2023-04-21 13:25:09 +00:00
{
2023-06-14 17:31:25 +00:00
"type" : "bundle" ,
"id" : "bundle--2e29b34e-9558-46ba-96b2-211295ece344" ,
"objects" : [
{
"type" : "identity" ,
"spec_version" : "2.1" ,
"id" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T11:21:12.000Z" ,
"modified" : "2021-02-04T11:21:12.000Z" ,
"name" : "CIRCL" ,
"identity_class" : "organization"
} ,
{
"type" : "report" ,
"spec_version" : "2.1" ,
"id" : "report--2e29b34e-9558-46ba-96b2-211295ece344" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T11:21:12.000Z" ,
"modified" : "2021-02-04T11:21:12.000Z" ,
"name" : "OSINT - Hildegard: New TeamTNT Malware Targeting Kubernetes" ,
"published" : "2021-02-04T11:21:39Z" ,
"object_refs" : [
"indicator--176f9db1-1f95-4ea1-998a-7d0253d6d45f" ,
"indicator--ea90cee2-3338-459b-bf2e-8f84edd9c74d" ,
"indicator--4f61af6e-155f-46bd-ad05-8ef20e4ca408" ,
"indicator--740ba33d-f828-4737-a56f-303cfcd290f5" ,
"indicator--2062baa3-04a0-4feb-9623-842a1aafec3c" ,
"indicator--d335ffab-1b09-4ece-a139-43524c9a871a" ,
"indicator--ccd37fe0-a473-4e9c-acb0-55f7dc917a66" ,
"indicator--85a67a9c-b76a-424c-8fd7-fd2f413deafd" ,
"indicator--282fc55b-627c-4d5e-9342-1af5184ddb5a" ,
"indicator--bdeca9c5-acfc-482a-973f-80386ddc837f" ,
"indicator--5d9e3240-96da-40be-866a-ea3fc431a40e" ,
"indicator--afa6e590-1959-4c42-b77e-1fd4a9896826" ,
"indicator--a5e1d11b-0f73-4cf4-b3ef-b8e723e6d30a" ,
"indicator--2c26666d-b912-4e8a-9f68-803f0b824429" ,
"indicator--c939eb92-cd87-408a-b2c1-5c25430c0470" ,
"indicator--33821510-4992-4ecb-84e9-1d320038a927" ,
"indicator--5ecf50d7-0d07-4c15-844a-6d2954367bc3" ,
"indicator--06a70163-a39c-4f54-bbdb-a87a814f1c99" ,
"indicator--49958838-8ef3-42ca-8053-92baf705789a" ,
"indicator--e309ca78-38e1-4c9a-ab77-b42459ff8396" ,
"indicator--778de61f-d6d7-4c20-9eb1-c75d829a3c4c" ,
"indicator--72ed2178-2db5-4c4f-a3b6-ec0f2dfe8855" ,
"indicator--e3c384cd-1c89-4a4b-a874-1652562a02b8" ,
"indicator--6020f6d1-af71-4e4a-8a12-225c0242d370" ,
"indicator--dfb15087-2708-4da2-9b47-298071b8304d" ,
"indicator--a086e984-6da5-4f73-8030-469f98c3227c" ,
"x-misp-object--94c1c886-20de-4707-b937-40b85b53bd3f" ,
"indicator--d5ed01ea-338f-445b-90e6-e5344378aa83" ,
"x-misp-object--62edf8d4-05c9-4862-8d42-f8a4806a36bc" ,
"indicator--387943cb-ee93-42dd-98b0-2c27066365df" ,
"x-misp-object--10416647-701f-4247-93af-3e201abed9b2" ,
"indicator--13c55aeb-731f-4f9f-bed7-54bc16691ee0" ,
"x-misp-object--663a8f21-2bf4-499e-9f5c-ba6bd04faa87" ,
"indicator--1cc03dbc-d46a-4ee2-aef9-82cc7ef7c97a" ,
"x-misp-object--1247892f-3395-4415-933b-581bc19ca772" ,
"indicator--0c47742b-164b-4df9-8c71-ef7acafe77cc" ,
"x-misp-object--7454fe7f-f8e1-45bc-acb5-b270c3d9d93d" ,
"indicator--b7657286-0c79-4c4e-9e45-b5c47795b70e" ,
"x-misp-object--16f3ee0a-c011-439f-8bf5-2f88b5671de2" ,
"indicator--cd4e86bb-5672-428e-ad55-00bd5ec27323" ,
"x-misp-object--31ac78bf-1fb8-40f3-8c88-a6f5c1c1ed9c" ,
"indicator--172dce95-5a65-4cf0-b710-277a5832b326" ,
"x-misp-object--cd6c16c4-35f5-474c-b49d-e5d213880efc" ,
"indicator--de8d5991-babe-4c5d-9343-0a1bd17eaba9" ,
"x-misp-object--a38d8b07-b456-42ae-b58a-036d656a2a25" ,
"indicator--3b265851-d607-41db-883a-3cdf383f8c65" ,
"x-misp-object--383195f4-cd06-40ad-b1f9-8a3f078d3c81" ,
"x-misp-object--4a242786-2019-442c-a76c-a9b208d7a3c3" ,
"note--2b0419ad-bb80-44c9-895c-eb6d227715f7" ,
"relationship--eb100704-b556-4017-bc6e-1c772b80a2ca" ,
"relationship--b67c0243-76a3-4ede-a55a-9d7a0c29776e" ,
"relationship--ec989344-a468-4679-976f-fb488ae196d4" ,
"relationship--ac705a98-c489-4f07-b0e4-f92d886a59d3" ,
"relationship--babb41c8-f139-486b-918e-e2f8098e90d6" ,
"relationship--78766512-5683-429b-995a-642c265da5f4" ,
"relationship--11965689-2da4-4ad4-ace6-481acce4a832" ,
"relationship--42cde405-306b-4759-a6e0-f904938819bf" ,
"relationship--2a2b8c24-5014-47c5-851e-fd0314fa696b" ,
"relationship--ec770b89-9926-4be5-917c-545d36624408"
] ,
"labels" : [
"Threat-Report" ,
"misp:tool=\"MISP-STIX-Converter\"" ,
"type:OSINT" ,
"osint:lifetime=\"perpetual\"" ,
"osint:certainty=\"50\""
] ,
"object_marking_refs" : [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--176f9db1-1f95-4ea1-998a-7d0253d6d45f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T08:58:34.000Z" ,
"modified" : "2021-02-04T08:58:34.000Z" ,
"description" : "This machine hosts malicious files used in the campaign and receives the collected data to this C2.\r\nHosted files: TDGG, api.key, tmate, tt.sh, sGAU.sh, t.sh, x86_64.so, xmr.sh, xmrig, xmrig.so, ziggy, xmr3.assi" ,
"pattern" : "[domain-name:value = 'the.borg.wtf' AND domain-name:resolves_to_refs[*].value = '45.9.150.36']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T08:58:34Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "network"
}
] ,
"labels" : [
"misp:name=\"domain-ip\"" ,
"misp:meta-category=\"network\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--ea90cee2-3338-459b-bf2e-8f84edd9c74d" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T08:59:13.000Z" ,
"modified" : "2021-02-04T08:59:13.000Z" ,
"description" : "The malware connects to this IP to obtain the victim host\u2019s public IP.\r\n" ,
"pattern" : "[(network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '147.75.47.199')]" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T08:59:13Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "network"
}
] ,
"labels" : [
"misp:name=\"ip-port\"" ,
"misp:meta-category=\"network\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--4f61af6e-155f-46bd-ad05-8ef20e4ca408" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T09:00:11.000Z" ,
"modified" : "2021-02-04T09:00:11.000Z" ,
"description" : "This host hosts malicious scripts and binaries.\r\nHosted files: pei.sh, pei64." ,
"pattern" : "[domain-name:value = 'teamtnt.red' AND domain-name:resolves_to_refs[*].value = '45.9.148.108']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T09:00:11Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "network"
}
] ,
"labels" : [
"misp:name=\"domain-ip\"" ,
"misp:meta-category=\"network\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--740ba33d-f828-4737-a56f-303cfcd290f5" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T09:00:59.000Z" ,
"modified" : "2021-02-04T09:00:59.000Z" ,
"description" : "This host hosts malicious scripts and binaries.\r\nHosted files: aws2.sh" ,
"pattern" : "[domain-name:value = 'borg.wtf' AND domain-name:resolves_to_refs[*].value = '45.9.148.108']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T09:00:59Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "network"
}
] ,
"labels" : [
"misp:name=\"domain-ip\"" ,
"misp:meta-category=\"network\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--2062baa3-04a0-4feb-9623-842a1aafec3c" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T09:01:53.000Z" ,
"modified" : "2021-02-04T09:01:53.000Z" ,
"description" : "This host is one of the C2s. It runs an IRC server on port 6667.\r\n" ,
"pattern" : "[domain-name:value = 'irc.borg.wtf' AND domain-name:resolves_to_refs[*].value = '123.245.9.147']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T09:01:53Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "network"
}
] ,
"labels" : [
"misp:name=\"domain-ip\"" ,
"misp:meta-category=\"network\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--d335ffab-1b09-4ece-a139-43524c9a871a" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T09:02:43.000Z" ,
"modified" : "2021-02-04T09:02:43.000Z" ,
"description" : "This host is one of the C2s. It runs an IRC server on port 6667.\r\n" ,
"pattern" : "[domain-name:value = 'sampwn.anondns.net' AND domain-name:resolves_to_refs[*].value = '13.245.9.147']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T09:02:43Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "network"
}
] ,
"labels" : [
"misp:name=\"domain-ip\"" ,
"misp:meta-category=\"network\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--ccd37fe0-a473-4e9c-acb0-55f7dc917a66" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T09:03:16.000Z" ,
"modified" : "2021-02-04T09:03:16.000Z" ,
"description" : "This host is one of the C2s. It runs an IRC server on port 6667.\r\n" ,
"pattern" : "[domain-name:resolves_to_refs[*].value = '164.68.106.96']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T09:03:16Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "network"
}
] ,
"labels" : [
"misp:name=\"domain-ip\"" ,
"misp:meta-category=\"network\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--85a67a9c-b76a-424c-8fd7-fd2f413deafd" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T09:03:47.000Z" ,
"modified" : "2021-02-04T09:03:47.000Z" ,
"description" : "This host is one of the C2s. It runs an IRC server on port 6667.\r\n" ,
"pattern" : "[domain-name:resolves_to_refs[*].value = '62.234.121.105']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T09:03:47Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "network"
}
] ,
"labels" : [
"misp:name=\"domain-ip\"" ,
"misp:meta-category=\"network\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--282fc55b-627c-4d5e-9342-1af5184ddb5a" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T09:59:06.000Z" ,
"modified" : "2021-02-04T09:59:06.000Z" ,
"pattern" : "[file:hashes.SHA256 = '2c1528253656ac09c7473911b24b243f083e60b98a19ba1bbb050979a1f38a0f' AND file:name = 'TDGGi' AND file:x_misp_text = 'script\tThis script downloads and executes tt.sh.']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T09:59:06Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--bdeca9c5-acfc-482a-973f-80386ddc837f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T09:59:06.000Z" ,
"modified" : "2021-02-04T09:59:06.000Z" ,
"pattern" : "[file:hashes.SHA256 = '2cde98579162ab165623241719b2ab33ac40f0b5d0a8ba7e7067c7aebc530172' AND file:name = 'tt.sh' AND file:x_misp_text = 'script\tThis script downloads and runs tmate. It collects system information from the victim\u2019s host and sends the collected data to C2(45.9.150[.]36)']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T09:59:06Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5d9e3240-96da-40be-866a-ea3fc431a40e" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T09:59:07.000Z" ,
"modified" : "2021-02-04T09:59:07.000Z" ,
"pattern" : "[file:hashes.SHA256 = 'b34df4b273b3bedaab531be46a0780d97b87588e93c1818158a47f7add8c7204' AND file:name = 'api.key' AND file:x_misp_text = 'text\tThe API key is used for creating a named tmate session from the compromised containers.']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T09:59:07Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--afa6e590-1959-4c42-b77e-1fd4a9896826" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T09:59:07.000Z" ,
"modified" : "2021-02-04T09:59:07.000Z" ,
"pattern" : "[file:hashes.SHA256 = 'd2fff992e40ce18ff81b9a92fa1cb93a56fb5a82c1cc428204552d8dfa1bc04f' AND file:name = 'tmate' AND file:x_misp_text = 'ELF\ttmate v2.4.0']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T09:59:07Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--a5e1d11b-0f73-4cf4-b3ef-b8e723e6d30a" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T09:59:07.000Z" ,
"modified" : "2021-02-04T09:59:07.000Z" ,
"pattern" : "[file:hashes.SHA256 = '74e3ccaea4df277e1a9c458a671db74aa47630928a7825f75994756512b09d64' AND file:name = 'sGAU.sh' AND file:x_misp_text = 'script\tThis script downloads and installs masscan. It scans Kubernetes\u2019 internal IP Kubelets running on port 10250. If masscan finds an exploitable Kubelet']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T09:59:07Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--2c26666d-b912-4e8a-9f68-803f0b824429" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T09:59:07.000Z" ,
"modified" : "2021-02-04T09:59:07.000Z" ,
"pattern" : "[file:hashes.SHA256 = '8e33496ea00218c07145396c6bcf3e25f4e38a1061f807d2d3653497a291348c' AND file:name = 'kshell' AND file:x_misp_text = 'script\tThe script performs remote code execution in containers via Kubelet\u2019s API. It also downloads and executes xmr.sh in a target container.']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T09:59:07Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--c939eb92-cd87-408a-b2c1-5c25430c0470" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T09:59:07.000Z" ,
"modified" : "2021-02-04T09:59:07.000Z" ,
"pattern" : "[file:hashes.SHA256 = '518a19aa2c3c9f895efa0d130e6355af5b5d7edf28e2a2d9b944aa358c23d887' AND file:name = 'install_monerod.bash' AND file:x_misp_text = 'script\tThe script is hosted in this Github repo. It pulls and builds the official monero project. It then creates a user named \u201cmonerodaemon\u201d and starts the monero service.']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T09:59:07Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--33821510-4992-4ecb-84e9-1d320038a927" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T09:59:07.000Z" ,
"modified" : "2021-02-04T09:59:07.000Z" ,
"pattern" : "[file:hashes.SHA256 = '5923f20010cb7c1d59aab36ba41c84cd20c25c6e64aace65dc8243ea827b537b' AND file:name = 'setup_moneroocean_miner.sh' AND file:x_misp_text = 'script\tThe script is hosted in this Github repo. It pulls and runs the MoneroOcean advanced version of xmrig.']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T09:59:07Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ecf50d7-0d07-4c15-844a-6d2954367bc3" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T09:59:07.000Z" ,
"modified" : "2021-02-04T09:59:07.000Z" ,
"pattern" : "[file:hashes.SHA256 = 'a22c2a6c2fdc5f5b962d2534aaae10d4de0379c9872f07aa10c77210ca652fa9' AND file:name = 'xmrig' AND file:x_misp_text = '(oneroocean)\tELF\txmrig 6.7.2-mo3. This binary is hosted in MoneroOcean/xmrig Github repo.']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T09:59:07Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--06a70163-a39c-4f54-bbdb-a87a814f1c99" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T09:59:07.000Z" ,
"modified" : "2021-02-04T09:59:07.000Z" ,
"pattern" : "[file:hashes.SHA256 = 'ee6dbbf85a3bb301a2e448c7fddaa4c1c6f234a8c75597ee766c66f52540d015' AND file:name = 'pei.sh' AND file:x_misp_text = 'script\tThis script downloads and executes pei64 or pei32']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T09:59:07Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--49958838-8ef3-42ca-8053-92baf705789a" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T09:59:08.000Z" ,
"modified" : "2021-02-04T09:59:08.000Z" ,
"pattern" : "[file:hashes.SHA256 = '937842811b9e2eb87c4c19354a1a790315f2669eea58b63264f751de4da5438d' AND file:name = 'pei64' AND file:x_misp_text = 'ELF\tThis is a Kubernetes penetration tool from the peirates project. The tool is capable of escalating privilege and pivoting through the Kubernetes cluster.']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T09:59:08Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--e309ca78-38e1-4c9a-ab77-b42459ff8396" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T09:59:08.000Z" ,
"modified" : "2021-02-04T09:59:08.000Z" ,
"pattern" : "[file:hashes.SHA256 = '72cff62d801c5bcb185aa299eb26f417aad843e617cf9c39c69f9dde6eb82742' AND file:name = 'pei32' AND file:x_misp_text = 'ELF\tSame as pei64']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T09:59:08Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--778de61f-d6d7-4c20-9eb1-c75d829a3c4c" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T09:59:08.000Z" ,
"modified" : "2021-02-04T09:59:08.000Z" ,
"pattern" : "[file:hashes.SHA256 = '12c5c5d556394aa107a433144c185a686aba3bb44389b7241d84bea766e2aea3' AND file:name = 'xmr3.assi' AND file:x_misp_text = 'script\tThe script downloads and runs aws2.sh']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T09:59:08Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--72ed2178-2db5-4c4f-a3b6-ec0f2dfe8855" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T09:59:08.000Z" ,
"modified" : "2021-02-04T09:59:08.000Z" ,
"pattern" : "[file:hashes.SHA256 = '053318adb15cf23075f737daa153b81ab8bd0f2958fa81cd85336ecdf3d7de4e' AND file:name = 'aws2.sh' AND file:x_misp_text = 'script\tThe script searches for cloud credentials and sends the identified credentials to C2 (the.borg[.]wtf).']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T09:59:08Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--e3c384cd-1c89-4a4b-a874-1652562a02b8" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T09:59:08.000Z" ,
"modified" : "2021-02-04T09:59:08.000Z" ,
"pattern" : "[file:hashes.SHA256 = 'e6422d97d381f255cd9e9f91f06e5e4921f070b23e4e35edd539a589b1d6aea7' AND file:name = 't.sh' AND file:x_misp_text = 'script\tThe script downloads x86_64.so and tmate from C2. It modifies ld.so.preload and starts a tmate named session. It then sends back the victim\u2019s system info and tmate session to C2.']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T09:59:08Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--6020f6d1-af71-4e4a-8a12-225c0242d370" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T09:59:08.000Z" ,
"modified" : "2021-02-04T09:59:08.000Z" ,
"pattern" : "[file:hashes.SHA256 = '77456c099facd775238086e8f9420308be432d461e55e49e1b24d96a8ea585e8' AND file:name = 'x86_64.so' AND file:x_misp_text = 'ELF\tThis shared object replaces the existing /etc/ld.so.preload file. It uses the LD_PRELOAD trick to hide the tmate process.']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T09:59:08Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--dfb15087-2708-4da2-9b47-298071b8304d" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T09:59:08.000Z" ,
"modified" : "2021-02-04T09:59:08.000Z" ,
"pattern" : "[file:hashes.SHA256 = '78f92857e18107872526feb1ae834edb9b7189df4a2129a4125a3dd8917f9983' AND file:name = 'xmrig' AND file:x_misp_text = 'ELF\txmrig v6.7.0']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T09:59:08Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--a086e984-6da5-4f73-8030-469f98c3227c" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T09:59:08.000Z" ,
"modified" : "2021-02-04T09:59:08.000Z" ,
"pattern" : "[file:hashes.SHA256 = '3de32f315fd01b7b741cfbb7dfee22c30bf7b9a5a01d7ab6690fcb42759a3e9f' AND file:name = 'xmrig.so' AND file:x_misp_text = 'ELF\tThis shared object replaces the existing /etc/ld.so.preload.']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T09:59:08Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--94c1c886-20de-4707-b937-40b85b53bd3f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T10:00:58.000Z" ,
"modified" : "2021-02-04T10:00:58.000Z" ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\""
] ,
"x_misp_attributes" : [
{
"type" : "attachment" ,
"object_relation" : "attachment" ,
"value" : "word-image.png" ,
"category" : "External analysis" ,
"uuid" : "2b389dc5-f633-400f-ab9b-660fe5041103" ,
"data" : " i V B O R w 0 K G g o A A A A N S U h E U g A A B P g A A A Q g C A Y A A A B 7 K u L Y A A A g A E l E Q V R 4 A e x d C Z g U x d m u y O L / a x I N L C b R m J g 7 R h P Z x f w m J i a a a D z Y x X j t 7 r C i K O I R V C I i o o K K y s 4 s I K A g N 8 o l t 8 j u z g y 73 H I f c i i X K I K I 4 O + V m E h + j 4 D W / 7 y 9 W 2 N N b 8 / O z G 73 d P f M u 8 + z T / d 0 V 1 d V v / X 211 + 9 / V W V E P w j A k S A C B A B I u A D B L p U 1 J 1 c P j B 8 T k k o f G V Z q K Z H I B Q e U F Y R H V U a j M w u r Y g s C g S j L 3 a u j L 5 W H o q + X V 4 Z / T A Q i n 4 c C E X / E w h G P y 8 L R i T / i Q E 5 Q A 6 Q A + Q A O U A O k A P k Q N Z w I B T 9 o i w U O R o I R T 4 N h C K H y 0 P R 98 t D 0 f 2 d B 0 W 3 B 4 L R l a W h B d V l o c i k 0 s r I k L K K a J / y Y P S 60 l D k o s 7 B 8 O m d x m 0 63 g f u P 6 t I B I g A E S A C R I A I + B W B q y r m n d w 5 t O B P Z a F I j 9 J g + M m y Y C R 6 b S i y p y w U + Y + V M 9 b 18 U V H b h u 57 M j d 41 d 9 c f + U D f L h G Z v k w D l b 5 e B 52 + T Q q h 1 y e H i n H B H Z J U d G 8 f 8 K / 4 k B O U A O k A P k A D l A D p A D 5 E C W c G C X f C K y S w 6 r 3 i G H z N 8 u K + e + J B + d t V k + O G 2 j 7 P P M W t l z z I q j 3 Y c v O d J l U K 3 l x + 5 A Z e S D s l B k f S A U m V Y S r H k o M D B c d n V F 9 V k l c + a 0 8 m t f g v U m A k S A C B A B I k A E X E C g f P C i n 5 R V R A J l o f B g R O D h q 6 M u 4 n U Z U n f 0 b 2 N X H n 14 + i b D c X l 66 V 45 d / 0 h u X D 7 B 3 L t 64 f l y 2 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
}
] ,
"x_misp_meta_category" : "file" ,
"x_misp_name" : "file"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--d5ed01ea-338f-445b-90e6-e5344378aa83" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T10:14:24.000Z" ,
"modified" : "2021-02-04T10:14:24.000Z" ,
"pattern" : "[file:hashes.MD5 = 'fe9d149dec9cd182254ace576a332f56' AND file:hashes.SHA1 = '66f858f47aebad049a58d416ca5f7916bf3ec524' AND file:hashes.SHA256 = '3de32f315fd01b7b741cfbb7dfee22c30bf7b9a5a01d7ab6690fcb42759a3e9f']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T10:14:24Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--62edf8d4-05c9-4862-8d42-f8a4806a36bc" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T10:14:24.000Z" ,
"modified" : "2021-02-04T10:14:24.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2021-02-03T19:27:51+00:00" ,
"category" : "Other" ,
"uuid" : "7cce5fc0-9644-441d-8697-37e733ef44f5"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/gui/file/3de32f315fd01b7b741cfbb7dfee22c30bf7b9a5a01d7ab6690fcb42759a3e9f/detection/f-3de32f315fd01b7b741cfbb7dfee22c30bf7b9a5a01d7ab6690fcb42759a3e9f-1612380471" ,
"category" : "Payload delivery" ,
"uuid" : "7d3b53ae-687b-416c-b654-f25154c2070d"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "36/62" ,
"category" : "Payload delivery" ,
"uuid" : "70d081db-33dd-49a8-970b-038e2fd244b2"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--387943cb-ee93-42dd-98b0-2c27066365df" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T10:14:24.000Z" ,
"modified" : "2021-02-04T10:14:24.000Z" ,
"pattern" : "[file:hashes.MD5 = '92490c9b9d3bb59aca5f106e401dfcaa' AND file:hashes.SHA1 = 'ca46d7e629475ec4dce991221d9c9f3abf4f6ad3' AND file:hashes.SHA256 = 'e6422d97d381f255cd9e9f91f06e5e4921f070b23e4e35edd539a589b1d6aea7']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T10:14:24Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--10416647-701f-4247-93af-3e201abed9b2" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T10:14:24.000Z" ,
"modified" : "2021-02-04T10:14:24.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2021-02-03T19:40:43+00:00" ,
"category" : "Other" ,
"uuid" : "d4cd28b1-b60e-44b4-9c64-7e7c4f45b5b6"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/gui/file/e6422d97d381f255cd9e9f91f06e5e4921f070b23e4e35edd539a589b1d6aea7/detection/f-e6422d97d381f255cd9e9f91f06e5e4921f070b23e4e35edd539a589b1d6aea7-1612381243" ,
"category" : "Payload delivery" ,
"uuid" : "6852adda-7ef4-4745-8c2b-fb5da0102746"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "8/60" ,
"category" : "Payload delivery" ,
"uuid" : "563c3788-bd32-4dcc-a076-af2cdfff1e33"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--13c55aeb-731f-4f9f-bed7-54bc16691ee0" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T10:14:24.000Z" ,
"modified" : "2021-02-04T10:14:24.000Z" ,
"pattern" : "[file:hashes.MD5 = '9f98db93197c6dfb27475075ae14e8ae' AND file:hashes.SHA1 = 'd849ca5d8fea568c2ccc56719d9b1bc145c64c9e' AND file:hashes.SHA256 = '053318adb15cf23075f737daa153b81ab8bd0f2958fa81cd85336ecdf3d7de4e']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T10:14:24Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--663a8f21-2bf4-499e-9f5c-ba6bd04faa87" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T10:14:24.000Z" ,
"modified" : "2021-02-04T10:14:24.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2021-02-03T19:41:02+00:00" ,
"category" : "Other" ,
"uuid" : "c032bbff-bca2-49ee-b17d-319677f87a00"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/gui/file/053318adb15cf23075f737daa153b81ab8bd0f2958fa81cd85336ecdf3d7de4e/detection/f-053318adb15cf23075f737daa153b81ab8bd0f2958fa81cd85336ecdf3d7de4e-1612381262" ,
"category" : "Payload delivery" ,
"uuid" : "a7ed5250-91ef-4cdd-9361-a9cb14637692"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "4/59" ,
"category" : "Payload delivery" ,
"uuid" : "28f8e57c-6ea4-4b49-8f71-7ef6d0ee00dd"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--1cc03dbc-d46a-4ee2-aef9-82cc7ef7c97a" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T10:14:24.000Z" ,
"modified" : "2021-02-04T10:14:24.000Z" ,
"pattern" : "[file:hashes.MD5 = '63248ffca814fec285379d27aaccf2e9' AND file:hashes.SHA1 = '661a178188ce87332779fd4e842674dd39425496' AND file:hashes.SHA256 = '72cff62d801c5bcb185aa299eb26f417aad843e617cf9c39c69f9dde6eb82742']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T10:14:24Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--1247892f-3395-4415-933b-581bc19ca772" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T10:14:24.000Z" ,
"modified" : "2021-02-04T10:14:24.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2021-02-04T06:36:23+00:00" ,
"category" : "Other" ,
"uuid" : "e482ad3f-ea53-4783-a5fc-a9df32a22e68"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/gui/file/72cff62d801c5bcb185aa299eb26f417aad843e617cf9c39c69f9dde6eb82742/detection/f-72cff62d801c5bcb185aa299eb26f417aad843e617cf9c39c69f9dde6eb82742-1612420583" ,
"category" : "Payload delivery" ,
"uuid" : "a7245756-6000-46a0-83d0-a8f046c7e488"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "3/61" ,
"category" : "Payload delivery" ,
"uuid" : "0154047d-9659-4470-bb33-127abbfd3c46"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--0c47742b-164b-4df9-8c71-ef7acafe77cc" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T10:14:24.000Z" ,
"modified" : "2021-02-04T10:14:24.000Z" ,
"pattern" : "[file:hashes.MD5 = '35ac482fafb1453f993cb7c447fb9525' AND file:hashes.SHA1 = '59e538c2a3b5a4ccf49b30b88e5571a27931aa4c' AND file:hashes.SHA256 = 'a22c2a6c2fdc5f5b962d2534aaae10d4de0379c9872f07aa10c77210ca652fa9']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T10:14:24Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--7454fe7f-f8e1-45bc-acb5-b270c3d9d93d" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T10:14:25.000Z" ,
"modified" : "2021-02-04T10:14:25.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2021-02-03T19:34:55+00:00" ,
"category" : "Other" ,
"uuid" : "f7f0be32-b20e-47e9-bff2-c3b6857999ef"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/gui/file/a22c2a6c2fdc5f5b962d2534aaae10d4de0379c9872f07aa10c77210ca652fa9/detection/f-a22c2a6c2fdc5f5b962d2534aaae10d4de0379c9872f07aa10c77210ca652fa9-1612380895" ,
"category" : "Payload delivery" ,
"uuid" : "3b209465-79f6-4244-b8f0-8d2e1f99f5b7"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "24/62" ,
"category" : "Payload delivery" ,
"uuid" : "4282e0ac-e3ea-4f2e-8d1c-244e51aa67ae"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--b7657286-0c79-4c4e-9e45-b5c47795b70e" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T10:14:25.000Z" ,
"modified" : "2021-02-04T10:14:25.000Z" ,
"pattern" : "[file:hashes.MD5 = '1aeb95215a633400d90ad8cbca9bc300' AND file:hashes.SHA1 = '31381d57d93b0c0738d2e92bce0014b69371f958' AND file:hashes.SHA256 = 'd2fff992e40ce18ff81b9a92fa1cb93a56fb5a82c1cc428204552d8dfa1bc04f']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T10:14:25Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--16f3ee0a-c011-439f-8bf5-2f88b5671de2" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T10:14:25.000Z" ,
"modified" : "2021-02-04T10:14:25.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2021-02-03T20:11:13+00:00" ,
"category" : "Other" ,
"uuid" : "14744553-4167-424e-a9ea-86c40d3ade68"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/gui/file/d2fff992e40ce18ff81b9a92fa1cb93a56fb5a82c1cc428204552d8dfa1bc04f/detection/f-d2fff992e40ce18ff81b9a92fa1cb93a56fb5a82c1cc428204552d8dfa1bc04f-1612383073" ,
"category" : "Payload delivery" ,
"uuid" : "949d6755-855d-4624-8c90-f2e9ece4f101"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "2/62" ,
"category" : "Payload delivery" ,
"uuid" : "37edadcb-4036-45d7-a086-11f69ac56b2b"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--cd4e86bb-5672-428e-ad55-00bd5ec27323" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T10:14:25.000Z" ,
"modified" : "2021-02-04T10:14:25.000Z" ,
"pattern" : "[file:hashes.MD5 = '80c202ced80965521adf1d63ba6be712' AND file:hashes.SHA1 = '9481e349e3b3942edd2346fa823611e16a375ae4' AND file:hashes.SHA256 = '77456c099facd775238086e8f9420308be432d461e55e49e1b24d96a8ea585e8']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T10:14:25Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--31ac78bf-1fb8-40f3-8c88-a6f5c1c1ed9c" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T10:14:25.000Z" ,
"modified" : "2021-02-04T10:14:25.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2021-02-03T19:31:29+00:00" ,
"category" : "Other" ,
"uuid" : "0bb828f3-37c1-453e-bbec-e3c7504adb9f"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/gui/file/77456c099facd775238086e8f9420308be432d461e55e49e1b24d96a8ea585e8/detection/f-77456c099facd775238086e8f9420308be432d461e55e49e1b24d96a8ea585e8-1612380689" ,
"category" : "Payload delivery" ,
"uuid" : "cb9b754b-9665-477f-b519-e868e5469128"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "26/63" ,
"category" : "Payload delivery" ,
"uuid" : "2b4e5d30-c772-4b53-b4be-bf6970b9f8d6"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--172dce95-5a65-4cf0-b710-277a5832b326" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T10:14:25.000Z" ,
"modified" : "2021-02-04T10:14:25.000Z" ,
"pattern" : "[file:hashes.MD5 = '70330c23a9027ba0d2d6dd552818d97b' AND file:hashes.SHA1 = 'e94aeaeae1a3df5e3778c37f7a77be43da627c7e' AND file:hashes.SHA256 = '78f92857e18107872526feb1ae834edb9b7189df4a2129a4125a3dd8917f9983']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T10:14:25Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--cd6c16c4-35f5-474c-b49d-e5d213880efc" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T10:14:25.000Z" ,
"modified" : "2021-02-04T10:14:25.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2021-02-03T19:38:56+00:00" ,
"category" : "Other" ,
"uuid" : "58d5b530-df03-43b3-a0bc-1958ed931ce3"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/gui/file/78f92857e18107872526feb1ae834edb9b7189df4a2129a4125a3dd8917f9983/detection/f-78f92857e18107872526feb1ae834edb9b7189df4a2129a4125a3dd8917f9983-1612381136" ,
"category" : "Payload delivery" ,
"uuid" : "f2e6fa65-0bcd-4147-8988-6fa1244279ab"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "30/62" ,
"category" : "Payload delivery" ,
"uuid" : "01a178ee-c1e2-4b87-bfca-f6c9b1c4e6f6"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--de8d5991-babe-4c5d-9343-0a1bd17eaba9" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T10:14:25.000Z" ,
"modified" : "2021-02-04T10:14:25.000Z" ,
"pattern" : "[file:hashes.MD5 = 'e10e607751f00516c86b35a6a3b76517' AND file:hashes.SHA1 = '841e188fb08de785a7cd43cb9ce3550ba84c21ef' AND file:hashes.SHA256 = '12c5c5d556394aa107a433144c185a686aba3bb44389b7241d84bea766e2aea3']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T10:14:25Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--a38d8b07-b456-42ae-b58a-036d656a2a25" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T10:14:25.000Z" ,
"modified" : "2021-02-04T10:14:25.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2021-02-03T19:38:17+00:00" ,
"category" : "Other" ,
"uuid" : "75e9f292-c358-4b12-897a-66c78643e7ec"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/gui/file/12c5c5d556394aa107a433144c185a686aba3bb44389b7241d84bea766e2aea3/detection/f-12c5c5d556394aa107a433144c185a686aba3bb44389b7241d84bea766e2aea3-1612381097" ,
"category" : "Payload delivery" ,
"uuid" : "70cd68f7-0a97-44d5-8a20-9e48050e725e"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "25/60" ,
"category" : "Payload delivery" ,
"uuid" : "ee1c3b33-7bae-4e3c-ba79-09d0275c372c"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--3b265851-d607-41db-883a-3cdf383f8c65" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T10:14:25.000Z" ,
"modified" : "2021-02-04T10:14:25.000Z" ,
"pattern" : "[file:hashes.MD5 = '018d88b8203bdea0fe4dc5b4baa930c4' AND file:hashes.SHA1 = '4ea685a7fc013cf3476ad13e9dcf6f08d06af85a' AND file:hashes.SHA256 = '937842811b9e2eb87c4c19354a1a790315f2669eea58b63264f751de4da5438d']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2021-02-04T10:14:25Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--383195f4-cd06-40ad-b1f9-8a3f078d3c81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T10:14:25.000Z" ,
"modified" : "2021-02-04T10:14:25.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2021-02-04T06:37:14+00:00" ,
"category" : "Other" ,
"uuid" : "d6fb239f-65d1-4aaa-b4a2-081e712bebaa"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/gui/file/937842811b9e2eb87c4c19354a1a790315f2669eea58b63264f751de4da5438d/detection/f-937842811b9e2eb87c4c19354a1a790315f2669eea58b63264f751de4da5438d-1612420634" ,
"category" : "Payload delivery" ,
"uuid" : "5639436e-48e6-4452-a771-d4475af5fe82"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "1/60" ,
"category" : "Payload delivery" ,
"uuid" : "7a643205-b7cc-437b-b564-d722e30939ed"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--4a242786-2019-442c-a76c-a9b208d7a3c3" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T11:20:59.000Z" ,
"modified" : "2021-02-04T11:20:59.000Z" ,
"labels" : [
"misp:name=\"report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "link" ,
"object_relation" : "link" ,
"value" : "https://unit42.paloaltonetworks.com/hildegard-malware-teamtnt/" ,
"category" : "External analysis" ,
"uuid" : "1765b652-f97a-46d0-b72d-148a81e51f13"
} ,
{
"type" : "text" ,
"object_relation" : "summary" ,
"value" : "In January 2021, Unit 42 researchers detected a new malware campaign targeting Kubernetes clusters. The attackers gained initial access via a misconfigured kubelet that allowed anonymous access. Once getting a foothold into a Kubernetes cluster, the malware attempted to spread over as many containers as possible and eventually launched cryptojacking operations. Based on the tactics, techniques and procedures (TTP) that the attackers used, we believe this is a new campaign from TeamTNT. We refer to this new malware as Hildegard, the username of the tmate account that the malware used.\r\n\r\nTeamTNT is known for exploiting unsecured Docker daemons and deploying malicious container images, as documented in previous research (Cetus, Black-T and TeamTNT DDoS). However, this is the first time we found TeamTNT targeting Kubernetes environments. In addition to the same tools and domains identified in TeamTNT\u2019s previous campaigns, this new malware carries multiple new capabilities that make it more stealthy and persistent. In particular, we found that TeamTNT\u2019s Hildegard malware:\r\n\r\nUses two ways to establish command and control (C2) connections: a tmate reverse shell and an Internet Relay Chat (IRC) channel.\r\nUses a known Linux process name (bioset) to disguise the malicious process.\r\nUses a library injection technique based on LD_PRELOAD to hide the malicious processes.\r\nEncrypts the malicious payload inside a binary to make automated static analysis more difficult.\r\nWe believe that this new malware campaign is still under development due to its seemingly incomplete codebase and infrastructure. At the time of writing, most of Hildegard\u2019s infrastructure has been online for only a month. The C2 domain borg[.]wtf was registered on Dec. 24, 2020, the IRC server went online on Jan. 9, 2021, and some malicious scripts have been updated frequently. The malware campaign has ~25.05 KH/s hashing power, and there is 11 XMR (~$1,500) in the wallet.\r\n\r\nThere has not been any activity since our initial detection, which indicates the threat campaign may still be in the reconnaissance and weaponization stage. However, knowing this malware\u2019s capabilities and target environments, we have good reason to believe that the group will soon launch a larger-scale attack. The malware can leverage the abundant computing resources in Kubernetes environments for cryptojacking and potentially exfiltrate sensitive data from tens to thousands of applications running in the clusters." ,
"category" : "Other" ,
"uuid" : "9e0c3854-65ec-491c-9338-42613794b6e4"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "report"
} ,
{
"type" : "note" ,
"spec_version" : "2.1" ,
"id" : "note--2b0419ad-bb80-44c9-895c-eb6d227715f7" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2021-02-04T11:21:12.000Z" ,
"modified" : "2021-02-04T11:21:12.000Z" ,
"abstract" : "Report from - https://unit42.paloaltonetworks.com/hildegard-malware-teamtnt/ (1612437672)" ,
"content" : "html [if IE]> <div class=\"alert alert-warning\"> You are using an <strong>outdated</strong> browser. Please <a href=\"http://browsehappy.com/\" > u p g r a d e y o u r b r o w s e r < / a > t o i m p r o v e y o u r e x p e r i e n c e . < / d i v > < ! [ e n d i f ] \ n * T o o l s \ n * A T O M s \ n * S p e a k i n g E v e n t s \ n * A b o u t U s \ n \ n B y J a y C h e n , A v i v S a s s o n a n d A r i e l Z e l i v a n s k y \ n \ n F e b r u a r y 3 , 2021 a t 6 : 0 0 A M \ n \ n C a t e g o r y : U n i t 42 \ n \ n T a g s : C l o u d , c o n t a i n e r s , c r y p t o j a c k i n g , D o c k e r , K u b e r n e t e s , p u b l i c c l o u d , T e a m T n T \ n \ n T h i s p o s t i s a l s o a v a i l a b l e i n : \ u 65e5 \ u 672 c \ u 8 a 9 e ( J a p a n e s e ) \ n \ n # # E x e c u t i v e S u m m a r y \ n \ n I n J a n u a r y 2021 , U n i t 42 r e s e a r c h e r s d e t e c t e d a n e w m a l w a r e c a m p a i g n t a r g e t i n g K u b e r n e t e s c l u s t e r s . T h e a t t a c k e r s g a i n e d i n i t i a l a c c e s s v i a a m i s c o n f i g u r e d k u b e l e t t h a t a l l o w e d a n o n y m o u s a c c e s s . O n c e g e t t i n g a f o o t h o l d i n t o a K u b e r n e t e s c l u s t e r , t h e m a l w a r e a t t e m p t e d t o s p r e a d o v e r a s m a n y c o n t a i n e r s a s p o s s i b l e a n d e v e n t u a l l y l a u n c h e d c r y p t o j a c k i n g o p e r a t i o n s . B a s e d o n t h e t a c t i c s , t e c h n i q u e s a n d p r o c e d u r e s ( T T P ) t h a t t h e a t t a c k e r s u s e d , w e b e l i e v e t h i s i s a n e w c a m p a i g n f r o m T e a m T N T . W e r e f e r t o t h i s n e w m a l w a r e a s * * H i l d e g a r d * * , t h e u s e r n a m e o f t h e t m a t e a c c o u n t t h a t t h e m a l w a r e u s e d . \ n \ n T e a m T N T i s k n o w n f o r e x p l o i t i n g u n s e c u r e d D o c k e r d a e m o n s a n d d e p l o y i n g m a l i c i o u s c o n t a i n e r i m a g e s , a s d o c u m e n t e d i n p r e v i o u s r e s e a r c h ( C e t u s , B l a c k - T a n d T e a m T N T D D o S ) . H o w e v e r , t h i s i s t h e f i r s t t i m e w e f o u n d T e a m T N T t a r g e t i n g K u b e r n e t e s e n v i r o n m e n t s . I n a d d i t i o n t o t h e s a m e t o o l s a n d d o m a i n s i d e n t i f i e d i n T e a m T N T \ u 2019 s p r e v i o u s c a m p a i g n s , t h i s n e w m a l w a r e c a r r i e s m u l t i p l e n e w c a p a b i l i t i e s t h a t m a k e i t m o r e s t e a l t h y a n d p e r s i s t e n t . I n p a r t i c u l a r , w e f o u n d t h a t T e a m T N T \ u 2019 s H i l d e g a r d m a l w a r e : \ n \ n \ n * U s e s t w o w a y s t o e s t a b l i s h c o m m a n d a n d c o n t r o l ( C 2 ) c o n n e c t i o n s : a t m a t e r e v e r s e s h e l l a n d a n I n t e r n e t R e l a y C h a t ( I R C ) c h a n n e l . \ n * U s e s a k n o w n L i n u x p r o c e s s n a m e ( b i o s e t ) t o d i s g u i s e t h e m a l i c i o u s p r o c e s s . \ n * U s e s a l i b r a r y i n j e c t i o n t e c h n i q u e b a s e d o n L D \ \ _ P R E L O A D t o h i d e t h e m a l i c i o u s p r o c e s s e s . \ n * E n c r y p t s t h e m a l i c i o u s p a y l o a d i n s i d e a b i n a r y t o m a k e a u t o m a t e d s t a t i c a n a l y s i s m o r e d i f f i c u l t . \ n \ n W e b e l i e v e t h a t t h i s n e w m a l w a r e c a m p a i g n i s s t i l l u n d e r d e v e l o p m e n t d u e t o i t s s e e m i n g l y i n c o m p l e t e c o d e b a s e a n d i n f r a s t r u c t u r e . A t t h e t i m e o f w r i t i n g , m o s t o f H i l d e g a r d \ u 2019 s i n f r a s t r u c t u r e h a s b e e n o n l i n e f o r o n l y a m o n t h . T h e C 2 d o m a i n b o r g [ . ] w t f w a s r e g i s t e r e d o n D e c . 24 , 2020 , t h e I R C s e r v e r w e n t o n l i n e o n J a n . 9 , 2021 , a n d s o m e m a l i c i o u s s c r i p t s h a v e b e e n u p d a t e d f r e q u e n t l y . T h e m a l w a r e c a m p a i g n h a s ~ 25.05 K H / s h a s h i n g p o w e r , a n d t h e r e i s 11 X M R ( ~ $ 1 , 500 ) i n t h e w a l l e t . \ n \ n * * T h e r e h a s n o t b e e n a n y a c t i v i t y s i n c e o u r i n i t i a l d e t e c t i o n , w h i c h i n d i c a t e s t h e t h r e a t c a m p a i g n m a y s t i l l b e i n t h e r e c o n n a i s s a n c e a n d w e a p o n i z a t i o n s t a g e . * * H o w e v e r , k n o w i n g t h i s m a l w a r e \ u 2019 s c a p a b i l i t i e s a n d t a r g e t e n v i r o n m e n t s , w e h a v e g o o d r e a s o n t o b e l i e v e t h a t t h e g r o u p w i l l s o o n l a u n c h a l a r g e r - s c a l e a t t a c k . T h e m a l w a r e c a n l e v e r a g e t h e a b u n d a n t c o m p u t i n g r e s o u r c e s i n K u b e r n e t e s e n v i r o n m e n t s f o r c r y p t o j a c k i n g a n d p o t e n t i a l l y e x f i l t r a t e s e n s i t i v e d a t a f r o m t e n s t o t h o u s a n d s o f a p p l i c a t i o n s r u n n i n g i n t h e c l u s t e r s . \ n \ n P a l o A l t o N e t w o r k s c u s t o m e r s r u n n i n g P r i s m a C l o u d a r e p r o t e c t e d f r o m t h i s t h r e a t b y t h e R u n t i m e P r o t e c t i o n f e a t u r e , C r y p t o m i n e r D e t e c t i o n f e a t u r e a n d t h e P r i s m a C l o u d C o m p u t e K u b e r n e t e s C o m p l i a n c e P r o t e c t i o n , w h i c h a l e r t s o n a n i n s u f f i c i e n t K u b e r n e t e s c o n f i g u r a t i o n a n d p r o v i d e s s e c u r e a l t e r n a t i v e s . \ n \ n # \ n \ n F i g u r e 1 . A t t a c k e r a n d m a l w a r e \ u 2019 s m o v e m e n t . # # T a c t i c s , T e c h n i q u e s a n d P r o c e d u r e s \ n \ n F i g u r e 1 i l l u s t r a t e s h o w t h e a t t a c k e r e n t e r e d , m o v e d l a t e r a l l y a n d e v e n t u a l l y p e r f o r m e d c r y p t o j a c k i n g i n m u l t i p l e c o n t a i n e r s . \ n \ n \ n 2 . T h e a t t a c k e r s t a r t e d b y e x p l o i t i n g a n u n s e c u r e d K u b e l e t o n t h e i n t e r n e t a n d s e a r c h e d f o r c o n t a i n e r s r u n n i n g i n s i d e t h e K u b e r n e t e s n o d e s . A f t e r f i n d i n g c o n t a i n e r 1 i n N o d e A , t h e a t t a c k e r a t t e m p t e d t o p e r f o r m r e m o t e c o d e e x e c u t i o n ( R C E ) i n c o n t a i n e r 1 . \ n 4 . T h e a t t a c k e r d o w n l o a d e d t m a t e a n d i s s u e d a c o m m a n d t o r u n i t a n d e s t a b l i s h a r e v e r s e s h e l l t o t m a t e . i o f r o m c o n t a i n e r 1 . T h e a t t a c k e r t h e n c o n t i n u e d t h e a t t a
"object_refs" : [
"report--2e29b34e-9558-46ba-96b2-211295ece344"
]
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
"id" : "relationship--eb100704-b556-4017-bc6e-1c772b80a2ca" ,
"created" : "1970-01-01T00:00:00.000Z" ,
"modified" : "1970-01-01T00:00:00.000Z" ,
2023-04-21 13:25:09 +00:00
"relationship_type" : "analysed-with" ,
2023-06-14 17:31:25 +00:00
"source_ref" : "indicator--d5ed01ea-338f-445b-90e6-e5344378aa83" ,
"target_ref" : "x-misp-object--62edf8d4-05c9-4862-8d42-f8a4806a36bc"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
"id" : "relationship--b67c0243-76a3-4ede-a55a-9d7a0c29776e" ,
"created" : "1970-01-01T00:00:00.000Z" ,
"modified" : "1970-01-01T00:00:00.000Z" ,
2023-04-21 13:25:09 +00:00
"relationship_type" : "analysed-with" ,
2023-06-14 17:31:25 +00:00
"source_ref" : "indicator--387943cb-ee93-42dd-98b0-2c27066365df" ,
"target_ref" : "x-misp-object--10416647-701f-4247-93af-3e201abed9b2"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
"id" : "relationship--ec989344-a468-4679-976f-fb488ae196d4" ,
"created" : "1970-01-01T00:00:00.000Z" ,
"modified" : "1970-01-01T00:00:00.000Z" ,
2023-04-21 13:25:09 +00:00
"relationship_type" : "analysed-with" ,
2023-06-14 17:31:25 +00:00
"source_ref" : "indicator--13c55aeb-731f-4f9f-bed7-54bc16691ee0" ,
"target_ref" : "x-misp-object--663a8f21-2bf4-499e-9f5c-ba6bd04faa87"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
"id" : "relationship--ac705a98-c489-4f07-b0e4-f92d886a59d3" ,
"created" : "1970-01-01T00:00:00.000Z" ,
"modified" : "1970-01-01T00:00:00.000Z" ,
2023-04-21 13:25:09 +00:00
"relationship_type" : "analysed-with" ,
2023-06-14 17:31:25 +00:00
"source_ref" : "indicator--1cc03dbc-d46a-4ee2-aef9-82cc7ef7c97a" ,
"target_ref" : "x-misp-object--1247892f-3395-4415-933b-581bc19ca772"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
"id" : "relationship--babb41c8-f139-486b-918e-e2f8098e90d6" ,
"created" : "1970-01-01T00:00:00.000Z" ,
"modified" : "1970-01-01T00:00:00.000Z" ,
2023-04-21 13:25:09 +00:00
"relationship_type" : "analysed-with" ,
2023-06-14 17:31:25 +00:00
"source_ref" : "indicator--0c47742b-164b-4df9-8c71-ef7acafe77cc" ,
"target_ref" : "x-misp-object--7454fe7f-f8e1-45bc-acb5-b270c3d9d93d"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
"id" : "relationship--78766512-5683-429b-995a-642c265da5f4" ,
"created" : "1970-01-01T00:00:00.000Z" ,
"modified" : "1970-01-01T00:00:00.000Z" ,
2023-04-21 13:25:09 +00:00
"relationship_type" : "analysed-with" ,
2023-06-14 17:31:25 +00:00
"source_ref" : "indicator--b7657286-0c79-4c4e-9e45-b5c47795b70e" ,
"target_ref" : "x-misp-object--16f3ee0a-c011-439f-8bf5-2f88b5671de2"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
"id" : "relationship--11965689-2da4-4ad4-ace6-481acce4a832" ,
"created" : "1970-01-01T00:00:00.000Z" ,
"modified" : "1970-01-01T00:00:00.000Z" ,
2023-04-21 13:25:09 +00:00
"relationship_type" : "analysed-with" ,
2023-06-14 17:31:25 +00:00
"source_ref" : "indicator--cd4e86bb-5672-428e-ad55-00bd5ec27323" ,
"target_ref" : "x-misp-object--31ac78bf-1fb8-40f3-8c88-a6f5c1c1ed9c"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
"id" : "relationship--42cde405-306b-4759-a6e0-f904938819bf" ,
"created" : "1970-01-01T00:00:00.000Z" ,
"modified" : "1970-01-01T00:00:00.000Z" ,
2023-04-21 13:25:09 +00:00
"relationship_type" : "analysed-with" ,
2023-06-14 17:31:25 +00:00
"source_ref" : "indicator--172dce95-5a65-4cf0-b710-277a5832b326" ,
"target_ref" : "x-misp-object--cd6c16c4-35f5-474c-b49d-e5d213880efc"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
"id" : "relationship--2a2b8c24-5014-47c5-851e-fd0314fa696b" ,
"created" : "1970-01-01T00:00:00.000Z" ,
"modified" : "1970-01-01T00:00:00.000Z" ,
2023-04-21 13:25:09 +00:00
"relationship_type" : "analysed-with" ,
2023-06-14 17:31:25 +00:00
"source_ref" : "indicator--de8d5991-babe-4c5d-9343-0a1bd17eaba9" ,
"target_ref" : "x-misp-object--a38d8b07-b456-42ae-b58a-036d656a2a25"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
"id" : "relationship--ec770b89-9926-4be5-917c-545d36624408" ,
"created" : "1970-01-01T00:00:00.000Z" ,
"modified" : "1970-01-01T00:00:00.000Z" ,
2023-04-21 13:25:09 +00:00
"relationship_type" : "analysed-with" ,
2023-06-14 17:31:25 +00:00
"source_ref" : "indicator--3b265851-d607-41db-883a-3cdf383f8c65" ,
"target_ref" : "x-misp-object--383195f4-cd06-40ad-b1f9-8a3f078d3c81"
} ,
{
"type" : "marking-definition" ,
"spec_version" : "2.1" ,
"id" : "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ,
"created" : "2017-01-20T00:00:00.000Z" ,
"definition_type" : "tlp" ,
"name" : "TLP:WHITE" ,
"definition" : {
"tlp" : "white"
}
}
2023-04-21 13:25:09 +00:00
]
}