2023-04-21 13:25:09 +00:00
|
|
|
{
|
2023-06-14 17:31:25 +00:00
|
|
|
"type": "bundle",
|
|
|
|
"id": "bundle--5e211b87-8f34-43f5-b02b-42e4950d210f",
|
|
|
|
"objects": [
|
|
|
|
{
|
|
|
|
"type": "identity",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
|
|
|
|
"created": "2020-01-31T07:38:46.000Z",
|
|
|
|
"modified": "2020-01-31T07:38:46.000Z",
|
|
|
|
"name": "wilbursecurity.com",
|
|
|
|
"identity_class": "organization"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "report",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "report--5e211b87-8f34-43f5-b02b-42e4950d210f",
|
|
|
|
"created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
|
|
|
|
"created": "2020-01-31T07:38:46.000Z",
|
|
|
|
"modified": "2020-01-31T07:38:46.000Z",
|
|
|
|
"name": "Ako Ransomware",
|
|
|
|
"published": "2020-01-31T07:39:04Z",
|
|
|
|
"object_refs": [
|
|
|
|
"indicator--5e211d3f-2db0-45f0-bfe5-479c950d210f",
|
|
|
|
"indicator--5e211d40-5edc-4756-8ccc-4d80950d210f",
|
|
|
|
"indicator--5e211d40-bd24-496b-b4e7-448f950d210f",
|
|
|
|
"x-misp-attribute--5e211ea9-58d4-4ef9-a5ef-40d7950d210f",
|
|
|
|
"observed-data--5e211f10-6480-42ab-8b19-4de9950d210f",
|
|
|
|
"url--5e211f10-6480-42ab-8b19-4de9950d210f",
|
|
|
|
"observed-data--5e211f39-d0a8-43d2-8995-48cf950d210f",
|
|
|
|
"network-traffic--5e211f39-d0a8-43d2-8995-48cf950d210f",
|
|
|
|
"ipv4-addr--5e211f39-d0a8-43d2-8995-48cf950d210f",
|
|
|
|
"x-misp-attribute--5e211f8e-94cc-4067-b97f-485f950d210f",
|
|
|
|
"observed-data--5e213034-de04-4974-820b-4b35950d210f",
|
|
|
|
"url--5e213034-de04-4974-820b-4b35950d210f",
|
|
|
|
"indicator--5e21d353-e354-456a-ba6b-4647950d210f",
|
|
|
|
"indicator--5e21d432-c228-4d2c-8d51-43ab950d210f"
|
|
|
|
],
|
|
|
|
"labels": [
|
|
|
|
"Threat-Report",
|
|
|
|
"misp:tool=\"MISP-STIX-Converter\"",
|
|
|
|
" Ransomware"
|
|
|
|
],
|
|
|
|
"object_marking_refs": [
|
|
|
|
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "indicator",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "indicator--5e211d3f-2db0-45f0-bfe5-479c950d210f",
|
|
|
|
"created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
|
|
|
|
"created": "2020-01-17T02:34:39.000Z",
|
|
|
|
"modified": "2020-01-17T02:34:39.000Z",
|
|
|
|
"description": "Locker.exe",
|
|
|
|
"pattern": "[file:hashes.SHA256 = 'ae8e02d15c9b45a751e4e7f177f27f5ba7663fe6ec4b53cc68a6c1f5c2a3cfd9']",
|
|
|
|
"pattern_type": "stix",
|
|
|
|
"pattern_version": "2.1",
|
|
|
|
"valid_from": "2020-01-17T02:34:39Z",
|
|
|
|
"kill_chain_phases": [
|
|
|
|
{
|
|
|
|
"kill_chain_name": "misp-category",
|
|
|
|
"phase_name": "Payload installation"
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"labels": [
|
|
|
|
"misp:type=\"sha256\"",
|
|
|
|
"misp:category=\"Payload installation\"",
|
|
|
|
"misp:to_ids=\"True\""
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "indicator",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "indicator--5e211d40-5edc-4756-8ccc-4d80950d210f",
|
|
|
|
"created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
|
|
|
|
"created": "2020-01-17T02:34:40.000Z",
|
|
|
|
"modified": "2020-01-17T02:34:40.000Z",
|
|
|
|
"description": "Locker.exe",
|
|
|
|
"pattern": "[file:hashes.SHA1 = 'c0501e264531f29854bdaa872eb12c30b5875200']",
|
|
|
|
"pattern_type": "stix",
|
|
|
|
"pattern_version": "2.1",
|
|
|
|
"valid_from": "2020-01-17T02:34:40Z",
|
|
|
|
"kill_chain_phases": [
|
|
|
|
{
|
|
|
|
"kill_chain_name": "misp-category",
|
|
|
|
"phase_name": "Payload installation"
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"labels": [
|
|
|
|
"misp:type=\"sha1\"",
|
|
|
|
"misp:category=\"Payload installation\"",
|
|
|
|
"misp:to_ids=\"True\""
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "indicator",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "indicator--5e211d40-bd24-496b-b4e7-448f950d210f",
|
|
|
|
"created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
|
|
|
|
"created": "2020-01-17T02:34:40.000Z",
|
|
|
|
"modified": "2020-01-17T02:34:40.000Z",
|
|
|
|
"description": "Locker.exe",
|
|
|
|
"pattern": "[file:hashes.MD5 = 'ef2697aa224266b204127722771bc209']",
|
|
|
|
"pattern_type": "stix",
|
|
|
|
"pattern_version": "2.1",
|
|
|
|
"valid_from": "2020-01-17T02:34:40Z",
|
|
|
|
"kill_chain_phases": [
|
|
|
|
{
|
|
|
|
"kill_chain_name": "misp-category",
|
|
|
|
"phase_name": "Payload installation"
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"labels": [
|
|
|
|
"misp:type=\"md5\"",
|
|
|
|
"misp:category=\"Payload installation\"",
|
|
|
|
"misp:to_ids=\"True\""
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "x-misp-attribute",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "x-misp-attribute--5e211ea9-58d4-4ef9-a5ef-40d7950d210f",
|
|
|
|
"created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
|
|
|
|
"created": "2020-01-17T02:45:16.000Z",
|
|
|
|
"modified": "2020-01-17T02:45:16.000Z",
|
|
|
|
"labels": [
|
|
|
|
"misp:type=\"other\"",
|
|
|
|
"misp:category=\"Other\""
|
|
|
|
],
|
|
|
|
"x_misp_category": "Other",
|
|
|
|
"x_misp_type": "other",
|
|
|
|
"x_misp_value": "Commands Run\r\nvssadmin.exe Delete Shadows /All /Quiet\r\nbcdedit.exe /set {default} recoveryenabled No\r\nbcdedit.exe /set {default} bootstatuspolicy ignoreallfailures\r\nwbadmin DELETE SYSTEMSTATEBACKUP\r\nwbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest\r\nwmic.exe SHADOWCOPY /nointeractive"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "observed-data",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "observed-data--5e211f10-6480-42ab-8b19-4de9950d210f",
|
|
|
|
"created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
|
|
|
|
"created": "2020-01-17T15:27:16.000Z",
|
|
|
|
"modified": "2020-01-17T15:27:16.000Z",
|
|
|
|
"first_observed": "2020-01-17T15:27:16Z",
|
|
|
|
"last_observed": "2020-01-17T15:27:16Z",
|
|
|
|
"number_observed": 1,
|
|
|
|
"object_refs": [
|
|
|
|
"url--5e211f10-6480-42ab-8b19-4de9950d210f"
|
|
|
|
],
|
|
|
|
"labels": [
|
|
|
|
"misp:type=\"link\"",
|
|
|
|
"misp:category=\"External analysis\""
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "url",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "url--5e211f10-6480-42ab-8b19-4de9950d210f",
|
|
|
|
"value": "https://app.any.run/tasks/5f4740c6-023a-4214-a96a-97b05e8b440e/"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "observed-data",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "observed-data--5e211f39-d0a8-43d2-8995-48cf950d210f",
|
|
|
|
"created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
|
|
|
|
"created": "2020-01-17T02:43:05.000Z",
|
|
|
|
"modified": "2020-01-17T02:43:05.000Z",
|
|
|
|
"first_observed": "2020-01-17T02:43:05Z",
|
|
|
|
"last_observed": "2020-01-17T02:43:05Z",
|
|
|
|
"number_observed": 1,
|
|
|
|
"object_refs": [
|
|
|
|
"network-traffic--5e211f39-d0a8-43d2-8995-48cf950d210f",
|
|
|
|
"ipv4-addr--5e211f39-d0a8-43d2-8995-48cf950d210f"
|
|
|
|
],
|
|
|
|
"labels": [
|
|
|
|
"misp:type=\"ip-src\"",
|
|
|
|
"misp:category=\"Network activity\""
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "network-traffic",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "network-traffic--5e211f39-d0a8-43d2-8995-48cf950d210f",
|
|
|
|
"src_ref": "ipv4-addr--5e211f39-d0a8-43d2-8995-48cf950d210f",
|
|
|
|
"protocols": [
|
|
|
|
"tcp"
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "ipv4-addr",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "ipv4-addr--5e211f39-d0a8-43d2-8995-48cf950d210f",
|
|
|
|
"value": "185.167.160.83"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "x-misp-attribute",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "x-misp-attribute--5e211f8e-94cc-4067-b97f-485f950d210f",
|
|
|
|
"created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
|
|
|
|
"created": "2020-01-17T15:27:10.000Z",
|
|
|
|
"modified": "2020-01-17T15:27:10.000Z",
|
|
|
|
"labels": [
|
|
|
|
"misp:type=\"other\"",
|
|
|
|
"misp:category=\"Other\""
|
|
|
|
],
|
|
|
|
"x_misp_category": "Other",
|
|
|
|
"x_misp_type": "other",
|
|
|
|
"x_misp_value": "Tor Ransom page\r\n\r\nhttp://kwvhrdibgmmpkhkidrby4mccwqpds5za6uo2thcw5gz75qncv7rbhyad.onion/C2SNJM7PHLUI0QQV"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "observed-data",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "observed-data--5e213034-de04-4974-820b-4b35950d210f",
|
|
|
|
"created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
|
|
|
|
"created": "2020-01-17T15:41:31.000Z",
|
|
|
|
"modified": "2020-01-17T15:41:31.000Z",
|
|
|
|
"first_observed": "2020-01-17T15:41:31Z",
|
|
|
|
"last_observed": "2020-01-17T15:41:31Z",
|
|
|
|
"number_observed": 1,
|
|
|
|
"object_refs": [
|
|
|
|
"url--5e213034-de04-4974-820b-4b35950d210f"
|
|
|
|
],
|
|
|
|
"labels": [
|
|
|
|
"misp:type=\"link\"",
|
|
|
|
"misp:category=\"External analysis\""
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "url",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "url--5e213034-de04-4974-820b-4b35950d210f",
|
|
|
|
"value": "https://wilbursecurity.com/2020/01/ako-ransomware"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "indicator",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "indicator--5e21d353-e354-456a-ba6b-4647950d210f",
|
|
|
|
"created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
|
|
|
|
"created": "2020-01-17T15:44:10.000Z",
|
|
|
|
"modified": "2020-01-17T15:44:10.000Z",
|
|
|
|
"pattern": "[windows-registry-key:key = 'HKLM\\\\SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Policies\\\\System' AND windows-registry-key:values[0].data = '1' AND windows-registry-key:values[0].name = 'EnableLinkedConnections']",
|
|
|
|
"pattern_type": "stix",
|
|
|
|
"pattern_version": "2.1",
|
|
|
|
"valid_from": "2020-01-17T15:44:10Z",
|
|
|
|
"kill_chain_phases": [
|
|
|
|
{
|
|
|
|
"kill_chain_name": "misp-category",
|
|
|
|
"phase_name": "file"
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"labels": [
|
|
|
|
"misp:name=\"registry-key\"",
|
|
|
|
"misp:meta-category=\"file\"",
|
|
|
|
"misp:to_ids=\"True\""
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "indicator",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "indicator--5e21d432-c228-4d2c-8d51-43ab950d210f",
|
|
|
|
"created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
|
|
|
|
"created": "2020-01-17T15:35:14.000Z",
|
|
|
|
"modified": "2020-01-17T15:35:14.000Z",
|
|
|
|
"pattern": "[windows-registry-key:key = 'HKEY_CURRENT_USER\\\\Software\\\\acfg' AND windows-registry-key:values[0].data = '.(randomly generated key)' AND windows-registry-key:values[0].name = 'aid']",
|
|
|
|
"pattern_type": "stix",
|
|
|
|
"pattern_version": "2.1",
|
|
|
|
"valid_from": "2020-01-17T15:35:14Z",
|
|
|
|
"kill_chain_phases": [
|
|
|
|
{
|
|
|
|
"kill_chain_name": "misp-category",
|
|
|
|
"phase_name": "file"
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"labels": [
|
|
|
|
"misp:name=\"registry-key\"",
|
|
|
|
"misp:meta-category=\"file\"",
|
|
|
|
"misp:to_ids=\"True\""
|
|
|
|
]
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"type": "marking-definition",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
|
|
|
|
"created": "2017-01-20T00:00:00.000Z",
|
|
|
|
"definition_type": "tlp",
|
|
|
|
"name": "TLP:WHITE",
|
|
|
|
"definition": {
|
|
|
|
"tlp": "white"
|
|
|
|
}
|
|
|
|
}
|
2023-04-21 13:25:09 +00:00
|
|
|
]
|
|
|
|
}
|