{ "type": "bundle", "id": "bundle--57b5a32c-b744-4674-b727-4cb2950d210f", "objects": [ { "type": "identity", "spec_version": "2.1", "id": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-18T12:10:08.000Z", "modified": "2016-08-18T12:10:08.000Z", "name": "CthulhuSPRL.be", "identity_class": "organization" }, { "type": "report", "spec_version": "2.1", "id": "report--57b5a32c-b744-4674-b727-4cb2950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-18T12:10:08.000Z", "modified": "2016-08-18T12:10:08.000Z", "name": "OSINT Aveo Malware Family Targets Japanese Speaking Users by Palo Alto networks Unit 42", "published": "2016-08-18T12:10:19Z", "object_refs": [ "observed-data--57b5a334-12c8-43b0-9987-40bb950d210f", "url--57b5a334-12c8-43b0-9987-40bb950d210f", "indicator--57b5a3f6-4250-4f13-bdbc-4045950d210f", "indicator--57b5a3f6-d374-4e7c-8bb2-47be950d210f", "indicator--57b5a3f6-53a4-4f28-a14d-4fb0950d210f", "indicator--57b5a3f7-50a4-4ed4-b5e7-40dc950d210f", "indicator--57b5a3f7-284c-48ee-b5d7-4d04950d210f", "indicator--57b5a3f7-6384-4a06-88c2-4677950d210f", "x-misp-attribute--57b5a3f7-d260-4d69-a44f-4d42950d210f", "x-misp-attribute--57b5a3f7-0fe0-4118-be05-4b20950d210f", "indicator--57b5a3f8-6bb4-4f2e-9744-42e3950d210f", "indicator--57b5a3f8-0158-4e04-888b-4a5f950d210f", "indicator--57b5a3f8-6578-4eee-9848-4f33950d210f", "indicator--57b5a3f8-4a80-4250-9044-475c950d210f", "indicator--57b5a3f8-6df8-47ac-9070-4d19950d210f", "indicator--57b5a42c-edac-460b-b68e-4a82950d210f", "indicator--57b5a42d-b8cc-47db-9689-4574950d210f", "x-misp-attribute--57b5a5a0-ec2c-4b4f-961d-49f1950d210f" ], "labels": [ "Threat-Report", "misp:tool=\"MISP-STIX-Converter\"", "OSINT" ], "object_marking_refs": [ "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--57b5a334-12c8-43b0-9987-40bb950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-18T11:59:48.000Z", "modified": "2016-08-18T11:59:48.000Z", "first_observed": "2016-08-18T11:59:48Z", "last_observed": "2016-08-18T11:59:48Z", "number_observed": 1, "object_refs": [ "url--57b5a334-12c8-43b0-9987-40bb950d210f" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--57b5a334-12c8-43b0-9987-40bb950d210f", "value": "http://researchcenter.paloaltonetworks.com/2016/08/unit42-aveo-malware-family-targets-japanese-speaking-users/" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--57b5a3f6-4250-4f13-bdbc-4045950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-18T12:03:02.000Z", "modified": "2016-08-18T12:03:02.000Z", "description": "Imported via the Freetext Import Tool", "pattern": "[domain-name:value = 'europcubit.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-08-18T12:03:02Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--57b5a3f6-d374-4e7c-8bb2-47be950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-18T12:03:02.000Z", "modified": "2016-08-18T12:03:02.000Z", "description": "Imported via the Freetext Import Tool", "pattern": "[domain-name:value = 'snoozetime.info']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-08-18T12:03:02Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--57b5a3f6-53a4-4f28-a14d-4fb0950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-18T12:03:02.000Z", "modified": "2016-08-18T12:03:02.000Z", "description": "Imported via the Freetext Import Tool", "pattern": "[domain-name:value = 'bluepaint.info']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-08-18T12:03:02Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--57b5a3f7-50a4-4ed4-b5e7-40dc950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-18T12:03:03.000Z", "modified": "2016-08-18T12:03:03.000Z", "description": "Imported via the Freetext Import Tool", "pattern": "[domain-name:value = '7b7p.info']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-08-18T12:03:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--57b5a3f7-284c-48ee-b5d7-4d04950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-18T12:03:03.000Z", "modified": "2016-08-18T12:03:03.000Z", "description": "Imported via the Freetext Import Tool", "pattern": "[domain-name:value = 'coinpack.info']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-08-18T12:03:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--57b5a3f7-6384-4a06-88c2-4677950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-18T12:03:03.000Z", "modified": "2016-08-18T12:03:03.000Z", "description": "Imported via the Freetext Import Tool", "pattern": "[domain-name:value = 'donkeyhaws.info']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-08-18T12:03:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-attribute", "spec_version": "2.1", "id": "x-misp-attribute--57b5a3f7-d260-4d69-a44f-4d42950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-18T12:09:57.000Z", "modified": "2016-08-18T12:09:57.000Z", "labels": [ "misp:type=\"whois-registrant-email\"", "misp:category=\"Attribution\"", "misp:to_ids=\"True\"" ], "x_misp_category": "Attribution", "x_misp_comment": "Imported via the Freetext Import Tool", "x_misp_type": "whois-registrant-email", "x_misp_value": "jhmiyh.ny@gmail.com" }, { "type": "x-misp-attribute", "spec_version": "2.1", "id": "x-misp-attribute--57b5a3f7-0fe0-4118-be05-4b20950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-18T12:09:42.000Z", "modified": "2016-08-18T12:09:42.000Z", "labels": [ "misp:type=\"whois-registrant-email\"", "misp:category=\"Attribution\"", "misp:to_ids=\"True\"" ], "x_misp_category": "Attribution", "x_misp_comment": "Imported via the Freetext Import Tool", "x_misp_type": "whois-registrant-email", "x_misp_value": "jack.ondo@mail.com" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--57b5a3f8-6bb4-4f2e-9744-42e3950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-18T12:03:04.000Z", "modified": "2016-08-18T12:03:04.000Z", "description": "Imported via the Freetext Import Tool", "pattern": "[file:hashes.SHA256 = '8101c298a33d91a985a5150d0254cf426601e4632250f5a03ddac39375e7fb4d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-08-18T12:03:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--57b5a3f8-0158-4e04-888b-4a5f950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-18T12:03:04.000Z", "modified": "2016-08-18T12:03:04.000Z", "description": "Imported via the Freetext Import Tool", "pattern": "[file:hashes.SHA256 = '9dccfdd2a503ef8614189225bbbac11ee6027590c577afcaada7e042e18625e2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-08-18T12:03:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--57b5a3f8-6578-4eee-9848-4f33950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-18T12:03:04.000Z", "modified": "2016-08-18T12:03:04.000Z", "description": "Imported via the Freetext Import Tool", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '50.63.202.38']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-08-18T12:03:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--57b5a3f8-4a80-4250-9044-475c950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-18T12:03:04.000Z", "modified": "2016-08-18T12:03:04.000Z", "description": "Imported via the Freetext Import Tool", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '104.202.173.82']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-08-18T12:03:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--57b5a3f8-6df8-47ac-9070-4d19950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-18T12:03:04.000Z", "modified": "2016-08-18T12:03:04.000Z", "description": "Imported via the Freetext Import Tool", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '107.180.36.179']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-08-18T12:03:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--57b5a42c-edac-460b-b68e-4a82950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-18T12:03:56.000Z", "modified": "2016-08-18T12:03:56.000Z", "pattern": "[file:name = '\\\\%APPDATA\\\\%\\\\MMC\\\\MMC.exe']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-08-18T12:03:56Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"filename\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--57b5a42d-b8cc-47db-9689-4574950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-18T12:03:57.000Z", "modified": "2016-08-18T12:03:57.000Z", "pattern": "[file:name = '\\\\%TEMP\\\\%\\\\MMC\\\\MMC.exe']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-08-18T12:03:57Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"filename\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-attribute", "spec_version": "2.1", "id": "x-misp-attribute--57b5a5a0-ec2c-4b4f-961d-49f1950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-08-18T12:10:08.000Z", "modified": "2016-08-18T12:10:08.000Z", "labels": [ "misp:type=\"whois-registrant-email\"", "misp:category=\"Attribution\"", "misp:to_ids=\"True\"" ], "x_misp_category": "Attribution", "x_misp_type": "whois-registrant-email", "x_misp_value": "844148030@qq.com" }, { "type": "marking-definition", "spec_version": "2.1", "id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9", "created": "2017-01-20T00:00:00.000Z", "definition_type": "tlp", "name": "TLP:WHITE", "definition": { "tlp": "white" } } ] }