2023-04-21 13:25:09 +00:00
{
2023-12-14 14:30:15 +00:00
"Event" : {
"analysis" : "2" ,
"date" : "2018-01-09" ,
"extends_uuid" : "" ,
"info" : "OSINT - A North Korean Monero Cryptocurrency Miner" ,
"publish_timestamp" : "1515696548" ,
"published" : true ,
"threat_level_id" : "3" ,
"timestamp" : "1515553226" ,
"uuid" : "5a54778c-3dac-4d36-b7c3-4d6e02de0b81" ,
"Orgc" : {
"name" : "CIRCL" ,
"uuid" : "55f6ea5e-2c60-40e5-964f-47a8950d210f"
} ,
"Tag" : [
{
"colour" : "#ffffff" ,
"local" : "0" ,
"name" : "tlp:white" ,
"relationship_type" : ""
} ,
{
"colour" : "#0fc000" ,
"local" : "0" ,
"name" : "admiralty-scale:information-credibility=\"2\"" ,
"relationship_type" : ""
} ,
{
"colour" : "#00223b" ,
"local" : "0" ,
"name" : "osint:source-type=\"blog-post\"" ,
"relationship_type" : ""
}
] ,
"Attribute" : [
{
"category" : "External analysis" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : false ,
"timestamp" : "1515485524" ,
"to_ids" : false ,
"type" : "link" ,
"uuid" : "5a54779b-451c-4777-a15d-573002de0b81" ,
"value" : "https://www.alienvault.com/blogs/labs-research/a-north-korean-monero-cryptocurrency-miner" ,
"Tag" : [
{
"colour" : "#00223b" ,
"local" : "0" ,
"name" : "osint:source-type=\"blog-post\"" ,
"relationship_type" : ""
}
]
} ,
{
"category" : "External analysis" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : false ,
"timestamp" : "1515485524" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5a5477ad-63d4-443a-a0d0-b52402de0b81" ,
"value" : "AlienVault labs recently analysed an application compiled on Christmas Eve 2017. It is an Installer for software to mine the Monero crypto-currency. Any mined currency is sent to Kim Il Sung University in Pyongyang, North Korea.\r\n\r\nThe Installer copies a file named intelservice.exe to the system. The filename intelservice.exe is often associated with crypto-currency mining malware. Based on the arguments it\u00e2\u20ac\u2122s executed with, it\u00e2\u20ac\u2122s likely a piece of software called xmrig. \r\n\r\nIt\u00e2\u20ac\u2122s not unusual to see xmrig in malware campaigns. It was recently used in some wide campaigns exploiting unpatched IIS servers to mine Monero." ,
"Tag" : [
{
"colour" : "#00223b" ,
"local" : "0" ,
"name" : "osint:source-type=\"blog-post\"" ,
"relationship_type" : ""
}
]
} ,
{
"category" : "Payload delivery" ,
"comment" : "We identified two other pieces of software which share some code:" ,
"deleted" : false ,
"disable_correlation" : false ,
"timestamp" : "1515485128" ,
"to_ids" : true ,
"type" : "md5" ,
"uuid" : "5a5477c8-1d28-4171-9740-bc9302de0b81" ,
"value" : "762c3249904a8bf76802effb54426655"
} ,
{
"category" : "Payload delivery" ,
"comment" : "We identified two other pieces of software which share some code:" ,
"deleted" : false ,
"disable_correlation" : false ,
"timestamp" : "1515485128" ,
"to_ids" : true ,
"type" : "md5" ,
"uuid" : "5a5477c8-8188-4ad5-bfbb-bc9302de0b81" ,
"value" : "42344bb45f351757e8638656e12a0135"
} ,
{
"category" : "Network activity" ,
"comment" : "has been active on BitCoin trading sites:" ,
"deleted" : false ,
"disable_correlation" : false ,
"timestamp" : "1515485410" ,
"to_ids" : false ,
"type" : "ip-src" ,
"uuid" : "5a5477f2-0068-4ce8-9be5-566802de0b81" ,
"value" : "175.45.178.19"
} ,
{
"category" : "Payload delivery" ,
"comment" : "Decompiled Code" ,
"deleted" : false ,
"disable_correlation" : false ,
"timestamp" : "1515485235" ,
"to_ids" : true ,
"type" : "md5" ,
"uuid" : "5a54780c-77cc-42c1-9633-bab602de0b81" ,
"value" : "6a261443299788af1467142d5f538b2c"
} ,
{
"category" : "Artifacts dropped" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : false ,
"timestamp" : "1515485410" ,
"to_ids" : true ,
"type" : "yara" ,
"uuid" : "5a547824-c8c8-45b3-b19b-b73502de0b81" ,
"value" : "rule nkminer_monero {\r\n\r\n meta:\r\n\r\n description = \"Detects installer of Monero miner that points to a NK domain\"\r\n\r\n author = \"cdoman@alienvault.com\"\r\n\r\n tlp = \"white\"\r\n\r\n license = \"MIT License\"\r\n\r\n strings:\r\n\r\n $a = \"82e999fb-a6e0-4094-aa1f-1a306069d1a5\" nocase wide ascii\r\n\r\n $b = \"4JUdGzvrMFDWrUUwY3toJATSeNwjn54LkCnKBPRzDuhzi5vSepHfUckJNxRL2gjkNrSqtCoRUrEDAgRwsQvVCjZbRy5YeFCqgoUMnzumvS\" nocase wide ascii\r\n\r\n $c = \"barjuok.ryongnamsan.edu.kp\" nocase wide ascii\r\n\r\n $d = \"C:\\\\SoftwaresInstall\\\\soft\" nocase wide ascii\r\n\r\n $e = \"C:\\\\Windows\\\\Sys64\\\\intelservice.exe\" nocase wide ascii\r\n\r\n $f = \"C:\\\\Windows\\\\Sys64\\\\updater.exe\" nocase wide ascii\r\n\r\n $g = \"C:\\\\Users\\\\Jawhar\\\\documents\\\\\" nocase wide ascii\r\n\r\n condition:\r\n\r\n any of them\r\n\r\n}"
} ,
{
"category" : "Network activity" ,
"comment" : "On port 5615" ,
"deleted" : false ,
"disable_correlation" : false ,
"timestamp" : "1515485410" ,
"to_ids" : true ,
"type" : "hostname" ,
"uuid" : "5a547852-0478-476e-9703-4d6e02de0b81" ,
"value" : "barjuok.ryongnamsan.edu.kp"
}
] ,
"Object" : [
{
"comment" : "" ,
"deleted" : false ,
"description" : "An IP address and a port seen as a tuple (or as a triple) in a specific time frame." ,
"meta-category" : "network" ,
"name" : "ip-port" ,
"template_uuid" : "9f8cea74-16fe-4968-a2b4-026676949ac6" ,
"template_version" : "5" ,
"timestamp" : "1515485370" ,
"uuid" : "5a5478ba-6920-40a3-bedc-57fd02de0b81" ,
"Attribute" : [
{
"category" : "Network activity" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : false ,
"object_relation" : "dst-port" ,
"timestamp" : "1515485370" ,
"to_ids" : false ,
"type" : "port" ,
"uuid" : "5a5478ba-372c-4127-a9e4-57fd02de0b81" ,
"value" : "5615"
} ,
{
"category" : "Network activity" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : false ,
"object_relation" : "ip" ,
"timestamp" : "1515485370" ,
"to_ids" : true ,
"type" : "ip-dst" ,
"uuid" : "5a5478ba-38dc-4458-ab14-57fd02de0b81" ,
2023-04-21 13:25:09 +00:00
"value" : "175.45.178.19"
2023-12-14 14:30:15 +00:00
} ,
{
"category" : "Other" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : false ,
"object_relation" : "text" ,
"timestamp" : "1515485370" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5a5478ba-e60c-4cce-80df-57fd02de0b81" ,
"value" : "Arguments = ((\"-o barjuok.ryongnamsan.edu.kp:5615 -u 4JUdGzvrMFDWrUUwY3toJATSeNwjn54LkCnKBPRzDuhzi5vSepHfUckJNxRL2gjkNrSqtCoRUrEDAgRwsQvVCjZbRy5YeFCqgoUMnzumvS -p \" + str + \" -k -t \" + Conversions.ToString(value)) ?? \"\")"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "File object describing a file with meta-information" ,
"meta-category" : "file" ,
"name" : "file" ,
"template_uuid" : "688c46fb-5edb-40a3-8273-1af7923e2215" ,
"template_version" : "7" ,
"timestamp" : "1515485413" ,
"uuid" : "ecdcbae1-a690-4f9c-9ce7-b505f1c1a634" ,
"ObjectReference" : [
{
"comment" : "" ,
"object_uuid" : "ecdcbae1-a690-4f9c-9ce7-b505f1c1a634" ,
"referenced_uuid" : "0b6118b9-a775-47cf-8f97-de518c5ffd7a" ,
2023-04-21 13:25:09 +00:00
"relationship_type" : "analysed-with" ,
2023-12-14 14:30:15 +00:00
"timestamp" : "1515696547" ,
"uuid" : "5a5478e3-4548-4777-a03f-b75d02de0b81"
}
] ,
"Attribute" : [
{
"category" : "Payload delivery" ,
"comment" : "We identified two other pieces of software which share some code:" ,
"deleted" : false ,
"disable_correlation" : false ,
"object_relation" : "sha1" ,
"timestamp" : "1515485410" ,
"to_ids" : true ,
"type" : "sha1" ,
"uuid" : "5a5478e2-563c-46c6-9664-b75d02de0b81" ,
"value" : "0def199dbdb8dccf380511f67138088148ea83a3"
} ,
{
"category" : "Payload delivery" ,
"comment" : "We identified two other pieces of software which share some code:" ,
"deleted" : false ,
"disable_correlation" : false ,
"object_relation" : "md5" ,
"timestamp" : "1515485410" ,
"to_ids" : true ,
"type" : "md5" ,
"uuid" : "5a5478e2-6a0c-4cf3-8df8-b75d02de0b81" ,
"value" : "762c3249904a8bf76802effb54426655"
} ,
{
"category" : "Payload delivery" ,
"comment" : "We identified two other pieces of software which share some code:" ,
"deleted" : false ,
"disable_correlation" : false ,
"object_relation" : "sha256" ,
"timestamp" : "1515485410" ,
"to_ids" : true ,
"type" : "sha256" ,
"uuid" : "5a5478e2-9af0-4d71-90d9-b75d02de0b81" ,
"value" : "42300b6a09f183ae167d7a11d9c6df21d022a5f02df346350d3d875d557d3b76"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "VirusTotal report" ,
"meta-category" : "misc" ,
"name" : "virustotal-report" ,
"template_uuid" : "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4" ,
"template_version" : "1" ,
"timestamp" : "1515485410" ,
"uuid" : "0b6118b9-a775-47cf-8f97-de518c5ffd7a" ,
"Attribute" : [
{
"category" : "External analysis" ,
"comment" : "We identified two other pieces of software which share some code:" ,
"deleted" : false ,
"disable_correlation" : false ,
"object_relation" : "permalink" ,
"timestamp" : "1515485411" ,
"to_ids" : false ,
"type" : "link" ,
"uuid" : "5a5478e3-2394-4d96-a621-b75d02de0b81" ,
"value" : "https://www.virustotal.com/file/42300b6a09f183ae167d7a11d9c6df21d022a5f02df346350d3d875d557d3b76/analysis/1515484535/"
} ,
{
"category" : "Other" ,
"comment" : "We identified two other pieces of software which share some code:" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "detection-ratio" ,
"timestamp" : "1515485411" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5a5478e3-ef44-4be0-99af-b75d02de0b81" ,
"value" : "3/67"
} ,
{
"category" : "Other" ,
"comment" : "We identified two other pieces of software which share some code:" ,
"deleted" : false ,
"disable_correlation" : false ,
"object_relation" : "last-submission" ,
"timestamp" : "1515485411" ,
"to_ids" : false ,
"type" : "datetime" ,
"uuid" : "5a5478e3-d6f0-430c-b82c-b75d02de0b81" ,
"value" : "2018-01-09T07:55:35"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "File object describing a file with meta-information" ,
"meta-category" : "file" ,
"name" : "file" ,
"template_uuid" : "688c46fb-5edb-40a3-8273-1af7923e2215" ,
"template_version" : "7" ,
"timestamp" : "1515485414" ,
"uuid" : "62422a69-b558-4bbc-9e01-ff1038764faf" ,
"ObjectReference" : [
{
"comment" : "" ,
"object_uuid" : "62422a69-b558-4bbc-9e01-ff1038764faf" ,
"referenced_uuid" : "36e2da81-042e-4880-9f27-76ebec952ba0" ,
2023-04-21 13:25:09 +00:00
"relationship_type" : "analysed-with" ,
2023-12-14 14:30:15 +00:00
"timestamp" : "1515696547" ,
"uuid" : "5a5478e3-55e0-4423-9961-b75d02de0b81"
}
] ,
"Attribute" : [
{
"category" : "Payload delivery" ,
"comment" : "Decompiled Code" ,
"deleted" : false ,
"disable_correlation" : false ,
"object_relation" : "sha1" ,
"timestamp" : "1515485411" ,
"to_ids" : true ,
"type" : "sha1" ,
"uuid" : "5a5478e3-fb0c-4974-a73c-b75d02de0b81" ,
"value" : "8965381377a884aa68eeb451b3e62175968b0b04"
} ,
{
"category" : "Payload delivery" ,
"comment" : "Decompiled Code" ,
"deleted" : false ,
"disable_correlation" : false ,
"object_relation" : "md5" ,
"timestamp" : "1515485411" ,
"to_ids" : true ,
"type" : "md5" ,
"uuid" : "5a5478e3-d088-4128-9a8b-b75d02de0b81" ,
"value" : "6a261443299788af1467142d5f538b2c"
} ,
{
"category" : "Payload delivery" ,
"comment" : "Decompiled Code" ,
"deleted" : false ,
"disable_correlation" : false ,
"object_relation" : "sha256" ,
"timestamp" : "1515485411" ,
"to_ids" : true ,
"type" : "sha256" ,
"uuid" : "5a5478e3-aa24-4e9e-bb93-b75d02de0b81" ,
"value" : "c599f3ca3417169e4a620b8231f8a97ccc63e291b9e09c888e6807dd90f1f17c"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "VirusTotal report" ,
"meta-category" : "misc" ,
"name" : "virustotal-report" ,
"template_uuid" : "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4" ,
"template_version" : "1" ,
"timestamp" : "1515485411" ,
"uuid" : "36e2da81-042e-4880-9f27-76ebec952ba0" ,
"Attribute" : [
{
"category" : "External analysis" ,
"comment" : "Decompiled Code" ,
"deleted" : false ,
"disable_correlation" : false ,
"object_relation" : "permalink" ,
"timestamp" : "1515485411" ,
"to_ids" : false ,
"type" : "link" ,
"uuid" : "5a5478e3-1108-4a5e-93b1-b75d02de0b81" ,
"value" : "https://www.virustotal.com/file/c599f3ca3417169e4a620b8231f8a97ccc63e291b9e09c888e6807dd90f1f17c/analysis/1515484533/"
} ,
{
"category" : "Other" ,
"comment" : "Decompiled Code" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "detection-ratio" ,
"timestamp" : "1515485411" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5a5478e3-04d8-4a5a-ae0b-b75d02de0b81" ,
"value" : "6/68"
} ,
{
"category" : "Other" ,
"comment" : "Decompiled Code" ,
"deleted" : false ,
"disable_correlation" : false ,
"object_relation" : "last-submission" ,
"timestamp" : "1515485411" ,
"to_ids" : false ,
"type" : "datetime" ,
"uuid" : "5a5478e3-0fa0-4ec3-b082-b75d02de0b81" ,
"value" : "2018-01-09T07:55:33"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "File object describing a file with meta-information" ,
"meta-category" : "file" ,
"name" : "file" ,
"template_uuid" : "688c46fb-5edb-40a3-8273-1af7923e2215" ,
"template_version" : "7" ,
"timestamp" : "1515485414" ,
"uuid" : "8a8becfb-f8ce-440a-9ffa-81a43239f4e2" ,
"ObjectReference" : [
{
"comment" : "" ,
"object_uuid" : "8a8becfb-f8ce-440a-9ffa-81a43239f4e2" ,
"referenced_uuid" : "fe330733-f2f4-490d-a9b8-c0f0da7353fe" ,
2023-04-21 13:25:09 +00:00
"relationship_type" : "analysed-with" ,
2023-12-14 14:30:15 +00:00
"timestamp" : "1515696548" ,
"uuid" : "5a5478e3-39bc-4941-8e3a-b75d02de0b81"
}
] ,
"Attribute" : [
{
"category" : "Payload delivery" ,
"comment" : "We identified two other pieces of software which share some code:" ,
"deleted" : false ,
"disable_correlation" : false ,
"object_relation" : "sha1" ,
"timestamp" : "1515485411" ,
"to_ids" : true ,
"type" : "sha1" ,
"uuid" : "5a5478e3-4cc8-44f8-900e-b75d02de0b81" ,
"value" : "7cab4853c370a2dd299a5ab3ebeccfe17455cb43"
} ,
{
"category" : "Payload delivery" ,
"comment" : "We identified two other pieces of software which share some code:" ,
"deleted" : false ,
"disable_correlation" : false ,
"object_relation" : "md5" ,
"timestamp" : "1515485411" ,
"to_ids" : true ,
"type" : "md5" ,
"uuid" : "5a5478e3-a69c-4ef3-b0f9-b75d02de0b81" ,
"value" : "42344bb45f351757e8638656e12a0135"
} ,
{
"category" : "Payload delivery" ,
"comment" : "We identified two other pieces of software which share some code:" ,
"deleted" : false ,
"disable_correlation" : false ,
"object_relation" : "sha256" ,
"timestamp" : "1515485411" ,
"to_ids" : true ,
"type" : "sha256" ,
"uuid" : "5a5478e3-85ec-4d15-8de3-b75d02de0b81" ,
"value" : "0024e32c0199ded445c0b968601f21cc92fc0c534d2642f2dd64c1c978ff01f3"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "VirusTotal report" ,
"meta-category" : "misc" ,
"name" : "virustotal-report" ,
"template_uuid" : "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4" ,
"template_version" : "1" ,
"timestamp" : "1515485411" ,
"uuid" : "fe330733-f2f4-490d-a9b8-c0f0da7353fe" ,
"Attribute" : [
{
"category" : "External analysis" ,
"comment" : "We identified two other pieces of software which share some code:" ,
"deleted" : false ,
"disable_correlation" : false ,
"object_relation" : "permalink" ,
"timestamp" : "1515485411" ,
"to_ids" : false ,
"type" : "link" ,
"uuid" : "5a5478e3-fa78-43c9-90a9-b75d02de0b81" ,
"value" : "https://www.virustotal.com/file/0024e32c0199ded445c0b968601f21cc92fc0c534d2642f2dd64c1c978ff01f3/analysis/1515484532/"
} ,
{
"category" : "Other" ,
"comment" : "We identified two other pieces of software which share some code:" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "detection-ratio" ,
"timestamp" : "1515485411" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5a5478e3-e430-4494-8cd8-b75d02de0b81" ,
"value" : "6/67"
} ,
{
"category" : "Other" ,
"comment" : "We identified two other pieces of software which share some code:" ,
"deleted" : false ,
"disable_correlation" : false ,
"object_relation" : "last-submission" ,
"timestamp" : "1515485411" ,
"to_ids" : false ,
"type" : "datetime" ,
"uuid" : "5a5478e3-546c-4052-abd1-b75d02de0b81" ,
"value" : "2018-01-09T07:55:32"
}
]
}
2023-04-21 13:25:09 +00:00
]
2023-12-14 14:30:15 +00:00
}
2023-04-21 13:25:09 +00:00
}