misp-circl-feed/feeds/circl/stix-2.1/5876a2cd-0a90-4f5b-9488-d567950d210f.json

343 lines
16 KiB
JSON
Raw Normal View History

2023-04-21 14:44:17 +00:00
{
"type": "bundle",
"id": "bundle--5876a2cd-0a90-4f5b-9488-d567950d210f",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-11T21:54:25.000Z",
"modified": "2017-01-11T21:54:25.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--5876a2cd-0a90-4f5b-9488-d567950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-11T21:54:25.000Z",
"modified": "2017-01-11T21:54:25.000Z",
"name": "OSINT - Second Wave of Shamoon 2 Attacks Identified",
"published": "2017-01-11T21:54:35Z",
"object_refs": [
"x-misp-attribute--5876a2ee-e7d0-4b7c-ba95-f74c950d210f",
"observed-data--5876a2fb-af9c-48af-a5d4-f747950d210f",
"url--5876a2fb-af9c-48af-a5d4-f747950d210f",
"indicator--5876a332-b0dc-4afe-b3ec-8845950d210f",
"indicator--5876a332-34d8-4298-b1a5-8845950d210f",
"indicator--5876a333-5758-40ee-b1ab-8845950d210f",
"indicator--5876a334-90d8-4274-8e12-8845950d210f",
"indicator--5876a433-27c0-4ff0-ac22-49fa02de0b81",
"indicator--5876a434-dd10-4e13-9056-4f1902de0b81",
"observed-data--5876a434-27f8-4a7a-ac74-4f2502de0b81",
"url--5876a434-27f8-4a7a-ac74-4f2502de0b81",
"indicator--5876a435-1de4-428a-81c5-4f1102de0b81",
"indicator--5876a436-9e30-416c-a6e5-482e02de0b81",
"observed-data--5876a436-8878-41fb-9c0e-49d902de0b81",
"url--5876a436-8878-41fb-9c0e-49d902de0b81"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"osint:source-type=\"blog-post\"",
"ms-caro-malware:malware-platform=\"Win32\"",
"misp-galaxy:tool=\"Shamoon\"",
"misp-galaxy:tool=\"Wipbot\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--5876a2ee-e7d0-4b7c-ba95-f74c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-11T21:26:06.000Z",
"modified": "2017-01-11T21:26:06.000Z",
"labels": [
"misp:type=\"comment\"",
"misp:category=\"External analysis\""
],
"x_misp_category": "External analysis",
"x_misp_type": "comment",
"x_misp_value": "In November 2016, we observed the reemergence of destructive attacks associated with the 2012 Shamoon attack campaign. We covered this attack in detail in our blog titled Shamoon 2: Return of the Disttrack Wiper, which targeted a single organization in Saudi Arabia and was set to wipe systems on November 17, 2016. Since our previous publication, we have found another, similar but different payload used to target a second organization in Saudi Arabia that was configured to wipe systems twelve days later on November 29, 2016. This latest attack potentially materially impacts one of the primary countermeasures employed against wiper attacks: Virtual Desktop Interface snapshots.\r\n\r\nThe payload used in this attack was very similar to the November 17, 2016 payload, but exhibited slightly different behaviors and contained hardcoded account credentials specific to the newly targeted organization. The hardcoded account credentials met Windows password complexity requirements, which suggests that the threat actors obtained the credentials through a previous, separate attack, similar to the November 17, 2016 attack.\r\n\r\nThe most notable thing about this latest sample is that it contains several usernames and passwords from official Huawei documentation related to their virtual desktop infrastructure (VDI) solutions, such as FusionCloud. VDI solutions can provide some protection against a destructive malware like Disttrack through the ability to load snapshots of wiped systems. The fact that the Shamoon attackers had these usernames and passwords may suggest that they intended on gaining access to these technologies at the targeted organization to increase the impact of their destructive attack. If true, this is a major development and organizations should consider adding additional safeguards in protecting the credentials related to their VDI deployment.\r\n\r\nAt this time, we have no details of the attack we believe preceded this Shamoon attack to obtain credentials. We also have no details on the delivery method used to deliver the new, similar, but different Disttrack payload in this attack."
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5876a2fb-af9c-48af-a5d4-f747950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-11T21:26:19.000Z",
"modified": "2017-01-11T21:26:19.000Z",
"first_observed": "2017-01-11T21:26:19Z",
"last_observed": "2017-01-11T21:26:19Z",
"number_observed": 1,
"object_refs": [
"url--5876a2fb-af9c-48af-a5d4-f747950d210f"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--5876a2fb-af9c-48af-a5d4-f747950d210f",
"value": "http://researchcenter.paloaltonetworks.com/2017/01/unit42-second-wave-shamoon-2-attacks-identified/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5876a332-b0dc-4afe-b3ec-8845950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-11T21:27:14.000Z",
"modified": "2017-01-11T21:27:14.000Z",
"description": "64-bit Disttrack",
"pattern": "[file:hashes.SHA256 = '010d4517c81bcdc438cb36fdf612274498d08db19bba174462ecbede7d9ce6bb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-11T21:27:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5876a332-34d8-4298-b1a5-8845950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-11T21:27:14.000Z",
"modified": "2017-01-11T21:27:14.000Z",
"description": "Communication",
"pattern": "[file:hashes.SHA256 = 'efd2f4c3fe4e9f2c9ac680a9c670cca378cef6b8776f2362ed278317bfb1fca8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-11T21:27:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5876a333-5758-40ee-b1ab-8845950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-11T21:27:15.000Z",
"modified": "2017-01-11T21:27:15.000Z",
"description": "Wiper",
"pattern": "[file:hashes.SHA256 = '113525c6bea55fa2a2c6cf406184092d743f9d099535923a12cdd9b9192009c4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-11T21:27:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5876a334-90d8-4274-8e12-8845950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-11T21:27:16.000Z",
"modified": "2017-01-11T21:27:16.000Z",
"description": "vdsk911.sys",
"pattern": "[file:hashes.SHA256 = '5a826b4fa10891cf63aae832fc645ce680a483b915c608ca26cedbb173b1b80a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-11T21:27:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5876a433-27c0-4ff0-ac22-49fa02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-11T21:31:31.000Z",
"modified": "2017-01-11T21:31:31.000Z",
"description": "vdsk911.sys - Xchecked via VT: 5a826b4fa10891cf63aae832fc645ce680a483b915c608ca26cedbb173b1b80a",
"pattern": "[file:hashes.SHA1 = '1292c7dd60214d96a71e7705e519006b9de7968f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-11T21:31:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5876a434-dd10-4e13-9056-4f1902de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-11T21:31:32.000Z",
"modified": "2017-01-11T21:31:32.000Z",
"description": "vdsk911.sys - Xchecked via VT: 5a826b4fa10891cf63aae832fc645ce680a483b915c608ca26cedbb173b1b80a",
"pattern": "[file:hashes.MD5 = '76c643ab29d497317085e5db8c799960']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-11T21:31:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5876a434-27f8-4a7a-ac74-4f2502de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-11T21:31:32.000Z",
"modified": "2017-01-11T21:31:32.000Z",
"first_observed": "2017-01-11T21:31:32Z",
"last_observed": "2017-01-11T21:31:32Z",
"number_observed": 1,
"object_refs": [
"url--5876a434-27f8-4a7a-ac74-4f2502de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--5876a434-27f8-4a7a-ac74-4f2502de0b81",
"value": "https://www.virustotal.com/file/5a826b4fa10891cf63aae832fc645ce680a483b915c608ca26cedbb173b1b80a/analysis/1484152712/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5876a435-1de4-428a-81c5-4f1102de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-11T21:31:33.000Z",
"modified": "2017-01-11T21:31:33.000Z",
"description": "64-bit Disttrack - Xchecked via VT: 010d4517c81bcdc438cb36fdf612274498d08db19bba174462ecbede7d9ce6bb",
"pattern": "[file:hashes.SHA1 = 'c8552de54ae5dba238103747b637863392616f70']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-11T21:31:33Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5876a436-9e30-416c-a6e5-482e02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-11T21:31:34.000Z",
"modified": "2017-01-11T21:31:34.000Z",
"description": "64-bit Disttrack - Xchecked via VT: 010d4517c81bcdc438cb36fdf612274498d08db19bba174462ecbede7d9ce6bb",
"pattern": "[file:hashes.MD5 = 'ba170958fd5b01967d5bcde6b1347425']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-11T21:31:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5876a436-8878-41fb-9c0e-49d902de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-11T21:31:34.000Z",
"modified": "2017-01-11T21:31:34.000Z",
"first_observed": "2017-01-11T21:31:34Z",
"last_observed": "2017-01-11T21:31:34Z",
"number_observed": 1,
"object_refs": [
"url--5876a436-8878-41fb-9c0e-49d902de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--5876a436-8878-41fb-9c0e-49d902de0b81",
"value": "https://www.virustotal.com/file/010d4517c81bcdc438cb36fdf612274498d08db19bba174462ecbede7d9ce6bb/analysis/1484152734/"
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}