misp-circl-feed/feeds/circl/misp/5c3862bd-cbb4-4373-854a-4507950d210f.json

559 lines
18 KiB
JSON
Raw Normal View History

2023-04-21 13:25:09 +00:00
{
2023-12-14 14:30:15 +00:00
"Event": {
"analysis": "0",
"date": "2019-01-10",
"extends_uuid": "",
"info": "OSINT - DarkHydrus is launching attacks to targets in Middle East",
"publish_timestamp": "1547215104",
"published": true,
"threat_level_id": "3",
"timestamp": "1547215090",
"uuid": "5c3862bd-cbb4-4373-854a-4507950d210f",
"Orgc": {
"name": "CIRCL",
"uuid": "55f6ea5e-2c60-40e5-964f-47a8950d210f"
},
"Tag": [
{
"colour": "#ffffff",
"local": "0",
"name": "tlp:white",
"relationship_type": ""
},
{
"colour": "#002642",
"local": "0",
"name": "osint:source-type=\"microblog-post\"",
"relationship_type": ""
},
{
"colour": "#0088cc",
"local": "0",
"name": "misp-galaxy:threat-actor=\"DarkHydrus\"",
"relationship_type": ""
}
],
"Attribute": [
{
"category": "Network activity",
"comment": "C2",
"deleted": false,
"disable_correlation": false,
"timestamp": "1547205028",
"to_ids": true,
"type": "domain",
"uuid": "5c38798b-2654-4662-824c-4396950d210f",
"value": "edgekey.live"
},
{
"category": "Network activity",
"comment": "C2",
"deleted": false,
"disable_correlation": false,
"timestamp": "1547205028",
"to_ids": true,
"type": "domain",
"uuid": "5c38798b-90c8-46c9-b39f-4c15950d210f",
"value": "akdns.live"
},
{
"category": "Network activity",
"comment": "C2",
"deleted": false,
"disable_correlation": false,
"timestamp": "1547205028",
"to_ids": true,
"type": "domain",
"uuid": "5c38798c-9094-4420-a265-4d8e950d210f",
"value": "trafficmanager.live"
},
{
"category": "Network activity",
"comment": "C2",
"deleted": false,
"disable_correlation": false,
"timestamp": "1547205028",
"to_ids": true,
"type": "domain",
"uuid": "5c38798c-0f28-4f29-abab-485b950d210f",
"value": "akamaized.live"
},
{
"category": "Network activity",
"comment": "C2",
"deleted": false,
"disable_correlation": false,
"timestamp": "1547205028",
"to_ids": true,
"type": "domain",
"uuid": "5c38798d-9930-41e3-bb4c-4602950d210f",
"value": "akamaiedge.live"
},
{
"category": "Network activity",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1547205616",
"to_ids": true,
"type": "domain",
"uuid": "5c387bf0-a1bc-4d4b-bbd0-4f25950d210f",
"value": "0ffice365.life"
},
{
"category": "Network activity",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1547205617",
"to_ids": true,
"type": "domain",
"uuid": "5c387bf1-b66c-47f3-891f-4fad950d210f",
"value": "0ffice365.services"
},
{
"category": "Network activity",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1547205617",
"to_ids": true,
"type": "domain",
"uuid": "5c387bf1-2240-41c9-8345-4381950d210f",
"value": "0nedrive.agency"
},
{
"category": "Network activity",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1547205618",
"to_ids": true,
"type": "domain",
"uuid": "5c387bf2-4dc8-4566-b125-4d58950d210f",
"value": "akadns.live"
},
{
"category": "Network activity",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1547205618",
"to_ids": true,
"type": "domain",
"uuid": "5c387bf2-1b5c-4e6a-b7a7-4a93950d210f",
"value": "akamai.agency"
},
{
"category": "Network activity",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1547205619",
"to_ids": true,
"type": "domain",
"uuid": "5c387bf3-7318-4c6b-91cb-4cbe950d210f",
"value": "akamaiedge.services"
},
{
"category": "Network activity",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1547205619",
"to_ids": true,
"type": "domain",
"uuid": "5c387bf3-dca0-4889-b5ca-43f0950d210f",
"value": "azureedge.today"
},
{
"category": "Network activity",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1547205620",
"to_ids": true,
"type": "domain",
"uuid": "5c387bf4-e78c-446c-a120-409d950d210f",
"value": "cloudfronts.services"
},
{
"category": "Network activity",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1547205620",
"to_ids": true,
"type": "domain",
"uuid": "5c387bf4-1c08-4fda-b2bc-4e2b950d210f",
"value": "corewindows.agency"
},
{
"category": "Network activity",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1547205621",
"to_ids": true,
"type": "domain",
"uuid": "5c387bf5-8664-4050-bf65-4e7b950d210f",
"value": "hotmai1.com"
},
{
"category": "Network activity",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1547205621",
"to_ids": true,
"type": "domain",
"uuid": "5c387bf5-d908-47d6-908d-44c4950d210f",
"value": "microsoftonline.agency"
},
{
"category": "Network activity",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1547205622",
"to_ids": true,
"type": "domain",
"uuid": "5c387bf6-e0ec-4e95-a762-4bea950d210f",
"value": "microsoftonline.services"
},
{
"category": "Network activity",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1547205622",
"to_ids": true,
"type": "domain",
"uuid": "5c387bf6-7fac-4203-ab2a-42ae950d210f",
"value": "nsatc.agency"
},
{
"category": "Network activity",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1547205623",
"to_ids": true,
"type": "domain",
"uuid": "5c387bf7-1f94-4eb2-9517-4d44950d210f",
"value": "onedrive.agency"
},
{
"category": "Network activity",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1547205623",
"to_ids": true,
"type": "domain",
"uuid": "5c387bf7-80dc-4c90-a697-44e8950d210f",
"value": "phicdn.world"
},
{
"category": "Network activity",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1547205624",
"to_ids": true,
"type": "domain",
"uuid": "5c387bf8-3a88-4d16-8541-4900950d210f",
"value": "sharepoint.agency"
},
{
"category": "Network activity",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1547205625",
"to_ids": true,
"type": "domain",
"uuid": "5c387bf9-c23c-4714-911a-4775950d210f",
"value": "skydrive.agency"
},
{
"category": "Network activity",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1547205625",
"to_ids": true,
"type": "domain",
"uuid": "5c387bf9-d0d4-4452-92e6-4822950d210f",
"value": "skydrive.services"
},
{
"category": "Network activity",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1547205626",
"to_ids": true,
"type": "domain",
"uuid": "5c387bfa-afe4-4fa8-bcd5-4424950d210f",
"value": "t-msedge.world"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1547215082",
"to_ids": true,
"type": "sha256",
"uuid": "5c38a0ea-b15c-4c4a-9711-4f81950d210f",
"value": "513813af1590bc9edeb91845b454d42bbce6a5e2d43a9b0afa7692e4e500b4c8"
}
],
"Object": [
{
"comment": "",
"deleted": false,
"description": "Microblog post like a Twitter tweet or a post on a Facebook wall.",
"meta-category": "misc",
"name": "microblog",
"template_uuid": "8ec8c911-ddbe-4f5b-895b-fbff70c42a60",
"template_version": "5",
"timestamp": "1547200855",
"uuid": "5c386957-8ad4-4f9a-8623-4e65950d210f",
"Attribute": [
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "post",
"timestamp": "1547200855",
"to_ids": false,
"type": "text",
"uuid": "5c386957-00a8-4120-ae6c-4fed950d210f",
"value": "#DarkHydrus is launching attacks to targets in Middle East. DNS tunneling is used for C2 communication\r\nDropper\u00ef\u00bc\u0161\u00d8\u00a7\u00d9\u201e\u00d9\u0081\u00d9\u2021\u00d8\u00a7\u00d8\u00b1\u00d8\u00b3.xlsm\r\nVT Link\r\n(link: https://www.virustotal.com/#/file/513813af1590bc9edeb91845b454d42bbce6a5e2d43a9b0afa7692e4e500b4c8/detection) virustotal.com/#/file/513813a\u00e2\u20ac\u00a6\r\nC2:\r\n(link: http://edgekey.live) edgekey.live\r\n(link: http://akdns.live) akdns.live\r\n(link: http://trafficmanager.live) trafficmanager.live\r\n(link: http://akamaized.live) akamaized.live\r\n(link: http://akamaiedge.live) akamaiedge.live"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "type",
"timestamp": "1547200856",
"to_ids": false,
"type": "text",
"uuid": "5c386958-2034-4907-b5cf-46c6950d210f",
"value": "Twitter"
},
{
"category": "Network activity",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "url",
"timestamp": "1547200856",
"to_ids": true,
"type": "url",
"uuid": "5c386958-e384-4b74-aa65-407e950d210f",
"value": "https://mobile.twitter.com/360TIC/status/1083289987339042817"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "creation-date",
"timestamp": "1547200858",
"to_ids": false,
"type": "datetime",
"uuid": "5c38695a-03bc-4243-b51d-47cb950d210f",
"value": "2019-01-10T10:10:00"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "username",
"timestamp": "1547200859",
"to_ids": false,
"type": "text",
"uuid": "5c38695b-9268-41ea-9bb3-46c3950d210f",
"value": "360TIC"
}
]
},
{
"comment": "",
"deleted": false,
"description": "File object describing a file with meta-information",
"meta-category": "file",
"name": "file",
"template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",
"template_version": "15",
"timestamp": "1547203871",
"uuid": "5c38751f-662c-4118-91f9-4958950d210f",
"Attribute": [
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "filename",
"timestamp": "1547203872",
"to_ids": true,
"type": "filename",
"uuid": "5c387520-2fd4-48a2-9aed-41e8950d210f",
"value": "\u00d8\u00a7\u00d9\u201e\u00d9\u0081\u00d9\u2021\u00d8\u00a7\u00d8\u00b1\u00d8\u00b3.xlsm"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "state",
"timestamp": "1547203872",
"to_ids": false,
"type": "text",
"uuid": "5c387520-c730-4ff7-8514-4d6d950d210f",
"value": "Malicious"
}
]
},
{
"comment": "",
"deleted": false,
"description": "VirusTotal report",
"meta-category": "misc",
"name": "virustotal-report",
"template_uuid": "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4",
"template_version": "2",
"timestamp": "1547204953",
"uuid": "5c387959-ec94-4d79-9df5-4f0d950d210f",
"Attribute": [
{
"category": "External analysis",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "permalink",
"timestamp": "1547204953",
"to_ids": false,
"type": "link",
"uuid": "5c387959-cc74-40cc-a8dc-47f7950d210f",
"value": "https://www.virustotal.com/#/file/513813af1590bc9edeb91845b454d42bbce6a5e2d43a9b0afa7692e4e500b4c8/detection"
}
]
},
{
"comment": "",
"deleted": false,
"description": "File object describing a file with meta-information",
"meta-category": "file",
"name": "file",
"template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",
"template_version": "11",
"timestamp": "1547215088",
"uuid": "c324a824-87cf-41ab-a751-c93d2becf34f",
"ObjectReference": [
{
"comment": "",
"object_uuid": "c324a824-87cf-41ab-a751-c93d2becf34f",
"referenced_uuid": "d9ec69f3-dd11-437c-9698-c22dfc16ae0a",
2023-04-21 13:25:09 +00:00
"relationship_type": "analysed-with",
2023-12-14 14:30:15 +00:00
"timestamp": "1547215090",
"uuid": "5c38a0f2-4e80-4536-add1-4c8a02de0b81"
}
],
"Attribute": [
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "md5",
"timestamp": "1547215088",
"to_ids": true,
"type": "md5",
"uuid": "c2d5480b-0e74-4727-904d-10a7f92a2a38",
"value": "5c3f96ade0ea67eef9d25161c64e6f3e"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "sha1",
"timestamp": "1547215089",
"to_ids": true,
"type": "sha1",
"uuid": "66beb061-6e24-4bf0-b574-b30bb011261d",
"value": "524f2c9f62703027b1ebbf1fc16a4a7506d6ff20"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "sha256",
"timestamp": "1547215089",
"to_ids": true,
"type": "sha256",
"uuid": "89c2afc4-c9fc-4e5d-86d0-53dba40d54fb",
"value": "513813af1590bc9edeb91845b454d42bbce6a5e2d43a9b0afa7692e4e500b4c8"
}
]
},
{
"comment": "",
"deleted": false,
"description": "VirusTotal report",
"meta-category": "misc",
"name": "virustotal-report",
"template_uuid": "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4",
"template_version": "2",
"timestamp": "1547215089",
"uuid": "d9ec69f3-dd11-437c-9698-c22dfc16ae0a",
"Attribute": [
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "last-submission",
"timestamp": "1547215090",
"to_ids": false,
"type": "datetime",
"uuid": "8df8271d-3edf-4f7e-b5c5-c3095bf34b87",
"value": "2019-01-11T02:47:36"
},
{
"category": "External analysis",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "permalink",
"timestamp": "1547215090",
"to_ids": false,
"type": "link",
"uuid": "f60804de-35d9-41ec-b8fb-d7491bfbae93",
"value": "https://www.virustotal.com/file/513813af1590bc9edeb91845b454d42bbce6a5e2d43a9b0afa7692e4e500b4c8/analysis/1547174856/"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "detection-ratio",
"timestamp": "1547215090",
"to_ids": false,
"type": "text",
"uuid": "207065c1-4337-4a28-96c9-09d38fbf9ff1",
"value": "34/62"
}
]
}
2023-04-21 13:25:09 +00:00
]
2023-12-14 14:30:15 +00:00
}
2023-04-21 13:25:09 +00:00
}