2023-04-21 14:44:17 +00:00
{
"type" : "bundle" ,
"id" : "bundle--5b1ace23-25c0-4c98-b257-9cc8950d210f" ,
"objects" : [
{
"type" : "identity" ,
"spec_version" : "2.1" ,
"id" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T19:46:59.000Z" ,
"modified" : "2018-06-08T19:46:59.000Z" ,
"name" : "CIRCL" ,
"identity_class" : "organization"
} ,
{
"type" : "report" ,
"spec_version" : "2.1" ,
"id" : "report--5b1ace23-25c0-4c98-b257-9cc8950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T19:46:59.000Z" ,
"modified" : "2018-06-08T19:46:59.000Z" ,
"name" : "OSINT - InvisiMole: surprisingly equipped spyware, undercover since 2013" ,
"published" : "2018-06-08T19:47:06Z" ,
"object_refs" : [
"observed-data--5b1ace35-e620-4825-bf2e-5ae9950d210f" ,
"url--5b1ace35-e620-4825-bf2e-5ae9950d210f" ,
"x-misp-attribute--5b1ace4b-5578-4230-9fb5-9cd4950d210f" ,
"indicator--5b1ace60-d590-4f99-969f-bb64950d210f" ,
"indicator--5b1ace61-0534-458d-8af8-bb64950d210f" ,
"indicator--5b1ace61-7f54-4349-9100-bb64950d210f" ,
"indicator--5b1ace62-fbc8-4b2f-9d24-bb64950d210f" ,
"indicator--5b1ace62-41ac-4fbe-a887-bb64950d210f" ,
"indicator--5b1acf12-34bc-4413-8203-5ae9950d210f" ,
"indicator--5b1acf12-bfbc-48ec-8748-5ae9950d210f" ,
"indicator--5b1acf13-cd78-4d22-816e-5ae9950d210f" ,
"indicator--5b1acf13-3228-47ae-b2cb-5ae9950d210f" ,
"indicator--5b1acf14-f6ec-49b6-b202-5ae9950d210f" ,
"indicator--5b1acf14-bc4c-45e7-906e-5ae9950d210f" ,
"indicator--5b1acf14-bbec-4f33-a31d-5ae9950d210f" ,
"indicator--5b1acf15-9950-483f-893b-5ae9950d210f" ,
"indicator--5b1acf15-66f4-46e8-9ce5-5ae9950d210f" ,
"indicator--5b1acf16-63b4-4024-8118-5ae9950d210f" ,
"indicator--5b1acf16-fbd4-46f0-b85b-5ae9950d210f" ,
"indicator--5b1acf36-10e0-40dd-ada5-9ddc950d210f" ,
"indicator--5b1acf36-ed10-4d47-9ae7-9ddc950d210f" ,
"indicator--5b1acf37-64fc-4c56-bd2b-9ddc950d210f" ,
"indicator--5b1acf37-41fc-46e9-b18d-9ddc950d210f" ,
"indicator--5b1acf38-9420-4075-9b47-9ddc950d210f" ,
"x-misp-attribute--5b1acf47-9ebc-4f6a-a1ea-43fb950d210f" ,
"x-misp-attribute--5b1acf47-5f08-4e3d-b95e-4aec950d210f" ,
"x-misp-attribute--5b1acf47-d580-4fe4-ac23-4400950d210f" ,
"x-misp-attribute--5b1acf47-5300-45e2-996e-4c66950d210f" ,
"x-misp-attribute--5b1acf47-e278-4e65-af1f-4458950d210f" ,
"x-misp-attribute--5b1acf47-75d8-4232-913a-40aa950d210f" ,
"x-misp-attribute--5b1acf47-ed18-489a-9699-460b950d210f" ,
"indicator--5b1acf81-6b60-4689-99aa-4184950d210f" ,
"indicator--5b1acf81-d6c4-452a-a6ad-45bb950d210f" ,
"indicator--5b1acf81-d07c-4190-932b-46e9950d210f" ,
"x-misp-object--e26da548-11e0-4052-9746-f7814d8e11b9" ,
"x-misp-object--d2836a0a-7b84-44c6-91b9-af25d4d73791" ,
2023-05-19 09:05:37 +00:00
"relationship--af79432d-fa89-44b2-bc98-13ebf06ed213"
2023-04-21 14:44:17 +00:00
] ,
"labels" : [
"Threat-Report" ,
"misp:tool=\"MISP-STIX-Converter\"" ,
"osint:source-type=\"blog-post\""
] ,
"object_marking_refs" : [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--5b1ace35-e620-4825-bf2e-5ae9950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:43:01.000Z" ,
"modified" : "2018-06-08T18:43:01.000Z" ,
"first_observed" : "2018-06-08T18:43:01Z" ,
"last_observed" : "2018-06-08T18:43:01Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--5b1ace35-e620-4825-bf2e-5ae9950d210f"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--5b1ace35-e620-4825-bf2e-5ae9950d210f" ,
"value" : "https://www.welivesecurity.com/2018/06/07/invisimole-equipped-spyware-undercover/"
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--5b1ace4b-5578-4230-9fb5-9cd4950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:43:23.000Z" ,
"modified" : "2018-06-08T18:43:23.000Z" ,
"labels" : [
"misp:type=\"text\"" ,
"misp:category=\"External analysis\""
] ,
"x_misp_category" : "External analysis" ,
"x_misp_type" : "text" ,
"x_misp_value" : "This is the modus operandi of the two malicious components of InvisiMole. They turn the affected computer into a video camera, letting the attackers see and hear what\u00e2\u20ac\u2122s going on in the victim\u00e2\u20ac\u2122s office or wherever their device may be. Uninvited, InvisiMole\u00e2\u20ac\u2122s operators access the system, closely monitoring the victim\u00e2\u20ac\u2122s activities and stealing the victim\u00e2\u20ac\u2122s secrets.\r\n\r\nOur telemetry indicates that the malicious actors behind this malware have been active at least since 2013, yet the cyber-espionage tool was never analyzed nor detected until discovered by ESET products on compromised computers in Ukraine and Russia.\r\n\r\nThe campaign is highly targeted \u00e2\u20ac\u201c no wonder the malware has a low infection ratio, with only a few dozen computers being affected.\r\n\r\nInvisiMole has a modular architecture, starting its journey with a wrapper DLL, and performing its activities using two other modules that are embedded in its resources. Both of the modules are feature-rich backdoors, which together give it the ability to gather as much information about the target as possible.\r\n\r\nExtra measures are taken to avoid attracting the attention of the compromised user, enabling the malware to reside on the system for a longer period of time. How the spyware was spread to the infected machines is yet to be determined by further investigation. All infection vectors are possible, including installation facilitated by physical access to the machine."
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b1ace60-d590-4f99-969f-bb64950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:43:44.000Z" ,
"modified" : "2018-06-08T18:43:44.000Z" ,
"pattern" : "[domain-name:value = 'activationstate.sytes.net']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-06-08T18:43:44Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"hostname\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b1ace61-0534-458d-8af8-bb64950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:43:45.000Z" ,
"modified" : "2018-06-08T18:43:45.000Z" ,
"pattern" : "[domain-name:value = 'advstatecheck.sytes.net']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-06-08T18:43:45Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"hostname\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b1ace61-7f54-4349-9100-bb64950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:43:45.000Z" ,
"modified" : "2018-06-08T18:43:45.000Z" ,
"pattern" : "[domain-name:value = 'akamai.sytes.net']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-06-08T18:43:45Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"hostname\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b1ace62-fbc8-4b2f-9d24-bb64950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:43:46.000Z" ,
"modified" : "2018-06-08T18:43:46.000Z" ,
"pattern" : "[domain-name:value = 'statbfnl.sytes.net']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-06-08T18:43:46Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"hostname\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b1ace62-41ac-4fbe-a887-bb64950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:43:46.000Z" ,
"modified" : "2018-06-08T18:43:46.000Z" ,
"pattern" : "[domain-name:value = 'updchecking.sytes.net']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-06-08T18:43:46Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"hostname\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b1acf12-34bc-4413-8203-5ae9950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:46:42.000Z" ,
"modified" : "2018-06-08T18:46:42.000Z" ,
"description" : "2013-2014 - InvisiMole\u00e2\u20ac\u2122s C&C servers IP addresses" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.165.231.85']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-06-08T18:46:42Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b1acf12-bfbc-48ec-8748-5ae9950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:46:42.000Z" ,
"modified" : "2018-06-08T18:46:42.000Z" ,
"description" : "2013-2014 - InvisiMole\u00e2\u20ac\u2122s C&C servers IP addresses" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.239.220.41']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-06-08T18:46:42Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b1acf13-cd78-4d22-816e-5ae9950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:46:43.000Z" ,
"modified" : "2018-06-08T18:46:43.000Z" ,
"description" : "2014-2017 - InvisiMole\u00e2\u20ac\u2122s C&C servers IP addresses" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.165.241.129']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-06-08T18:46:43Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b1acf13-3228-47ae-b2cb-5ae9950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:46:43.000Z" ,
"modified" : "2018-06-08T18:46:43.000Z" ,
"description" : "2014-2016 - InvisiMole\u00e2\u20ac\u2122s C&C servers IP addresses" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.165.241.153']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-06-08T18:46:43Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b1acf14-f6ec-49b6-b202-5ae9950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:46:44.000Z" ,
"modified" : "2018-06-08T18:46:44.000Z" ,
"description" : "2014-2018 - InvisiMole\u00e2\u20ac\u2122s C&C servers IP addresses" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.46.35.74']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-06-08T18:46:44Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b1acf14-bc4c-45e7-906e-5ae9950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:46:44.000Z" ,
"modified" : "2018-06-08T18:46:44.000Z" ,
"description" : "2016-2016 - InvisiMole\u00e2\u20ac\u2122s C&C servers IP addresses" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.215.111.109']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-06-08T18:46:44Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b1acf14-bbec-4f33-a31d-5ae9950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:46:44.000Z" ,
"modified" : "2018-06-08T18:46:44.000Z" ,
"description" : "2016-2018 - InvisiMole\u00e2\u20ac\u2122s C&C servers IP addresses" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '185.118.66.163']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-06-08T18:46:44Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b1acf15-9950-483f-893b-5ae9950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:46:45.000Z" ,
"modified" : "2018-06-08T18:46:45.000Z" ,
"description" : "2017-2017 - InvisiMole\u00e2\u20ac\u2122s C&C servers IP addresses" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '185.118.67.233']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-06-08T18:46:45Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b1acf15-66f4-46e8-9ce5-5ae9950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:46:45.000Z" ,
"modified" : "2018-06-08T18:46:45.000Z" ,
"description" : "2017-2018 - InvisiMole\u00e2\u20ac\u2122s C&C servers IP addresses" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '185.156.173.92']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-06-08T18:46:45Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b1acf16-63b4-4024-8118-5ae9950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:46:46.000Z" ,
"modified" : "2018-06-08T18:46:46.000Z" ,
"description" : "2018-2018 - InvisiMole\u00e2\u20ac\u2122s C&C servers IP addresses" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.165.230.241']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-06-08T18:46:46Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b1acf16-fbd4-46f0-b85b-5ae9950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:46:46.000Z" ,
"modified" : "2018-06-08T18:46:46.000Z" ,
"description" : "2018-2018 - InvisiMole\u00e2\u20ac\u2122s C&C servers IP addresses" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '194.187.249.157']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-06-08T18:46:46Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b1acf36-10e0-40dd-ada5-9ddc950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:47:18.000Z" ,
"modified" : "2018-06-08T18:47:18.000Z" ,
"pattern" : "[file:hashes.SHA1 = '5ee6e0410052029eafa10d1669ae3aa04b508bf9']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-06-08T18:47:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b1acf36-ed10-4d47-9ae7-9ddc950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:47:18.000Z" ,
"modified" : "2018-06-08T18:47:18.000Z" ,
"pattern" : "[file:hashes.SHA1 = '2fcc87ab226f4a1cc713b13a12421468c82cd586']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-06-08T18:47:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b1acf37-64fc-4c56-bd2b-9ddc950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:47:19.000Z" ,
"modified" : "2018-06-08T18:47:19.000Z" ,
"pattern" : "[file:hashes.SHA1 = 'b6ba65a48ffeb800c29822265190b8eaea3935b1']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-06-08T18:47:19Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b1acf37-41fc-46e9-b18d-9ddc950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:47:19.000Z" ,
"modified" : "2018-06-08T18:47:19.000Z" ,
"pattern" : "[file:hashes.SHA1 = 'c8c4b6bcb4b583ba69663ec3aed8e1e01f310f9f']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-06-08T18:47:19Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b1acf38-9420-4075-9b47-9ddc950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:47:20.000Z" ,
"modified" : "2018-06-08T18:47:20.000Z" ,
"pattern" : "[file:hashes.SHA1 = 'a5a20bc333f22fd89c34a532680173cbcd287ff8']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-06-08T18:47:20Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--5b1acf47-9ebc-4f6a-a1ea-43fb950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:47:35.000Z" ,
"modified" : "2018-06-08T18:47:35.000Z" ,
"labels" : [
"misp:type=\"text\"" ,
"misp:category=\"Antivirus detection\""
] ,
"x_misp_category" : "Antivirus detection" ,
"x_misp_type" : "text" ,
"x_misp_value" : "Win32/InvisiMole.A"
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--5b1acf47-5f08-4e3d-b95e-4aec950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:47:35.000Z" ,
"modified" : "2018-06-08T18:47:35.000Z" ,
"labels" : [
"misp:type=\"text\"" ,
"misp:category=\"Antivirus detection\""
] ,
"x_misp_category" : "Antivirus detection" ,
"x_misp_type" : "text" ,
"x_misp_value" : "Win32/InvisiMole.B"
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--5b1acf47-d580-4fe4-ac23-4400950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:47:35.000Z" ,
"modified" : "2018-06-08T18:47:35.000Z" ,
"labels" : [
"misp:type=\"text\"" ,
"misp:category=\"Antivirus detection\""
] ,
"x_misp_category" : "Antivirus detection" ,
"x_misp_type" : "text" ,
"x_misp_value" : "Win32/InvisiMole.C"
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--5b1acf47-5300-45e2-996e-4c66950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:47:35.000Z" ,
"modified" : "2018-06-08T18:47:35.000Z" ,
"labels" : [
"misp:type=\"text\"" ,
"misp:category=\"Antivirus detection\""
] ,
"x_misp_category" : "Antivirus detection" ,
"x_misp_type" : "text" ,
"x_misp_value" : "Win32/InvisiMole.D"
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--5b1acf47-e278-4e65-af1f-4458950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:47:35.000Z" ,
"modified" : "2018-06-08T18:47:35.000Z" ,
"labels" : [
"misp:type=\"text\"" ,
"misp:category=\"Antivirus detection\""
] ,
"x_misp_category" : "Antivirus detection" ,
"x_misp_type" : "text" ,
"x_misp_value" : "Win64/InvisiMole.B"
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--5b1acf47-75d8-4232-913a-40aa950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:47:35.000Z" ,
"modified" : "2018-06-08T18:47:35.000Z" ,
"labels" : [
"misp:type=\"text\"" ,
"misp:category=\"Antivirus detection\""
] ,
"x_misp_category" : "Antivirus detection" ,
"x_misp_type" : "text" ,
"x_misp_value" : "Win64/InvisiMole.C"
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--5b1acf47-ed18-489a-9699-460b950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:47:35.000Z" ,
"modified" : "2018-06-08T18:47:35.000Z" ,
"labels" : [
"misp:type=\"text\"" ,
"misp:category=\"Antivirus detection\""
] ,
"x_misp_category" : "Antivirus detection" ,
"x_misp_type" : "text" ,
"x_misp_value" : "Win64/InvisiMole.D"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b1acf81-6b60-4689-99aa-4184950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:48:33.000Z" ,
"modified" : "2018-06-08T18:48:33.000Z" ,
"pattern" : "[file:name = '\\\\%APPDATA\\\\%\\\\Microsoft\\\\Internet Explorer\\\\Cache\\\\AMB6HER8\\\\']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-06-08T18:48:33Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Artifacts dropped"
}
] ,
"labels" : [
"misp:type=\"filename\"" ,
"misp:category=\"Artifacts dropped\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b1acf81-d6c4-452a-a6ad-45bb950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:48:33.000Z" ,
"modified" : "2018-06-08T18:48:33.000Z" ,
"pattern" : "[file:name = '\\\\%APPDATA\\\\%\\\\Microsoft\\\\Internet Explorer\\\\Cache\\\\MX0ROSB1\\\\']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-06-08T18:48:33Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Artifacts dropped"
}
] ,
"labels" : [
"misp:type=\"filename\"" ,
"misp:category=\"Artifacts dropped\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b1acf81-d07c-4190-932b-46e9950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:48:33.000Z" ,
"modified" : "2018-06-08T18:48:33.000Z" ,
"pattern" : "[file:name = '\\\\%APPDATA\\\\%\\\\Microsoft\\\\Internet Explorer\\\\Cache\\\\index0.dat']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-06-08T18:48:33Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Artifacts dropped"
}
] ,
"labels" : [
"misp:type=\"filename\"" ,
"misp:category=\"Artifacts dropped\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--e26da548-11e0-4052-9746-f7814d8e11b9" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:49:50.000Z" ,
"modified" : "2018-06-08T18:49:50.000Z" ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\""
] ,
"x_misp_meta_category" : "file" ,
"x_misp_name" : "file"
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--d2836a0a-7b84-44c6-91b9-af25d4d73791" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-06-08T18:49:48.000Z" ,
"modified" : "2018-06-08T18:49:48.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2023-05-19 09:05:37 +00:00
"id" : "relationship--af79432d-fa89-44b2-bc98-13ebf06ed213" ,
2023-04-21 14:44:17 +00:00
"created" : "2018-06-08T18:49:49.000Z" ,
"modified" : "2018-06-08T18:49:49.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "x-misp-object--e26da548-11e0-4052-9746-f7814d8e11b9" ,
"target_ref" : "x-misp-object--d2836a0a-7b84-44c6-91b9-af25d4d73791"
} ,
{
"type" : "marking-definition" ,
"spec_version" : "2.1" ,
"id" : "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ,
"created" : "2017-01-20T00:00:00.000Z" ,
"definition_type" : "tlp" ,
"name" : "TLP:WHITE" ,
"definition" : {
"tlp" : "white"
}
}
]
}