misp-circl-feed/feeds/circl/stix-2.1/5e211b87-8f34-43f5-b02b-42e4950d210f.json

290 lines
12 KiB
JSON
Raw Normal View History

2023-04-21 14:44:17 +00:00
{
"type": "bundle",
"id": "bundle--5e211b87-8f34-43f5-b02b-42e4950d210f",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
"created": "2020-01-31T07:38:46.000Z",
"modified": "2020-01-31T07:38:46.000Z",
"name": "wilbursecurity.com",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--5e211b87-8f34-43f5-b02b-42e4950d210f",
"created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
"created": "2020-01-31T07:38:46.000Z",
"modified": "2020-01-31T07:38:46.000Z",
"name": "Ako Ransomware",
"published": "2020-01-31T07:39:04Z",
"object_refs": [
"indicator--5e211d3f-2db0-45f0-bfe5-479c950d210f",
"indicator--5e211d40-5edc-4756-8ccc-4d80950d210f",
"indicator--5e211d40-bd24-496b-b4e7-448f950d210f",
"x-misp-attribute--5e211ea9-58d4-4ef9-a5ef-40d7950d210f",
"observed-data--5e211f10-6480-42ab-8b19-4de9950d210f",
"url--5e211f10-6480-42ab-8b19-4de9950d210f",
"observed-data--5e211f39-d0a8-43d2-8995-48cf950d210f",
"network-traffic--5e211f39-d0a8-43d2-8995-48cf950d210f",
"ipv4-addr--5e211f39-d0a8-43d2-8995-48cf950d210f",
"x-misp-attribute--5e211f8e-94cc-4067-b97f-485f950d210f",
"observed-data--5e213034-de04-4974-820b-4b35950d210f",
"url--5e213034-de04-4974-820b-4b35950d210f",
"indicator--5e21d353-e354-456a-ba6b-4647950d210f",
"indicator--5e21d432-c228-4d2c-8d51-43ab950d210f"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
" Ransomware"
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5e211d3f-2db0-45f0-bfe5-479c950d210f",
"created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
"created": "2020-01-17T02:34:39.000Z",
"modified": "2020-01-17T02:34:39.000Z",
"description": "Locker.exe",
"pattern": "[file:hashes.SHA256 = 'ae8e02d15c9b45a751e4e7f177f27f5ba7663fe6ec4b53cc68a6c1f5c2a3cfd9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-01-17T02:34:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5e211d40-5edc-4756-8ccc-4d80950d210f",
"created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
"created": "2020-01-17T02:34:40.000Z",
"modified": "2020-01-17T02:34:40.000Z",
"description": "Locker.exe",
"pattern": "[file:hashes.SHA1 = 'c0501e264531f29854bdaa872eb12c30b5875200']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-01-17T02:34:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5e211d40-bd24-496b-b4e7-448f950d210f",
"created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
"created": "2020-01-17T02:34:40.000Z",
"modified": "2020-01-17T02:34:40.000Z",
"description": "Locker.exe",
"pattern": "[file:hashes.MD5 = 'ef2697aa224266b204127722771bc209']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-01-17T02:34:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--5e211ea9-58d4-4ef9-a5ef-40d7950d210f",
"created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
"created": "2020-01-17T02:45:16.000Z",
"modified": "2020-01-17T02:45:16.000Z",
"labels": [
"misp:type=\"other\"",
"misp:category=\"Other\""
],
"x_misp_category": "Other",
"x_misp_type": "other",
"x_misp_value": "Commands Run\r\nvssadmin.exe Delete Shadows /All /Quiet\r\nbcdedit.exe /set {default} recoveryenabled No\r\nbcdedit.exe /set {default} bootstatuspolicy ignoreallfailures\r\nwbadmin DELETE SYSTEMSTATEBACKUP\r\nwbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest\r\nwmic.exe SHADOWCOPY /nointeractive"
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5e211f10-6480-42ab-8b19-4de9950d210f",
"created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
"created": "2020-01-17T15:27:16.000Z",
"modified": "2020-01-17T15:27:16.000Z",
"first_observed": "2020-01-17T15:27:16Z",
"last_observed": "2020-01-17T15:27:16Z",
"number_observed": 1,
"object_refs": [
"url--5e211f10-6480-42ab-8b19-4de9950d210f"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--5e211f10-6480-42ab-8b19-4de9950d210f",
"value": "https://app.any.run/tasks/5f4740c6-023a-4214-a96a-97b05e8b440e/"
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5e211f39-d0a8-43d2-8995-48cf950d210f",
"created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
"created": "2020-01-17T02:43:05.000Z",
"modified": "2020-01-17T02:43:05.000Z",
"first_observed": "2020-01-17T02:43:05Z",
"last_observed": "2020-01-17T02:43:05Z",
"number_observed": 1,
"object_refs": [
"network-traffic--5e211f39-d0a8-43d2-8995-48cf950d210f",
"ipv4-addr--5e211f39-d0a8-43d2-8995-48cf950d210f"
],
"labels": [
"misp:type=\"ip-src\"",
"misp:category=\"Network activity\""
]
},
{
"type": "network-traffic",
"spec_version": "2.1",
"id": "network-traffic--5e211f39-d0a8-43d2-8995-48cf950d210f",
"src_ref": "ipv4-addr--5e211f39-d0a8-43d2-8995-48cf950d210f",
"protocols": [
"tcp"
]
},
{
"type": "ipv4-addr",
"spec_version": "2.1",
"id": "ipv4-addr--5e211f39-d0a8-43d2-8995-48cf950d210f",
"value": "185.167.160.83"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--5e211f8e-94cc-4067-b97f-485f950d210f",
"created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
"created": "2020-01-17T15:27:10.000Z",
"modified": "2020-01-17T15:27:10.000Z",
"labels": [
"misp:type=\"other\"",
"misp:category=\"Other\""
],
"x_misp_category": "Other",
"x_misp_type": "other",
"x_misp_value": "Tor Ransom page\r\n\r\nhttp://kwvhrdibgmmpkhkidrby4mccwqpds5za6uo2thcw5gz75qncv7rbhyad.onion/C2SNJM7PHLUI0QQV"
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5e213034-de04-4974-820b-4b35950d210f",
"created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
"created": "2020-01-17T15:41:31.000Z",
"modified": "2020-01-17T15:41:31.000Z",
"first_observed": "2020-01-17T15:41:31Z",
"last_observed": "2020-01-17T15:41:31Z",
"number_observed": 1,
"object_refs": [
"url--5e213034-de04-4974-820b-4b35950d210f"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--5e213034-de04-4974-820b-4b35950d210f",
"value": "https://wilbursecurity.com/2020/01/ako-ransomware"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5e21d353-e354-456a-ba6b-4647950d210f",
"created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
"created": "2020-01-17T15:44:10.000Z",
"modified": "2020-01-17T15:44:10.000Z",
"pattern": "[windows-registry-key:key = 'HKLM\\\\SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Policies\\\\System' AND windows-registry-key:values[0].data = '1' AND windows-registry-key:values[0].name = 'EnableLinkedConnections']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-01-17T15:44:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"registry-key\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5e21d432-c228-4d2c-8d51-43ab950d210f",
"created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f",
"created": "2020-01-17T15:35:14.000Z",
"modified": "2020-01-17T15:35:14.000Z",
"pattern": "[windows-registry-key:key = 'HKEY_CURRENT_USER\\\\Software\\\\acfg' AND windows-registry-key:values[0].data = '.(randomly generated key)' AND windows-registry-key:values[0].name = 'aid']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2020-01-17T15:35:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"registry-key\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}