misp-circl-feed/feeds/circl/misp/5b238476-4fbc-480c-9c86-48ab950d210f.json

1 line
7.9 KiB
JSON
Raw Normal View History

2023-12-14 14:30:15 +00:00
{"Event": {"info": "OSINT - The Week in Ransomware - June 8th 2018 - CryBrazil, CryptConsole, and Magniber", "Tag": [{"colour": "#72003d", "exportable": true, "name": "workflow:todo=\"add-missing-misp-galaxy-cluster-values\""}, {"colour": "#7a0042", "exportable": true, "name": "workflow:todo=\"create-missing-misp-galaxy-cluster\""}, {"colour": "#ffffff", "exportable": true, "name": "tlp:white"}, {"colour": "#2c4f00", "exportable": true, "name": "malware_classification:malware-category=\"Ransomware\""}, {"colour": "#00223b", "exportable": true, "name": "osint:source-type=\"blog-post\""}, {"colour": "#366c00", "exportable": true, "name": "circl:incident-classification=\"malware\""}, {"colour": "#0088cc", "exportable": true, "name": "misp-galaxy:ransomware=\"CryBrazil\""}, {"colour": "#0088cc", "exportable": true, "name": "misp-galaxy:malpedia=\"Magniber\""}, {"colour": "#0088cc", "exportable": true, "name": "misp-galaxy:ransomware=\"Pedcont\""}, {"colour": "#0088cc", "exportable": true, "name": "misp-galaxy:ransomware=\"DiskDoctor\""}, {"colour": "#0088cc", "exportable": true, "name": "misp-galaxy:ransomware=\"Magniber Ransomware\""}, {"colour": "#0088cc", "exportable": true, "name": "misp-galaxy:ransomware=\"XiaoBa ransomware\""}, {"colour": "#0088cc", "exportable": true, "name": "misp-galaxy:ransomware=\"CryptConsole\""}, {"colour": "#0088cc", "exportable": true, "name": "misp-galaxy:ransomware=\"RedEye\""}, {"colour": "#0088cc", "exportable": true, "name": "misp-galaxy:ransomware=\"Aurora Ransomware\""}, {"colour": "#0088cc", "exportable": true, "name": "misp-galaxy:ransomware=\"Fake Globe Ransomware\""}, {"colour": "#0088cc", "exportable": true, "name": "misp-galaxy:malpedia=\"GlobeImposter\""}, {"colour": "#0088cc", "exportable": true, "name": "misp-galaxy:ransomware=\"PGPSnippet Ransomware\""}, {"colour": "#0088cc", "exportable": true, "name": "misp-galaxy:ransomware=\"Spartacus Ransomware\""}, {"colour": "#d00070", "exportable": true, "name": "workflow:todo=\"additional-task\""}], "publish_timestamp": "0", "timestamp": "1540555274", "Object": [{"comment": "Scarab Ransomware variant, DiskDoctor, Ransomnote", "template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215", "uuid": "5b23a361-fe98-4450-9fb8-4703950d210f", "sharing_group_id": "0", "timestamp": "1529062241", "description": "File object describing a file with meta-information", "template_version": "11", "Attribute": [{"comment": "", "category": "Payload delivery", "uuid": "5b23a361-ebe4-4612-9e22-42cf950d210f", "timestamp": "1529062241", "to_ids": true, "value": "HOW TO RECOVER ENCRYPTED FILES.TXT", "disable_correlation": true, "object_relation": "filename", "type": "filename"}, {"comment": "", "category": "Other", "uuid": "5b23a361-0318-41d2-8a9e-4a94950d210f", "timestamp": "1529062241", "to_ids": false, "value": "Malicious", "disable_correlation": true, "object_relation": "state", "type": "text"}], "distribution": "5", "meta-category": "file", "name": "file"}, {"comment": "XiaoBa Ransomware ransomnote", "template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215", "uuid": "5b23a3de-2368-473b-be4a-4ecb950d210f", "sharing_group_id": "0", "timestamp": "1529062366", "description": "File object describing a file with meta-information", "template_version": "11", "Attribute": [{"comment": "", "category": "Payload delivery", "uuid": "5b23a3de-e258-463b-9557-47c0950d210f", "timestamp": "1529062366", "to_ids": true, "value": "# # DECRYPT MY FILE # #.bmp", "disable_correlation": true, "object_relation": "filename", "type": "filename"}, {"comment": "", "category": "Other", "uuid": "5b23a3de-d278-496c-9165-42e2950d210f", "timestamp": "1529062366", "to_ids": false, "value": "Malicious", "disable_correlation": true, "object_relation": "state", "type": "text"}], "distribution": "5", "meta-category": "file", "name": "file"}, {"comment": "Aurora ransomware ransomnote", "template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215", "uuid": "5b23a70c-cb38-42dd-a922-47b9950d210f", "sharing_group_id": "0", "timestamp": "1529063180", "description": "File object describing a file with meta-infor