687 lines
24 KiB
JSON
687 lines
24 KiB
JSON
|
{
|
||
|
"Event": {
|
||
|
"analysis": "2",
|
||
|
"date": "2018-03-12",
|
||
|
"extends_uuid": "",
|
||
|
"info": "OSINT - APT15 is alive and strong: An analysis of RoyalCli and RoyalDNS",
|
||
|
"publish_timestamp": "1520857733",
|
||
|
"published": true,
|
||
|
"threat_level_id": "3",
|
||
|
"timestamp": "1520857725",
|
||
|
"uuid": "5aa670db-6ef0-4d81-8e90-9476950d210f",
|
||
|
"Orgc": {
|
||
|
"name": "CIRCL",
|
||
|
"uuid": "55f6ea5e-2c60-40e5-964f-47a8950d210f"
|
||
|
},
|
||
|
"Tag": [
|
||
|
{
|
||
|
"colour": "#10cb00",
|
||
|
"name": "misp-galaxy:threat-actor=\"Mirage\""
|
||
|
},
|
||
|
{
|
||
|
"colour": "#ffffff",
|
||
|
"name": "tlp:white"
|
||
|
},
|
||
|
{
|
||
|
"colour": "#00223b",
|
||
|
"name": "osint:source-type=\"blog-post\""
|
||
|
}
|
||
|
],
|
||
|
"Attribute": [
|
||
|
{
|
||
|
"category": "Network activity",
|
||
|
"comment": "Possible linked APT15 domains include:",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"timestamp": "1520857671",
|
||
|
"to_ids": true,
|
||
|
"type": "hostname",
|
||
|
"uuid": "5aa670f5-39b4-4382-9f91-0fa3950d210f",
|
||
|
"value": "micakiz.wikaba.org"
|
||
|
},
|
||
|
{
|
||
|
"category": "Network activity",
|
||
|
"comment": "Possible linked APT15 domains include:",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"timestamp": "1520857671",
|
||
|
"to_ids": true,
|
||
|
"type": "domain",
|
||
|
"uuid": "5aa670f6-d5ac-4682-9a04-0fa3950d210f",
|
||
|
"value": "cavanic9.net"
|
||
|
},
|
||
|
{
|
||
|
"category": "Network activity",
|
||
|
"comment": "Possible linked APT15 domains include:",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"timestamp": "1520857672",
|
||
|
"to_ids": true,
|
||
|
"type": "domain",
|
||
|
"uuid": "5aa670f6-d5d4-4202-9a37-0fa3950d210f",
|
||
|
"value": "ridingduck.com"
|
||
|
},
|
||
|
{
|
||
|
"category": "Network activity",
|
||
|
"comment": "Possible linked APT15 domains include:",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"timestamp": "1520857672",
|
||
|
"to_ids": true,
|
||
|
"type": "domain",
|
||
|
"uuid": "5aa670f7-0014-4df2-a56f-0fa3950d210f",
|
||
|
"value": "zipcodeterm.com"
|
||
|
},
|
||
|
{
|
||
|
"category": "Network activity",
|
||
|
"comment": "Possible linked APT15 domains include:",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"timestamp": "1520857672",
|
||
|
"to_ids": true,
|
||
|
"type": "domain",
|
||
|
"uuid": "5aa670f7-6a48-4bdf-8746-0fa3950d210f",
|
||
|
"value": "dnsapp.info"
|
||
|
},
|
||
|
{
|
||
|
"category": "Network activity",
|
||
|
"comment": "RoyalDNS backdoor was seen communicating to the domain:",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"timestamp": "1520857673",
|
||
|
"to_ids": true,
|
||
|
"type": "domain",
|
||
|
"uuid": "5aa67102-ced4-4a30-b0d7-0fa3950d210f",
|
||
|
"value": "andspurs.com"
|
||
|
},
|
||
|
{
|
||
|
"category": "Network activity",
|
||
|
"comment": "The BS2005 backdoor utilised the following domains for C2:",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"timestamp": "1520857673",
|
||
|
"to_ids": true,
|
||
|
"type": "hostname",
|
||
|
"uuid": "5aa6710e-52b4-40af-ac3b-0fa3950d210f",
|
||
|
"value": "run.linodepower.com"
|
||
|
},
|
||
|
{
|
||
|
"category": "Network activity",
|
||
|
"comment": "The BS2005 backdoor utilised the following domains for C2:",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"timestamp": "1520857673",
|
||
|
"to_ids": true,
|
||
|
"type": "hostname",
|
||
|
"uuid": "5aa6710f-fe88-4d3d-96a7-0fa3950d210f",
|
||
|
"value": "singa.linodepower.com"
|
||
|
},
|
||
|
{
|
||
|
"category": "Network activity",
|
||
|
"comment": "The BS2005 backdoor utilised the following domains for C2:",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"timestamp": "1520857674",
|
||
|
"to_ids": true,
|
||
|
"type": "hostname",
|
||
|
"uuid": "5aa6710f-50d0-4454-860d-0fa3950d210f",
|
||
|
"value": "log.autocount.org"
|
||
|
},
|
||
|
{
|
||
|
"category": "Network activity",
|
||
|
"comment": "The RoyalCli backdoor was attempting to communicate to the following domains:",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"timestamp": "1520857674",
|
||
|
"to_ids": true,
|
||
|
"type": "hostname",
|
||
|
"uuid": "5aa6711b-a1c4-40d1-92b7-0fa3950d210f",
|
||
|
"value": "news.memozilla.org"
|
||
|
},
|
||
|
{
|
||
|
"category": "Network activity",
|
||
|
"comment": "The RoyalCli backdoor was attempting to communicate to the following domains:",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"timestamp": "1520857675",
|
||
|
"to_ids": true,
|
||
|
"type": "hostname",
|
||
|
"uuid": "5aa6711b-f3b8-4787-b246-0fa3950d210f",
|
||
|
"value": "video.memozilla.org"
|
||
|
},
|
||
|
{
|
||
|
"category": "Payload delivery",
|
||
|
"comment": "Royal DNS",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"timestamp": "1520857413",
|
||
|
"to_ids": true,
|
||
|
"type": "sha256",
|
||
|
"uuid": "5aa67145-28d0-47cb-927a-d9cd950d210f",
|
||
|
"value": "bc937f6e958b339f6925023bc2af375d669084e9551fd3753e501ef26e36b39d"
|
||
|
},
|
||
|
{
|
||
|
"category": "Payload delivery",
|
||
|
"comment": "BS2005",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"timestamp": "1520857413",
|
||
|
"to_ids": true,
|
||
|
"type": "sha256",
|
||
|
"uuid": "5aa67145-68d0-4b05-a406-d9cd950d210f",
|
||
|
"value": "750d9eecd533f89b8aa13aeab173a1cf813b021b6824bc30e60f5db6fa7b950b"
|
||
|
},
|
||
|
{
|
||
|
"category": "Payload delivery",
|
||
|
"comment": "BS2005",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"timestamp": "1520857414",
|
||
|
"to_ids": true,
|
||
|
"type": "sha256",
|
||
|
"uuid": "5aa67146-a2d0-4ed0-968e-d9cd950d210f",
|
||
|
"value": "6ea9cc475d41ca07fa206eb84b10cf2bbd2392366890de5ae67241afa2f4269f"
|
||
|
},
|
||
|
{
|
||
|
"category": "Payload delivery",
|
||
|
"comment": "RoyalCli",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"timestamp": "1520857414",
|
||
|
"to_ids": true,
|
||
|
"type": "sha256",
|
||
|
"uuid": "5aa67146-e6a4-40d8-a37c-d9cd950d210f",
|
||
|
"value": "6df9b712ff56009810c4000a0ad47e41b7a6183b69416251e060b5c80cd05785"
|
||
|
},
|
||
|
{
|
||
|
"category": "Payload delivery",
|
||
|
"comment": "MS Exchange Tool",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"timestamp": "1520857414",
|
||
|
"to_ids": true,
|
||
|
"type": "sha256",
|
||
|
"uuid": "5aa67146-1288-4aa0-9671-d9cd950d210f",
|
||
|
"value": "16b868d1bef6be39f69b4e976595e7bd46b6c0595cf6bc482229dbb9e64f1bce"
|
||
|
},
|
||
|
{
|
||
|
"category": "Artifacts dropped",
|
||
|
"comment": "",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"timestamp": "1520857675",
|
||
|
"to_ids": false,
|
||
|
"type": "pdb",
|
||
|
"uuid": "5aa67163-e99c-4bf6-9649-d928950d210f",
|
||
|
"value": "%USERPROFILE%\\documents\\visual studio 2010\\Projects\\RoyalCli\\Release\\RoyalCli.pdb"
|
||
|
},
|
||
|
{
|
||
|
"category": "External analysis",
|
||
|
"comment": "",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"timestamp": "1520857676",
|
||
|
"to_ids": false,
|
||
|
"type": "text",
|
||
|
"uuid": "5aa67177-ac60-43db-9bd5-4053950d210f",
|
||
|
"value": "APT15 is alive and strong: An analysis of RoyalCli and RoyalDNS\r\nIn May 2017, NCC Group's Incident Response team reacted to an ongoing incident where our client, which provides a range of services to UK Government, suffered a network compromise involving the advanced persistent threat group APT15.\r\n\r\nAPT15 is also known as, Ke3chang, Mirage, Vixen Panda GREF and Playful Dragon.\r\nA number of sensitive documents were stolen by the attackers during the incident and we believe APT15 was targeting information related to UK government departments and military technology."
|
||
|
},
|
||
|
{
|
||
|
"category": "Other",
|
||
|
"comment": "",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"timestamp": "1520857676",
|
||
|
"to_ids": false,
|
||
|
"type": "text",
|
||
|
"uuid": "5aa671e4-c8f4-4d39-ad4b-9394950d210f",
|
||
|
"value": "5aa64b62-8f2c-4081-a6f9-4480950d210f"
|
||
|
},
|
||
|
{
|
||
|
"category": "External analysis",
|
||
|
"comment": "",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"timestamp": "1520857676",
|
||
|
"to_ids": false,
|
||
|
"type": "link",
|
||
|
"uuid": "5aa67218-06ac-49e7-baa9-d9cd950d210f",
|
||
|
"value": "https://github.com/nccgroup/Royal_APT"
|
||
|
}
|
||
|
],
|
||
|
"Object": [
|
||
|
{
|
||
|
"comment": "",
|
||
|
"deleted": false,
|
||
|
"description": "File object describing a file with meta-information",
|
||
|
"meta-category": "file",
|
||
|
"name": "file",
|
||
|
"template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",
|
||
|
"template_version": "7",
|
||
|
"timestamp": "1520857680",
|
||
|
"uuid": "0e812898-7fc4-40f8-ac95-7a23e22438de",
|
||
|
"ObjectReference": [
|
||
|
{
|
||
|
"comment": "",
|
||
|
"object_uuid": "0e812898-7fc4-40f8-ac95-7a23e22438de",
|
||
|
"referenced_uuid": "bf2e6e7d-19c6-4341-94b9-8f15b563b0b3",
|
||
|
"relationship_type": "analysed-with",
|
||
|
"timestamp": "1520857686",
|
||
|
"uuid": "5aa67256-1c04-4a97-84a8-947502de0b81"
|
||
|
}
|
||
|
],
|
||
|
"Attribute": [
|
||
|
{
|
||
|
"category": "Payload delivery",
|
||
|
"comment": "BS2005",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"object_relation": "sha1",
|
||
|
"timestamp": "1520857677",
|
||
|
"to_ids": true,
|
||
|
"type": "sha1",
|
||
|
"uuid": "5aa6724d-b8c0-487a-860b-947502de0b81",
|
||
|
"value": "201e74fd33724a872ab89f8a002a560d1ce73e54"
|
||
|
},
|
||
|
{
|
||
|
"category": "Payload delivery",
|
||
|
"comment": "BS2005",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"object_relation": "sha256",
|
||
|
"timestamp": "1520857677",
|
||
|
"to_ids": true,
|
||
|
"type": "sha256",
|
||
|
"uuid": "5aa6724d-6bd4-49c4-8c18-947502de0b81",
|
||
|
"value": "750d9eecd533f89b8aa13aeab173a1cf813b021b6824bc30e60f5db6fa7b950b"
|
||
|
},
|
||
|
{
|
||
|
"category": "Payload delivery",
|
||
|
"comment": "BS2005",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"object_relation": "md5",
|
||
|
"timestamp": "1520857678",
|
||
|
"to_ids": true,
|
||
|
"type": "md5",
|
||
|
"uuid": "5aa6724e-c468-4b60-a221-947502de0b81",
|
||
|
"value": "ed21ce2beee56f0a0b1c5a62a80c128b"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"comment": "",
|
||
|
"deleted": false,
|
||
|
"description": "VirusTotal report",
|
||
|
"meta-category": "misc",
|
||
|
"name": "virustotal-report",
|
||
|
"template_uuid": "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4",
|
||
|
"template_version": "1",
|
||
|
"timestamp": "1520857678",
|
||
|
"uuid": "bf2e6e7d-19c6-4341-94b9-8f15b563b0b3",
|
||
|
"Attribute": [
|
||
|
{
|
||
|
"category": "External analysis",
|
||
|
"comment": "BS2005",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"object_relation": "permalink",
|
||
|
"timestamp": "1520857678",
|
||
|
"to_ids": false,
|
||
|
"type": "link",
|
||
|
"uuid": "5aa6724e-e14c-4ad9-ad8e-947502de0b81",
|
||
|
"value": "https://www.virustotal.com/file/750d9eecd533f89b8aa13aeab173a1cf813b021b6824bc30e60f5db6fa7b950b/analysis/1520793006/"
|
||
|
},
|
||
|
{
|
||
|
"category": "Other",
|
||
|
"comment": "BS2005",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": true,
|
||
|
"object_relation": "detection-ratio",
|
||
|
"timestamp": "1520857679",
|
||
|
"to_ids": false,
|
||
|
"type": "text",
|
||
|
"uuid": "5aa6724f-fd84-4c88-9a54-947502de0b81",
|
||
|
"value": "44/67"
|
||
|
},
|
||
|
{
|
||
|
"category": "Other",
|
||
|
"comment": "BS2005",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"object_relation": "last-submission",
|
||
|
"timestamp": "1520857679",
|
||
|
"to_ids": false,
|
||
|
"type": "datetime",
|
||
|
"uuid": "5aa6724f-d5a8-4efc-b433-947502de0b81",
|
||
|
"value": "2018-03-11T18:30:06"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"comment": "",
|
||
|
"deleted": false,
|
||
|
"description": "File object describing a file with meta-information",
|
||
|
"meta-category": "file",
|
||
|
"name": "file",
|
||
|
"template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",
|
||
|
"template_version": "7",
|
||
|
"timestamp": "1520857682",
|
||
|
"uuid": "06f1e0a0-004c-4356-9f89-380b53274f42",
|
||
|
"ObjectReference": [
|
||
|
{
|
||
|
"comment": "",
|
||
|
"object_uuid": "06f1e0a0-004c-4356-9f89-380b53274f42",
|
||
|
"referenced_uuid": "326d28d2-bc18-4205-945a-2b3ef2cfa9fa",
|
||
|
"relationship_type": "analysed-with",
|
||
|
"timestamp": "1520857686",
|
||
|
"uuid": "5aa67256-9704-459d-8bd4-947502de0b81"
|
||
|
}
|
||
|
],
|
||
|
"Attribute": [
|
||
|
{
|
||
|
"category": "Payload delivery",
|
||
|
"comment": "Royal DNS",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"object_relation": "sha1",
|
||
|
"timestamp": "1520857679",
|
||
|
"to_ids": true,
|
||
|
"type": "sha1",
|
||
|
"uuid": "5aa6724f-0b60-4f1e-b424-947502de0b81",
|
||
|
"value": "3d4ee6cbfaeb7890bb0b2d41547849f8e2d9243f"
|
||
|
},
|
||
|
{
|
||
|
"category": "Payload delivery",
|
||
|
"comment": "Royal DNS",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"object_relation": "sha256",
|
||
|
"timestamp": "1520857679",
|
||
|
"to_ids": true,
|
||
|
"type": "sha256",
|
||
|
"uuid": "5aa6724f-cfc0-4955-b212-947502de0b81",
|
||
|
"value": "bc937f6e958b339f6925023bc2af375d669084e9551fd3753e501ef26e36b39d"
|
||
|
},
|
||
|
{
|
||
|
"category": "Payload delivery",
|
||
|
"comment": "Royal DNS",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"object_relation": "md5",
|
||
|
"timestamp": "1520857680",
|
||
|
"to_ids": true,
|
||
|
"type": "md5",
|
||
|
"uuid": "5aa67250-c2c4-4584-8881-947502de0b81",
|
||
|
"value": "941a4fc3d2a3289017cf9c56584d1168"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"comment": "",
|
||
|
"deleted": false,
|
||
|
"description": "VirusTotal report",
|
||
|
"meta-category": "misc",
|
||
|
"name": "virustotal-report",
|
||
|
"template_uuid": "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4",
|
||
|
"template_version": "1",
|
||
|
"timestamp": "1520857680",
|
||
|
"uuid": "326d28d2-bc18-4205-945a-2b3ef2cfa9fa",
|
||
|
"Attribute": [
|
||
|
{
|
||
|
"category": "External analysis",
|
||
|
"comment": "Royal DNS",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"object_relation": "permalink",
|
||
|
"timestamp": "1520857680",
|
||
|
"to_ids": false,
|
||
|
"type": "link",
|
||
|
"uuid": "5aa67250-7bc8-45a9-b533-947502de0b81",
|
||
|
"value": "https://www.virustotal.com/file/bc937f6e958b339f6925023bc2af375d669084e9551fd3753e501ef26e36b39d/analysis/1520841997/"
|
||
|
},
|
||
|
{
|
||
|
"category": "Other",
|
||
|
"comment": "Royal DNS",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": true,
|
||
|
"object_relation": "detection-ratio",
|
||
|
"timestamp": "1520857681",
|
||
|
"to_ids": false,
|
||
|
"type": "text",
|
||
|
"uuid": "5aa67251-59a4-4b15-9b43-947502de0b81",
|
||
|
"value": "7/65"
|
||
|
},
|
||
|
{
|
||
|
"category": "Other",
|
||
|
"comment": "Royal DNS",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"object_relation": "last-submission",
|
||
|
"timestamp": "1520857681",
|
||
|
"to_ids": false,
|
||
|
"type": "datetime",
|
||
|
"uuid": "5aa67251-5338-45f7-a3c9-947502de0b81",
|
||
|
"value": "2018-03-12T08:06:37"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"comment": "",
|
||
|
"deleted": false,
|
||
|
"description": "File object describing a file with meta-information",
|
||
|
"meta-category": "file",
|
||
|
"name": "file",
|
||
|
"template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",
|
||
|
"template_version": "7",
|
||
|
"timestamp": "1520857684",
|
||
|
"uuid": "f1bdc5bc-932a-4efa-9855-e8e3981fbd2f",
|
||
|
"ObjectReference": [
|
||
|
{
|
||
|
"comment": "",
|
||
|
"object_uuid": "f1bdc5bc-932a-4efa-9855-e8e3981fbd2f",
|
||
|
"referenced_uuid": "3d28abc7-0edd-438c-bd55-54bfbf90e295",
|
||
|
"relationship_type": "analysed-with",
|
||
|
"timestamp": "1520857686",
|
||
|
"uuid": "5aa67256-1c8c-4434-aaec-947502de0b81"
|
||
|
}
|
||
|
],
|
||
|
"Attribute": [
|
||
|
{
|
||
|
"category": "Payload delivery",
|
||
|
"comment": "RoyalCli",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"object_relation": "sha1",
|
||
|
"timestamp": "1520857682",
|
||
|
"to_ids": true,
|
||
|
"type": "sha1",
|
||
|
"uuid": "5aa67252-6ed4-45b9-9df8-947502de0b81",
|
||
|
"value": "a35297163ed0efcb71e63069a3115737d2fe2d1d"
|
||
|
},
|
||
|
{
|
||
|
"category": "Payload delivery",
|
||
|
"comment": "RoyalCli",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"object_relation": "sha256",
|
||
|
"timestamp": "1520857682",
|
||
|
"to_ids": true,
|
||
|
"type": "sha256",
|
||
|
"uuid": "5aa67252-c304-4294-81a7-947502de0b81",
|
||
|
"value": "6df9b712ff56009810c4000a0ad47e41b7a6183b69416251e060b5c80cd05785"
|
||
|
},
|
||
|
{
|
||
|
"category": "Payload delivery",
|
||
|
"comment": "RoyalCli",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"object_relation": "md5",
|
||
|
"timestamp": "1520857682",
|
||
|
"to_ids": true,
|
||
|
"type": "md5",
|
||
|
"uuid": "5aa67252-26e8-4190-bc90-947502de0b81",
|
||
|
"value": "5e5c9e6e710f67f4886e4f4169d02b1d"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"comment": "",
|
||
|
"deleted": false,
|
||
|
"description": "VirusTotal report",
|
||
|
"meta-category": "misc",
|
||
|
"name": "virustotal-report",
|
||
|
"template_uuid": "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4",
|
||
|
"template_version": "1",
|
||
|
"timestamp": "1520857683",
|
||
|
"uuid": "3d28abc7-0edd-438c-bd55-54bfbf90e295",
|
||
|
"Attribute": [
|
||
|
{
|
||
|
"category": "External analysis",
|
||
|
"comment": "RoyalCli",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"object_relation": "permalink",
|
||
|
"timestamp": "1520857683",
|
||
|
"to_ids": false,
|
||
|
"type": "link",
|
||
|
"uuid": "5aa67253-ffe8-4691-9928-947502de0b81",
|
||
|
"value": "https://www.virustotal.com/file/6df9b712ff56009810c4000a0ad47e41b7a6183b69416251e060b5c80cd05785/analysis/1520793104/"
|
||
|
},
|
||
|
{
|
||
|
"category": "Other",
|
||
|
"comment": "RoyalCli",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": true,
|
||
|
"object_relation": "detection-ratio",
|
||
|
"timestamp": "1520857683",
|
||
|
"to_ids": false,
|
||
|
"type": "text",
|
||
|
"uuid": "5aa67253-2ca8-410a-914b-947502de0b81",
|
||
|
"value": "45/67"
|
||
|
},
|
||
|
{
|
||
|
"category": "Other",
|
||
|
"comment": "RoyalCli",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"object_relation": "last-submission",
|
||
|
"timestamp": "1520857683",
|
||
|
"to_ids": false,
|
||
|
"type": "datetime",
|
||
|
"uuid": "5aa67253-568c-41df-8205-947502de0b81",
|
||
|
"value": "2018-03-11T18:31:44"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"comment": "",
|
||
|
"deleted": false,
|
||
|
"description": "File object describing a file with meta-information",
|
||
|
"meta-category": "file",
|
||
|
"name": "file",
|
||
|
"template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",
|
||
|
"template_version": "7",
|
||
|
"timestamp": "1520857687",
|
||
|
"uuid": "c752a171-4c3d-403e-bb4a-5dae51f2993f",
|
||
|
"ObjectReference": [
|
||
|
{
|
||
|
"comment": "",
|
||
|
"object_uuid": "c752a171-4c3d-403e-bb4a-5dae51f2993f",
|
||
|
"referenced_uuid": "8840afc4-669d-4a92-8a3e-a104c2994436",
|
||
|
"relationship_type": "analysed-with",
|
||
|
"timestamp": "1520857687",
|
||
|
"uuid": "5aa67257-4ca4-4b10-940e-947502de0b81"
|
||
|
}
|
||
|
],
|
||
|
"Attribute": [
|
||
|
{
|
||
|
"category": "Payload delivery",
|
||
|
"comment": "MS Exchange Tool",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"object_relation": "sha1",
|
||
|
"timestamp": "1520857684",
|
||
|
"to_ids": true,
|
||
|
"type": "sha1",
|
||
|
"uuid": "5aa67254-c7e4-443f-8966-947502de0b81",
|
||
|
"value": "63fbd3feb41c0b6de892b4a70a6241d123ec1e5a"
|
||
|
},
|
||
|
{
|
||
|
"category": "Payload delivery",
|
||
|
"comment": "MS Exchange Tool",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"object_relation": "sha256",
|
||
|
"timestamp": "1520857684",
|
||
|
"to_ids": true,
|
||
|
"type": "sha256",
|
||
|
"uuid": "5aa67254-1f90-49ec-af2c-947502de0b81",
|
||
|
"value": "16b868d1bef6be39f69b4e976595e7bd46b6c0595cf6bc482229dbb9e64f1bce"
|
||
|
},
|
||
|
{
|
||
|
"category": "Payload delivery",
|
||
|
"comment": "MS Exchange Tool",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"object_relation": "md5",
|
||
|
"timestamp": "1520857684",
|
||
|
"to_ids": true,
|
||
|
"type": "md5",
|
||
|
"uuid": "5aa67254-46f4-409b-843b-947502de0b81",
|
||
|
"value": "d21a7e349e796064ce10f2f6ede31c71"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"comment": "",
|
||
|
"deleted": false,
|
||
|
"description": "VirusTotal report",
|
||
|
"meta-category": "misc",
|
||
|
"name": "virustotal-report",
|
||
|
"template_uuid": "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4",
|
||
|
"template_version": "1",
|
||
|
"timestamp": "1520857685",
|
||
|
"uuid": "8840afc4-669d-4a92-8a3e-a104c2994436",
|
||
|
"Attribute": [
|
||
|
{
|
||
|
"category": "External analysis",
|
||
|
"comment": "MS Exchange Tool",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"object_relation": "permalink",
|
||
|
"timestamp": "1520857685",
|
||
|
"to_ids": false,
|
||
|
"type": "link",
|
||
|
"uuid": "5aa67255-56f0-4687-875c-947502de0b81",
|
||
|
"value": "https://www.virustotal.com/file/16b868d1bef6be39f69b4e976595e7bd46b6c0595cf6bc482229dbb9e64f1bce/analysis/1520844201/"
|
||
|
},
|
||
|
{
|
||
|
"category": "Other",
|
||
|
"comment": "MS Exchange Tool",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": true,
|
||
|
"object_relation": "detection-ratio",
|
||
|
"timestamp": "1520857685",
|
||
|
"to_ids": false,
|
||
|
"type": "text",
|
||
|
"uuid": "5aa67255-5500-48d8-9364-947502de0b81",
|
||
|
"value": "2/67"
|
||
|
},
|
||
|
{
|
||
|
"category": "Other",
|
||
|
"comment": "MS Exchange Tool",
|
||
|
"deleted": false,
|
||
|
"disable_correlation": false,
|
||
|
"object_relation": "last-submission",
|
||
|
"timestamp": "1520857685",
|
||
|
"to_ids": false,
|
||
|
"type": "datetime",
|
||
|
"uuid": "5aa67255-bb78-4fff-b7bf-947502de0b81",
|
||
|
"value": "2018-03-12T08:43:21"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
}
|