2023-04-21 13:25:09 +00:00
|
|
|
{
|
2023-06-14 17:31:25 +00:00
|
|
|
"type": "bundle",
|
|
|
|
"id": "bundle--5af9eb11-bba8-46ab-acc0-b75e0acd0835",
|
|
|
|
"objects": [
|
|
|
|
{
|
|
|
|
"type": "identity",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "identity--5a68c02d-959c-4c8a-a571-0dcac0a8060a",
|
|
|
|
"created": "2018-05-23T05:20:41.000Z",
|
|
|
|
"modified": "2018-05-23T05:20:41.000Z",
|
|
|
|
"name": "Synovus Financial",
|
|
|
|
"identity_class": "organization"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "report",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "report--5af9eb11-bba8-46ab-acc0-b75e0acd0835",
|
|
|
|
"created_by_ref": "identity--5a68c02d-959c-4c8a-a571-0dcac0a8060a",
|
|
|
|
"created": "2018-05-23T05:20:41.000Z",
|
|
|
|
"modified": "2018-05-23T05:20:41.000Z",
|
|
|
|
"name": "Panda Malware Broadens - F5 Blog",
|
|
|
|
"published": "2018-12-14T16:57:11Z",
|
|
|
|
"object_refs": [
|
|
|
|
"indicator--5af9eb27-4040-413f-a410-1e470acd0835",
|
|
|
|
"indicator--5af9eb28-4fcc-44fb-b425-1e470acd0835",
|
|
|
|
"indicator--5af9eb28-97fc-46e9-90cf-1e470acd0835",
|
|
|
|
"indicator--5af9eb28-81e4-43a0-a66a-1e470acd0835",
|
|
|
|
"indicator--5af9eb28-b864-4d7d-82b1-1e470acd0835",
|
|
|
|
"indicator--5af9eb28-22b4-47e7-9b73-1e470acd0835",
|
|
|
|
"indicator--5af9eb28-7bb8-439e-a475-1e470acd0835",
|
|
|
|
"indicator--5af9eb28-90bc-4ee8-bfd4-1e470acd0835",
|
|
|
|
"indicator--5af9eb28-9410-42ec-8588-1e470acd0835",
|
|
|
|
"observed-data--5af9eb83-e660-490e-89ea-bbfb0acd0835",
|
|
|
|
"url--5af9eb83-e660-490e-89ea-bbfb0acd0835"
|
|
|
|
],
|
|
|
|
"labels": [
|
|
|
|
"Threat-Report",
|
|
|
|
"misp:tool=\"MISP-STIX-Converter\"",
|
|
|
|
"misp-galaxy:banker=\"Panda Banker\"",
|
|
|
|
"osint:source-type=\"blog-post\"",
|
|
|
|
"ms-caro-malware-full:malware-family=\"Banker\""
|
|
|
|
],
|
|
|
|
"object_marking_refs": [
|
|
|
|
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "indicator",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "indicator--5af9eb27-4040-413f-a410-1e470acd0835",
|
|
|
|
"created_by_ref": "identity--5a68c02d-959c-4c8a-a571-0dcac0a8060a",
|
|
|
|
"created": "2018-05-14T20:03:55.000Z",
|
|
|
|
"modified": "2018-05-14T20:03:55.000Z",
|
|
|
|
"description": "Panda Banker",
|
|
|
|
"pattern": "[file:hashes.MD5 = 'e9d881b40d94a541b11fad44f1efbb7c']",
|
|
|
|
"pattern_type": "stix",
|
|
|
|
"pattern_version": "2.1",
|
|
|
|
"valid_from": "2018-05-14T20:03:55Z",
|
|
|
|
"kill_chain_phases": [
|
|
|
|
{
|
|
|
|
"kill_chain_name": "misp-category",
|
|
|
|
"phase_name": "Payload delivery"
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"labels": [
|
|
|
|
"misp:type=\"md5\"",
|
|
|
|
"misp:category=\"Payload delivery\"",
|
|
|
|
"misp:to_ids=\"True\"",
|
|
|
|
"ms-caro-malware-full:malware-family=\"Banker\""
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "indicator",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "indicator--5af9eb28-4fcc-44fb-b425-1e470acd0835",
|
|
|
|
"created_by_ref": "identity--5a68c02d-959c-4c8a-a571-0dcac0a8060a",
|
|
|
|
"created": "2018-05-14T20:03:56.000Z",
|
|
|
|
"modified": "2018-05-14T20:03:56.000Z",
|
|
|
|
"description": "Panda Banker",
|
|
|
|
"pattern": "[file:hashes.MD5 = '35a7e666942eb0c70e73d5dc502a97d2']",
|
|
|
|
"pattern_type": "stix",
|
|
|
|
"pattern_version": "2.1",
|
|
|
|
"valid_from": "2018-05-14T20:03:56Z",
|
|
|
|
"kill_chain_phases": [
|
|
|
|
{
|
|
|
|
"kill_chain_name": "misp-category",
|
|
|
|
"phase_name": "Payload delivery"
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"labels": [
|
|
|
|
"misp:type=\"md5\"",
|
|
|
|
"misp:category=\"Payload delivery\"",
|
|
|
|
"misp:to_ids=\"True\"",
|
|
|
|
"ms-caro-malware-full:malware-family=\"Banker\""
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "indicator",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "indicator--5af9eb28-97fc-46e9-90cf-1e470acd0835",
|
|
|
|
"created_by_ref": "identity--5a68c02d-959c-4c8a-a571-0dcac0a8060a",
|
|
|
|
"created": "2018-05-14T20:03:56.000Z",
|
|
|
|
"modified": "2018-05-14T20:03:56.000Z",
|
|
|
|
"description": "Panda Banker",
|
|
|
|
"pattern": "[file:hashes.MD5 = '3b78b983ed00cfa580c0b1c9beda4ca2']",
|
|
|
|
"pattern_type": "stix",
|
|
|
|
"pattern_version": "2.1",
|
|
|
|
"valid_from": "2018-05-14T20:03:56Z",
|
|
|
|
"kill_chain_phases": [
|
|
|
|
{
|
|
|
|
"kill_chain_name": "misp-category",
|
|
|
|
"phase_name": "Payload delivery"
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"labels": [
|
|
|
|
"misp:type=\"md5\"",
|
|
|
|
"misp:category=\"Payload delivery\"",
|
|
|
|
"misp:to_ids=\"True\"",
|
|
|
|
"ms-caro-malware-full:malware-family=\"Banker\""
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "indicator",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "indicator--5af9eb28-81e4-43a0-a66a-1e470acd0835",
|
|
|
|
"created_by_ref": "identity--5a68c02d-959c-4c8a-a571-0dcac0a8060a",
|
|
|
|
"created": "2018-05-14T20:03:56.000Z",
|
|
|
|
"modified": "2018-05-14T20:03:56.000Z",
|
|
|
|
"description": "Panda Banker",
|
|
|
|
"pattern": "[file:hashes.MD5 = '8822dc8e66b51344b623c6cd29a91db1']",
|
|
|
|
"pattern_type": "stix",
|
|
|
|
"pattern_version": "2.1",
|
|
|
|
"valid_from": "2018-05-14T20:03:56Z",
|
|
|
|
"kill_chain_phases": [
|
|
|
|
{
|
|
|
|
"kill_chain_name": "misp-category",
|
|
|
|
"phase_name": "Payload delivery"
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"labels": [
|
|
|
|
"misp:type=\"md5\"",
|
|
|
|
"misp:category=\"Payload delivery\"",
|
|
|
|
"misp:to_ids=\"True\"",
|
|
|
|
"ms-caro-malware-full:malware-family=\"Banker\""
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "indicator",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "indicator--5af9eb28-b864-4d7d-82b1-1e470acd0835",
|
|
|
|
"created_by_ref": "identity--5a68c02d-959c-4c8a-a571-0dcac0a8060a",
|
|
|
|
"created": "2018-05-14T20:03:56.000Z",
|
|
|
|
"modified": "2018-05-14T20:03:56.000Z",
|
|
|
|
"description": "Panda Banker",
|
|
|
|
"pattern": "[file:hashes.MD5 = '5d4c4668567b0b3321b0125779bdb3ae']",
|
|
|
|
"pattern_type": "stix",
|
|
|
|
"pattern_version": "2.1",
|
|
|
|
"valid_from": "2018-05-14T20:03:56Z",
|
|
|
|
"kill_chain_phases": [
|
|
|
|
{
|
|
|
|
"kill_chain_name": "misp-category",
|
|
|
|
"phase_name": "Payload delivery"
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"labels": [
|
|
|
|
"misp:type=\"md5\"",
|
|
|
|
"misp:category=\"Payload delivery\"",
|
|
|
|
"misp:to_ids=\"True\"",
|
|
|
|
"ms-caro-malware-full:malware-family=\"Banker\""
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "indicator",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "indicator--5af9eb28-22b4-47e7-9b73-1e470acd0835",
|
|
|
|
"created_by_ref": "identity--5a68c02d-959c-4c8a-a571-0dcac0a8060a",
|
|
|
|
"created": "2018-05-14T20:03:38.000Z",
|
|
|
|
"modified": "2018-05-14T20:03:38.000Z",
|
|
|
|
"description": "Panda Banker",
|
|
|
|
"pattern": "[url:value = 'https://0a109ec2ab47.com']",
|
|
|
|
"pattern_type": "stix",
|
|
|
|
"pattern_version": "2.1",
|
|
|
|
"valid_from": "2018-05-14T20:03:38Z",
|
|
|
|
"kill_chain_phases": [
|
|
|
|
{
|
|
|
|
"kill_chain_name": "misp-category",
|
|
|
|
"phase_name": "Network activity"
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"labels": [
|
|
|
|
"misp:type=\"url\"",
|
|
|
|
"misp:category=\"Network activity\"",
|
|
|
|
"misp:to_ids=\"True\"",
|
|
|
|
"veris:action:malware:variety=\"C2\""
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "indicator",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "indicator--5af9eb28-7bb8-439e-a475-1e470acd0835",
|
|
|
|
"created_by_ref": "identity--5a68c02d-959c-4c8a-a571-0dcac0a8060a",
|
|
|
|
"created": "2018-05-14T20:03:38.000Z",
|
|
|
|
"modified": "2018-05-14T20:03:38.000Z",
|
|
|
|
"description": "Panda Banker",
|
|
|
|
"pattern": "[url:value = 'https://adshiepkhach.top']",
|
|
|
|
"pattern_type": "stix",
|
|
|
|
"pattern_version": "2.1",
|
|
|
|
"valid_from": "2018-05-14T20:03:38Z",
|
|
|
|
"kill_chain_phases": [
|
|
|
|
{
|
|
|
|
"kill_chain_name": "misp-category",
|
|
|
|
"phase_name": "Network activity"
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"labels": [
|
|
|
|
"misp:type=\"url\"",
|
|
|
|
"misp:category=\"Network activity\"",
|
|
|
|
"misp:to_ids=\"True\"",
|
|
|
|
"veris:action:malware:variety=\"C2\""
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "indicator",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "indicator--5af9eb28-90bc-4ee8-bfd4-1e470acd0835",
|
|
|
|
"created_by_ref": "identity--5a68c02d-959c-4c8a-a571-0dcac0a8060a",
|
|
|
|
"created": "2018-05-14T20:03:38.000Z",
|
|
|
|
"modified": "2018-05-14T20:03:38.000Z",
|
|
|
|
"description": "Panda Banker",
|
|
|
|
"pattern": "[url:value = 'https://antrefurniture.top']",
|
|
|
|
"pattern_type": "stix",
|
|
|
|
"pattern_version": "2.1",
|
|
|
|
"valid_from": "2018-05-14T20:03:38Z",
|
|
|
|
"kill_chain_phases": [
|
|
|
|
{
|
|
|
|
"kill_chain_name": "misp-category",
|
|
|
|
"phase_name": "Network activity"
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"labels": [
|
|
|
|
"misp:type=\"url\"",
|
|
|
|
"misp:category=\"Network activity\"",
|
|
|
|
"misp:to_ids=\"True\"",
|
|
|
|
"veris:action:malware:variety=\"C2\""
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "indicator",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "indicator--5af9eb28-9410-42ec-8588-1e470acd0835",
|
|
|
|
"created_by_ref": "identity--5a68c02d-959c-4c8a-a571-0dcac0a8060a",
|
|
|
|
"created": "2018-05-14T20:03:38.000Z",
|
|
|
|
"modified": "2018-05-14T20:03:38.000Z",
|
|
|
|
"description": "Panda Banker",
|
|
|
|
"pattern": "[url:value = 'https://cotrus.co']",
|
|
|
|
"pattern_type": "stix",
|
|
|
|
"pattern_version": "2.1",
|
|
|
|
"valid_from": "2018-05-14T20:03:38Z",
|
|
|
|
"kill_chain_phases": [
|
|
|
|
{
|
|
|
|
"kill_chain_name": "misp-category",
|
|
|
|
"phase_name": "Network activity"
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"labels": [
|
|
|
|
"misp:type=\"url\"",
|
|
|
|
"misp:category=\"Network activity\"",
|
|
|
|
"misp:to_ids=\"True\"",
|
|
|
|
"veris:action:malware:variety=\"C2\""
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "observed-data",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "observed-data--5af9eb83-e660-490e-89ea-bbfb0acd0835",
|
|
|
|
"created_by_ref": "identity--5a68c02d-959c-4c8a-a571-0dcac0a8060a",
|
|
|
|
"created": "2018-05-14T20:03:15.000Z",
|
|
|
|
"modified": "2018-05-14T20:03:15.000Z",
|
|
|
|
"first_observed": "2018-05-14T20:03:15Z",
|
|
|
|
"last_observed": "2018-05-14T20:03:15Z",
|
|
|
|
"number_observed": 1,
|
|
|
|
"object_refs": [
|
|
|
|
"url--5af9eb83-e660-490e-89ea-bbfb0acd0835"
|
|
|
|
],
|
|
|
|
"labels": [
|
|
|
|
"misp:type=\"link\"",
|
|
|
|
"misp:category=\"External analysis\""
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "url",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "url--5af9eb83-e660-490e-89ea-bbfb0acd0835",
|
|
|
|
"value": "https://f5.com/labs/articles/threat-intelligence/malware/panda-malware-broadens-targets-to-cryptocurrency-exchanges-and-social-media?utm_source=securityweek"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "marking-definition",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
|
|
|
|
"created": "2017-01-20T00:00:00.000Z",
|
|
|
|
"definition_type": "tlp",
|
|
|
|
"name": "TLP:WHITE",
|
|
|
|
"definition": {
|
|
|
|
"tlp": "white"
|
|
|
|
}
|
|
|
|
}
|
2023-04-21 13:25:09 +00:00
|
|
|
]
|
|
|
|
}
|