2023-04-21 13:25:09 +00:00
{
2023-06-14 17:31:25 +00:00
"type" : "bundle" ,
"id" : "bundle--5aeffb23-79e0-4d58-acf9-4b28950d210f" ,
"objects" : [
{
"type" : "identity" ,
"spec_version" : "2.1" ,
"id" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-08T06:54:45.000Z" ,
"modified" : "2018-05-08T06:54:45.000Z" ,
"name" : "CIRCL" ,
"identity_class" : "organization"
} ,
{
"type" : "report" ,
"spec_version" : "2.1" ,
"id" : "report--5aeffb23-79e0-4d58-acf9-4b28950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-08T06:54:45.000Z" ,
"modified" : "2018-05-08T06:54:45.000Z" ,
"name" : "OSINT - GandCrab Version 3 Released With Autorun Feature and Desktop Background" ,
"published" : "2018-05-08T06:55:46Z" ,
"object_refs" : [
"observed-data--5aeffb57-5a94-478d-b076-48f9950d210f" ,
"url--5aeffb57-5a94-478d-b076-48f9950d210f" ,
"x-misp-attribute--5aeffb7a-362c-4b9e-94f9-4f07950d210f" ,
"observed-data--5aeffcbb-bd20-483f-bf46-4144950d210f" ,
"file--5aeffcbb-bd20-483f-bf46-4144950d210f" ,
"artifact--5aeffcbb-bd20-483f-bf46-4144950d210f" ,
"indicator--5af0006f-34a0-4125-b2be-4fb1950d210f" ,
"indicator--5af0009e-19a8-4735-af74-4d84950d210f" ,
"indicator--5af0009f-d418-498e-bcde-46cc950d210f" ,
"observed-data--5af0009f-44cc-4b48-9e3e-48d2950d210f" ,
"windows-registry-key--5af0009f-44cc-4b48-9e3e-48d2950d210f" ,
"indicator--5af000c5-b464-41aa-b3e0-40c0950d210f" ,
"indicator--5af000c5-a024-4abf-b493-4656950d210f" ,
"indicator--5af000e3-1050-49ac-961b-4672950d210f" ,
"indicator--5af000e3-0b68-46fa-972a-40c2950d210f" ,
"indicator--5af000e4-b490-40e4-8606-4826950d210f" ,
"indicator--5af000e4-1ed0-408c-838c-4a9f950d210f" ,
"indicator--5af000e5-7ecc-434b-ae09-4919950d210f" ,
"indicator--5af000e5-3744-425d-9479-49a2950d210f" ,
"indicator--50fcb2ed-e6a7-44c3-bb3e-9692652102ca" ,
"x-misp-object--ea3856a4-0979-4f6f-8dd2-a8e8c4db47ed" ,
2023-06-24 09:36:52 +00:00
"relationship--44be22f8-9444-4582-97f3-ff1ead6e9b68"
2023-06-14 17:31:25 +00:00
] ,
"labels" : [
"Threat-Report" ,
"misp:tool=\"MISP-STIX-Converter\"" ,
"misp-galaxy:ransomware=\"GandCrab\"" ,
"malware_classification:malware-category=\"Ransomware\"" ,
"circl:incident-classification=\"malware\"" ,
"osint:source-type=\"blog-post\""
] ,
"object_marking_refs" : [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--5aeffb57-5a94-478d-b076-48f9950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-08T06:54:33.000Z" ,
"modified" : "2018-05-08T06:54:33.000Z" ,
"first_observed" : "2018-05-08T06:54:33Z" ,
"last_observed" : "2018-05-08T06:54:33Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--5aeffb57-5a94-478d-b076-48f9950d210f"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\"" ,
"osint:source-type=\"blog-post\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--5aeffb57-5a94-478d-b076-48f9950d210f" ,
"value" : "https://www.bleepingcomputer.com/news/security/gandcrab-version-3-released-with-autorun-feature-and-desktop-background/"
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--5aeffb7a-362c-4b9e-94f9-4f07950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-08T06:54:33.000Z" ,
"modified" : "2018-05-08T06:54:33.000Z" ,
"labels" : [
"misp:type=\"text\"" ,
"misp:category=\"External analysis\"" ,
"osint:source-type=\"blog-post\""
] ,
"x_misp_category" : "External analysis" ,
"x_misp_type" : "text" ,
"x_misp_value" : "GandCrab version 3 was released earlier this week with a few noticeable changes. The most noticeable change is the addition of a desktop background.\r\n\r\nUnfortunately, at this time GandCrab 3 cannot be decrypted for free."
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--5aeffcbb-bd20-483f-bf46-4144950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-08T06:54:34.000Z" ,
"modified" : "2018-05-08T06:54:34.000Z" ,
"first_observed" : "2018-05-08T06:54:34Z" ,
"last_observed" : "2018-05-08T06:54:34Z" ,
"number_observed" : 1 ,
"object_refs" : [
"file--5aeffcbb-bd20-483f-bf46-4144950d210f" ,
"artifact--5aeffcbb-bd20-483f-bf46-4144950d210f"
] ,
"labels" : [
"misp:type=\"attachment\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "file" ,
"spec_version" : "2.1" ,
"id" : "file--5aeffcbb-bd20-483f-bf46-4144950d210f" ,
"name" : "gandcrabv3mail.png" ,
"content_ref" : "artifact--5aeffcbb-bd20-483f-bf46-4144950d210f"
} ,
{
"type" : "artifact" ,
"spec_version" : "2.1" ,
"id" : "artifact--5aeffcbb-bd20-483f-bf46-4144950d210f" ,
"payload_bin" : " i V B O R w 0 K G g o A A A A N S U h E U g A A A 6 w A A A I d C A Y A A A A 52 v A g A A C A A E l E Q V R 42 u y 9 a 7 B u V X n n m y + n T 3 W d r 6 e q P 6 Q / a J 9 z U q e q O 93 n w z m p 6 u 4 P e q o T U x U 1 f b T V T q U N 6 T I 2 b d H R J l a i 2 M c g K Z T S x F s Q b J R E E A W M B x O I F y 7 a C d r s 7 C B B Y K N s w S 2 o w N 7 A Z r O 5 i K A C 86 z f Z P 1 e n j X 2 m L f 3 s t a 71 n 5 m 1 X / N d 73 v v I w 5 x p h z j t 94 n v G M n / k f / 97 f a 9 Z F P / u z / z C V S m 2 z X v S i F 6 d S q d S e U z 5 L U 9 t R d 2 r 7 / 9 z P / d y e 0 M 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
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5af0006f-34a0-4125-b2be-4fb1950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-08T06:54:34.000Z" ,
"modified" : "2018-05-08T06:54:34.000Z" ,
"description" : "Ransomnote" ,
"pattern" : "[file:name = 'CRAB-DECRYPT.txt']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-08T06:54:34Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"filename\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5af0009e-19a8-4735-af74-4d84950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-07T07:30:38.000Z" ,
"modified" : "2018-05-07T07:30:38.000Z" ,
"pattern" : "[file:hashes.SHA256 = '0b193494ffbbc5396886715253582aea075f97f5c5e79b58de9a4c0c62ed9b02']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-07T07:30:38Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5af0009f-d418-498e-bcde-46cc950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-08T06:54:35.000Z" ,
"modified" : "2018-05-08T06:54:35.000Z" ,
"pattern" : "[file:name = '\\\\%AppData\\\\%\\\\Microsoft\\\\[random].exe']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-08T06:54:35Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"filename\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--5af0009f-44cc-4b48-9e3e-48d2950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-08T06:54:35.000Z" ,
"modified" : "2018-05-08T06:54:35.000Z" ,
"first_observed" : "2018-05-08T06:54:35Z" ,
"last_observed" : "2018-05-08T06:54:35Z" ,
"number_observed" : 1 ,
"object_refs" : [
"windows-registry-key--5af0009f-44cc-4b48-9e3e-48d2950d210f"
] ,
"labels" : [
"misp:type=\"regkey\"" ,
"misp:category=\"Persistence mechanism\""
]
} ,
{
"type" : "windows-registry-key" ,
"spec_version" : "2.1" ,
"id" : "windows-registry-key--5af0009f-44cc-4b48-9e3e-48d2950d210f" ,
"key" : "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce \"[random]\" = \"%AppData%\\Microsoft\\[random].exe\""
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5af000c5-b464-41aa-b3e0-40c0950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-08T06:54:36.000Z" ,
"modified" : "2018-05-08T06:54:36.000Z" ,
"pattern" : "[domain-name:value = 'ns1.wowservers.ru']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-08T06:54:36Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"hostname\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5af000c5-a024-4abf-b493-4656950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-08T06:54:36.000Z" ,
"modified" : "2018-05-08T06:54:36.000Z" ,
"pattern" : "[domain-name:value = 'carder.bit']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-08T06:54:36Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"domain\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5af000e3-1050-49ac-961b-4672950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-08T06:54:36.000Z" ,
"modified" : "2018-05-08T06:54:36.000Z" ,
"pattern" : "[url:value = 'https://www.torproject.org/']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-08T06:54:36Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5af000e3-0b68-46fa-972a-40c2950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-08T06:54:37.000Z" ,
"modified" : "2018-05-08T06:54:37.000Z" ,
"pattern" : "[url:value = 'http://gandcrab2pie73et.onion/[id]']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-08T06:54:37Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5af000e4-b490-40e4-8606-4826950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-08T06:54:37.000Z" ,
"modified" : "2018-05-08T06:54:37.000Z" ,
"pattern" : "[url:value = 'https://psi-im.org/download/']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-08T06:54:37Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5af000e4-1ed0-408c-838c-4a9f950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-08T06:54:38.000Z" ,
"modified" : "2018-05-08T06:54:38.000Z" ,
"pattern" : "[url:value = 'http://sj.ms/register.php']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-08T06:54:38Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5af000e5-7ecc-434b-ae09-4919950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-08T06:54:38.000Z" ,
"modified" : "2018-05-08T06:54:38.000Z" ,
"pattern" : "[email-message:from_ref.value = 'ransomware@sj.ms']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-08T06:54:38Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"email-src\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5af000e5-3744-425d-9479-49a2950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-08T06:54:38.000Z" ,
"modified" : "2018-05-08T06:54:38.000Z" ,
"pattern" : "[url:value = 'http://www.sfu.ca/jabber/Psi_Jabber_PC.pdf']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-08T06:54:38Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--50fcb2ed-e6a7-44c3-bb3e-9692652102ca" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-08T06:54:42.000Z" ,
"modified" : "2018-05-08T06:54:42.000Z" ,
"pattern" : "[file:hashes.MD5 = 'f7c072a322cb0b4ce491307ddad466da' AND file:hashes.SHA1 = '2cac2760211ee91015ac22470ca59be7bf3ad685' AND file:hashes.SHA256 = '0b193494ffbbc5396886715253582aea075f97f5c5e79b58de9a4c0c62ed9b02']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-08T06:54:42Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--ea3856a4-0979-4f6f-8dd2-a8e8c4db47ed" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-08T06:54:40.000Z" ,
"modified" : "2018-05-08T06:54:40.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2018-05-07T14:08:34" ,
"category" : "Other" ,
"uuid" : "5af149b0-da14-4404-b41d-44e402de0b81"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "55/65" ,
"category" : "Other" ,
"uuid" : "5af149b1-cde8-4570-ab33-409302de0b81"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/0b193494ffbbc5396886715253582aea075f97f5c5e79b58de9a4c0c62ed9b02/analysis/1525702114/" ,
"category" : "External analysis" ,
"uuid" : "5af149b1-adf0-433f-ad5d-40ae02de0b81"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2023-06-24 09:36:52 +00:00
"id" : "relationship--44be22f8-9444-4582-97f3-ff1ead6e9b68" ,
2023-06-14 17:31:25 +00:00
"created" : "2018-05-08T06:54:41.000Z" ,
"modified" : "2018-05-08T06:54:41.000Z" ,
2023-04-21 13:25:09 +00:00
"relationship_type" : "analysed-with" ,
2023-06-14 17:31:25 +00:00
"source_ref" : "indicator--50fcb2ed-e6a7-44c3-bb3e-9692652102ca" ,
"target_ref" : "x-misp-object--ea3856a4-0979-4f6f-8dd2-a8e8c4db47ed"
} ,
{
"type" : "marking-definition" ,
"spec_version" : "2.1" ,
"id" : "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ,
"created" : "2017-01-20T00:00:00.000Z" ,
"definition_type" : "tlp" ,
"name" : "TLP:WHITE" ,
"definition" : {
"tlp" : "white"
}
}
2023-04-21 13:25:09 +00:00
]
}