misp-circl-feed/feeds/circl/stix-2.1/5c47f54e-1cf4-48d1-b188-245768f8e8cf.json

180 lines
7.8 KiB
JSON
Raw Normal View History

2023-04-21 14:44:17 +00:00
{
"type": "bundle",
"id": "bundle--5c47f54e-1cf4-48d1-b188-245768f8e8cf",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--5bfa439e-c978-4dcd-b474-73f568f8e8cf",
"created": "2021-05-24T09:53:16.000Z",
"modified": "2021-05-24T09:53:16.000Z",
"name": "VK-Intel",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--5c47f54e-1cf4-48d1-b188-245768f8e8cf",
"created_by_ref": "identity--5bfa439e-c978-4dcd-b474-73f568f8e8cf",
"created": "2021-05-24T09:53:16.000Z",
"modified": "2021-05-24T09:53:16.000Z",
"name": "2019-01-22: Emotet->TrickBot",
"published": "2020-05-11T07:52:23Z",
"object_refs": [
"indicator--5c47f54e-b264-446a-84d4-245768f8e8cf",
"observed-data--5c4d8fac-8190-44f5-9bf5-4abc02de0b81",
"url--5c4d8fac-8190-44f5-9bf5-4abc02de0b81",
"observed-data--5c4d8fbf-a68c-4cd8-86ac-438702de0b81",
"url--5c4d8fbf-a68c-4cd8-86ac-438702de0b81",
"indicator--3ffca240-fd85-4f51-910b-ad6932f4c23a",
"indicator--d135cc85-6672-4e0e-be10-90e91b894a9f"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"Banker: TrickBot",
"Version: 1057",
"core-parser.dll",
"type:OSINT",
"osint:lifetime=\"perpetual\"",
"osint:certainty=\"50\"",
"misp-galaxy:tool=\"Trick Bot\"",
"misp-galaxy:banker=\"Trickbot\"",
"misp-galaxy:tool=\"Emotet\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5c47f54e-b264-446a-84d4-245768f8e8cf",
"created_by_ref": "identity--5bfa439e-c978-4dcd-b474-73f568f8e8cf",
"created": "2019-01-23T05:02:06.000Z",
"modified": "2019-01-23T05:02:06.000Z",
"pattern": "[file:hashes.MD5 = 'e6aab38ff1d7cf9edd1f9279875248fa']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2019-01-23T05:02:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5c4d8fac-8190-44f5-9bf5-4abc02de0b81",
"created_by_ref": "identity--5bfa439e-c978-4dcd-b474-73f568f8e8cf",
"created": "2019-01-27T11:03:18.000Z",
"modified": "2019-01-27T11:03:18.000Z",
"first_observed": "2019-01-27T11:03:18Z",
"last_observed": "2019-01-27T11:03:18Z",
"number_observed": 1,
"object_refs": [
"url--5c4d8fac-8190-44f5-9bf5-4abc02de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\"",
"osint:source-type=\"blog-post\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--5c4d8fac-8190-44f5-9bf5-4abc02de0b81",
"value": "https://www.virustotal.com/en/file/8e4cc0539b4921b0222081a0948bd149f10a027f73983e9ade36d4045f69921f/analysis/1548422859/"
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5c4d8fbf-a68c-4cd8-86ac-438702de0b81",
"created_by_ref": "identity--5bfa439e-c978-4dcd-b474-73f568f8e8cf",
"created": "2019-01-27T11:03:17.000Z",
"modified": "2019-01-27T11:03:17.000Z",
"first_observed": "2019-01-27T11:03:17Z",
"last_observed": "2019-01-27T11:03:17Z",
"number_observed": 1,
"object_refs": [
"url--5c4d8fbf-a68c-4cd8-86ac-438702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\"",
"osint:source-type=\"blog-post\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--5c4d8fbf-a68c-4cd8-86ac-438702de0b81",
"value": "https://github.com/k-vitali/TrickBot-share/blob/master/2019-01-22-TrickBot-banker-client-1057_misp.json"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3ffca240-fd85-4f51-910b-ad6932f4c23a",
"created_by_ref": "identity--5bfa439e-c978-4dcd-b474-73f568f8e8cf",
"created": "2019-01-23T05:03:33.000Z",
"modified": "2019-01-23T05:03:33.000Z",
"pattern": "[file:hashes.MD5 = 'e6aab38ff1d7cf9edd1f9279875248fa' AND file:hashes.SHA1 = 'fba09f81056ab943bb90e1500cb1d1317ae2e36e' AND file:hashes.SHA256 = '8e4cc0539b4921b0222081a0948bd149f10a027f73983e9ade36d4045f69921f' AND file:hashes.SHA512 = '5e17b9ac8e65b072249d7aa40fceac7f169fd43ce26b2a590dbc124a7257a4a19bd68df9551643a666c8837ce1f38d40b27bf39eba5ebfadb2986e661bfc652e' AND file:name = '2019-01-22-trickbot-loader.exe' AND file:size = '232960' AND file:x_misp_entropy = '7.682967694857']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2019-01-23T05:03:33Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d135cc85-6672-4e0e-be10-90e91b894a9f",
"created_by_ref": "identity--5bfa439e-c978-4dcd-b474-73f568f8e8cf",
"created": "2019-01-23T05:04:10.000Z",
"modified": "2019-01-23T05:04:10.000Z",
"pattern": "[file:hashes.MD5 = '4d0c97d8315be2c87c5b9ec855cad88d' AND file:hashes.SHA1 = 'fb5d538084489a7b7b4c9be80cd221b338c6b39c' AND file:hashes.SHA256 = '40bbc0b76af2a2130c3ceaba8a2f1fa255bbbef138e2f37c995ee32c6bcccbf8' AND file:hashes.SHA512 = 'b19d95f067e2adeda48554d33397ae16c296db6a4cf9eb66c7abb13ddd964d3c5a83cc7e6074168f512aeb8b64338d7c5cef93a629c8592d4b7ebb731d252d05' AND file:name = 'core-parser.dll' AND file:size = '217600' AND file:x_misp_entropy = '6.5165485023488']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2019-01-23T05:04:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}