{ "type": "bundle", "id": "bundle--57adad28-ac28-49f0-b8d5-7495950d210f", "objects": [ { "type": "identity", "spec_version": "2.1", "id": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-12T11:14:47.000Z", "modified": "2016-08-12T11:14:47.000Z", "name": "CthulhuSPRL.be", "identity_class": "organization" }, { "type": "report", "spec_version": "2.1", "id": "report--57adad28-ac28-49f0-b8d5-7495950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-12T11:14:47.000Z", "modified": "2016-08-12T11:14:47.000Z", "name": "OSINT New C2 \u00e2\u20ac\u201c Neutrino Exploit Kit via pseudoDarkleech HOPTO.ORG gate delivers CrypMic Ransomware by Broad Analysis", "published": "2016-08-12T11:15:07Z", "object_refs": [ "observed-data--57adaef5-bd68-4f9b-8a2e-6c4f950d210f", "url--57adaef5-bd68-4f9b-8a2e-6c4f950d210f", "indicator--57adaf2d-c848-4a48-8ae0-7495950d210f", "indicator--57adaf47-646c-469a-a6c7-7495950d210f", "indicator--57adaf5d-f3a8-46f6-8efc-3297950d210f", "indicator--57adaf75-8f48-4c71-9219-42f4950d210f", "indicator--57adaf8c-8edc-4b48-8a0f-3299950d210f", "indicator--57adafa7-cfe0-47f1-8c70-3299950d210f", "indicator--57adafa7-f574-46df-9e77-3299950d210f" ], "labels": [ "Threat-Report", "misp:tool=\"MISP-STIX-Converter\"", "OSINT" ], "object_marking_refs": [ "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--57adaef5-bd68-4f9b-8a2e-6c4f950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-12T11:11:49.000Z", "modified": "2016-08-12T11:11:49.000Z", "first_observed": "2016-08-12T11:11:49Z", "last_observed": "2016-08-12T11:11:49Z", "number_observed": 1, "object_refs": [ "url--57adaef5-bd68-4f9b-8a2e-6c4f950d210f" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--57adaef5-bd68-4f9b-8a2e-6c4f950d210f", "value": "http://www.broadanalysis.com/2016/08/08/new-c2-neutrino-exploit-kit-via-pseudodarkleech-hopto-org-gate-delivers-crypmic-ransomware/" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--57adaf2d-c848-4a48-8ae0-7495950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-12T11:12:45.000Z", "modified": "2016-08-12T11:12:45.000Z", "description": "Redirect GATE", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '83.217.27.178']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-08-12T11:12:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--57adaf47-646c-469a-a6c7-7495950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-12T11:13:11.000Z", "modified": "2016-08-12T11:13:11.000Z", "description": "Redirect GATE", "pattern": "[domain-name:value = 'jkgbpsh.hopto.org']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-08-12T11:13:11Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--57adaf5d-f3a8-46f6-8efc-3297950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-12T11:13:33.000Z", "modified": "2016-08-12T11:13:33.000Z", "description": "Neutrino EK", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '51.254.30.225']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-08-12T11:13:33Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--57adaf75-8f48-4c71-9219-42f4950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-12T11:13:57.000Z", "modified": "2016-08-12T11:13:57.000Z", "description": "Neutrino EK", "pattern": "[domain-name:value = 'saveoldclinicas.propertymanager.eu.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-08-12T11:13:57Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--57adaf8c-8edc-4b48-8a0f-3299950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-12T11:14:20.000Z", "modified": "2016-08-12T11:14:20.000Z", "description": "Port 443 Clear text \u00e2\u20ac\u201c C2 Check-In \u00e2\u20ac\u201c POST INFECTION TRAFFIC Germany, AS24961 myLoc managed IT AG,", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '85.14.243.9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-08-12T11:14:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--57adafa7-cfe0-47f1-8c70-3299950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-12T11:14:47.000Z", "modified": "2016-08-12T11:14:47.000Z", "description": "Domains for ransom payments", "pattern": "[url:value = 'http://ccjlwb22w6c22p2k.onion.to']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-08-12T11:14:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"url\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--57adafa7-f574-46df-9e77-3299950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-12T11:14:47.000Z", "modified": "2016-08-12T11:14:47.000Z", "description": "Domains for ransom payments", "pattern": "[url:value = 'http://ccjlwb22w6c22p2k.onion.city']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-08-12T11:14:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"url\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "marking-definition", "spec_version": "2.1", "id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9", "created": "2017-01-20T00:00:00.000Z", "definition_type": "tlp", "name": "TLP:WHITE", "definition": { "tlp": "white" } } ] }