pattern": "[file:name = 'RESTORE-SIGRUN.html']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-06-07T07:36:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"filename\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b18e0b6-1ccc-41f1-b246-1dc5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-06-07T07:37:26.000Z",
"modified": "2018-06-07T07:37:26.000Z",
"pattern": "[email-message:from_ref.value = 'sigrun_decryptor@protonmail.ch']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-06-07T07:37:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-src\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b18df00-e54c-4f8c-8aff-1dc7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-06-07T07:30:08.000Z",
"modified": "2018-06-07T07:30:08.000Z",
"pattern": "[file:hashes.SHA256 = '664b482e22e0f108660cf03fb7d1507d929e8242eb6c5762e577096a50a8cc5b' AND file:x_misp_state = 'Malicious']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-06-07T07:30:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--09bc113b-4699-4395-b2c8-f7e57415bab4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-06-13T07:38:07.000Z",
"modified": "2018-06-13T07:38:07.000Z",
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\""
],
"x_misp_meta_category": "file",
"x_misp_name": "file"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--7aeb92ee-c416-4eea-bd3d-bffb83f3b67c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-06-13T07:38:06.000Z",
"modified": "2018-06-13T07:38:06.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "relationship",
"spec_version": "2.1",
2024-08-07 08:13:15 +00:00
"id": "relationship--b5e37887-74c6-4487-9cdb-e244dc7882d6",
2023-04-21 14:44:17 +00:00
"created": "2018-06-13T07:38:07.000Z",
"modified": "2018-06-13T07:38:07.000Z",
"relationship_type": "analysed-with",
"source_ref": "x-misp-object--09bc113b-4699-4395-b2c8-f7e57415bab4",
"target_ref": "x-misp-object--7aeb92ee-c416-4eea-bd3d-bffb83f3b67c"
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}