2023-04-21 13:25:09 +00:00
{
2023-06-14 17:31:25 +00:00
"type" : "bundle" ,
"id" : "bundle--5cd4446a-b318-40d6-8120-473a950d210f" ,
"objects" : [
{
"type" : "identity" ,
"spec_version" : "2.1" ,
"id" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-05-09T15:22:57.000Z" ,
"modified" : "2019-05-09T15:22:57.000Z" ,
"name" : "CIRCL" ,
"identity_class" : "organization"
} ,
{
"type" : "report" ,
"spec_version" : "2.1" ,
"id" : "report--5cd4446a-b318-40d6-8120-473a950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-05-09T15:22:57.000Z" ,
"modified" : "2019-05-09T15:22:57.000Z" ,
"name" : "OSINT - keepass(dot)com spreading malware acting as the official site for KeePass password manager. Download for .dmg and .exe files are available on the site." ,
"published" : "2019-05-09T15:24:00Z" ,
"object_refs" : [
"indicator--5cd444bb-5100-4607-ab39-4e98950d210f" ,
"indicator--5cd444bb-b15c-4760-b152-4fda950d210f" ,
"indicator--5cd444ed-5814-49ff-a3f9-466a950d210f" ,
"indicator--9bc5279d-fa53-4c2f-92f1-9aac47fe4658" ,
"x-misp-object--b6903b23-45ff-4d75-ab0d-ebc19a94a7e6" ,
"indicator--2ec00d74-5d8a-4db5-9d43-1845fcfd8917" ,
"x-misp-object--b6b594cd-778d-4c19-a1e8-b04a78d6154d" ,
"x-misp-object--5cd44594-ead8-4e11-8ccb-4a0e950d210f" ,
2023-06-24 09:36:52 +00:00
"relationship--45437b2c-c486-439e-82fb-5d77c3b4f228" ,
"relationship--44ee922a-e85d-4d5d-bd6c-fdc068357e97"
2023-06-14 17:31:25 +00:00
] ,
"labels" : [
"Threat-Report" ,
"misp:tool=\"MISP-STIX-Converter\"" ,
"type:OSINT" ,
"osint:lifetime=\"perpetual\"" ,
"osint:certainty=\"50\"" ,
"misp-galaxy:mitre-attack-pattern=\"Unconditional client-side exploitation/Injected Website/Driveby - T1372\""
] ,
"object_marking_refs" : [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5cd444bb-5100-4607-ab39-4e98950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-05-09T15:18:19.000Z" ,
"modified" : "2019-05-09T15:18:19.000Z" ,
"pattern" : "[file:hashes.SHA256 = '4090224f97db5601e5b293f81ec6fe28f86d7e3d8f4592f6b9d0765831e2c966']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-05-09T15:18:19Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5cd444bb-b15c-4760-b152-4fda950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-05-09T15:18:19.000Z" ,
"modified" : "2019-05-09T15:18:19.000Z" ,
"pattern" : "[file:hashes.SHA256 = '41c82089de60c0a2fe9a51d0f8f919261d0e73cf1da0d61b835194c177787b4e']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-05-09T15:18:19Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5cd444ed-5814-49ff-a3f9-466a950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-05-09T15:19:09.000Z" ,
"modified" : "2019-05-09T15:19:09.000Z" ,
"pattern" : "[domain-name:value = 'lifopp-sacoho.com']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-05-09T15:19:09Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"domain\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--9bc5279d-fa53-4c2f-92f1-9aac47fe4658" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-05-09T15:18:28.000Z" ,
"modified" : "2019-05-09T15:18:28.000Z" ,
"pattern" : "[file:hashes.MD5 = '3590c4b2cfa63655dc14bef32659f675' AND file:hashes.SHA1 = '5b0825a4436e4908501667e1cfa91e9e39e82302' AND file:hashes.SHA256 = '4090224f97db5601e5b293f81ec6fe28f86d7e3d8f4592f6b9d0765831e2c966']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-05-09T15:18:28Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--b6903b23-45ff-4d75-ab0d-ebc19a94a7e6" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-05-09T15:18:28.000Z" ,
"modified" : "2019-05-09T15:18:28.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2019-05-08T10:03:22" ,
"category" : "Other" ,
"uuid" : "9268cd71-c418-4b6c-8ae7-b2755788dedc"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/4090224f97db5601e5b293f81ec6fe28f86d7e3d8f4592f6b9d0765831e2c966/analysis/1557309802/" ,
"category" : "Payload delivery" ,
"uuid" : "fea2b397-1408-4777-ab45-308963ac7d8b"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "31/72" ,
"category" : "Payload delivery" ,
"uuid" : "584d4279-982a-4ca3-bedf-933dd6a5b6bb"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--2ec00d74-5d8a-4db5-9d43-1845fcfd8917" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-05-09T15:18:28.000Z" ,
"modified" : "2019-05-09T15:18:28.000Z" ,
"pattern" : "[file:hashes.MD5 = '0211036d4f551610892d3da2f2377b95' AND file:hashes.SHA1 = 'b4f5d93b0eb93812018646f6b358da9592ae6499' AND file:hashes.SHA256 = '41c82089de60c0a2fe9a51d0f8f919261d0e73cf1da0d61b835194c177787b4e']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-05-09T15:18:28Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--b6b594cd-778d-4c19-a1e8-b04a78d6154d" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-05-09T15:18:28.000Z" ,
"modified" : "2019-05-09T15:18:28.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2019-05-07T11:36:35" ,
"category" : "Other" ,
"uuid" : "a6d53689-a303-42fe-8c7f-def94d11e653"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/41c82089de60c0a2fe9a51d0f8f919261d0e73cf1da0d61b835194c177787b4e/analysis/1557228995/" ,
"category" : "Payload delivery" ,
"uuid" : "eceb9e59-eff8-433b-8169-b854da49308d"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "14/56" ,
"category" : "Payload delivery" ,
"uuid" : "05cda147-431f-4496-807b-50aa24c3c031"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--5cd44594-ead8-4e11-8ccb-4a0e950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-05-09T15:21:56.000Z" ,
"modified" : "2019-05-09T15:21:56.000Z" ,
"labels" : [
"misp:name=\"microblog\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "text" ,
"object_relation" : "post" ,
"value" : "keepass(dot)com spreading malware acting as the official site for KeePass password manager. Download for .dmg and .exe files are available on the site. @malwrhunterteam" ,
"category" : "Other" ,
"uuid" : "5cd44595-8944-400e-b668-4629950d210f"
} ,
{
"type" : "text" ,
"object_relation" : "type" ,
"value" : "Twitter" ,
"category" : "Other" ,
"uuid" : "5cd44595-c004-4e7e-83c1-442b950d210f"
} ,
{
"type" : "url" ,
"object_relation" : "url" ,
"value" : "https://twitter.com/berkcgoksel/status/1125727590440931329" ,
"category" : "Network activity" ,
"uuid" : "5cd44595-d14c-4a3d-bb69-4f53950d210f"
} ,
{
"type" : "text" ,
"object_relation" : "username" ,
"value" : "berkcgoksel" ,
"category" : "Other" ,
"uuid" : "5cd44595-720c-4b7b-9eb2-42a8950d210f"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "microblog"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2023-06-24 09:36:52 +00:00
"id" : "relationship--45437b2c-c486-439e-82fb-5d77c3b4f228" ,
2023-06-14 17:31:25 +00:00
"created" : "2019-05-09T15:18:28.000Z" ,
"modified" : "2019-05-09T15:18:28.000Z" ,
2023-04-21 13:25:09 +00:00
"relationship_type" : "analysed-with" ,
2023-06-14 17:31:25 +00:00
"source_ref" : "indicator--9bc5279d-fa53-4c2f-92f1-9aac47fe4658" ,
"target_ref" : "x-misp-object--b6903b23-45ff-4d75-ab0d-ebc19a94a7e6"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2023-06-24 09:36:52 +00:00
"id" : "relationship--44ee922a-e85d-4d5d-bd6c-fdc068357e97" ,
2023-06-14 17:31:25 +00:00
"created" : "2019-05-09T15:18:28.000Z" ,
"modified" : "2019-05-09T15:18:28.000Z" ,
2023-04-21 13:25:09 +00:00
"relationship_type" : "analysed-with" ,
2023-06-14 17:31:25 +00:00
"source_ref" : "indicator--2ec00d74-5d8a-4db5-9d43-1845fcfd8917" ,
"target_ref" : "x-misp-object--b6b594cd-778d-4c19-a1e8-b04a78d6154d"
} ,
{
"type" : "marking-definition" ,
"spec_version" : "2.1" ,
"id" : "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ,
"created" : "2017-01-20T00:00:00.000Z" ,
"definition_type" : "tlp" ,
"name" : "TLP:WHITE" ,
"definition" : {
"tlp" : "white"
}
}
2023-04-21 13:25:09 +00:00
]
}