2023-04-21 13:25:09 +00:00
{
2023-12-14 14:30:15 +00:00
"Event" : {
"analysis" : "0" ,
"date" : "2018-03-12" ,
"extends_uuid" : "" ,
"info" : "OSINT - Sigma Ransomware Being Distributed Using Fake Craigslist Malspam" ,
"publish_timestamp" : "1536755880" ,
"published" : true ,
"threat_level_id" : "3" ,
"timestamp" : "1536755790" ,
"uuid" : "5b9123c0-1480-4e09-877e-4783950d210f" ,
"Orgc" : {
"name" : "CIRCL" ,
"uuid" : "55f6ea5e-2c60-40e5-964f-47a8950d210f"
} ,
"Tag" : [
{
"colour" : "#ffffff" ,
"local" : "0" ,
"name" : "tlp:white" ,
"relationship_type" : ""
} ,
{
"colour" : "#2c4f00" ,
"local" : "0" ,
"name" : "malware_classification:malware-category=\"Ransomware\"" ,
"relationship_type" : ""
} ,
{
"colour" : "#00223b" ,
"local" : "0" ,
"name" : "osint:source-type=\"blog-post\"" ,
"relationship_type" : ""
} ,
{
"colour" : "#0088cc" ,
"local" : "0" ,
"name" : "misp-galaxy:ransomware=\"Sigma Ransomware\"" ,
"relationship_type" : ""
} ,
{
"colour" : "#0088cc" ,
"local" : "0" ,
"name" : "misp-galaxy:mitre-enterprise-attack-attack-pattern=\"Spearphishing Link - T1192\"" ,
"relationship_type" : ""
} ,
{
"colour" : "#0088cc" ,
"local" : "0" ,
"name" : "misp-galaxy:mitre-enterprise-attack-attack-pattern=\"Spearphishing Attachment - T1193\"" ,
"relationship_type" : ""
} ,
{
"colour" : "#0088cc" ,
"local" : "0" ,
"name" : "misp-galaxy:mitre-enterprise-attack-attack-pattern=\"User Execution - T1204\"" ,
"relationship_type" : ""
} ,
{
"colour" : "#0088cc" ,
"local" : "0" ,
"name" : "misp-galaxy:mitre-enterprise-attack-attack-pattern=\"Scripting - T1064\"" ,
"relationship_type" : ""
} ,
{
"colour" : "#0088cc" ,
"local" : "0" ,
"name" : "misp-galaxy:mitre-enterprise-attack-attack-pattern=\"Obfuscated Files or Information - T1027\"" ,
"relationship_type" : ""
} ,
{
"colour" : "#026900" ,
"local" : "0" ,
"name" : "monarc-threat:unauthorised-actions=\"corruption-of-data\"" ,
"relationship_type" : ""
} ,
{
"colour" : "#039900" ,
"local" : "0" ,
"name" : "monarc-threat:compromise-of-information=\"malware-infection\"" ,
"relationship_type" : ""
}
] ,
"Attribute" : [
{
"category" : "External analysis" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : false ,
"timestamp" : "1536329213" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5b912411-f738-46fc-b27c-4ada950d210f" ,
"value" : "Today one of our volunteers, Aura, told me about a new new malspam campaign pretending to be from Craigslist that is under way and distributing the Sigma Ransomware. These spam emails contain password protected Word or RTF documents that download the Sigma Ransomware executable from a remote site and install it on a recipients computer." ,
"Tag" : [
{
"colour" : "#00223b" ,
"local" : "0" ,
"name" : "osint:source-type=\"blog-post\"" ,
"relationship_type" : ""
}
]
} ,
{
"category" : "External analysis" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : false ,
"timestamp" : "1536329222" ,
"to_ids" : false ,
"type" : "link" ,
"uuid" : "5b912433-50b0-4e96-8d7a-44b1950d210f" ,
"value" : "https://www.bleepingcomputer.com/news/security/sigma-ransomware-being-distributed-using-fake-craigslist-malspam/" ,
"Tag" : [
{
"colour" : "#00223b" ,
"local" : "0" ,
"name" : "osint:source-type=\"blog-post\"" ,
"relationship_type" : ""
}
]
} ,
{
"category" : "Network activity" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : false ,
"timestamp" : "1536240806" ,
"to_ids" : true ,
"type" : "url" ,
"uuid" : "5b912ca6-7264-48c8-afca-40e4950d210f" ,
"value" : "http://185.121.139.229/"
} ,
{
"category" : "Payload delivery" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : false ,
"timestamp" : "1536326656" ,
"to_ids" : true ,
"type" : "filename" ,
"uuid" : "5b927c00-c9c8-4780-84da-abc4950d210f" ,
"value" : "%UserProfile%\\AppData\\Roaming\\Microsoft\\660F187B8C71F670E76F70C7EDAFE4E7\\taskwgr.exe"
}
] ,
"Object" : [
{
"comment" : "" ,
"deleted" : false ,
"description" : "File object describing a file with meta-information" ,
"meta-category" : "file" ,
"name" : "file" ,
"template_uuid" : "688c46fb-5edb-40a3-8273-1af7923e2215" ,
"template_version" : "11" ,
"timestamp" : "1536240542" ,
"uuid" : "5b912b9e-67d4-45ad-b17d-4020950d210f" ,
"Attribute" : [
{
"category" : "Payload delivery" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : false ,
"object_relation" : "sha256" ,
"timestamp" : "1536240542" ,
"to_ids" : true ,
"type" : "sha256" ,
"uuid" : "5b912b9e-a4d4-4f19-a85a-4b45950d210f" ,
"value" : "b81c7079fd573304bb8fb177898dfbf6acdb16ff32632dfa9ebb9c3da2a59864"
} ,
{
"category" : "Other" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "state" ,
"timestamp" : "1536240546" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5b912ba2-604c-4c25-b80f-4c2c950d210f" ,
"value" : "Malicious"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "File object describing a file with meta-information" ,
"meta-category" : "file" ,
"name" : "file" ,
"template_uuid" : "688c46fb-5edb-40a3-8273-1af7923e2215" ,
"template_version" : "11" ,
"timestamp" : "1536755335" ,
"uuid" : "af63c140-7e55-4ae2-a261-9f126f0195ab" ,
"ObjectReference" : [
{
"comment" : "" ,
"object_uuid" : "af63c140-7e55-4ae2-a261-9f126f0195ab" ,
"referenced_uuid" : "6241958e-2b1b-4ccf-8aa5-0aee9e179e50" ,
2023-04-21 13:25:09 +00:00
"relationship_type" : "analysed-with" ,
2023-12-14 14:30:15 +00:00
"timestamp" : "1536302901" ,
"uuid" : "5b921f35-0d6c-4a42-b336-495202de0b81"
} ,
{
"comment" : "" ,
"object_uuid" : "af63c140-7e55-4ae2-a261-9f126f0195ab" ,
"referenced_uuid" : "f04b2156-46a7-4ffe-a470-b0d0ac7ef70e" ,
2023-04-21 13:25:09 +00:00
"relationship_type" : "analysed-with" ,
2023-12-14 14:30:15 +00:00
"timestamp" : "1536755345" ,
"uuid" : "5b990691-7064-4bee-bcb8-494c02de0b81"
}
] ,
"Attribute" : [
{
"category" : "Payload delivery" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : false ,
"object_relation" : "md5" ,
"timestamp" : "1536302885" ,
"to_ids" : true ,
"type" : "md5" ,
"uuid" : "1badb4a6-67f0-408a-9ba2-f60f41bb913c" ,
"value" : "9afa3302527608a30408958bc48019fc"
} ,
{
"category" : "Payload delivery" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : false ,
"object_relation" : "sha1" ,
"timestamp" : "1536302888" ,
"to_ids" : true ,
"type" : "sha1" ,
"uuid" : "3f8e1d75-74db-40bd-a845-6289bdb3dc91" ,
"value" : "0d34add7d61e26583dc54e7b89b6d4056d6bf201"
} ,
{
"category" : "Payload delivery" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : false ,
"object_relation" : "sha256" ,
"timestamp" : "1536302891" ,
"to_ids" : true ,
"type" : "sha256" ,
"uuid" : "2d4820de-1980-4c31-a0ff-8c0b43a9936d" ,
"value" : "b81c7079fd573304bb8fb177898dfbf6acdb16ff32632dfa9ebb9c3da2a59864"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "VirusTotal report" ,
"meta-category" : "misc" ,
"name" : "virustotal-report" ,
"template_uuid" : "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4" ,
"template_version" : "2" ,
"timestamp" : "1536302893" ,
"uuid" : "6241958e-2b1b-4ccf-8aa5-0aee9e179e50" ,
"Attribute" : [
{
"category" : "Other" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : false ,
"object_relation" : "last-submission" ,
"timestamp" : "1536302893" ,
"to_ids" : false ,
"type" : "datetime" ,
"uuid" : "8d5b54cd-1dfc-435b-8e19-cc4eda5b2288" ,
"value" : "2018-08-28T00:23:39"
} ,
{
"category" : "External analysis" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : false ,
"object_relation" : "permalink" ,
"timestamp" : "1536302896" ,
"to_ids" : false ,
"type" : "link" ,
"uuid" : "18055e03-5add-4a61-9465-9afc972b1cb3" ,
"value" : "https://www.virustotal.com/file/b81c7079fd573304bb8fb177898dfbf6acdb16ff32632dfa9ebb9c3da2a59864/analysis/1535415819/"
} ,
{
"category" : "Other" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "detection-ratio" ,
"timestamp" : "1536302898" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "e911d120-fdf4-4110-8272-ddb11eedd9ec" ,
"value" : "45/67"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "File object describing a file with meta-information" ,
"meta-category" : "file" ,
"name" : "file" ,
"template_uuid" : "688c46fb-5edb-40a3-8273-1af7923e2215" ,
"template_version" : "11" ,
"timestamp" : "1536325764" ,
"uuid" : "5b927884-8d5c-4a6c-af30-4daa950d210f" ,
"Attribute" : [
{
"category" : "Payload delivery" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "filename" ,
"timestamp" : "1536325764" ,
"to_ids" : true ,
"type" : "filename" ,
"uuid" : "5b927884-8b74-453b-ae0f-439b950d210f" ,
"value" : "ReadMe.txt"
} ,
{
"category" : "Other" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "state" ,
"timestamp" : "1536325764" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5b927884-63d4-43d8-b2c8-4c68950d210f" ,
"value" : "Malicious"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "Registry key object describing a Windows registry key with value and last-modified timestamp" ,
"meta-category" : "file" ,
"name" : "registry-key" ,
"template_uuid" : "8b3228ad-6d82-4fe6-b2ae-05426308f1d5" ,
"template_version" : "4" ,
"timestamp" : "1536326106" ,
"uuid" : "5b9279c2-40a4-4823-840a-4c03950d210f" ,
"Attribute" : [
{
"category" : "Persistence mechanism" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : false ,
"object_relation" : "key" ,
"timestamp" : "1536326106" ,
"to_ids" : true ,
"type" : "regkey" ,
"uuid" : "5b9279c2-6a44-4133-bdbf-45ae950d210f" ,
"value" : "\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\chrome"
} ,
{
"category" : "Other" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "root-keys" ,
"timestamp" : "1536326106" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5b9279c3-b8ec-445c-9f70-4c8b950d210f" ,
"value" : "HKCU"
} ,
{
"category" : "Persistence mechanism" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "data-type" ,
"timestamp" : "1536326106" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5b9279c3-c040-4ea5-bfe7-4955950d210f" ,
"value" : "REG_NONE"
} ,
{
"category" : "Persistence mechanism" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : false ,
"object_relation" : "name" ,
"timestamp" : "1536326692" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5b9279dc-e050-4a20-ac5e-adb4950d210f" ,
"value" : "Rundll32.exe SHELL32.DLL,ShellExec_RunDLL"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "File object describing a file with meta-information" ,
"meta-category" : "file" ,
"name" : "file" ,
"template_uuid" : "688c46fb-5edb-40a3-8273-1af7923e2215" ,
"template_version" : "11" ,
"timestamp" : "1536326853" ,
"uuid" : "5b927cc5-d5ac-46df-ace4-4cf8950d210f" ,
"Attribute" : [
{
"category" : "Payload delivery" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "filename" ,
"timestamp" : "1536326853" ,
"to_ids" : true ,
"type" : "filename" ,
"uuid" : "5b927cc5-28e4-4d21-8166-447d950d210f" ,
"value" : "%UserProfile%\\AppData\\Roaming\\Microsoft\\660F187B8C71F670E76F70C7EDAFE4E7\\Data\\Tor\\geoip"
} ,
{
"category" : "Other" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "state" ,
"timestamp" : "1536326855" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5b927cc7-1e4c-44bc-94ff-4ee8950d210f" ,
"value" : "Malicious"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "File object describing a file with meta-information" ,
"meta-category" : "file" ,
"name" : "file" ,
"template_uuid" : "688c46fb-5edb-40a3-8273-1af7923e2215" ,
"template_version" : "11" ,
"timestamp" : "1536326952" ,
"uuid" : "5b927d28-edcc-445d-869b-42ae950d210f" ,
"Attribute" : [
{
"category" : "Payload delivery" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "filename" ,
"timestamp" : "1536326953" ,
"to_ids" : true ,
"type" : "filename" ,
"uuid" : "5b927d29-a424-46ab-879c-4609950d210f" ,
"value" : "%UserProfile%\\AppData\\Roaming\\Microsoft\\660F187B8C71F670E76F70C7EDAFE4E7\\Data\\Tor\\geoip6"
} ,
{
"category" : "Other" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "state" ,
"timestamp" : "1536326953" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5b927d29-1040-4836-878b-420c950d210f" ,
"value" : "Malicious"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "File object describing a file with meta-information" ,
"meta-category" : "file" ,
"name" : "file" ,
"template_uuid" : "688c46fb-5edb-40a3-8273-1af7923e2215" ,
"template_version" : "11" ,
"timestamp" : "1536326971" ,
"uuid" : "5b927d3b-9628-4e2f-83b3-4cb8950d210f" ,
"Attribute" : [
{
"category" : "Payload delivery" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "filename" ,
"timestamp" : "1536326971" ,
"to_ids" : true ,
"type" : "filename" ,
"uuid" : "5b927d3b-e228-4ecc-b169-4369950d210f" ,
"value" : "%UserProfile%\\AppData\\Roaming\\Microsoft\\660F187B8C71F670E76F70C7EDAFE4E7\\test1.bmp"
} ,
{
"category" : "Other" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "state" ,
"timestamp" : "1536326973" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5b927d3d-8404-433c-9b99-4c2d950d210f" ,
"value" : "Malicious"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "File object describing a file with meta-information" ,
"meta-category" : "file" ,
"name" : "file" ,
"template_uuid" : "688c46fb-5edb-40a3-8273-1af7923e2215" ,
"template_version" : "11" ,
"timestamp" : "1536326986" ,
"uuid" : "5b927d4a-5334-448b-84e9-4545950d210f" ,
"Attribute" : [
{
"category" : "Payload delivery" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "filename" ,
"timestamp" : "1536326987" ,
"to_ids" : true ,
"type" : "filename" ,
"uuid" : "5b927d4b-39a8-4fc7-a4b7-4a10950d210f" ,
"value" : "%UserProfile%\\AppData\\Roaming\\Microsoft\\660F187B8C71F670E76F70C7EDAFE4E7\\Tor\\libeay32.dll"
} ,
{
"category" : "Other" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "state" ,
"timestamp" : "1536326988" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5b927d4c-a078-414c-8f77-4b37950d210f" ,
"value" : "Malicious"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "File object describing a file with meta-information" ,
"meta-category" : "file" ,
"name" : "file" ,
"template_uuid" : "688c46fb-5edb-40a3-8273-1af7923e2215" ,
"template_version" : "11" ,
"timestamp" : "1536327388" ,
"uuid" : "5b927edc-e5a4-47e1-86a6-4a0f950d210f" ,
"Attribute" : [
{
"category" : "Payload delivery" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "filename" ,
"timestamp" : "1536327388" ,
"to_ids" : true ,
"type" : "filename" ,
"uuid" : "5b927edc-12c8-4b11-bc21-4428950d210f" ,
"value" : "%UserProfile%\\AppData\\Roaming\\Microsoft\\660F187B8C71F670E76F70C7EDAFE4E7\\Tor\\libevent_core-2-0-5.dll"
} ,
{
"category" : "Other" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "state" ,
"timestamp" : "1536327389" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5b927edd-56fc-4e14-8074-48f3950d210f" ,
"value" : "Malicious"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "File object describing a file with meta-information" ,
"meta-category" : "file" ,
"name" : "file" ,
"template_uuid" : "688c46fb-5edb-40a3-8273-1af7923e2215" ,
"template_version" : "11" ,
"timestamp" : "1536327431" ,
"uuid" : "5b927f07-0ebc-45ea-9a4c-4791950d210f" ,
"Attribute" : [
{
"category" : "Payload delivery" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "filename" ,
"timestamp" : "1536327432" ,
"to_ids" : true ,
"type" : "filename" ,
"uuid" : "5b927f08-3ef8-43e9-9cbf-445c950d210f" ,
"value" : "%UserProfile%\\AppData\\Roaming\\tor\\cached-certs"
} ,
{
"category" : "Other" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "state" ,
"timestamp" : "1536327433" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5b927f09-3b80-48dc-9dad-49d2950d210f" ,
"value" : "Malicious"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "File object describing a file with meta-information" ,
"meta-category" : "file" ,
"name" : "file" ,
"template_uuid" : "688c46fb-5edb-40a3-8273-1af7923e2215" ,
"template_version" : "11" ,
"timestamp" : "1536327449" ,
"uuid" : "5b927f19-af00-4e57-bc93-49e9950d210f" ,
"Attribute" : [
{
"category" : "Payload delivery" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "filename" ,
"timestamp" : "1536327449" ,
"to_ids" : true ,
"type" : "filename" ,
"uuid" : "5b927f19-4a0c-4abe-b57d-4727950d210f" ,
"value" : "%UserProfile%\\AppData\\Roaming\\tor\\cached-microdesc-consensus"
} ,
{
"category" : "Other" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "state" ,
"timestamp" : "1536327449" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5b927f19-d26c-48fd-9d16-45c8950d210f" ,
"value" : "Malicious"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "File object describing a file with meta-information" ,
"meta-category" : "file" ,
"name" : "file" ,
"template_uuid" : "688c46fb-5edb-40a3-8273-1af7923e2215" ,
"template_version" : "11" ,
"timestamp" : "1536327501" ,
"uuid" : "5b927f4d-5914-4be0-bc7e-4da1950d210f" ,
"Attribute" : [
{
"category" : "Payload delivery" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "filename" ,
"timestamp" : "1536327501" ,
"to_ids" : true ,
"type" : "filename" ,
"uuid" : "5b927f4d-6a90-4640-9dc3-452b950d210f" ,
"value" : "%UserProfile%\\AppData\\Roaming\\Microsoft\\660F187B8C71F670E76F70C7EDAFE4E7\\Tor\\libssp-0.dll"
} ,
{
"category" : "Other" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "state" ,
"timestamp" : "1536327504" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5b927f50-f734-4110-bc51-4193950d210f" ,
"value" : "Malicious"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "File object describing a file with meta-information" ,
"meta-category" : "file" ,
"name" : "file" ,
"template_uuid" : "688c46fb-5edb-40a3-8273-1af7923e2215" ,
"template_version" : "11" ,
"timestamp" : "1536327518" ,
"uuid" : "5b927f5e-50ac-4596-b3cb-474b950d210f" ,
"Attribute" : [
{
"category" : "Payload delivery" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "filename" ,
"timestamp" : "1536327518" ,
"to_ids" : true ,
"type" : "filename" ,
"uuid" : "5b927f5e-1f80-41ab-a84f-4832950d210f" ,
"value" : "%UserProfile%\\AppData\\Roaming\\Microsoft\\660F187B8C71F670E76F70C7EDAFE4E7\\Tor\\tor-gencert.exe"
} ,
{
"category" : "Other" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "state" ,
"timestamp" : "1536327521" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5b927f61-2d78-4789-9d34-4ea6950d210f" ,
"value" : "Malicious"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "File object describing a file with meta-information" ,
"meta-category" : "file" ,
"name" : "file" ,
"template_uuid" : "688c46fb-5edb-40a3-8273-1af7923e2215" ,
"template_version" : "11" ,
"timestamp" : "1536327531" ,
"uuid" : "5b927f6b-0430-4a52-b692-4dba950d210f" ,
"Attribute" : [
{
"category" : "Payload delivery" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "filename" ,
"timestamp" : "1536327531" ,
"to_ids" : true ,
"type" : "filename" ,
"uuid" : "5b927f6b-8f2c-4ee2-987d-436c950d210f" ,
"value" : "%UserProfile%\\AppData\\Roaming\\Microsoft\\660F187B8C71F670E76F70C7EDAFE4E7\\Tor\\svchost.exe"
} ,
{
"category" : "Other" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "state" ,
"timestamp" : "1536327532" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5b927f6c-0670-40ab-a060-4653950d210f" ,
"value" : "Malicious"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "File object describing a file with meta-information" ,
"meta-category" : "file" ,
"name" : "file" ,
"template_uuid" : "688c46fb-5edb-40a3-8273-1af7923e2215" ,
"template_version" : "11" ,
"timestamp" : "1536327548" ,
"uuid" : "5b927f7c-32c8-4e30-b9d5-421f950d210f" ,
"Attribute" : [
{
"category" : "Payload delivery" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "filename" ,
"timestamp" : "1536327548" ,
"to_ids" : true ,
"type" : "filename" ,
"uuid" : "5b927f7c-13a0-4be5-a59e-4b2f950d210f" ,
"value" : "%UserProfile%\\AppData\\Roaming\\Microsoft\\660F187B8C71F670E76F70C7EDAFE4E7\\Tor\\zlib1.dll"
} ,
{
"category" : "Other" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "state" ,
"timestamp" : "1536327550" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5b927f7e-c258-4aa9-ba33-4c57950d210f" ,
"value" : "Malicious"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "File object describing a file with meta-information" ,
"meta-category" : "file" ,
"name" : "file" ,
"template_uuid" : "688c46fb-5edb-40a3-8273-1af7923e2215" ,
"template_version" : "11" ,
"timestamp" : "1536327662" ,
"uuid" : "5b927fee-1590-49f2-a2f6-44ca950d210f" ,
"Attribute" : [
{
"category" : "Payload delivery" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "filename" ,
"timestamp" : "1536327662" ,
"to_ids" : true ,
"type" : "filename" ,
"uuid" : "5b927fee-413c-4578-b4f7-4de2950d210f" ,
"value" : "%UserProfile%\\AppData\\Roaming\\tor\\cached-microdescs.new"
} ,
{
"category" : "Other" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "state" ,
"timestamp" : "1536327665" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5b927ff1-1924-4851-b7be-4693950d210f" ,
"value" : "Malicious"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "File object describing a file with meta-information" ,
"meta-category" : "file" ,
"name" : "file" ,
"template_uuid" : "688c46fb-5edb-40a3-8273-1af7923e2215" ,
"template_version" : "11" ,
"timestamp" : "1536327834" ,
"uuid" : "5b92809a-b468-47e6-a7c7-47c9950d210f" ,
"Attribute" : [
{
"category" : "Payload delivery" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "filename" ,
"timestamp" : "1536327835" ,
"to_ids" : true ,
"type" : "filename" ,
"uuid" : "5b92809b-1a04-4ceb-be76-42b9950d210f" ,
"value" : "%UserProfile%\\AppData\\Roaming\\Microsoft\\660F187B8C71F670E76F70C7EDAFE4E7\\Tor\\libevent-2-0-5.dll"
} ,
{
"category" : "Other" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "state" ,
"timestamp" : "1536327837" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5b92809d-168c-47c1-852f-47b1950d210f" ,
"value" : "Malicious"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "File object describing a file with meta-information" ,
"meta-category" : "file" ,
"name" : "file" ,
"template_uuid" : "688c46fb-5edb-40a3-8273-1af7923e2215" ,
"template_version" : "11" ,
"timestamp" : "1536327849" ,
"uuid" : "5b9280aa-969c-4c3e-ad03-4011950d210f" ,
"Attribute" : [
{
"category" : "Payload delivery" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "filename" ,
"timestamp" : "1536327850" ,
"to_ids" : true ,
"type" : "filename" ,
"uuid" : "5b9280aa-23a0-4033-9e66-4ede950d210f" ,
"value" : "%UserProfile%\\AppData\\Roaming\\Microsoft\\660F187B8C71F670E76F70C7EDAFE4E7\\Tor\\ssleay32.dll"
} ,
{
"category" : "Other" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "state" ,
"timestamp" : "1536327850" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5b9280aa-5258-44fb-a115-4a6a950d210f" ,
"value" : "Malicious"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "File object describing a file with meta-information" ,
"meta-category" : "file" ,
"name" : "file" ,
"template_uuid" : "688c46fb-5edb-40a3-8273-1af7923e2215" ,
"template_version" : "11" ,
"timestamp" : "1536327865" ,
"uuid" : "5b9280b9-be58-4c21-a4d2-49ca950d210f" ,
"Attribute" : [
{
"category" : "Payload delivery" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "filename" ,
"timestamp" : "1536327865" ,
"to_ids" : true ,
"type" : "filename" ,
"uuid" : "5b9280b9-fb64-4f19-9d04-493d950d210f" ,
"value" : "%UserProfile%\\AppData\\Roaming\\tor\\state"
} ,
{
"category" : "Other" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "state" ,
"timestamp" : "1536327866" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5b9280ba-fc78-464f-aaad-4a8e950d210f" ,
"value" : "Malicious"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "File object describing a file with meta-information" ,
"meta-category" : "file" ,
"name" : "file" ,
"template_uuid" : "688c46fb-5edb-40a3-8273-1af7923e2215" ,
"template_version" : "11" ,
"timestamp" : "1536327876" ,
"uuid" : "5b9280c4-17b4-4114-8017-44e0950d210f" ,
"Attribute" : [
{
"category" : "Payload delivery" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "filename" ,
"timestamp" : "1536327876" ,
"to_ids" : true ,
"type" : "filename" ,
"uuid" : "5b9280c4-4200-4f03-a557-4997950d210f" ,
"value" : "%UserProfile%\\Desktop\\ReadMe.html"
} ,
{
"category" : "Other" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "state" ,
"timestamp" : "1536327879" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5b9280c7-bdb8-4b91-9edb-46df950d210f" ,
"value" : "Malicious"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "File object describing a file with meta-information" ,
"meta-category" : "file" ,
"name" : "file" ,
"template_uuid" : "688c46fb-5edb-40a3-8273-1af7923e2215" ,
"template_version" : "11" ,
"timestamp" : "1536327888" ,
"uuid" : "5b9280d0-1874-4711-87ed-4299950d210f" ,
"Attribute" : [
{
"category" : "Payload delivery" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "filename" ,
"timestamp" : "1536327888" ,
"to_ids" : true ,
"type" : "filename" ,
"uuid" : "5b9280d0-a204-43f9-b463-405d950d210f" ,
"value" : "%UserProfile%\\AppData\\Roaming\\Microsoft\\660F187B8C71F670E76F70C7EDAFE4E7\\Tor\\libgcc_s_sjlj-1.dll"
} ,
{
"category" : "Other" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "state" ,
"timestamp" : "1536327889" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5b9280d1-a424-494c-93d6-4600950d210f" ,
"value" : "Malicious"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "File object describing a file with meta-information" ,
"meta-category" : "file" ,
"name" : "file" ,
"template_uuid" : "688c46fb-5edb-40a3-8273-1af7923e2215" ,
"template_version" : "11" ,
"timestamp" : "1536327899" ,
"uuid" : "5b9280db-dfe0-41f0-9f42-44c7950d210f" ,
"Attribute" : [
{
"category" : "Payload delivery" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "filename" ,
"timestamp" : "1536327899" ,
"to_ids" : true ,
"type" : "filename" ,
"uuid" : "5b9280db-0780-49ba-94b9-46c8950d210f" ,
"value" : "%UserProfile%\\AppData\\Roaming\\Microsoft\\660F187B8C71F670E76F70C7EDAFE4E7\\Tor\\libevent_extra-2-0-5.dll"
} ,
{
"category" : "Other" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "state" ,
"timestamp" : "1536327900" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5b9280dc-001c-4fa5-a889-4301950d210f" ,
"value" : "Malicious"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "File object describing a file with meta-information" ,
"meta-category" : "file" ,
"name" : "file" ,
"template_uuid" : "688c46fb-5edb-40a3-8273-1af7923e2215" ,
"template_version" : "11" ,
"timestamp" : "1536327914" ,
"uuid" : "5b9280ea-e38c-41f1-8453-47b9950d210f" ,
"Attribute" : [
{
"category" : "Payload delivery" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "filename" ,
"timestamp" : "1536327914" ,
"to_ids" : true ,
"type" : "filename" ,
"uuid" : "5b9280ea-0530-490d-bdf6-4b03950d210f" ,
"value" : "%UserProfile%\\AppData\\Roaming\\tor\\lock"
} ,
{
"category" : "Other" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "state" ,
"timestamp" : "1536327917" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "5b9280ed-a180-4fc9-80c4-46f6950d210f" ,
"value" : "Malicious"
}
]
} ,
{
"comment" : "" ,
"deleted" : false ,
"description" : "VirusTotal report" ,
"meta-category" : "misc" ,
"name" : "virustotal-report" ,
"template_uuid" : "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4" ,
"template_version" : "2" ,
"timestamp" : "1536755335" ,
"uuid" : "f04b2156-46a7-4ffe-a470-b0d0ac7ef70e" ,
"Attribute" : [
{
"category" : "Other" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : false ,
"object_relation" : "last-submission" ,
"timestamp" : "1536755338" ,
"to_ids" : false ,
"type" : "datetime" ,
"uuid" : "bff3beea-deb5-49b8-a2be-334a5603e8ac" ,
"value" : "2018-08-28T00:23:39"
} ,
{
"category" : "External analysis" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : false ,
"object_relation" : "permalink" ,
"timestamp" : "1536755342" ,
"to_ids" : false ,
"type" : "link" ,
"uuid" : "505d7436-7769-4279-9d1a-b95934d0edc8" ,
"value" : "https://www.virustotal.com/file/b81c7079fd573304bb8fb177898dfbf6acdb16ff32632dfa9ebb9c3da2a59864/analysis/1535415819/"
} ,
{
"category" : "Other" ,
"comment" : "" ,
"deleted" : false ,
"disable_correlation" : true ,
"object_relation" : "detection-ratio" ,
"timestamp" : "1536755345" ,
"to_ids" : false ,
"type" : "text" ,
"uuid" : "00c8704b-05af-405d-a5ce-13f8167612d4" ,
"value" : "45/67"
}
]
}
2023-04-21 13:25:09 +00:00
]
2023-12-14 14:30:15 +00:00
}
2023-04-21 13:25:09 +00:00
}