{ "type": "bundle", "id": "bundle--5a265a9e-9e54-4d44-a04e-42af950d210f", "objects": [ { "type": "identity", "spec_version": "2.1", "id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2017-12-06T10:03:09.000Z", "modified": "2017-12-06T10:03:09.000Z", "name": "CIRCL", "identity_class": "organization" }, { "type": "report", "spec_version": "2.1", "id": "report--5a265a9e-9e54-4d44-a04e-42af950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2017-12-06T10:03:09.000Z", "modified": "2017-12-06T10:03:09.000Z", "name": "OSINT - Halloware Ransomware on Sale on the Dark Web for Only $40", "published": "2017-12-06T10:03:18Z", "object_refs": [ "observed-data--5a265ab9-fd00-469a-a5fa-4019950d210f", "url--5a265ab9-fd00-469a-a5fa-4019950d210f", "x-misp-attribute--5a265d95-5644-43e2-ac0f-4744950d210f", "indicator--5a265dba-e3e0-45fb-8c3a-42b7950d210f", "indicator--5a265dba-0bc0-4d83-b3c8-4f6a950d210f", "indicator--5a265dba-a5a8-4c74-8d40-4951950d210f", "indicator--5a27c054-fd60-48db-a4b6-476a02de0b81", "indicator--5a27c054-dee8-42e8-ba80-495202de0b81", "observed-data--5a27c054-28b4-434a-8d0f-433b02de0b81", "url--5a27c054-28b4-434a-8d0f-433b02de0b81", "indicator--5a27c054-2594-4b77-8d21-494b02de0b81", "indicator--5a27c054-4f14-494f-95de-44e802de0b81", "observed-data--5a27c054-1928-4147-99a8-40e102de0b81", "url--5a27c054-1928-4147-99a8-40e102de0b81", "indicator--5a27c054-8dfc-40d4-9787-4bbc02de0b81", "indicator--5a27c054-6144-49b2-9c3c-499902de0b81", "observed-data--5a27c054-4558-4dc5-ac31-494f02de0b81", "url--5a27c054-4558-4dc5-ac31-494f02de0b81" ], "labels": [ "Threat-Report", "misp:tool=\"MISP-STIX-Converter\"", "type:OSINT", "malware_classification:malware-category=\"Ransomware\"", "osint:source-type=\"blog-post\"" ], "object_marking_refs": [ "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--5a265ab9-fd00-469a-a5fa-4019950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2017-12-06T10:02:59.000Z", "modified": "2017-12-06T10:02:59.000Z", "first_observed": "2017-12-06T10:02:59Z", "last_observed": "2017-12-06T10:02:59Z", "number_observed": 1, "object_refs": [ "url--5a265ab9-fd00-469a-a5fa-4019950d210f" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"", "osint:source-type=\"blog-post\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--5a265ab9-fd00-469a-a5fa-4019950d210f", "value": "https://www.bleepingcomputer.com/news/security/halloware-ransomware-on-sale-on-the-dark-web-for-only-40/" }, { "type": "x-misp-attribute", "spec_version": "2.1", "id": "x-misp-attribute--5a265d95-5644-43e2-ac0f-4744950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2017-12-06T10:03:00.000Z", "modified": "2017-12-06T10:03:00.000Z", "labels": [ "misp:type=\"comment\"", "misp:category=\"External analysis\"", "osint:source-type=\"blog-post\"" ], "x_misp_category": "External analysis", "x_misp_type": "comment", "x_misp_value": "A malware author by the name of Luc1F3R is peddling a new ransomware strain called Halloware for the lowly price of $40. Based on evidence gathered by Bleeping Computer, Luc1F3R started selling his ransomware this week, beginning Thursday.\r\n\r\nCurrently, the malware dev is selling and/or advertising his ransomware on a dedicated Dark Web portal, on Dark Web forums, two sites hosted on the public Internet, and via videos hosted on YouTube." }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5a265dba-e3e0-45fb-8c3a-42b7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2017-12-06T10:03:00.000Z", "modified": "2017-12-06T10:03:00.000Z", "pattern": "[file:hashes.SHA256 = '007c1f11afb195d77c176891d54b9cfd37c87b13dfe0ab5b6c368125e4459b8c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2017-12-06T10:03:00Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5a265dba-0bc0-4d83-b3c8-4f6a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2017-12-06T10:03:00.000Z", "modified": "2017-12-06T10:03:00.000Z", "pattern": "[file:hashes.SHA256 = 'd5b58bdda4ece79fbc264fff7f32df584d7b0051a5493119d336252f4668c73c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2017-12-06T10:03:00Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5a265dba-a5a8-4c74-8d40-4951950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2017-12-06T10:03:00.000Z", "modified": "2017-12-06T10:03:00.000Z", "pattern": "[file:hashes.SHA256 = 'c6d2e486109dc37f451dccce716e99e8a2653475d5605531d52756fc4fc88f09']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2017-12-06T10:03:00Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5a27c054-fd60-48db-a4b6-476a02de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2017-12-06T10:03:00.000Z", "modified": "2017-12-06T10:03:00.000Z", "description": "- Xchecked via VT: c6d2e486109dc37f451dccce716e99e8a2653475d5605531d52756fc4fc88f09", "pattern": "[file:hashes.SHA1 = 'd94437d6aa2b74d56626e1cb31230949e21c4f48']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2017-12-06T10:03:00Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha1\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5a27c054-dee8-42e8-ba80-495202de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2017-12-06T10:03:00.000Z", "modified": "2017-12-06T10:03:00.000Z", "description": "- Xchecked via VT: c6d2e486109dc37f451dccce716e99e8a2653475d5605531d52756fc4fc88f09", "pattern": "[file:hashes.MD5 = '220cd79a8eddbfb19121e0b67165ab1c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2017-12-06T10:03:00Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--5a27c054-28b4-434a-8d0f-433b02de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2017-12-06T10:03:00.000Z", "modified": "2017-12-06T10:03:00.000Z", "first_observed": "2017-12-06T10:03:00Z", "last_observed": "2017-12-06T10:03:00Z", "number_observed": 1, "object_refs": [ "url--5a27c054-28b4-434a-8d0f-433b02de0b81" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--5a27c054-28b4-434a-8d0f-433b02de0b81", "value": "https://www.virustotal.com/file/c6d2e486109dc37f451dccce716e99e8a2653475d5605531d52756fc4fc88f09/analysis/1512455978/" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5a27c054-2594-4b77-8d21-494b02de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2017-12-06T10:03:00.000Z", "modified": "2017-12-06T10:03:00.000Z", "description": "- Xchecked via VT: d5b58bdda4ece79fbc264fff7f32df584d7b0051a5493119d336252f4668c73c", "pattern": "[file:hashes.SHA1 = '56db07c9905d9bd2cc5fbc0f7091982b7e0aadc2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2017-12-06T10:03:00Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha1\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5a27c054-4f14-494f-95de-44e802de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2017-12-06T10:03:00.000Z", "modified": "2017-12-06T10:03:00.000Z", "description": "- Xchecked via VT: d5b58bdda4ece79fbc264fff7f32df584d7b0051a5493119d336252f4668c73c", "pattern": "[file:hashes.MD5 = 'b01230be6e42bf7210ce244ca493a697']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2017-12-06T10:03:00Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--5a27c054-1928-4147-99a8-40e102de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2017-12-06T10:03:00.000Z", "modified": "2017-12-06T10:03:00.000Z", "first_observed": "2017-12-06T10:03:00Z", "last_observed": "2017-12-06T10:03:00Z", "number_observed": 1, "object_refs": [ "url--5a27c054-1928-4147-99a8-40e102de0b81" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--5a27c054-1928-4147-99a8-40e102de0b81", "value": "https://www.virustotal.com/file/d5b58bdda4ece79fbc264fff7f32df584d7b0051a5493119d336252f4668c73c/analysis/1512445343/" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5a27c054-8dfc-40d4-9787-4bbc02de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2017-12-06T10:03:00.000Z", "modified": "2017-12-06T10:03:00.000Z", "description": "- Xchecked via VT: 007c1f11afb195d77c176891d54b9cfd37c87b13dfe0ab5b6c368125e4459b8c", "pattern": "[file:hashes.SHA1 = 'e3902bc1f576ad063db6da455a820a840c1556a4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2017-12-06T10:03:00Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha1\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5a27c054-6144-49b2-9c3c-499902de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2017-12-06T10:03:00.000Z", "modified": "2017-12-06T10:03:00.000Z", "description": "- Xchecked via VT: 007c1f11afb195d77c176891d54b9cfd37c87b13dfe0ab5b6c368125e4459b8c", "pattern": "[file:hashes.MD5 = '7c10cf39ee3169bb3e46aac14c888228']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2017-12-06T10:03:00Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--5a27c054-4558-4dc5-ac31-494f02de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2017-12-06T10:03:00.000Z", "modified": "2017-12-06T10:03:00.000Z", "first_observed": "2017-12-06T10:03:00Z", "last_observed": "2017-12-06T10:03:00Z", "number_observed": 1, "object_refs": [ "url--5a27c054-4558-4dc5-ac31-494f02de0b81" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--5a27c054-4558-4dc5-ac31-494f02de0b81", "value": "https://www.virustotal.com/file/007c1f11afb195d77c176891d54b9cfd37c87b13dfe0ab5b6c368125e4459b8c/analysis/1512445313/" }, { "type": "marking-definition", "spec_version": "2.1", "id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9", "created": "2017-01-20T00:00:00.000Z", "definition_type": "tlp", "name": "TLP:WHITE", "definition": { "tlp": "white" } } ] }