{ "Event": { "analysis": "2", "date": "2018-01-09", "extends_uuid": "", "info": "OSINT - A North Korean Monero Cryptocurrency Miner", "publish_timestamp": "1515696548", "published": true, "threat_level_id": "3", "timestamp": "1515553226", "uuid": "5a54778c-3dac-4d36-b7c3-4d6e02de0b81", "Orgc": { "name": "CIRCL", "uuid": "55f6ea5e-2c60-40e5-964f-47a8950d210f" }, "Tag": [ { "colour": "#ffffff", "local": false, "name": "tlp:white", "relationship_type": "" }, { "colour": "#0fc000", "local": false, "name": "admiralty-scale:information-credibility=\"2\"", "relationship_type": "" }, { "colour": "#00223b", "local": false, "name": "osint:source-type=\"blog-post\"", "relationship_type": "" } ], "Attribute": [ { "category": "External analysis", "comment": "", "deleted": false, "disable_correlation": false, "timestamp": "1515485524", "to_ids": false, "type": "link", "uuid": "5a54779b-451c-4777-a15d-573002de0b81", "value": "https://www.alienvault.com/blogs/labs-research/a-north-korean-monero-cryptocurrency-miner", "Tag": [ { "colour": "#00223b", "local": false, "name": "osint:source-type=\"blog-post\"", "relationship_type": "" } ] }, { "category": "External analysis", "comment": "", "deleted": false, "disable_correlation": false, "timestamp": "1515485524", "to_ids": false, "type": "text", "uuid": "5a5477ad-63d4-443a-a0d0-b52402de0b81", "value": "AlienVault labs recently analysed an application compiled on Christmas Eve 2017. It is an Installer for software to mine the Monero crypto-currency. Any mined currency is sent to Kim Il Sung University in Pyongyang, North Korea.\r\n\r\nThe Installer copies a file named intelservice.exe to the system. The filename intelservice.exe is often associated with crypto-currency mining malware. Based on the arguments it\u00e2\u20ac\u2122s executed with, it\u00e2\u20ac\u2122s likely a piece of software called xmrig. \r\n\r\nIt\u00e2\u20ac\u2122s not unusual to see xmrig in malware campaigns. It was recently used in some wide campaigns exploiting unpatched IIS servers to mine Monero.", "Tag": [ { "colour": "#00223b", "local": false, "name": "osint:source-type=\"blog-post\"", "relationship_type": "" } ] }, { "category": "Payload delivery", "comment": "We identified two other pieces of software which share some code:", "deleted": false, "disable_correlation": false, "timestamp": "1515485128", "to_ids": true, "type": "md5", "uuid": "5a5477c8-1d28-4171-9740-bc9302de0b81", "value": "762c3249904a8bf76802effb54426655" }, { "category": "Payload delivery", "comment": "We identified two other pieces of software which share some code:", "deleted": false, "disable_correlation": false, "timestamp": "1515485128", "to_ids": true, "type": "md5", "uuid": "5a5477c8-8188-4ad5-bfbb-bc9302de0b81", "value": "42344bb45f351757e8638656e12a0135" }, { "category": "Network activity", "comment": "has been active on BitCoin trading sites:", "deleted": false, "disable_correlation": false, "timestamp": "1515485410", "to_ids": false, "type": "ip-src", "uuid": "5a5477f2-0068-4ce8-9be5-566802de0b81", "value": "175.45.178.19" }, { "category": "Payload delivery", "comment": "Decompiled Code", "deleted": false, "disable_correlation": false, "timestamp": "1515485235", "to_ids": true, "type": "md5", "uuid": "5a54780c-77cc-42c1-9633-bab602de0b81", "value": "6a261443299788af1467142d5f538b2c" }, { "category": "Artifacts dropped", "comment": "", "deleted": false, "disable_correlation": false, "timestamp": "1515485410", "to_ids": true, "type": "yara", "uuid": "5a547824-c8c8-45b3-b19b-b73502de0b81", "value": "rule nkminer_monero {\r\n\r\n meta:\r\n\r\n description = \"Detects installer of Monero miner that points to a NK domain\"\r\n\r\n author = \"cdoman@alienvault.com\"\r\n\r\n tlp = \"white\"\r\n\r\n license = \"MIT License\"\r\n\r\n strings:\r\n\r\n $a = \"82e999fb-a6e0-4094-aa1f-1a306069d1a5\" nocase wide ascii\r\n\r\n $b = \"4JUdGzvrMFDWrUUwY3toJATSeNwjn54LkCnKBPRzDuhzi5vSepHfUckJNxRL2gjkNrSqtCoRUrEDAgRwsQvVCjZbRy5YeFCqgoUMnzumvS\" nocase wide ascii\r\n\r\n $c = \"barjuok.ryongnamsan.edu.kp\" nocase wide ascii\r\n\r\n $d = \"C:\\\\SoftwaresInstall\\\\soft\" nocase wide ascii\r\n\r\n $e = \"C:\\\\Windows\\\\Sys64\\\\intelservice.exe\" nocase wide ascii\r\n\r\n $f = \"C:\\\\Windows\\\\Sys64\\\\updater.exe\" nocase wide ascii\r\n\r\n $g = \"C:\\\\Users\\\\Jawhar\\\\documents\\\\\" nocase wide ascii\r\n\r\n condition:\r\n\r\n any of them\r\n\r\n}" }, { "category": "Network activity", "comment": "On port 5615", "deleted": false, "disable_correlation": false, "timestamp": "1515485410", "to_ids": true, "type": "hostname", "uuid": "5a547852-0478-476e-9703-4d6e02de0b81", "value": "barjuok.ryongnamsan.edu.kp" } ], "Object": [ { "comment": "", "deleted": false, "description": "An IP address and a port seen as a tuple (or as a triple) in a specific time frame.", "meta-category": "network", "name": "ip-port", "template_uuid": "9f8cea74-16fe-4968-a2b4-026676949ac6", "template_version": "5", "timestamp": "1515485370", "uuid": "5a5478ba-6920-40a3-bedc-57fd02de0b81", "Attribute": [ { "category": "Network activity", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "dst-port", "timestamp": "1515485370", "to_ids": false, "type": "port", "uuid": "5a5478ba-372c-4127-a9e4-57fd02de0b81", "value": "5615" }, { "category": "Network activity", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "ip", "timestamp": "1515485370", "to_ids": true, "type": "ip-dst", "uuid": "5a5478ba-38dc-4458-ab14-57fd02de0b81", "value": "175.45.178.19" }, { "category": "Other", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "text", "timestamp": "1515485370", "to_ids": false, "type": "text", "uuid": "5a5478ba-e60c-4cce-80df-57fd02de0b81", "value": "Arguments = ((\"-o barjuok.ryongnamsan.edu.kp:5615 -u 4JUdGzvrMFDWrUUwY3toJATSeNwjn54LkCnKBPRzDuhzi5vSepHfUckJNxRL2gjkNrSqtCoRUrEDAgRwsQvVCjZbRy5YeFCqgoUMnzumvS -p \" + str + \" -k -t \" + Conversions.ToString(value)) ?? \"\")" } ] }, { "comment": "", "deleted": false, "description": "File object describing a file with meta-information", "meta-category": "file", "name": "file", "template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215", "template_version": "7", "timestamp": "1515485413", "uuid": "ecdcbae1-a690-4f9c-9ce7-b505f1c1a634", "ObjectReference": [ { "comment": "", "object_uuid": "ecdcbae1-a690-4f9c-9ce7-b505f1c1a634", "referenced_uuid": "0b6118b9-a775-47cf-8f97-de518c5ffd7a", "relationship_type": "analysed-with", "timestamp": "1515696547", "uuid": "5a5478e3-4548-4777-a03f-b75d02de0b81" } ], "Attribute": [ { "category": "Payload delivery", "comment": "We identified two other pieces of software which share some code:", "deleted": false, "disable_correlation": false, "object_relation": "sha1", "timestamp": "1515485410", "to_ids": true, "type": "sha1", "uuid": "5a5478e2-563c-46c6-9664-b75d02de0b81", "value": "0def199dbdb8dccf380511f67138088148ea83a3" }, { "category": "Payload delivery", "comment": "We identified two other pieces of software which share some code:", "deleted": false, "disable_correlation": false, "object_relation": "md5", "timestamp": "1515485410", "to_ids": true, "type": "md5", "uuid": "5a5478e2-6a0c-4cf3-8df8-b75d02de0b81", "value": "762c3249904a8bf76802effb54426655" }, { "category": "Payload delivery", "comment": "We identified two other pieces of software which share some code:", "deleted": false, "disable_correlation": false, "object_relation": "sha256", "timestamp": "1515485410", "to_ids": true, "type": "sha256", "uuid": "5a5478e2-9af0-4d71-90d9-b75d02de0b81", "value": "42300b6a09f183ae167d7a11d9c6df21d022a5f02df346350d3d875d557d3b76" } ] }, { "comment": "", "deleted": false, "description": "VirusTotal report", "meta-category": "misc", "name": "virustotal-report", "template_uuid": "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4", "template_version": "1", "timestamp": "1515485410", "uuid": "0b6118b9-a775-47cf-8f97-de518c5ffd7a", "Attribute": [ { "category": "External analysis", "comment": "We identified two other pieces of software which share some code:", "deleted": false, "disable_correlation": false, "object_relation": "permalink", "timestamp": "1515485411", "to_ids": false, "type": "link", "uuid": "5a5478e3-2394-4d96-a621-b75d02de0b81", "value": "https://www.virustotal.com/file/42300b6a09f183ae167d7a11d9c6df21d022a5f02df346350d3d875d557d3b76/analysis/1515484535/" }, { "category": "Other", "comment": "We identified two other pieces of software which share some code:", "deleted": false, "disable_correlation": true, "object_relation": "detection-ratio", "timestamp": "1515485411", "to_ids": false, "type": "text", "uuid": "5a5478e3-ef44-4be0-99af-b75d02de0b81", "value": "3/67" }, { "category": "Other", "comment": "We identified two other pieces of software which share some code:", "deleted": false, "disable_correlation": false, "object_relation": "last-submission", "timestamp": "1515485411", "to_ids": false, "type": "datetime", "uuid": "5a5478e3-d6f0-430c-b82c-b75d02de0b81", "value": "2018-01-09T07:55:35" } ] }, { "comment": "", "deleted": false, "description": "File object describing a file with meta-information", "meta-category": "file", "name": "file", "template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215", "template_version": "7", "timestamp": "1515485414", "uuid": "62422a69-b558-4bbc-9e01-ff1038764faf", "ObjectReference": [ { "comment": "", "object_uuid": "62422a69-b558-4bbc-9e01-ff1038764faf", "referenced_uuid": "36e2da81-042e-4880-9f27-76ebec952ba0", "relationship_type": "analysed-with", "timestamp": "1515696547", "uuid": "5a5478e3-55e0-4423-9961-b75d02de0b81" } ], "Attribute": [ { "category": "Payload delivery", "comment": "Decompiled Code", "deleted": false, "disable_correlation": false, "object_relation": "sha1", "timestamp": "1515485411", "to_ids": true, "type": "sha1", "uuid": "5a5478e3-fb0c-4974-a73c-b75d02de0b81", "value": "8965381377a884aa68eeb451b3e62175968b0b04" }, { "category": "Payload delivery", "comment": "Decompiled Code", "deleted": false, "disable_correlation": false, "object_relation": "md5", "timestamp": "1515485411", "to_ids": true, "type": "md5", "uuid": "5a5478e3-d088-4128-9a8b-b75d02de0b81", "value": "6a261443299788af1467142d5f538b2c" }, { "category": "Payload delivery", "comment": "Decompiled Code", "deleted": false, "disable_correlation": false, "object_relation": "sha256", "timestamp": "1515485411", "to_ids": true, "type": "sha256", "uuid": "5a5478e3-aa24-4e9e-bb93-b75d02de0b81", "value": "c599f3ca3417169e4a620b8231f8a97ccc63e291b9e09c888e6807dd90f1f17c" } ] }, { "comment": "", "deleted": false, "description": "VirusTotal report", "meta-category": "misc", "name": "virustotal-report", "template_uuid": "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4", "template_version": "1", "timestamp": "1515485411", "uuid": "36e2da81-042e-4880-9f27-76ebec952ba0", "Attribute": [ { "category": "External analysis", "comment": "Decompiled Code", "deleted": false, "disable_correlation": false, "object_relation": "permalink", "timestamp": "1515485411", "to_ids": false, "type": "link", "uuid": "5a5478e3-1108-4a5e-93b1-b75d02de0b81", "value": "https://www.virustotal.com/file/c599f3ca3417169e4a620b8231f8a97ccc63e291b9e09c888e6807dd90f1f17c/analysis/1515484533/" }, { "category": "Other", "comment": "Decompiled Code", "deleted": false, "disable_correlation": true, "object_relation": "detection-ratio", "timestamp": "1515485411", "to_ids": false, "type": "text", "uuid": "5a5478e3-04d8-4a5a-ae0b-b75d02de0b81", "value": "6/68" }, { "category": "Other", "comment": "Decompiled Code", "deleted": false, "disable_correlation": false, "object_relation": "last-submission", "timestamp": "1515485411", "to_ids": false, "type": "datetime", "uuid": "5a5478e3-0fa0-4ec3-b082-b75d02de0b81", "value": "2018-01-09T07:55:33" } ] }, { "comment": "", "deleted": false, "description": "File object describing a file with meta-information", "meta-category": "file", "name": "file", "template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215", "template_version": "7", "timestamp": "1515485414", "uuid": "8a8becfb-f8ce-440a-9ffa-81a43239f4e2", "ObjectReference": [ { "comment": "", "object_uuid": "8a8becfb-f8ce-440a-9ffa-81a43239f4e2", "referenced_uuid": "fe330733-f2f4-490d-a9b8-c0f0da7353fe", "relationship_type": "analysed-with", "timestamp": "1515696548", "uuid": "5a5478e3-39bc-4941-8e3a-b75d02de0b81" } ], "Attribute": [ { "category": "Payload delivery", "comment": "We identified two other pieces of software which share some code:", "deleted": false, "disable_correlation": false, "object_relation": "sha1", "timestamp": "1515485411", "to_ids": true, "type": "sha1", "uuid": "5a5478e3-4cc8-44f8-900e-b75d02de0b81", "value": "7cab4853c370a2dd299a5ab3ebeccfe17455cb43" }, { "category": "Payload delivery", "comment": "We identified two other pieces of software which share some code:", "deleted": false, "disable_correlation": false, "object_relation": "md5", "timestamp": "1515485411", "to_ids": true, "type": "md5", "uuid": "5a5478e3-a69c-4ef3-b0f9-b75d02de0b81", "value": "42344bb45f351757e8638656e12a0135" }, { "category": "Payload delivery", "comment": "We identified two other pieces of software which share some code:", "deleted": false, "disable_correlation": false, "object_relation": "sha256", "timestamp": "1515485411", "to_ids": true, "type": "sha256", "uuid": "5a5478e3-85ec-4d15-8de3-b75d02de0b81", "value": "0024e32c0199ded445c0b968601f21cc92fc0c534d2642f2dd64c1c978ff01f3" } ] }, { "comment": "", "deleted": false, "description": "VirusTotal report", "meta-category": "misc", "name": "virustotal-report", "template_uuid": "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4", "template_version": "1", "timestamp": "1515485411", "uuid": "fe330733-f2f4-490d-a9b8-c0f0da7353fe", "Attribute": [ { "category": "External analysis", "comment": "We identified two other pieces of software which share some code:", "deleted": false, "disable_correlation": false, "object_relation": "permalink", "timestamp": "1515485411", "to_ids": false, "type": "link", "uuid": "5a5478e3-fa78-43c9-90a9-b75d02de0b81", "value": "https://www.virustotal.com/file/0024e32c0199ded445c0b968601f21cc92fc0c534d2642f2dd64c1c978ff01f3/analysis/1515484532/" }, { "category": "Other", "comment": "We identified two other pieces of software which share some code:", "deleted": false, "disable_correlation": true, "object_relation": "detection-ratio", "timestamp": "1515485411", "to_ids": false, "type": "text", "uuid": "5a5478e3-e430-4494-8cd8-b75d02de0b81", "value": "6/67" }, { "category": "Other", "comment": "We identified two other pieces of software which share some code:", "deleted": false, "disable_correlation": false, "object_relation": "last-submission", "timestamp": "1515485411", "to_ids": false, "type": "datetime", "uuid": "5a5478e3-546c-4052-abd1-b75d02de0b81", "value": "2018-01-09T07:55:32" } ] } ] } }