2023-04-21 13:25:09 +00:00
{
2023-06-14 17:31:25 +00:00
"type" : "bundle" ,
"id" : "bundle--59720fc0-19c8-47f0-92e2-4dff950d210f" ,
"objects" : [
{
"type" : "identity" ,
"spec_version" : "2.1" ,
"id" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-07-21T14:35:14.000Z" ,
"modified" : "2017-07-21T14:35:14.000Z" ,
"name" : "CIRCL" ,
"identity_class" : "organization"
} ,
{
"type" : "report" ,
"spec_version" : "2.1" ,
"id" : "report--59720fc0-19c8-47f0-92e2-4dff950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-07-21T14:35:14.000Z" ,
"modified" : "2017-07-21T14:35:14.000Z" ,
"name" : "OSINT - Rurktar - Spyware under Construction" ,
"published" : "2017-07-21T14:35:29Z" ,
"object_refs" : [
"observed-data--59721042-1400-40a3-80c9-473b950d210f" ,
"url--59721042-1400-40a3-80c9-473b950d210f" ,
"x-misp-attribute--5972104f-4280-47eb-8fb6-4fa5950d210f" ,
"observed-data--5972105c-5c74-4639-99e2-4bc2950d210f" ,
"url--5972105c-5c74-4639-99e2-4bc2950d210f" ,
"indicator--5972107b-91b0-42f4-8e60-45f6950d210f" ,
"indicator--5972107b-709c-4caa-be1f-425d950d210f" ,
"indicator--5972107b-f3fc-4302-855f-48bc950d210f" ,
"indicator--5972107b-2858-4d4e-9fca-47a9950d210f" ,
"indicator--597210b0-4b54-4f70-be6a-47ab950d210f" ,
"indicator--59721123-362c-4a08-bc48-41fa02de0b81" ,
"indicator--59721123-58c8-4a8f-a8d3-4c6202de0b81" ,
"observed-data--59721123-2cc4-428d-9066-4d5302de0b81" ,
"url--59721123-2cc4-428d-9066-4d5302de0b81" ,
"indicator--59721123-ed14-4727-af44-417a02de0b81" ,
"indicator--59721123-bfc0-4e7f-abef-48d502de0b81" ,
"observed-data--59721123-f4dc-4e0b-84ff-425e02de0b81" ,
"url--59721123-f4dc-4e0b-84ff-425e02de0b81" ,
"indicator--59721123-8ba0-4f4d-a717-416402de0b81" ,
"indicator--59721123-8bdc-4a5a-9093-49de02de0b81" ,
"observed-data--59721123-1684-4902-b143-415a02de0b81" ,
"url--59721123-1684-4902-b143-415a02de0b81" ,
"indicator--59721123-3df4-4d16-8d55-463c02de0b81" ,
"indicator--59721123-bf3c-4600-9378-426802de0b81" ,
"observed-data--59721123-20e0-4420-9cea-4a7402de0b81" ,
"url--59721123-20e0-4420-9cea-4a7402de0b81"
] ,
"labels" : [
"Threat-Report" ,
"misp:tool=\"MISP-STIX-Converter\""
] ,
"object_marking_refs" : [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--59721042-1400-40a3-80c9-473b950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-07-21T14:35:14.000Z" ,
"modified" : "2017-07-21T14:35:14.000Z" ,
"first_observed" : "2017-07-21T14:35:14Z" ,
"last_observed" : "2017-07-21T14:35:14Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--59721042-1400-40a3-80c9-473b950d210f"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--59721042-1400-40a3-80c9-473b950d210f" ,
"value" : "https://www.gdatasoftware.com/blog/2017/07/29896-rurktar-spyware-under-construction"
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--5972104f-4280-47eb-8fb6-4fa5950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-07-21T14:35:14.000Z" ,
"modified" : "2017-07-21T14:35:14.000Z" ,
"labels" : [
"misp:type=\"text\"" ,
"misp:category=\"External analysis\""
] ,
"x_misp_category" : "External analysis" ,
"x_misp_type" : "text" ,
"x_misp_value" : "Researchers at G DATA - have examined a new spyware which still seems to be in a development stage. But what is it about and what are its objectives?\r\nThe development of any kind of software takes time. Not every function that is planned for the final product is implemented right from the start. It does not come as a surprise that this is also true for the development of malware. At the G DATA Security Labs, a file has sparked the interest of our researchers - this file is interesting for a number of reasons.\r\n\r\nWho commissioned it?\r\nThe new espionage tool which was was christened \"Rurktar\" allows some conclusions as to its origin. It is very likely that it originates from Russia. There is quite some evidence to support this: some of the internal error messages of Rurktar are in Russian. Also, the IP addresses used for remote control of the spyware are located in Russia.\r\n\r\nIt is not 100 per cent clear whether Rurktar is the work of a single individual or a development team. What we can say, though, is that a Dropbox folder is used as a working directory. There are several possible reasons for this. One of them is that several developers are cooperating here and consolidate their work through a Dropbox. What Dropbox can also be used for by a single individual is a crude and very basic versioning system - some Dropbox accounts offer the possibility of restoring earlier versions of a file. Therefore, it can be used to track changes, but it is not ideal from a developer's stand point. Using Dropbox as a backup is, of course, also a possibility to be considered here."
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--5972105c-5c74-4639-99e2-4bc2950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-07-21T14:35:14.000Z" ,
"modified" : "2017-07-21T14:35:14.000Z" ,
"first_observed" : "2017-07-21T14:35:14Z" ,
"last_observed" : "2017-07-21T14:35:14Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--5972105c-5c74-4639-99e2-4bc2950d210f"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--5972105c-5c74-4639-99e2-4bc2950d210f" ,
"value" : "https://file.gdatasoftware.com/web/en/documents/whitepaper/Rurktar.pdf"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5972107b-91b0-42f4-8e60-45f6950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-07-21T14:35:14.000Z" ,
"modified" : "2017-07-21T14:35:14.000Z" ,
"description" : "MSIL.Backdoor.Rurktar.A" ,
"pattern" : "[file:hashes.SHA256 = 'b4b75bda475ea58f2a5cf3329e311a70fa56745ba6cb2785523fa53139d4e37f']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-07-21T14:35:14Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5972107b-709c-4caa-be1f-425d950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-07-21T14:35:14.000Z" ,
"modified" : "2017-07-21T14:35:14.000Z" ,
"description" : "MSIL.Backdoor.Rurktar.A" ,
"pattern" : "[file:hashes.SHA256 = '54f25a6820b8a0e3fc26bdf4599e7db695ef7aefb7dcefaa2c2581bb58426a40']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-07-21T14:35:14Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5972107b-f3fc-4302-855f-48bc950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-07-21T14:35:14.000Z" ,
"modified" : "2017-07-21T14:35:14.000Z" ,
"description" : "MSIL.Backdoor.Rurktar.A" ,
"pattern" : "[file:hashes.SHA256 = '89110710eddd0da23ea206a6047c252bf1e16a2d1957729973d77a58219e614b']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-07-21T14:35:14Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5972107b-2858-4d4e-9fca-47a9950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-07-21T14:35:14.000Z" ,
"modified" : "2017-07-21T14:35:14.000Z" ,
"description" : "MSIL.Backdoor.Rurktar.A" ,
"pattern" : "[file:hashes.SHA256 = '618908e3d368301a323ee8ae7df867db8d7f5a98b513cfb8c961fb945e62a9b6']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-07-21T14:35:14Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--597210b0-4b54-4f70-be6a-47ab950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-07-21T14:35:14.000Z" ,
"modified" : "2017-07-21T14:35:14.000Z" ,
"pattern" : "[rule Rurktar\r\n{\r\nmeta:\r\nauthor = \"Nathan Stern\"\r\ndescription = \"Rurktar detection rule\"\r\nstrings:\r\n $a = \"FriendlyID\" wide ascii nocase\r\n $a2 = \"CaptureMode\" wide ascii nocase\r\n $a3 = \"CaptureStart\" wide ascii nocase\r\n $a4 = \"CaptureMonikerString\" wide ascii nocase\r\n $a5 = \"ACaptureMonikerString\" wide ascii nocase\r\n $a6 = \"VideoCap\" wide ascii nocase\r\n $a7 = \"SkipFrames\" wide ascii nocase\r\n $a8 = \"SkipDetectionFrames\" wide ascii nocase\r\n $a9 = \"SkipTakeFrames\" wide ascii nocase\r\n $a10 = \"DetectionPreBuffer\" wide ascii nocase\r\n $a11 = \"MaxCaptureFrames\" wide ascii nocase\r\n $a12 = \"MaxCaptureFolderSize\" wide ascii nocase\r\n $a13 = \"NetworkImageQ\" wide ascii nocase\r\n $a14 = \"CaptureDirectory\" wide ascii nocase\r\n $a15 = \"DefPass\" wide ascii nocase\r\n $a16 = \"CaptureStopProcess1\" wide ascii nocase\r\n $a17 = \"CaptureStopProcess2\" wide ascii nocase\r\n$a18 = \"DetectPorog\" wide ascii nocase\r\n $a19 = \"WatchFiles\" wide ascii nocase\r\n $a20 = \"AutoSendPreviews\" wide ascii nocase\r\n $a21 = \"ControlExt\" wide ascii nocase\r\n $a22 = \"SendOriginPreviews\" wide ascii nocase\r\n $a23 = \"CopyOriginsToCaptureDir\" wide ascii nocase\r\n $a24 = \"WatchProc\" wide ascii nocase\r\n $a25 = \"ScreenshotExt\" wide ascii nocase\r\n $a26 = \"ScreenshotAutoCapture\" wide ascii nocase\r\n $a27 = \"ScreenshotAutoStartProcess\" wide ascii nocase\r\n $a28 = \"ScreenshotPause\" wide ascii nocase\r\n $a29 = \"ProxyEnabled\" wide ascii nocase\r\n $b = \"\\\\R_C_S.ini\" wide ascii nocase\r\n $b2 = \"\\\\RCS.ini\" wide ascii nocase\r\n $b3 = \"RCS.log\" wide ascii nocase\r\n $b4 = \"RCSU.exe\" wide ascii nocase\r\n $b5 = \"RCS.log\" wide ascii nocase\r\n $c = \"?share*\" wide ascii nocase\r\n $c2 = \"?find*\" wide ascii nocase\r\n $c3 = \"user?\" wide ascii nocase\r\n $c4 = \"?prefs*\" wide ascii nocase\r\n $c5 = \"?type*abstract\" wide ascii nocase\r\n $c6 = \"?FriendlyID*\" wide ascii nocase\r\n $c7 = \"?disc*\" wide ascii nocase\r\ncondition:\r\n5 of ($a*) or\r\n3 of ($b*) or\r\n 4 of ($c*)\r\n}]" ,
"pattern_type" : "yara" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-07-21T14:35:14Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Artifacts dropped"
}
] ,
"labels" : [
"misp:type=\"yara\"" ,
"misp:category=\"Artifacts dropped\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59721123-362c-4a08-bc48-41fa02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-07-21T14:35:15.000Z" ,
"modified" : "2017-07-21T14:35:15.000Z" ,
"description" : "MSIL.Backdoor.Rurktar.A - Xchecked via VT: 618908e3d368301a323ee8ae7df867db8d7f5a98b513cfb8c961fb945e62a9b6" ,
"pattern" : "[file:hashes.SHA1 = 'a97716c9be9f903c5b797643e458c207ae1c8bee']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-07-21T14:35:15Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59721123-58c8-4a8f-a8d3-4c6202de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-07-21T14:35:15.000Z" ,
"modified" : "2017-07-21T14:35:15.000Z" ,
"description" : "MSIL.Backdoor.Rurktar.A - Xchecked via VT: 618908e3d368301a323ee8ae7df867db8d7f5a98b513cfb8c961fb945e62a9b6" ,
"pattern" : "[file:hashes.MD5 = '921b1b1d2f7a228e753fc43de1b3169c']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-07-21T14:35:15Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--59721123-2cc4-428d-9066-4d5302de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-07-21T14:35:15.000Z" ,
"modified" : "2017-07-21T14:35:15.000Z" ,
"first_observed" : "2017-07-21T14:35:15Z" ,
"last_observed" : "2017-07-21T14:35:15Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--59721123-2cc4-428d-9066-4d5302de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--59721123-2cc4-428d-9066-4d5302de0b81" ,
"value" : "https://www.virustotal.com/file/618908e3d368301a323ee8ae7df867db8d7f5a98b513cfb8c961fb945e62a9b6/analysis/1489348132/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59721123-ed14-4727-af44-417a02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-07-21T14:35:15.000Z" ,
"modified" : "2017-07-21T14:35:15.000Z" ,
"description" : "MSIL.Backdoor.Rurktar.A - Xchecked via VT: 89110710eddd0da23ea206a6047c252bf1e16a2d1957729973d77a58219e614b" ,
"pattern" : "[file:hashes.SHA1 = '77ce9ccf740d394e065ece52fc0f282686e672c1']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-07-21T14:35:15Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59721123-bfc0-4e7f-abef-48d502de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-07-21T14:35:15.000Z" ,
"modified" : "2017-07-21T14:35:15.000Z" ,
"description" : "MSIL.Backdoor.Rurktar.A - Xchecked via VT: 89110710eddd0da23ea206a6047c252bf1e16a2d1957729973d77a58219e614b" ,
"pattern" : "[file:hashes.MD5 = 'adcb921fa79845abbe3011237f227773']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-07-21T14:35:15Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--59721123-f4dc-4e0b-84ff-425e02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-07-21T14:35:15.000Z" ,
"modified" : "2017-07-21T14:35:15.000Z" ,
"first_observed" : "2017-07-21T14:35:15Z" ,
"last_observed" : "2017-07-21T14:35:15Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--59721123-f4dc-4e0b-84ff-425e02de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--59721123-f4dc-4e0b-84ff-425e02de0b81" ,
"value" : "https://www.virustotal.com/file/89110710eddd0da23ea206a6047c252bf1e16a2d1957729973d77a58219e614b/analysis/1489377772/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59721123-8ba0-4f4d-a717-416402de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-07-21T14:35:15.000Z" ,
"modified" : "2017-07-21T14:35:15.000Z" ,
"description" : "MSIL.Backdoor.Rurktar.A - Xchecked via VT: 54f25a6820b8a0e3fc26bdf4599e7db695ef7aefb7dcefaa2c2581bb58426a40" ,
"pattern" : "[file:hashes.SHA1 = '8ee7df7a432b9d1c12ac2dcc85a39686e8ade31e']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-07-21T14:35:15Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59721123-8bdc-4a5a-9093-49de02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-07-21T14:35:15.000Z" ,
"modified" : "2017-07-21T14:35:15.000Z" ,
"description" : "MSIL.Backdoor.Rurktar.A - Xchecked via VT: 54f25a6820b8a0e3fc26bdf4599e7db695ef7aefb7dcefaa2c2581bb58426a40" ,
"pattern" : "[file:hashes.MD5 = '9076a243f64f33841b27643ca71cca1c']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-07-21T14:35:15Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--59721123-1684-4902-b143-415a02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-07-21T14:35:15.000Z" ,
"modified" : "2017-07-21T14:35:15.000Z" ,
"first_observed" : "2017-07-21T14:35:15Z" ,
"last_observed" : "2017-07-21T14:35:15Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--59721123-1684-4902-b143-415a02de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--59721123-1684-4902-b143-415a02de0b81" ,
"value" : "https://www.virustotal.com/file/54f25a6820b8a0e3fc26bdf4599e7db695ef7aefb7dcefaa2c2581bb58426a40/analysis/1497208372/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59721123-3df4-4d16-8d55-463c02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-07-21T14:35:15.000Z" ,
"modified" : "2017-07-21T14:35:15.000Z" ,
"description" : "MSIL.Backdoor.Rurktar.A - Xchecked via VT: b4b75bda475ea58f2a5cf3329e311a70fa56745ba6cb2785523fa53139d4e37f" ,
"pattern" : "[file:hashes.SHA1 = 'd73470779ebef52d5b81cf9bfe3d28465b2879a3']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-07-21T14:35:15Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59721123-bf3c-4600-9378-426802de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-07-21T14:35:15.000Z" ,
"modified" : "2017-07-21T14:35:15.000Z" ,
"description" : "MSIL.Backdoor.Rurktar.A - Xchecked via VT: b4b75bda475ea58f2a5cf3329e311a70fa56745ba6cb2785523fa53139d4e37f" ,
"pattern" : "[file:hashes.MD5 = '684a21cf74dc35fd65b49f3468f2aad1']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-07-21T14:35:15Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--59721123-20e0-4420-9cea-4a7402de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-07-21T14:35:15.000Z" ,
"modified" : "2017-07-21T14:35:15.000Z" ,
"first_observed" : "2017-07-21T14:35:15Z" ,
"last_observed" : "2017-07-21T14:35:15Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--59721123-20e0-4420-9cea-4a7402de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--59721123-20e0-4420-9cea-4a7402de0b81" ,
"value" : "https://www.virustotal.com/file/b4b75bda475ea58f2a5cf3329e311a70fa56745ba6cb2785523fa53139d4e37f/analysis/1496056079/"
} ,
{
"type" : "marking-definition" ,
"spec_version" : "2.1" ,
"id" : "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ,
"created" : "2017-01-20T00:00:00.000Z" ,
"definition_type" : "tlp" ,
"name" : "TLP:WHITE" ,
"definition" : {
"tlp" : "white"
}
}
2023-04-21 13:25:09 +00:00
]
}