2023-04-21 13:25:09 +00:00
{
2023-06-14 17:31:25 +00:00
"type" : "bundle" ,
"id" : "bundle--57c405cd-ab54-47b8-9eff-7a52950d210f" ,
"objects" : [
{
"type" : "identity" ,
"spec_version" : "2.1" ,
"id" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-06-16T21:13:55.000Z" ,
"modified" : "2017-06-16T21:13:55.000Z" ,
"name" : "CIRCL" ,
"identity_class" : "organization"
} ,
{
"type" : "report" ,
"spec_version" : "2.1" ,
"id" : "report--57c405cd-ab54-47b8-9eff-7a52950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-06-16T21:13:55.000Z" ,
"modified" : "2017-06-16T21:13:55.000Z" ,
"name" : "OSINT - Dridex Returns To Action For Smaller, More Targeted Attacks" ,
"published" : "2017-06-16T21:14:04Z" ,
"object_refs" : [
"observed-data--57c405f9-fe0c-40ed-9b92-800f950d210f" ,
"url--57c405f9-fe0c-40ed-9b92-800f950d210f" ,
"x-misp-attribute--57c4060f-fbec-432b-8d84-800e950d210f" ,
"indicator--57c406c0-cb60-4bc4-aacb-800e950d210f" ,
"indicator--57c406c0-5820-4b47-b716-800e950d210f" ,
"indicator--57c406c0-fd78-438a-9502-800e950d210f" ,
"indicator--57c406c0-3898-46c6-abfd-800e950d210f" ,
"indicator--57c406c1-c66c-4933-b0f0-800e950d210f" ,
"indicator--57c406c2-8ad4-4ae5-95d1-800e950d210f" ,
"indicator--57c406c2-d160-4c6c-a9ff-800e950d210f" ,
"indicator--57c406c2-fcb4-4a0f-8a18-800e950d210f" ,
"indicator--57c406c3-d550-4216-a10c-800e950d210f" ,
"indicator--57c406c3-7aac-4786-8508-800e950d210f" ,
"indicator--57c406c3-0004-4083-ab33-800e950d210f" ,
"x-misp-attribute--57c406f4-914c-4f8a-bf4b-7a58950d210f" ,
"x-misp-attribute--57c40714-8904-4705-8609-8ac9950d210f" ,
"observed-data--57c40730-30cc-42d6-809e-8aca950d210f" ,
"url--57c40730-30cc-42d6-809e-8aca950d210f" ,
"indicator--57c4076e-0bb4-45d7-89d4-7a5102de0b81" ,
"indicator--57c4076e-0bcc-458c-b1ec-7a5102de0b81" ,
"observed-data--57c4076e-dc1c-4fb6-8cb0-7a5102de0b81" ,
"url--57c4076e-dc1c-4fb6-8cb0-7a5102de0b81" ,
"indicator--57c4076f-05e4-4b12-9725-7a5102de0b81" ,
"indicator--57c4076f-1da4-4c89-ac85-7a5102de0b81" ,
"observed-data--57c4076f-43f4-4dba-8473-7a5102de0b81" ,
"url--57c4076f-43f4-4dba-8473-7a5102de0b81" ,
"indicator--57c4076f-c114-4aee-86b6-7a5102de0b81" ,
"indicator--57c40770-51e4-4454-9097-7a5102de0b81" ,
"observed-data--57c40770-ca40-4836-bea3-7a5102de0b81" ,
"url--57c40770-ca40-4836-bea3-7a5102de0b81" ,
"indicator--57c40771-2eac-4b02-849f-7a5102de0b81" ,
"indicator--57c40771-731c-4fa8-a4f2-7a5102de0b81" ,
"observed-data--57c40771-38a8-4b85-ba46-7a5102de0b81" ,
"url--57c40771-38a8-4b85-ba46-7a5102de0b81" ,
"indicator--57c40771-9430-4687-bddd-7a5102de0b81" ,
"indicator--57c40772-a618-4472-8d3e-7a5102de0b81" ,
"observed-data--57c40772-ea1c-4941-a9eb-7a5102de0b81" ,
"url--57c40772-ea1c-4941-a9eb-7a5102de0b81" ,
"indicator--57c40772-e9b0-4f2a-ae55-7a5102de0b81" ,
"indicator--57c40772-48e0-4f43-bf9f-7a5102de0b81" ,
"observed-data--57c40773-bc68-460c-aff9-7a5102de0b81" ,
"url--57c40773-bc68-460c-aff9-7a5102de0b81" ,
"indicator--57c40773-62d0-47a3-80dc-7a5102de0b81" ,
"indicator--57c40774-2914-4485-8441-7a5102de0b81" ,
"observed-data--57c40774-8b28-49e0-9519-7a5102de0b81" ,
"url--57c40774-8b28-49e0-9519-7a5102de0b81" ,
"indicator--57c40775-c9e4-42d9-b7da-7a5102de0b81" ,
"indicator--57c40775-da1c-470f-9cf8-7a5102de0b81" ,
"observed-data--57c40775-ed24-4616-b20f-7a5102de0b81" ,
"url--57c40775-ed24-4616-b20f-7a5102de0b81" ,
"indicator--57c40776-4d88-4efb-9eb3-7a5102de0b81" ,
"indicator--57c40776-3c6c-4746-9439-7a5102de0b81" ,
"observed-data--57c40777-54f8-4870-b385-7a5102de0b81" ,
"url--57c40777-54f8-4870-b385-7a5102de0b81" ,
"indicator--57c40777-45a0-4150-b8e4-7a5102de0b81" ,
"indicator--57c40778-09ec-4e47-9c47-7a5102de0b81" ,
"observed-data--57c40779-fd00-407c-8951-7a5102de0b81" ,
"url--57c40779-fd00-407c-8951-7a5102de0b81" ,
"indicator--57c40779-48e0-4c1a-9091-7a5102de0b81" ,
"indicator--57c4077a-c778-43bc-a0ba-7a5102de0b81" ,
"observed-data--57c4077a-7bbc-4d8a-83fa-7a5102de0b81" ,
"url--57c4077a-7bbc-4d8a-83fa-7a5102de0b81"
] ,
"labels" : [
"Threat-Report" ,
"misp:tool=\"MISP-STIX-Converter\"" ,
"circl:topic=\"finance\"" ,
"circl:incident-classification=\"malware\"" ,
"type:OSINT" ,
"misp-galaxy:tool=\"Dridex\""
] ,
"object_marking_refs" : [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--57c405f9-fe0c-40ed-9b92-800f950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:52:57.000Z" ,
"modified" : "2016-08-29T09:52:57.000Z" ,
"first_observed" : "2016-08-29T09:52:57Z" ,
"last_observed" : "2016-08-29T09:52:57Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--57c405f9-fe0c-40ed-9b92-800f950d210f"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--57c405f9-fe0c-40ed-9b92-800f950d210f" ,
"value" : "https://www.proofpoint.com/us/threat-insight/post/Dridex-returns-to-action-for-smaller-more-targeted-attacks"
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--57c4060f-fbec-432b-8d84-800e950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:53:19.000Z" ,
"modified" : "2016-08-29T09:53:19.000Z" ,
"labels" : [
"misp:type=\"comment\"" ,
"misp:category=\"External analysis\""
] ,
"x_misp_category" : "External analysis" ,
"x_misp_type" : "comment" ,
"x_misp_value" : "Since it was first detected in November 2014, Dridex has been one of the most prolific pieces of malware worldwide. Even when the actors behind distribution of Dridex began distributing Locky ransomware in February, 2016, they would often switch between the two payloads or distribute them simultaneously. More recently, though, Dridex email message volumes have dropped to a relative trickle, and a new geography of interest, Switzerland, has emerged. The much lower volume suggests a higher degree of targeting, freeing the actors to pursue more lucrative attacks and leverage stolen information more effectively.\r\n\r\nIn this post we\u00e2\u20ac\u2122ll investigate the recent Dridex campaigns, including their message volumes and targeting, and provide possible reasons for changes in the mode of operation."
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c406c0-cb60-4bc4-aacb-800e950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:56:16.000Z" ,
"modified" : "2016-08-29T09:56:16.000Z" ,
"description" : "June 29 Dridex 38923 document \u00e2\u20ac\u0153[name].doc\u00e2\u20ac\u009d" ,
"pattern" : "[file:hashes.SHA256 = '313e2282bffcd2df612404c7ab6e7e913495c13b6f3011c1a2739e289b5451b6']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:56:16Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c406c0-5820-4b47-b716-800e950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:56:16.000Z" ,
"modified" : "2016-08-29T09:56:16.000Z" ,
"description" : "July 15 Dridex 124 document \u00e2\u20ac\u01531666.docm\u00e2\u20ac\u009d" ,
"pattern" : "[file:hashes.SHA256 = '1fe24808cabd3fa69e58824a58a1e302ce677362603d4f26240cff7c145421b5']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:56:16Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c406c0-fd78-438a-9502-800e950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:56:16.000Z" ,
"modified" : "2016-08-29T09:56:16.000Z" ,
"description" : "August 11 Dridex 144 document \u00e2\u20ac\u0153rechnung11aug.docm\u00e2\u20ac\u009d" ,
"pattern" : "[file:hashes.SHA256 = '1a6859d265b94a2109d690999f62fdbadd8cb1894205e2e1b260a9f3bdcd8639']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:56:16Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c406c0-3898-46c6-abfd-800e950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:56:16.000Z" ,
"modified" : "2016-08-29T09:56:16.000Z" ,
"description" : "August 15/16 Dridex 228 document \u00e2\u20ac\u0153Ord191878.docm\u00e2\u20ac\u009d" ,
"pattern" : "[file:hashes.SHA256 = '026b724fe9d07d47f8fcdf02f7e1072a74bc518e415430a2c23881fb179b4a99']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:56:16Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c406c1-c66c-4933-b0f0-800e950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:56:17.000Z" ,
"modified" : "2016-08-29T09:56:17.000Z" ,
"description" : "Dridex 38923 Loader" ,
"pattern" : "[file:hashes.SHA256 = '10cf55031c31f8a615b93cec9d3675b6af2fb7d9aa4ef5163723b55e43b9a9f4']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:56:17Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c406c2-8ad4-4ae5-95d1-800e950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:56:18.000Z" ,
"modified" : "2016-08-29T09:56:18.000Z" ,
"description" : "Dridex 124 Loader" ,
"pattern" : "[file:hashes.SHA256 = '207b4ae38b3a5c51614aacd6b9d09bff242b23fab777446e9f752eefde57bac8']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:56:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c406c2-d160-4c6c-a9ff-800e950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:56:18.000Z" ,
"modified" : "2016-08-29T09:56:18.000Z" ,
"description" : "Dridex 144 Loader" ,
"pattern" : "[file:hashes.SHA256 = '75717e7acf4f41de953e0c6f57986844bc21dcda546d5a37371ad8d5a7952782']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:56:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c406c2-fcb4-4a0f-8a18-800e950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:56:18.000Z" ,
"modified" : "2016-08-29T09:56:18.000Z" ,
"description" : "Dridex 228 Loader" ,
"pattern" : "[file:hashes.SHA256 = '160c95261abba3e71c52195251db075ed922acdf010aa85fef1760e8fa198bd8']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:56:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c406c3-d550-4216-a10c-800e950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:56:19.000Z" ,
"modified" : "2016-08-29T09:56:19.000Z" ,
"description" : "Dridex 1124 Loader" ,
"pattern" : "[file:hashes.SHA256 = 'bcaa57c93dc973aabd419b65dcdc4e9ae68bcae5ddfe920070cc2b2ae9dbaf3f']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:56:19Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c406c3-7aac-4786-8508-800e950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:56:19.000Z" ,
"modified" : "2016-08-29T09:56:19.000Z" ,
"description" : "Dridex 302 Loader" ,
"pattern" : "[file:hashes.SHA256 = '2d9c2edc8d1cfb2b5691b0f6a938d17d5adf1e7797ab401dfa12bd29df79af44']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:56:19Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c406c3-0004-4083-ab33-800e950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:56:19.000Z" ,
"modified" : "2016-08-29T09:56:19.000Z" ,
"description" : "Dridex 1024 dropped by Neutrino" ,
"pattern" : "[file:hashes.SHA256 = 'fc39a8ef9567ce977215b8699762843d4f8a98504d9495bf9f8edad0a60b5fcb']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:56:19Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--57c406f4-914c-4f8a-bf4b-7a58950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:57:08.000Z" ,
"modified" : "2016-08-29T09:57:08.000Z" ,
"labels" : [
"misp:type=\"comment\"" ,
"misp:category=\"Targeting data\""
] ,
"x_misp_category" : "Targeting data" ,
"x_misp_comment" : "Appendix A: Applications Targeted by Dridex 228 on August 16, 2016" ,
"x_misp_type" : "comment" ,
"x_misp_value" : "crealogix | multiversa | abacus | ebics | agro-office | cashcomm | softcrew | coconet | macrogram | mammut | omikron | multicash | quatersoft | alphasys | wineur | epsitec | myaccessweb | bellin | financesuite | moneta | softcash | trinity | financesuite | abrantix | starmoney | sfirm | migrosbank | migros bank | online banking | star money | multibit | bitgo | bither | blockchain | copay | msigna | armory | electrum | coinbase | magnr | keepkey | coinsbank | coolwallet | bitoex | xapo | changetip | coinapult | blocktrail | breadwallet | luxstack | airbitz | schildbach | ledger nano | mycelium | trezor | coinomi | bitcore | WinBacs | albacs | Albany.EFT.Corporate.Client | wpc | eSigner | StartStarMoney | StarMoney | acsagent | accrdsub | acevents | acCOMpkcs | jp2launcher | sllauncher | cspregtool | RegisterTool | OEBMCC32 | sfirm | Bbm24win | wip | paypen | mammut_tb | telelink | translink | deltaworks | dfsvc | bitcoin-qt | multibit | BacscomIP2 | runclient | paycentre | accesspay | PaymentStudio | DiasClient | SynIntegrationClient | QuestLauncher | RemoteAdminServer | SymForm2App | plink | launch | PaygateWpfClient | terminal | Telelink | EBsec | ftrskr | Suite Entreprise | rbpmain2 | rbpmain | tkc | ecbl-nxbp | sagedirect | turbo_teletransmission | cedripack | cedrisend | QikDesktop | QikDesktopCitrix | ConfigurationEditor | InteractFastConfig | otscm-client | ecb-sg | crs1 | GbpSV | pstw32 | MopaMaes | ldcptv10 | gslshmsrvc | launcher | tokensharesrv | universe | ifrun60 | roiwin31 | guawin32 | intwin31 | kb_pcb | spawin31 | cziwin31 | czawin31 | sta2gpc | etsr | tellerlauncher | prowin32 | dirclt32 | PLT1751 | PLT1151 | cegidebics | CCS3 | CCMPS3 | ComSX | keepass | c_agent | transac | relaisbtp | telebanking | ewallet | mstsc | cardentry | TPComplianceManager | TPWorkstation | BancLine 2.0 | MS000000 | BancLine 3.0 | BancLine 4.0 | BancLine 5.0 | SFW | ptw1151 | fedcomp | sfmain | VRNetWorld | KDS | Kasir | ICS | mpkds | pspooler | ipspool | POS-CFG | callerIdserver | EftTray | dpseftxc | EFTSERV | QBPOS | APRINT6 | POSCONFG | jRestaurant | AFR38 | rmpos | roi | AxUpdatePortal | Firefly | InitEpp | SM22 | xfsExplorer | XFSSimulator | WosaXFSTest | kiosk | CRE2004 | aspnet_wp | javav | XChrgSrv | rpccEngine | PTService | Rpro8 | UTG2Svc | Active-Charge | javaw | DDCDSRV1 | alohaedc | dbstpssvc | XPS | Transnet | posw | NCRLoader | PSTTransfer | TSTSolutions | wndaudit | TSTAdmin | TellerDR | merapplauncher | contact manager | goldtllr32 | goldtrakpc | farm42phyton | fx4cash | bpcssm | vp-ebanking | LLB Online Banking | efix | iberclear | AMBCN | SGO | SQLpnr | vmware-view | banktelapk | SynJhaIntService | uniservice | client32 | CanaraCustMaintenance | legaclt | pcsfe | pcscmenu | cwbtf | srvview | pcsmc2vb | cwb3uic | trcgui | cwbsvstr | rtopcb | cwbujcnv | cwbujbld | cwbuisxe | pcsws | cwbsvd | cwblog | cwbdsk | securID | jhaintexec | appupdate | SGNavigatorApp | dbr | WINTRV | bsaadmin | encompass | eautomate | link | adminconsole | commandclientplugin | commandclientplugin_gui | mfmanager | verex director-server manager | verex director-communication manager | notes | nlnotes | notes2 | sacmonitor | netterm | fspnet | bridgerinside | cardserver | si | dais.ebank.client.offlineclient | BGFWIN31 | BGDWIN31 | BGXWIN31 | bocusertool | CLXReader | UBSPay | Migros_Bank_E-Banking | Bank linth Online Banking | java | abastart | abamenu | abajvm | sage200.finanz.gui | vpxclient | htmlshell | mmc | e3K.Main | QOPT | cresus | wineur | abaeb | efinance | GestionPE | BCN-Netkey | Sage 30 | ISL_light_client | msaccess | proffix.v4 | pxShowThread"
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--57c40714-8904-4705-8609-8ac9950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:57:40.000Z" ,
"modified" : "2016-08-29T09:57:40.000Z" ,
"labels" : [
"misp:type=\"comment\"" ,
"misp:category=\"Targeting data\""
] ,
"x_misp_category" : "Targeting data" ,
"x_misp_comment" : "Appendix B: Applications Targeted by Dridex 120 in July 2015" ,
"x_misp_type" : "comment" ,
"x_misp_value" : "Uniface | bankline | Aptos | Hyposwiss | episys quest | bancline | tellerplus | ACE Software Solutions | ACI Worldwide | Alliance Enterprise | Bottomline Technologies | Broadridge | China Systems | CMA Small Systems | Clear2Pay | Adaptor Payments | Decillion Group | EastNets | Infosys | Flexcube | ECS Financials | FircoSoft | Fiserv | Kyriba | Premium Technology | Smartstream Technologies | Sopra Banking | Surecomp | Tieto Payment | TONBELLER | Wall Street Systems | Western Union | MoneyGram | Unistream | Direct Link | Abacus | agro-twin | coconet | crealogix | macrogram | mammut soft | omikron | quatersoft | experian payment gateway | softcrew | WinBacs | albacs | Albany.EFT.Corporate.Client | wpc | eSigner | StartStarMoney | StarMoney | acsagent | accrdsub | acevents | acCOMpkcs | ac.sharedstore | jp2launcher+ | sllauncher | cspregtool | RegisterTool | OEBMCC32 | sfirm | Bbm24win | wip | paypen | mammut_tb | telelink | translink | deltaworks | dfsvc | bitcoin-qt | multibit | BacscomIP2 | runclient | paycentre | accesspay | PaymentStudio | DiasClient | SynIntegrationClient | QuestLauncher | RemoteAdminServer | SymForm2App | plink | launch | PaygateWpfClient | terminal | Telelink | EBsec | ftrskr | Suite | Entreprise | rbpmain2 | rbpmain | tkc | ecbl-nxbp | sagedirect | turbo_teletransmission | cedripack | cedrisend | QikDesktop | QikDesktopCitrix | ConfigurationEditor | InteractFastConfig | javaw | otscm-client+ | ecb-sg | crs1 | GbpSV | pstw32 | MopaMaes | ldcptv10 | gslshmsrvc | launcher | tokensharesrv | sage"
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--57c40730-30cc-42d6-809e-8aca950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:58:08.000Z" ,
"modified" : "2016-08-29T09:58:08.000Z" ,
"first_observed" : "2016-08-29T09:58:08Z" ,
"last_observed" : "2016-08-29T09:58:08Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--57c40730-30cc-42d6-809e-8aca950d210f"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--57c40730-30cc-42d6-809e-8aca950d210f" ,
"value" : "https://www.melani.admin.ch/melani/de/home/dokumentation/newsletter/offline-payment-software.html"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c4076e-0bb4-45d7-89d4-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:10.000Z" ,
"modified" : "2016-08-29T09:59:10.000Z" ,
"description" : "Dridex 1024 dropped by Neutrino - Xchecked via VT: fc39a8ef9567ce977215b8699762843d4f8a98504d9495bf9f8edad0a60b5fcb" ,
"pattern" : "[file:hashes.SHA1 = '6207bb1f208867a3b357c64e635993cc4ee01c7b']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:59:10Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c4076e-0bcc-458c-b1ec-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:10.000Z" ,
"modified" : "2016-08-29T09:59:10.000Z" ,
"description" : "Dridex 1024 dropped by Neutrino - Xchecked via VT: fc39a8ef9567ce977215b8699762843d4f8a98504d9495bf9f8edad0a60b5fcb" ,
"pattern" : "[file:hashes.MD5 = '87f8402f0e46fcb929e175f3a722a202']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:59:10Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--57c4076e-dc1c-4fb6-8cb0-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:10.000Z" ,
"modified" : "2016-08-29T09:59:10.000Z" ,
"first_observed" : "2016-08-29T09:59:10Z" ,
"last_observed" : "2016-08-29T09:59:10Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--57c4076e-dc1c-4fb6-8cb0-7a5102de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--57c4076e-dc1c-4fb6-8cb0-7a5102de0b81" ,
"value" : "https://www.virustotal.com/file/fc39a8ef9567ce977215b8699762843d4f8a98504d9495bf9f8edad0a60b5fcb/analysis/1471591636/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c4076f-05e4-4b12-9725-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:11.000Z" ,
"modified" : "2016-08-29T09:59:11.000Z" ,
"description" : "Dridex 302 Loader - Xchecked via VT: 2d9c2edc8d1cfb2b5691b0f6a938d17d5adf1e7797ab401dfa12bd29df79af44" ,
"pattern" : "[file:hashes.SHA1 = '39b2aa526c79e263b77daf93c2426e96b61427ac']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:59:11Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c4076f-1da4-4c89-ac85-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:11.000Z" ,
"modified" : "2016-08-29T09:59:11.000Z" ,
"description" : "Dridex 302 Loader - Xchecked via VT: 2d9c2edc8d1cfb2b5691b0f6a938d17d5adf1e7797ab401dfa12bd29df79af44" ,
"pattern" : "[file:hashes.MD5 = 'd4c3e289e5c2240b4bc06e344be6e5b6']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:59:11Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--57c4076f-43f4-4dba-8473-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:11.000Z" ,
"modified" : "2016-08-29T09:59:11.000Z" ,
"first_observed" : "2016-08-29T09:59:11Z" ,
"last_observed" : "2016-08-29T09:59:11Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--57c4076f-43f4-4dba-8473-7a5102de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--57c4076f-43f4-4dba-8473-7a5102de0b81" ,
"value" : "https://www.virustotal.com/file/2d9c2edc8d1cfb2b5691b0f6a938d17d5adf1e7797ab401dfa12bd29df79af44/analysis/1471129011/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c4076f-c114-4aee-86b6-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:11.000Z" ,
"modified" : "2016-08-29T09:59:11.000Z" ,
"description" : "Dridex 1124 Loader - Xchecked via VT: bcaa57c93dc973aabd419b65dcdc4e9ae68bcae5ddfe920070cc2b2ae9dbaf3f" ,
"pattern" : "[file:hashes.SHA1 = 'f16fb1512e40ab115fb26ad5e516cd3660d903d7']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:59:11Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c40770-51e4-4454-9097-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:12.000Z" ,
"modified" : "2016-08-29T09:59:12.000Z" ,
"description" : "Dridex 1124 Loader - Xchecked via VT: bcaa57c93dc973aabd419b65dcdc4e9ae68bcae5ddfe920070cc2b2ae9dbaf3f" ,
"pattern" : "[file:hashes.MD5 = '5a5dfe4ec70529af9f937f58399410cf']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:59:12Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--57c40770-ca40-4836-bea3-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:12.000Z" ,
"modified" : "2016-08-29T09:59:12.000Z" ,
"first_observed" : "2016-08-29T09:59:12Z" ,
"last_observed" : "2016-08-29T09:59:12Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--57c40770-ca40-4836-bea3-7a5102de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--57c40770-ca40-4836-bea3-7a5102de0b81" ,
"value" : "https://www.virustotal.com/file/bcaa57c93dc973aabd419b65dcdc4e9ae68bcae5ddfe920070cc2b2ae9dbaf3f/analysis/1472443888/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c40771-2eac-4b02-849f-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:13.000Z" ,
"modified" : "2016-08-29T09:59:13.000Z" ,
"description" : "Dridex 228 Loader - Xchecked via VT: 160c95261abba3e71c52195251db075ed922acdf010aa85fef1760e8fa198bd8" ,
"pattern" : "[file:hashes.SHA1 = 'e682a268c7807fa3d4a5c7b0244a2f44663aadfc']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:59:13Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c40771-731c-4fa8-a4f2-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:13.000Z" ,
"modified" : "2016-08-29T09:59:13.000Z" ,
"description" : "Dridex 228 Loader - Xchecked via VT: 160c95261abba3e71c52195251db075ed922acdf010aa85fef1760e8fa198bd8" ,
"pattern" : "[file:hashes.MD5 = '08f44a4d709f1a16a1a99598e6038960']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:59:13Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--57c40771-38a8-4b85-ba46-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:13.000Z" ,
"modified" : "2016-08-29T09:59:13.000Z" ,
"first_observed" : "2016-08-29T09:59:13Z" ,
"last_observed" : "2016-08-29T09:59:13Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--57c40771-38a8-4b85-ba46-7a5102de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--57c40771-38a8-4b85-ba46-7a5102de0b81" ,
"value" : "https://www.virustotal.com/file/160c95261abba3e71c52195251db075ed922acdf010aa85fef1760e8fa198bd8/analysis/1472283781/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c40771-9430-4687-bddd-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:13.000Z" ,
"modified" : "2016-08-29T09:59:13.000Z" ,
"description" : "Dridex 144 Loader - Xchecked via VT: 75717e7acf4f41de953e0c6f57986844bc21dcda546d5a37371ad8d5a7952782" ,
"pattern" : "[file:hashes.SHA1 = 'ae99800e25d331403995c08fbbeef47a659ab804']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:59:13Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c40772-a618-4472-8d3e-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:14.000Z" ,
"modified" : "2016-08-29T09:59:14.000Z" ,
"description" : "Dridex 144 Loader - Xchecked via VT: 75717e7acf4f41de953e0c6f57986844bc21dcda546d5a37371ad8d5a7952782" ,
"pattern" : "[file:hashes.MD5 = 'd58ec78a177b82da975f2a42edfcdbad']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:59:14Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--57c40772-ea1c-4941-a9eb-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:14.000Z" ,
"modified" : "2016-08-29T09:59:14.000Z" ,
"first_observed" : "2016-08-29T09:59:14Z" ,
"last_observed" : "2016-08-29T09:59:14Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--57c40772-ea1c-4941-a9eb-7a5102de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--57c40772-ea1c-4941-a9eb-7a5102de0b81" ,
"value" : "https://www.virustotal.com/file/75717e7acf4f41de953e0c6f57986844bc21dcda546d5a37371ad8d5a7952782/analysis/1471678904/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c40772-e9b0-4f2a-ae55-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:14.000Z" ,
"modified" : "2016-08-29T09:59:14.000Z" ,
"description" : "Dridex 124 Loader - Xchecked via VT: 207b4ae38b3a5c51614aacd6b9d09bff242b23fab777446e9f752eefde57bac8" ,
"pattern" : "[file:hashes.SHA1 = '4af210a9c7c7c5d62dfac90de213c559bd04295c']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:59:14Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c40772-48e0-4f43-bf9f-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:14.000Z" ,
"modified" : "2016-08-29T09:59:14.000Z" ,
"description" : "Dridex 124 Loader - Xchecked via VT: 207b4ae38b3a5c51614aacd6b9d09bff242b23fab777446e9f752eefde57bac8" ,
"pattern" : "[file:hashes.MD5 = '52faad132ecc0a103d368640db9274b7']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:59:14Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--57c40773-bc68-460c-aff9-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:15.000Z" ,
"modified" : "2016-08-29T09:59:15.000Z" ,
"first_observed" : "2016-08-29T09:59:15Z" ,
"last_observed" : "2016-08-29T09:59:15Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--57c40773-bc68-460c-aff9-7a5102de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--57c40773-bc68-460c-aff9-7a5102de0b81" ,
"value" : "https://www.virustotal.com/file/207b4ae38b3a5c51614aacd6b9d09bff242b23fab777446e9f752eefde57bac8/analysis/1470206023/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c40773-62d0-47a3-80dc-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:15.000Z" ,
"modified" : "2016-08-29T09:59:15.000Z" ,
"description" : "Dridex 38923 Loader - Xchecked via VT: 10cf55031c31f8a615b93cec9d3675b6af2fb7d9aa4ef5163723b55e43b9a9f4" ,
"pattern" : "[file:hashes.SHA1 = '8dda6643074fc4c08e621b06a4b9ba2b02307462']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:59:15Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c40774-2914-4485-8441-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:16.000Z" ,
"modified" : "2016-08-29T09:59:16.000Z" ,
"description" : "Dridex 38923 Loader - Xchecked via VT: 10cf55031c31f8a615b93cec9d3675b6af2fb7d9aa4ef5163723b55e43b9a9f4" ,
"pattern" : "[file:hashes.MD5 = 'b8946d3329e56a3f3e52547aac913e8e']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:59:16Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--57c40774-8b28-49e0-9519-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:16.000Z" ,
"modified" : "2016-08-29T09:59:16.000Z" ,
"first_observed" : "2016-08-29T09:59:16Z" ,
"last_observed" : "2016-08-29T09:59:16Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--57c40774-8b28-49e0-9519-7a5102de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--57c40774-8b28-49e0-9519-7a5102de0b81" ,
"value" : "https://www.virustotal.com/file/10cf55031c31f8a615b93cec9d3675b6af2fb7d9aa4ef5163723b55e43b9a9f4/analysis/1469142637/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c40775-c9e4-42d9-b7da-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:17.000Z" ,
"modified" : "2016-08-29T09:59:17.000Z" ,
"description" : "August 15/16 Dridex 228 document \u00e2\u20ac\u0153Ord191878.docm\u00e2\u20ac\u009d - Xchecked via VT: 026b724fe9d07d47f8fcdf02f7e1072a74bc518e415430a2c23881fb179b4a99" ,
"pattern" : "[file:hashes.SHA1 = '880d6e1db2928dacf3977595507a0b8441e18778']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:59:17Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c40775-da1c-470f-9cf8-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:17.000Z" ,
"modified" : "2016-08-29T09:59:17.000Z" ,
"description" : "August 15/16 Dridex 228 document \u00e2\u20ac\u0153Ord191878.docm\u00e2\u20ac\u009d - Xchecked via VT: 026b724fe9d07d47f8fcdf02f7e1072a74bc518e415430a2c23881fb179b4a99" ,
"pattern" : "[file:hashes.MD5 = 'd0f9189af92bf014d2c3d1384806079b']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:59:17Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--57c40775-ed24-4616-b20f-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:17.000Z" ,
"modified" : "2016-08-29T09:59:17.000Z" ,
"first_observed" : "2016-08-29T09:59:17Z" ,
"last_observed" : "2016-08-29T09:59:17Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--57c40775-ed24-4616-b20f-7a5102de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--57c40775-ed24-4616-b20f-7a5102de0b81" ,
"value" : "https://www.virustotal.com/file/026b724fe9d07d47f8fcdf02f7e1072a74bc518e415430a2c23881fb179b4a99/analysis/1471302720/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c40776-4d88-4efb-9eb3-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:18.000Z" ,
"modified" : "2016-08-29T09:59:18.000Z" ,
"description" : "August 11 Dridex 144 document \u00e2\u20ac\u0153rechnung11aug.docm\u00e2\u20ac\u009d - Xchecked via VT: 1a6859d265b94a2109d690999f62fdbadd8cb1894205e2e1b260a9f3bdcd8639" ,
"pattern" : "[file:hashes.SHA1 = '05e3a7ee1df443b75ec8106a7ef857ddeb299ac5']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:59:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c40776-3c6c-4746-9439-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:18.000Z" ,
"modified" : "2016-08-29T09:59:18.000Z" ,
"description" : "August 11 Dridex 144 document \u00e2\u20ac\u0153rechnung11aug.docm\u00e2\u20ac\u009d - Xchecked via VT: 1a6859d265b94a2109d690999f62fdbadd8cb1894205e2e1b260a9f3bdcd8639" ,
"pattern" : "[file:hashes.MD5 = '5e89753e6a7e1cb8f18004aaa4c47374']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:59:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--57c40777-54f8-4870-b385-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:19.000Z" ,
"modified" : "2016-08-29T09:59:19.000Z" ,
"first_observed" : "2016-08-29T09:59:19Z" ,
"last_observed" : "2016-08-29T09:59:19Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--57c40777-54f8-4870-b385-7a5102de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--57c40777-54f8-4870-b385-7a5102de0b81" ,
"value" : "https://www.virustotal.com/file/1a6859d265b94a2109d690999f62fdbadd8cb1894205e2e1b260a9f3bdcd8639/analysis/1471932146/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c40777-45a0-4150-b8e4-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:19.000Z" ,
"modified" : "2016-08-29T09:59:19.000Z" ,
"description" : "July 15 Dridex 124 document \u00e2\u20ac\u01531666.docm\u00e2\u20ac\u009d - Xchecked via VT: 1fe24808cabd3fa69e58824a58a1e302ce677362603d4f26240cff7c145421b5" ,
"pattern" : "[file:hashes.SHA1 = 'fcec303b9de6eb89f621ca3d469471a011e84b2f']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:59:19Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c40778-09ec-4e47-9c47-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:20.000Z" ,
"modified" : "2016-08-29T09:59:20.000Z" ,
"description" : "July 15 Dridex 124 document \u00e2\u20ac\u01531666.docm\u00e2\u20ac\u009d - Xchecked via VT: 1fe24808cabd3fa69e58824a58a1e302ce677362603d4f26240cff7c145421b5" ,
"pattern" : "[file:hashes.MD5 = 'bc4b5dbf114c3ad5ba93d966781257fa']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:59:20Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--57c40779-fd00-407c-8951-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:21.000Z" ,
"modified" : "2016-08-29T09:59:21.000Z" ,
"first_observed" : "2016-08-29T09:59:21Z" ,
"last_observed" : "2016-08-29T09:59:21Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--57c40779-fd00-407c-8951-7a5102de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--57c40779-fd00-407c-8951-7a5102de0b81" ,
"value" : "https://www.virustotal.com/file/1fe24808cabd3fa69e58824a58a1e302ce677362603d4f26240cff7c145421b5/analysis/1469347569/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c40779-48e0-4c1a-9091-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:21.000Z" ,
"modified" : "2016-08-29T09:59:21.000Z" ,
"description" : "June 29 Dridex 38923 document \u00e2\u20ac\u0153[name].doc\u00e2\u20ac\u009d - Xchecked via VT: 313e2282bffcd2df612404c7ab6e7e913495c13b6f3011c1a2739e289b5451b6" ,
"pattern" : "[file:hashes.SHA1 = 'eb78f441a57ffeec110a1cc3d6255043e612e5dd']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:59:21Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57c4077a-c778-43bc-a0ba-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:22.000Z" ,
"modified" : "2016-08-29T09:59:22.000Z" ,
"description" : "June 29 Dridex 38923 document \u00e2\u20ac\u0153[name].doc\u00e2\u20ac\u009d - Xchecked via VT: 313e2282bffcd2df612404c7ab6e7e913495c13b6f3011c1a2739e289b5451b6" ,
"pattern" : "[file:hashes.MD5 = '6369e4e4ddd8312b52a1c1b4818e463c']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-08-29T09:59:22Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--57c4077a-7bbc-4d8a-83fa-7a5102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-08-29T09:59:22.000Z" ,
"modified" : "2016-08-29T09:59:22.000Z" ,
"first_observed" : "2016-08-29T09:59:22Z" ,
"last_observed" : "2016-08-29T09:59:22Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--57c4077a-7bbc-4d8a-83fa-7a5102de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--57c4077a-7bbc-4d8a-83fa-7a5102de0b81" ,
"value" : "https://www.virustotal.com/file/313e2282bffcd2df612404c7ab6e7e913495c13b6f3011c1a2739e289b5451b6/analysis/1470643493/"
} ,
{
"type" : "marking-definition" ,
"spec_version" : "2.1" ,
"id" : "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ,
"created" : "2017-01-20T00:00:00.000Z" ,
"definition_type" : "tlp" ,
"name" : "TLP:WHITE" ,
"definition" : {
"tlp" : "white"
}
}
2023-04-21 13:25:09 +00:00
]
}