312 lines
13 KiB
JSON
312 lines
13 KiB
JSON
|
{
|
||
|
"type": "bundle",
|
||
|
"id": "bundle--5cd4446a-b318-40d6-8120-473a950d210f",
|
||
|
"objects": [
|
||
|
{
|
||
|
"type": "identity",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2019-05-09T15:22:57.000Z",
|
||
|
"modified": "2019-05-09T15:22:57.000Z",
|
||
|
"name": "CIRCL",
|
||
|
"identity_class": "organization"
|
||
|
},
|
||
|
{
|
||
|
"type": "report",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "report--5cd4446a-b318-40d6-8120-473a950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2019-05-09T15:22:57.000Z",
|
||
|
"modified": "2019-05-09T15:22:57.000Z",
|
||
|
"name": "OSINT - keepass(dot)com spreading malware acting as the official site for KeePass password manager. Download for .dmg and .exe files are available on the site.",
|
||
|
"published": "2019-05-09T15:24:00Z",
|
||
|
"object_refs": [
|
||
|
"indicator--5cd444bb-5100-4607-ab39-4e98950d210f",
|
||
|
"indicator--5cd444bb-b15c-4760-b152-4fda950d210f",
|
||
|
"indicator--5cd444ed-5814-49ff-a3f9-466a950d210f",
|
||
|
"indicator--9bc5279d-fa53-4c2f-92f1-9aac47fe4658",
|
||
|
"x-misp-object--b6903b23-45ff-4d75-ab0d-ebc19a94a7e6",
|
||
|
"indicator--2ec00d74-5d8a-4db5-9d43-1845fcfd8917",
|
||
|
"x-misp-object--b6b594cd-778d-4c19-a1e8-b04a78d6154d",
|
||
|
"x-misp-object--5cd44594-ead8-4e11-8ccb-4a0e950d210f",
|
||
|
"relationship--5a84a2f8-64c4-4d13-b715-ba993f8425ac",
|
||
|
"relationship--76c55350-0882-478f-905c-56b3601cb44d"
|
||
|
],
|
||
|
"labels": [
|
||
|
"Threat-Report",
|
||
|
"misp:tool=\"MISP-STIX-Converter\"",
|
||
|
"type:OSINT",
|
||
|
"osint:lifetime=\"perpetual\"",
|
||
|
"osint:certainty=\"50\"",
|
||
|
"misp-galaxy:mitre-attack-pattern=\"Unconditional client-side exploitation/Injected Website/Driveby - T1372\""
|
||
|
],
|
||
|
"object_marking_refs": [
|
||
|
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5cd444bb-5100-4607-ab39-4e98950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2019-05-09T15:18:19.000Z",
|
||
|
"modified": "2019-05-09T15:18:19.000Z",
|
||
|
"pattern": "[file:hashes.SHA256 = '4090224f97db5601e5b293f81ec6fe28f86d7e3d8f4592f6b9d0765831e2c966']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2019-05-09T15:18:19Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"sha256\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5cd444bb-b15c-4760-b152-4fda950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2019-05-09T15:18:19.000Z",
|
||
|
"modified": "2019-05-09T15:18:19.000Z",
|
||
|
"pattern": "[file:hashes.SHA256 = '41c82089de60c0a2fe9a51d0f8f919261d0e73cf1da0d61b835194c177787b4e']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2019-05-09T15:18:19Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"sha256\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5cd444ed-5814-49ff-a3f9-466a950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2019-05-09T15:19:09.000Z",
|
||
|
"modified": "2019-05-09T15:19:09.000Z",
|
||
|
"pattern": "[domain-name:value = 'lifopp-sacoho.com']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2019-05-09T15:19:09Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Network activity"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"domain\"",
|
||
|
"misp:category=\"Network activity\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--9bc5279d-fa53-4c2f-92f1-9aac47fe4658",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2019-05-09T15:18:28.000Z",
|
||
|
"modified": "2019-05-09T15:18:28.000Z",
|
||
|
"pattern": "[file:hashes.MD5 = '3590c4b2cfa63655dc14bef32659f675' AND file:hashes.SHA1 = '5b0825a4436e4908501667e1cfa91e9e39e82302' AND file:hashes.SHA256 = '4090224f97db5601e5b293f81ec6fe28f86d7e3d8f4592f6b9d0765831e2c966']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2019-05-09T15:18:28Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "file"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:name=\"file\"",
|
||
|
"misp:meta-category=\"file\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "x-misp-object",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "x-misp-object--b6903b23-45ff-4d75-ab0d-ebc19a94a7e6",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2019-05-09T15:18:28.000Z",
|
||
|
"modified": "2019-05-09T15:18:28.000Z",
|
||
|
"labels": [
|
||
|
"misp:name=\"virustotal-report\"",
|
||
|
"misp:meta-category=\"misc\""
|
||
|
],
|
||
|
"x_misp_attributes": [
|
||
|
{
|
||
|
"type": "datetime",
|
||
|
"object_relation": "last-submission",
|
||
|
"value": "2019-05-08T10:03:22",
|
||
|
"category": "Other",
|
||
|
"uuid": "9268cd71-c418-4b6c-8ae7-b2755788dedc"
|
||
|
},
|
||
|
{
|
||
|
"type": "link",
|
||
|
"object_relation": "permalink",
|
||
|
"value": "https://www.virustotal.com/file/4090224f97db5601e5b293f81ec6fe28f86d7e3d8f4592f6b9d0765831e2c966/analysis/1557309802/",
|
||
|
"category": "Payload delivery",
|
||
|
"uuid": "fea2b397-1408-4777-ab45-308963ac7d8b"
|
||
|
},
|
||
|
{
|
||
|
"type": "text",
|
||
|
"object_relation": "detection-ratio",
|
||
|
"value": "31/72",
|
||
|
"category": "Payload delivery",
|
||
|
"uuid": "584d4279-982a-4ca3-bedf-933dd6a5b6bb"
|
||
|
}
|
||
|
],
|
||
|
"x_misp_meta_category": "misc",
|
||
|
"x_misp_name": "virustotal-report"
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--2ec00d74-5d8a-4db5-9d43-1845fcfd8917",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2019-05-09T15:18:28.000Z",
|
||
|
"modified": "2019-05-09T15:18:28.000Z",
|
||
|
"pattern": "[file:hashes.MD5 = '0211036d4f551610892d3da2f2377b95' AND file:hashes.SHA1 = 'b4f5d93b0eb93812018646f6b358da9592ae6499' AND file:hashes.SHA256 = '41c82089de60c0a2fe9a51d0f8f919261d0e73cf1da0d61b835194c177787b4e']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2019-05-09T15:18:28Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "file"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:name=\"file\"",
|
||
|
"misp:meta-category=\"file\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "x-misp-object",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "x-misp-object--b6b594cd-778d-4c19-a1e8-b04a78d6154d",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2019-05-09T15:18:28.000Z",
|
||
|
"modified": "2019-05-09T15:18:28.000Z",
|
||
|
"labels": [
|
||
|
"misp:name=\"virustotal-report\"",
|
||
|
"misp:meta-category=\"misc\""
|
||
|
],
|
||
|
"x_misp_attributes": [
|
||
|
{
|
||
|
"type": "datetime",
|
||
|
"object_relation": "last-submission",
|
||
|
"value": "2019-05-07T11:36:35",
|
||
|
"category": "Other",
|
||
|
"uuid": "a6d53689-a303-42fe-8c7f-def94d11e653"
|
||
|
},
|
||
|
{
|
||
|
"type": "link",
|
||
|
"object_relation": "permalink",
|
||
|
"value": "https://www.virustotal.com/file/41c82089de60c0a2fe9a51d0f8f919261d0e73cf1da0d61b835194c177787b4e/analysis/1557228995/",
|
||
|
"category": "Payload delivery",
|
||
|
"uuid": "eceb9e59-eff8-433b-8169-b854da49308d"
|
||
|
},
|
||
|
{
|
||
|
"type": "text",
|
||
|
"object_relation": "detection-ratio",
|
||
|
"value": "14/56",
|
||
|
"category": "Payload delivery",
|
||
|
"uuid": "05cda147-431f-4496-807b-50aa24c3c031"
|
||
|
}
|
||
|
],
|
||
|
"x_misp_meta_category": "misc",
|
||
|
"x_misp_name": "virustotal-report"
|
||
|
},
|
||
|
{
|
||
|
"type": "x-misp-object",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "x-misp-object--5cd44594-ead8-4e11-8ccb-4a0e950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2019-05-09T15:21:56.000Z",
|
||
|
"modified": "2019-05-09T15:21:56.000Z",
|
||
|
"labels": [
|
||
|
"misp:name=\"microblog\"",
|
||
|
"misp:meta-category=\"misc\""
|
||
|
],
|
||
|
"x_misp_attributes": [
|
||
|
{
|
||
|
"type": "text",
|
||
|
"object_relation": "post",
|
||
|
"value": "keepass(dot)com spreading malware acting as the official site for KeePass password manager. Download for .dmg and .exe files are available on the site. @malwrhunterteam",
|
||
|
"category": "Other",
|
||
|
"uuid": "5cd44595-8944-400e-b668-4629950d210f"
|
||
|
},
|
||
|
{
|
||
|
"type": "text",
|
||
|
"object_relation": "type",
|
||
|
"value": "Twitter",
|
||
|
"category": "Other",
|
||
|
"uuid": "5cd44595-c004-4e7e-83c1-442b950d210f"
|
||
|
},
|
||
|
{
|
||
|
"type": "url",
|
||
|
"object_relation": "url",
|
||
|
"value": "https://twitter.com/berkcgoksel/status/1125727590440931329",
|
||
|
"category": "Network activity",
|
||
|
"uuid": "5cd44595-d14c-4a3d-bb69-4f53950d210f"
|
||
|
},
|
||
|
{
|
||
|
"type": "text",
|
||
|
"object_relation": "username",
|
||
|
"value": "berkcgoksel",
|
||
|
"category": "Other",
|
||
|
"uuid": "5cd44595-720c-4b7b-9eb2-42a8950d210f"
|
||
|
}
|
||
|
],
|
||
|
"x_misp_meta_category": "misc",
|
||
|
"x_misp_name": "microblog"
|
||
|
},
|
||
|
{
|
||
|
"type": "relationship",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "relationship--5a84a2f8-64c4-4d13-b715-ba993f8425ac",
|
||
|
"created": "2019-05-09T15:18:28.000Z",
|
||
|
"modified": "2019-05-09T15:18:28.000Z",
|
||
|
"relationship_type": "analysed-with",
|
||
|
"source_ref": "indicator--9bc5279d-fa53-4c2f-92f1-9aac47fe4658",
|
||
|
"target_ref": "x-misp-object--b6903b23-45ff-4d75-ab0d-ebc19a94a7e6"
|
||
|
},
|
||
|
{
|
||
|
"type": "relationship",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "relationship--76c55350-0882-478f-905c-56b3601cb44d",
|
||
|
"created": "2019-05-09T15:18:28.000Z",
|
||
|
"modified": "2019-05-09T15:18:28.000Z",
|
||
|
"relationship_type": "analysed-with",
|
||
|
"source_ref": "indicator--2ec00d74-5d8a-4db5-9d43-1845fcfd8917",
|
||
|
"target_ref": "x-misp-object--b6b594cd-778d-4c19-a1e8-b04a78d6154d"
|
||
|
},
|
||
|
{
|
||
|
"type": "marking-definition",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
|
||
|
"created": "2017-01-20T00:00:00.000Z",
|
||
|
"definition_type": "tlp",
|
||
|
"name": "TLP:WHITE",
|
||
|
"definition": {
|
||
|
"tlp": "white"
|
||
|
}
|
||
|
}
|
||
|
]
|
||
|
}
|