828 lines
36 KiB
JSON
828 lines
36 KiB
JSON
|
{
|
||
|
"type": "bundle",
|
||
|
"id": "bundle--5b1ace23-25c0-4c98-b257-9cc8950d210f",
|
||
|
"objects": [
|
||
|
{
|
||
|
"type": "identity",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T19:46:59.000Z",
|
||
|
"modified": "2018-06-08T19:46:59.000Z",
|
||
|
"name": "CIRCL",
|
||
|
"identity_class": "organization"
|
||
|
},
|
||
|
{
|
||
|
"type": "report",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "report--5b1ace23-25c0-4c98-b257-9cc8950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T19:46:59.000Z",
|
||
|
"modified": "2018-06-08T19:46:59.000Z",
|
||
|
"name": "OSINT - InvisiMole: surprisingly equipped spyware, undercover since 2013",
|
||
|
"published": "2018-06-08T19:47:06Z",
|
||
|
"object_refs": [
|
||
|
"observed-data--5b1ace35-e620-4825-bf2e-5ae9950d210f",
|
||
|
"url--5b1ace35-e620-4825-bf2e-5ae9950d210f",
|
||
|
"x-misp-attribute--5b1ace4b-5578-4230-9fb5-9cd4950d210f",
|
||
|
"indicator--5b1ace60-d590-4f99-969f-bb64950d210f",
|
||
|
"indicator--5b1ace61-0534-458d-8af8-bb64950d210f",
|
||
|
"indicator--5b1ace61-7f54-4349-9100-bb64950d210f",
|
||
|
"indicator--5b1ace62-fbc8-4b2f-9d24-bb64950d210f",
|
||
|
"indicator--5b1ace62-41ac-4fbe-a887-bb64950d210f",
|
||
|
"indicator--5b1acf12-34bc-4413-8203-5ae9950d210f",
|
||
|
"indicator--5b1acf12-bfbc-48ec-8748-5ae9950d210f",
|
||
|
"indicator--5b1acf13-cd78-4d22-816e-5ae9950d210f",
|
||
|
"indicator--5b1acf13-3228-47ae-b2cb-5ae9950d210f",
|
||
|
"indicator--5b1acf14-f6ec-49b6-b202-5ae9950d210f",
|
||
|
"indicator--5b1acf14-bc4c-45e7-906e-5ae9950d210f",
|
||
|
"indicator--5b1acf14-bbec-4f33-a31d-5ae9950d210f",
|
||
|
"indicator--5b1acf15-9950-483f-893b-5ae9950d210f",
|
||
|
"indicator--5b1acf15-66f4-46e8-9ce5-5ae9950d210f",
|
||
|
"indicator--5b1acf16-63b4-4024-8118-5ae9950d210f",
|
||
|
"indicator--5b1acf16-fbd4-46f0-b85b-5ae9950d210f",
|
||
|
"indicator--5b1acf36-10e0-40dd-ada5-9ddc950d210f",
|
||
|
"indicator--5b1acf36-ed10-4d47-9ae7-9ddc950d210f",
|
||
|
"indicator--5b1acf37-64fc-4c56-bd2b-9ddc950d210f",
|
||
|
"indicator--5b1acf37-41fc-46e9-b18d-9ddc950d210f",
|
||
|
"indicator--5b1acf38-9420-4075-9b47-9ddc950d210f",
|
||
|
"x-misp-attribute--5b1acf47-9ebc-4f6a-a1ea-43fb950d210f",
|
||
|
"x-misp-attribute--5b1acf47-5f08-4e3d-b95e-4aec950d210f",
|
||
|
"x-misp-attribute--5b1acf47-d580-4fe4-ac23-4400950d210f",
|
||
|
"x-misp-attribute--5b1acf47-5300-45e2-996e-4c66950d210f",
|
||
|
"x-misp-attribute--5b1acf47-e278-4e65-af1f-4458950d210f",
|
||
|
"x-misp-attribute--5b1acf47-75d8-4232-913a-40aa950d210f",
|
||
|
"x-misp-attribute--5b1acf47-ed18-489a-9699-460b950d210f",
|
||
|
"indicator--5b1acf81-6b60-4689-99aa-4184950d210f",
|
||
|
"indicator--5b1acf81-d6c4-452a-a6ad-45bb950d210f",
|
||
|
"indicator--5b1acf81-d07c-4190-932b-46e9950d210f",
|
||
|
"x-misp-object--e26da548-11e0-4052-9746-f7814d8e11b9",
|
||
|
"x-misp-object--d2836a0a-7b84-44c6-91b9-af25d4d73791",
|
||
|
"relationship--0ff8333f-ee19-4f16-b4fa-0872d7520c18"
|
||
|
],
|
||
|
"labels": [
|
||
|
"Threat-Report",
|
||
|
"misp:tool=\"MISP-STIX-Converter\"",
|
||
|
"osint:source-type=\"blog-post\""
|
||
|
],
|
||
|
"object_marking_refs": [
|
||
|
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "observed-data",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "observed-data--5b1ace35-e620-4825-bf2e-5ae9950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:43:01.000Z",
|
||
|
"modified": "2018-06-08T18:43:01.000Z",
|
||
|
"first_observed": "2018-06-08T18:43:01Z",
|
||
|
"last_observed": "2018-06-08T18:43:01Z",
|
||
|
"number_observed": 1,
|
||
|
"object_refs": [
|
||
|
"url--5b1ace35-e620-4825-bf2e-5ae9950d210f"
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"link\"",
|
||
|
"misp:category=\"External analysis\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "url",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "url--5b1ace35-e620-4825-bf2e-5ae9950d210f",
|
||
|
"value": "https://www.welivesecurity.com/2018/06/07/invisimole-equipped-spyware-undercover/"
|
||
|
},
|
||
|
{
|
||
|
"type": "x-misp-attribute",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "x-misp-attribute--5b1ace4b-5578-4230-9fb5-9cd4950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:43:23.000Z",
|
||
|
"modified": "2018-06-08T18:43:23.000Z",
|
||
|
"labels": [
|
||
|
"misp:type=\"text\"",
|
||
|
"misp:category=\"External analysis\""
|
||
|
],
|
||
|
"x_misp_category": "External analysis",
|
||
|
"x_misp_type": "text",
|
||
|
"x_misp_value": "This is the modus operandi of the two malicious components of InvisiMole. They turn the affected computer into a video camera, letting the attackers see and hear what\u00e2\u20ac\u2122s going on in the victim\u00e2\u20ac\u2122s office or wherever their device may be. Uninvited, InvisiMole\u00e2\u20ac\u2122s operators access the system, closely monitoring the victim\u00e2\u20ac\u2122s activities and stealing the victim\u00e2\u20ac\u2122s secrets.\r\n\r\nOur telemetry indicates that the malicious actors behind this malware have been active at least since 2013, yet the cyber-espionage tool was never analyzed nor detected until discovered by ESET products on compromised computers in Ukraine and Russia.\r\n\r\nThe campaign is highly targeted \u00e2\u20ac\u201c no wonder the malware has a low infection ratio, with only a few dozen computers being affected.\r\n\r\nInvisiMole has a modular architecture, starting its journey with a wrapper DLL, and performing its activities using two other modules that are embedded in its resources. Both of the modules are feature-rich backdoors, which together give it the ability to gather as much information about the target as possible.\r\n\r\nExtra measures are taken to avoid attracting the attention of the compromised user, enabling the malware to reside on the system for a longer period of time. How the spyware was spread to the infected machines is yet to be determined by further investigation. All infection vectors are possible, including installation facilitated by physical access to the machine."
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5b1ace60-d590-4f99-969f-bb64950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:43:44.000Z",
|
||
|
"modified": "2018-06-08T18:43:44.000Z",
|
||
|
"pattern": "[domain-name:value = 'activationstate.sytes.net']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2018-06-08T18:43:44Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Network activity"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"hostname\"",
|
||
|
"misp:category=\"Network activity\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5b1ace61-0534-458d-8af8-bb64950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:43:45.000Z",
|
||
|
"modified": "2018-06-08T18:43:45.000Z",
|
||
|
"pattern": "[domain-name:value = 'advstatecheck.sytes.net']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2018-06-08T18:43:45Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Network activity"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"hostname\"",
|
||
|
"misp:category=\"Network activity\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5b1ace61-7f54-4349-9100-bb64950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:43:45.000Z",
|
||
|
"modified": "2018-06-08T18:43:45.000Z",
|
||
|
"pattern": "[domain-name:value = 'akamai.sytes.net']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2018-06-08T18:43:45Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Network activity"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"hostname\"",
|
||
|
"misp:category=\"Network activity\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5b1ace62-fbc8-4b2f-9d24-bb64950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:43:46.000Z",
|
||
|
"modified": "2018-06-08T18:43:46.000Z",
|
||
|
"pattern": "[domain-name:value = 'statbfnl.sytes.net']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2018-06-08T18:43:46Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Network activity"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"hostname\"",
|
||
|
"misp:category=\"Network activity\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5b1ace62-41ac-4fbe-a887-bb64950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:43:46.000Z",
|
||
|
"modified": "2018-06-08T18:43:46.000Z",
|
||
|
"pattern": "[domain-name:value = 'updchecking.sytes.net']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2018-06-08T18:43:46Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Network activity"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"hostname\"",
|
||
|
"misp:category=\"Network activity\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5b1acf12-34bc-4413-8203-5ae9950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:46:42.000Z",
|
||
|
"modified": "2018-06-08T18:46:42.000Z",
|
||
|
"description": "2013-2014 - InvisiMole\u00e2\u20ac\u2122s C&C servers IP addresses",
|
||
|
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.165.231.85']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2018-06-08T18:46:42Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Network activity"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"ip-dst\"",
|
||
|
"misp:category=\"Network activity\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5b1acf12-bfbc-48ec-8748-5ae9950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:46:42.000Z",
|
||
|
"modified": "2018-06-08T18:46:42.000Z",
|
||
|
"description": "2013-2014 - InvisiMole\u00e2\u20ac\u2122s C&C servers IP addresses",
|
||
|
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.239.220.41']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2018-06-08T18:46:42Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Network activity"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"ip-dst\"",
|
||
|
"misp:category=\"Network activity\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5b1acf13-cd78-4d22-816e-5ae9950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:46:43.000Z",
|
||
|
"modified": "2018-06-08T18:46:43.000Z",
|
||
|
"description": "2014-2017 - InvisiMole\u00e2\u20ac\u2122s C&C servers IP addresses",
|
||
|
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.165.241.129']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2018-06-08T18:46:43Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Network activity"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"ip-dst\"",
|
||
|
"misp:category=\"Network activity\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5b1acf13-3228-47ae-b2cb-5ae9950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:46:43.000Z",
|
||
|
"modified": "2018-06-08T18:46:43.000Z",
|
||
|
"description": "2014-2016 - InvisiMole\u00e2\u20ac\u2122s C&C servers IP addresses",
|
||
|
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.165.241.153']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2018-06-08T18:46:43Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Network activity"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"ip-dst\"",
|
||
|
"misp:category=\"Network activity\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5b1acf14-f6ec-49b6-b202-5ae9950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:46:44.000Z",
|
||
|
"modified": "2018-06-08T18:46:44.000Z",
|
||
|
"description": "2014-2018 - InvisiMole\u00e2\u20ac\u2122s C&C servers IP addresses",
|
||
|
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.46.35.74']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2018-06-08T18:46:44Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Network activity"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"ip-dst\"",
|
||
|
"misp:category=\"Network activity\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5b1acf14-bc4c-45e7-906e-5ae9950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:46:44.000Z",
|
||
|
"modified": "2018-06-08T18:46:44.000Z",
|
||
|
"description": "2016-2016 - InvisiMole\u00e2\u20ac\u2122s C&C servers IP addresses",
|
||
|
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.215.111.109']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2018-06-08T18:46:44Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Network activity"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"ip-dst\"",
|
||
|
"misp:category=\"Network activity\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5b1acf14-bbec-4f33-a31d-5ae9950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:46:44.000Z",
|
||
|
"modified": "2018-06-08T18:46:44.000Z",
|
||
|
"description": "2016-2018 - InvisiMole\u00e2\u20ac\u2122s C&C servers IP addresses",
|
||
|
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '185.118.66.163']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2018-06-08T18:46:44Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Network activity"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"ip-dst\"",
|
||
|
"misp:category=\"Network activity\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5b1acf15-9950-483f-893b-5ae9950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:46:45.000Z",
|
||
|
"modified": "2018-06-08T18:46:45.000Z",
|
||
|
"description": "2017-2017 - InvisiMole\u00e2\u20ac\u2122s C&C servers IP addresses",
|
||
|
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '185.118.67.233']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2018-06-08T18:46:45Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Network activity"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"ip-dst\"",
|
||
|
"misp:category=\"Network activity\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5b1acf15-66f4-46e8-9ce5-5ae9950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:46:45.000Z",
|
||
|
"modified": "2018-06-08T18:46:45.000Z",
|
||
|
"description": "2017-2018 - InvisiMole\u00e2\u20ac\u2122s C&C servers IP addresses",
|
||
|
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '185.156.173.92']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2018-06-08T18:46:45Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Network activity"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"ip-dst\"",
|
||
|
"misp:category=\"Network activity\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5b1acf16-63b4-4024-8118-5ae9950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:46:46.000Z",
|
||
|
"modified": "2018-06-08T18:46:46.000Z",
|
||
|
"description": "2018-2018 - InvisiMole\u00e2\u20ac\u2122s C&C servers IP addresses",
|
||
|
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.165.230.241']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2018-06-08T18:46:46Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Network activity"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"ip-dst\"",
|
||
|
"misp:category=\"Network activity\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5b1acf16-fbd4-46f0-b85b-5ae9950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:46:46.000Z",
|
||
|
"modified": "2018-06-08T18:46:46.000Z",
|
||
|
"description": "2018-2018 - InvisiMole\u00e2\u20ac\u2122s C&C servers IP addresses",
|
||
|
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '194.187.249.157']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2018-06-08T18:46:46Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Network activity"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"ip-dst\"",
|
||
|
"misp:category=\"Network activity\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5b1acf36-10e0-40dd-ada5-9ddc950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:47:18.000Z",
|
||
|
"modified": "2018-06-08T18:47:18.000Z",
|
||
|
"pattern": "[file:hashes.SHA1 = '5ee6e0410052029eafa10d1669ae3aa04b508bf9']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2018-06-08T18:47:18Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"sha1\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5b1acf36-ed10-4d47-9ae7-9ddc950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:47:18.000Z",
|
||
|
"modified": "2018-06-08T18:47:18.000Z",
|
||
|
"pattern": "[file:hashes.SHA1 = '2fcc87ab226f4a1cc713b13a12421468c82cd586']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2018-06-08T18:47:18Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"sha1\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5b1acf37-64fc-4c56-bd2b-9ddc950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:47:19.000Z",
|
||
|
"modified": "2018-06-08T18:47:19.000Z",
|
||
|
"pattern": "[file:hashes.SHA1 = 'b6ba65a48ffeb800c29822265190b8eaea3935b1']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2018-06-08T18:47:19Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"sha1\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5b1acf37-41fc-46e9-b18d-9ddc950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:47:19.000Z",
|
||
|
"modified": "2018-06-08T18:47:19.000Z",
|
||
|
"pattern": "[file:hashes.SHA1 = 'c8c4b6bcb4b583ba69663ec3aed8e1e01f310f9f']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2018-06-08T18:47:19Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"sha1\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5b1acf38-9420-4075-9b47-9ddc950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:47:20.000Z",
|
||
|
"modified": "2018-06-08T18:47:20.000Z",
|
||
|
"pattern": "[file:hashes.SHA1 = 'a5a20bc333f22fd89c34a532680173cbcd287ff8']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2018-06-08T18:47:20Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"sha1\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "x-misp-attribute",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "x-misp-attribute--5b1acf47-9ebc-4f6a-a1ea-43fb950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:47:35.000Z",
|
||
|
"modified": "2018-06-08T18:47:35.000Z",
|
||
|
"labels": [
|
||
|
"misp:type=\"text\"",
|
||
|
"misp:category=\"Antivirus detection\""
|
||
|
],
|
||
|
"x_misp_category": "Antivirus detection",
|
||
|
"x_misp_type": "text",
|
||
|
"x_misp_value": "Win32/InvisiMole.A"
|
||
|
},
|
||
|
{
|
||
|
"type": "x-misp-attribute",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "x-misp-attribute--5b1acf47-5f08-4e3d-b95e-4aec950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:47:35.000Z",
|
||
|
"modified": "2018-06-08T18:47:35.000Z",
|
||
|
"labels": [
|
||
|
"misp:type=\"text\"",
|
||
|
"misp:category=\"Antivirus detection\""
|
||
|
],
|
||
|
"x_misp_category": "Antivirus detection",
|
||
|
"x_misp_type": "text",
|
||
|
"x_misp_value": "Win32/InvisiMole.B"
|
||
|
},
|
||
|
{
|
||
|
"type": "x-misp-attribute",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "x-misp-attribute--5b1acf47-d580-4fe4-ac23-4400950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:47:35.000Z",
|
||
|
"modified": "2018-06-08T18:47:35.000Z",
|
||
|
"labels": [
|
||
|
"misp:type=\"text\"",
|
||
|
"misp:category=\"Antivirus detection\""
|
||
|
],
|
||
|
"x_misp_category": "Antivirus detection",
|
||
|
"x_misp_type": "text",
|
||
|
"x_misp_value": "Win32/InvisiMole.C"
|
||
|
},
|
||
|
{
|
||
|
"type": "x-misp-attribute",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "x-misp-attribute--5b1acf47-5300-45e2-996e-4c66950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:47:35.000Z",
|
||
|
"modified": "2018-06-08T18:47:35.000Z",
|
||
|
"labels": [
|
||
|
"misp:type=\"text\"",
|
||
|
"misp:category=\"Antivirus detection\""
|
||
|
],
|
||
|
"x_misp_category": "Antivirus detection",
|
||
|
"x_misp_type": "text",
|
||
|
"x_misp_value": "Win32/InvisiMole.D"
|
||
|
},
|
||
|
{
|
||
|
"type": "x-misp-attribute",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "x-misp-attribute--5b1acf47-e278-4e65-af1f-4458950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:47:35.000Z",
|
||
|
"modified": "2018-06-08T18:47:35.000Z",
|
||
|
"labels": [
|
||
|
"misp:type=\"text\"",
|
||
|
"misp:category=\"Antivirus detection\""
|
||
|
],
|
||
|
"x_misp_category": "Antivirus detection",
|
||
|
"x_misp_type": "text",
|
||
|
"x_misp_value": "Win64/InvisiMole.B"
|
||
|
},
|
||
|
{
|
||
|
"type": "x-misp-attribute",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "x-misp-attribute--5b1acf47-75d8-4232-913a-40aa950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:47:35.000Z",
|
||
|
"modified": "2018-06-08T18:47:35.000Z",
|
||
|
"labels": [
|
||
|
"misp:type=\"text\"",
|
||
|
"misp:category=\"Antivirus detection\""
|
||
|
],
|
||
|
"x_misp_category": "Antivirus detection",
|
||
|
"x_misp_type": "text",
|
||
|
"x_misp_value": "Win64/InvisiMole.C"
|
||
|
},
|
||
|
{
|
||
|
"type": "x-misp-attribute",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "x-misp-attribute--5b1acf47-ed18-489a-9699-460b950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:47:35.000Z",
|
||
|
"modified": "2018-06-08T18:47:35.000Z",
|
||
|
"labels": [
|
||
|
"misp:type=\"text\"",
|
||
|
"misp:category=\"Antivirus detection\""
|
||
|
],
|
||
|
"x_misp_category": "Antivirus detection",
|
||
|
"x_misp_type": "text",
|
||
|
"x_misp_value": "Win64/InvisiMole.D"
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5b1acf81-6b60-4689-99aa-4184950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:48:33.000Z",
|
||
|
"modified": "2018-06-08T18:48:33.000Z",
|
||
|
"pattern": "[file:name = '\\\\%APPDATA\\\\%\\\\Microsoft\\\\Internet Explorer\\\\Cache\\\\AMB6HER8\\\\']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2018-06-08T18:48:33Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Artifacts dropped"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"filename\"",
|
||
|
"misp:category=\"Artifacts dropped\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5b1acf81-d6c4-452a-a6ad-45bb950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:48:33.000Z",
|
||
|
"modified": "2018-06-08T18:48:33.000Z",
|
||
|
"pattern": "[file:name = '\\\\%APPDATA\\\\%\\\\Microsoft\\\\Internet Explorer\\\\Cache\\\\MX0ROSB1\\\\']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2018-06-08T18:48:33Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Artifacts dropped"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"filename\"",
|
||
|
"misp:category=\"Artifacts dropped\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5b1acf81-d07c-4190-932b-46e9950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:48:33.000Z",
|
||
|
"modified": "2018-06-08T18:48:33.000Z",
|
||
|
"pattern": "[file:name = '\\\\%APPDATA\\\\%\\\\Microsoft\\\\Internet Explorer\\\\Cache\\\\index0.dat']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2018-06-08T18:48:33Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Artifacts dropped"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"filename\"",
|
||
|
"misp:category=\"Artifacts dropped\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "x-misp-object",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "x-misp-object--e26da548-11e0-4052-9746-f7814d8e11b9",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:49:50.000Z",
|
||
|
"modified": "2018-06-08T18:49:50.000Z",
|
||
|
"labels": [
|
||
|
"misp:name=\"file\"",
|
||
|
"misp:meta-category=\"file\""
|
||
|
],
|
||
|
"x_misp_meta_category": "file",
|
||
|
"x_misp_name": "file"
|
||
|
},
|
||
|
{
|
||
|
"type": "x-misp-object",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "x-misp-object--d2836a0a-7b84-44c6-91b9-af25d4d73791",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2018-06-08T18:49:48.000Z",
|
||
|
"modified": "2018-06-08T18:49:48.000Z",
|
||
|
"labels": [
|
||
|
"misp:name=\"virustotal-report\"",
|
||
|
"misp:meta-category=\"misc\""
|
||
|
],
|
||
|
"x_misp_meta_category": "misc",
|
||
|
"x_misp_name": "virustotal-report"
|
||
|
},
|
||
|
{
|
||
|
"type": "relationship",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "relationship--0ff8333f-ee19-4f16-b4fa-0872d7520c18",
|
||
|
"created": "2018-06-08T18:49:49.000Z",
|
||
|
"modified": "2018-06-08T18:49:49.000Z",
|
||
|
"relationship_type": "analysed-with",
|
||
|
"source_ref": "x-misp-object--e26da548-11e0-4052-9746-f7814d8e11b9",
|
||
|
"target_ref": "x-misp-object--d2836a0a-7b84-44c6-91b9-af25d4d73791"
|
||
|
},
|
||
|
{
|
||
|
"type": "marking-definition",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
|
||
|
"created": "2017-01-20T00:00:00.000Z",
|
||
|
"definition_type": "tlp",
|
||
|
"name": "TLP:WHITE",
|
||
|
"definition": {
|
||
|
"tlp": "white"
|
||
|
}
|
||
|
}
|
||
|
]
|
||
|
}
|