2023-04-21 13:25:09 +00:00
{
2023-06-14 17:31:25 +00:00
"type" : "bundle" ,
"id" : "bundle--574549b7-23c0-4bf3-9183-466b950d210f" ,
"objects" : [
{
"type" : "identity" ,
"spec_version" : "2.1" ,
"id" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-05-25T06:57:34.000Z" ,
"modified" : "2016-05-25T06:57:34.000Z" ,
"name" : "CIRCL" ,
"identity_class" : "organization"
} ,
{
"type" : "report" ,
"spec_version" : "2.1" ,
"id" : "report--574549b7-23c0-4bf3-9183-466b950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-05-25T06:57:34.000Z" ,
"modified" : "2016-05-25T06:57:34.000Z" ,
"name" : "OSINT - Dogspectus Ransomware Analysis" ,
"published" : "2016-05-25T06:59:42Z" ,
"object_refs" : [
"x-misp-attribute--574549e8-c020-4a63-8146-4ce6950d210f" ,
"observed-data--57454c25-2ad4-4971-ab4b-4704950d210f" ,
"url--57454c25-2ad4-4971-ab4b-4704950d210f" ,
"observed-data--57454c25-a5a0-4029-af09-460d950d210f" ,
"url--57454c25-a5a0-4029-af09-460d950d210f" ,
"observed-data--57454c26-e3d0-40d9-b77c-4f9d950d210f" ,
"url--57454c26-e3d0-40d9-b77c-4f9d950d210f" ,
"indicator--57454c4b-74b8-4e8b-955e-4053950d210f" ,
"indicator--57454c4b-db4c-4805-a8a8-482a950d210f" ,
"indicator--57454c4c-9f3c-4f7f-be50-4a7c950d210f" ,
"indicator--57454c4c-d55c-4d66-afda-4bc2950d210f" ,
"indicator--57454c4c-3fac-47e8-bd71-4be3950d210f" ,
"indicator--57454c4d-1b10-4f2a-a911-4a37950d210f" ,
"indicator--57454c59-6b48-4c0a-b689-4355950d210f" ,
"indicator--57454cde-0adc-42d8-a2a1-404702de0b81" ,
"indicator--57454cde-cbcc-402d-9057-4aaa02de0b81" ,
"observed-data--57454cdf-db60-4831-8b49-452502de0b81" ,
"url--57454cdf-db60-4831-8b49-452502de0b81"
] ,
"labels" : [
"Threat-Report" ,
"misp:tool=\"MISP-STIX-Converter\"" ,
"type:OSINT" ,
"ecsirt:malicious-code=\"ransomware\""
] ,
"object_marking_refs" : [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--574549e8-c020-4a63-8146-4ce6950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-05-25T06:44:56.000Z" ,
"modified" : "2016-05-25T06:44:56.000Z" ,
"labels" : [
"misp:type=\"comment\"" ,
"misp:category=\"External analysis\""
] ,
"x_misp_category" : "External analysis" ,
"x_misp_type" : "comment" ,
"x_misp_value" : "On April 25, 2016, Blue Coat published an article on a new Android Ransomware, called \"Dogspectus.\u00e2\u20ac\u009d On May 12, 2016, Dell SonicWALL published a separate report on the Android Lockscreen malware campaign with similar characteristics to Dogspectus. These similarities are not a coincidence. We began our own extensive investigation into this ransomware some time ago, and will share additional technical details of this malware here that have not been previously discussed."
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--57454c25-2ad4-4971-ab4b-4704950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-05-25T06:54:29.000Z" ,
"modified" : "2016-05-25T06:54:29.000Z" ,
"first_observed" : "2016-05-25T06:54:29Z" ,
"last_observed" : "2016-05-25T06:54:29Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--57454c25-2ad4-4971-ab4b-4704950d210f"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--57454c25-2ad4-4971-ab4b-4704950d210f" ,
"value" : "http://blog.fortinet.com/2016/05/19/dogspectus-ransomware-analysis"
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--57454c25-a5a0-4029-af09-460d950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-05-25T06:54:29.000Z" ,
"modified" : "2016-05-25T06:54:29.000Z" ,
"first_observed" : "2016-05-25T06:54:29Z" ,
"last_observed" : "2016-05-25T06:54:29Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--57454c25-a5a0-4029-af09-460d950d210f"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--57454c25-a5a0-4029-af09-460d950d210f" ,
"value" : "https://www.mysonicwall.com/sonicalert/searchresults.aspx?ev=article&id=929"
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--57454c26-e3d0-40d9-b77c-4f9d950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-05-25T06:54:30.000Z" ,
"modified" : "2016-05-25T06:54:30.000Z" ,
"first_observed" : "2016-05-25T06:54:30Z" ,
"last_observed" : "2016-05-25T06:54:30Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--57454c26-e3d0-40d9-b77c-4f9d950d210f"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--57454c26-e3d0-40d9-b77c-4f9d950d210f" ,
"value" : "https://www.bluecoat.com/security-blog/2016-04-25/android-exploit-delivers-dogspectus-ransomware"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57454c4b-74b8-4e8b-955e-4053950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-05-25T06:55:07.000Z" ,
"modified" : "2016-05-25T06:55:07.000Z" ,
"description" : "C&C" ,
"pattern" : "[url:value = 'http://workoutplaceface.com']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-05-25T06:55:07Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57454c4b-db4c-4805-a8a8-482a950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-05-25T06:55:07.000Z" ,
"modified" : "2016-05-25T06:55:07.000Z" ,
"description" : "C&C" ,
"pattern" : "[url:value = 'http://orlandroot.com']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-05-25T06:55:07Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57454c4c-9f3c-4f7f-be50-4a7c950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-05-25T06:55:08.000Z" ,
"modified" : "2016-05-25T06:55:08.000Z" ,
"description" : "C&C" ,
"pattern" : "[url:value = 'http://daflourstmichurins.com']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-05-25T06:55:08Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57454c4c-d55c-4d66-afda-4bc2950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-05-25T06:55:08.000Z" ,
"modified" : "2016-05-25T06:55:08.000Z" ,
"description" : "C&C" ,
"pattern" : "[url:value = 'http://mentosjolly.com']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-05-25T06:55:08Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57454c4c-3fac-47e8-bd71-4be3950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-05-25T06:55:08.000Z" ,
"modified" : "2016-05-25T06:55:08.000Z" ,
"description" : "C&C" ,
"pattern" : "[url:value = 'http://belkafruitcymus.com']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-05-25T06:55:08Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57454c4d-1b10-4f2a-a911-4a37950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-05-25T06:55:09.000Z" ,
"modified" : "2016-05-25T06:55:09.000Z" ,
"description" : "C&C" ,
"pattern" : "[url:value = 'http://wirtualcleens.com']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-05-25T06:55:09Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57454c59-6b48-4c0a-b689-4355950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-05-25T06:55:21.000Z" ,
"modified" : "2016-05-25T06:55:21.000Z" ,
"pattern" : "[file:hashes.SHA256 = '197588be3e8ba5c779696d864121aff188901720dcda796759906c17473d46fe']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-05-25T06:55:21Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57454cde-0adc-42d8-a2a1-404702de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-05-25T06:57:34.000Z" ,
"modified" : "2016-05-25T06:57:34.000Z" ,
"description" : "- Xchecked via VT: 197588be3e8ba5c779696d864121aff188901720dcda796759906c17473d46fe" ,
"pattern" : "[file:hashes.SHA1 = '392e8b90431dfe55ca03e04a49fce1514d61638e']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-05-25T06:57:34Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57454cde-cbcc-402d-9057-4aaa02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-05-25T06:57:34.000Z" ,
"modified" : "2016-05-25T06:57:34.000Z" ,
"description" : "- Xchecked via VT: 197588be3e8ba5c779696d864121aff188901720dcda796759906c17473d46fe" ,
"pattern" : "[file:hashes.MD5 = 'e26710a4e499a797aab62fd0ad7ac19c']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-05-25T06:57:34Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--57454cdf-db60-4831-8b49-452502de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-05-25T06:57:35.000Z" ,
"modified" : "2016-05-25T06:57:35.000Z" ,
"first_observed" : "2016-05-25T06:57:35Z" ,
"last_observed" : "2016-05-25T06:57:35Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--57454cdf-db60-4831-8b49-452502de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--57454cdf-db60-4831-8b49-452502de0b81" ,
"value" : "https://www.virustotal.com/file/197588be3e8ba5c779696d864121aff188901720dcda796759906c17473d46fe/analysis/1464158418/"
} ,
{
"type" : "marking-definition" ,
"spec_version" : "2.1" ,
"id" : "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ,
"created" : "2017-01-20T00:00:00.000Z" ,
"definition_type" : "tlp" ,
"name" : "TLP:WHITE" ,
"definition" : {
"tlp" : "white"
}
}
2023-04-21 13:25:09 +00:00
]
}