{ "type": "bundle", "id": "bundle--5e211b87-8f34-43f5-b02b-42e4950d210f", "objects": [ { "type": "identity", "spec_version": "2.1", "id": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f", "created": "2020-01-31T07:38:46.000Z", "modified": "2020-01-31T07:38:46.000Z", "name": "wilbursecurity.com", "identity_class": "organization" }, { "type": "report", "spec_version": "2.1", "id": "report--5e211b87-8f34-43f5-b02b-42e4950d210f", "created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f", "created": "2020-01-31T07:38:46.000Z", "modified": "2020-01-31T07:38:46.000Z", "name": "Ako Ransomware", "published": "2020-01-31T07:39:04Z", "object_refs": [ "indicator--5e211d3f-2db0-45f0-bfe5-479c950d210f", "indicator--5e211d40-5edc-4756-8ccc-4d80950d210f", "indicator--5e211d40-bd24-496b-b4e7-448f950d210f", "x-misp-attribute--5e211ea9-58d4-4ef9-a5ef-40d7950d210f", "observed-data--5e211f10-6480-42ab-8b19-4de9950d210f", "url--5e211f10-6480-42ab-8b19-4de9950d210f", "observed-data--5e211f39-d0a8-43d2-8995-48cf950d210f", "network-traffic--5e211f39-d0a8-43d2-8995-48cf950d210f", "ipv4-addr--5e211f39-d0a8-43d2-8995-48cf950d210f", "x-misp-attribute--5e211f8e-94cc-4067-b97f-485f950d210f", "observed-data--5e213034-de04-4974-820b-4b35950d210f", "url--5e213034-de04-4974-820b-4b35950d210f", "indicator--5e21d353-e354-456a-ba6b-4647950d210f", "indicator--5e21d432-c228-4d2c-8d51-43ab950d210f" ], "labels": [ "Threat-Report", "misp:tool=\"MISP-STIX-Converter\"", " Ransomware" ], "object_marking_refs": [ "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5e211d3f-2db0-45f0-bfe5-479c950d210f", "created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f", "created": "2020-01-17T02:34:39.000Z", "modified": "2020-01-17T02:34:39.000Z", "description": "Locker.exe", "pattern": "[file:hashes.SHA256 = 'ae8e02d15c9b45a751e4e7f177f27f5ba7663fe6ec4b53cc68a6c1f5c2a3cfd9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-01-17T02:34:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload installation" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload installation\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5e211d40-5edc-4756-8ccc-4d80950d210f", "created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f", "created": "2020-01-17T02:34:40.000Z", "modified": "2020-01-17T02:34:40.000Z", "description": "Locker.exe", "pattern": "[file:hashes.SHA1 = 'c0501e264531f29854bdaa872eb12c30b5875200']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-01-17T02:34:40Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload installation" } ], "labels": [ "misp:type=\"sha1\"", "misp:category=\"Payload installation\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5e211d40-bd24-496b-b4e7-448f950d210f", "created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f", "created": "2020-01-17T02:34:40.000Z", "modified": "2020-01-17T02:34:40.000Z", "description": "Locker.exe", "pattern": "[file:hashes.MD5 = 'ef2697aa224266b204127722771bc209']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-01-17T02:34:40Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload installation" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Payload installation\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-attribute", "spec_version": "2.1", "id": "x-misp-attribute--5e211ea9-58d4-4ef9-a5ef-40d7950d210f", "created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f", "created": "2020-01-17T02:45:16.000Z", "modified": "2020-01-17T02:45:16.000Z", "labels": [ "misp:type=\"other\"", "misp:category=\"Other\"" ], "x_misp_category": "Other", "x_misp_type": "other", "x_misp_value": "Commands Run\r\nvssadmin.exe Delete Shadows /All /Quiet\r\nbcdedit.exe /set {default} recoveryenabled No\r\nbcdedit.exe /set {default} bootstatuspolicy ignoreallfailures\r\nwbadmin DELETE SYSTEMSTATEBACKUP\r\nwbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest\r\nwmic.exe SHADOWCOPY /nointeractive" }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--5e211f10-6480-42ab-8b19-4de9950d210f", "created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f", "created": "2020-01-17T15:27:16.000Z", "modified": "2020-01-17T15:27:16.000Z", "first_observed": "2020-01-17T15:27:16Z", "last_observed": "2020-01-17T15:27:16Z", "number_observed": 1, "object_refs": [ "url--5e211f10-6480-42ab-8b19-4de9950d210f" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--5e211f10-6480-42ab-8b19-4de9950d210f", "value": "https://app.any.run/tasks/5f4740c6-023a-4214-a96a-97b05e8b440e/" }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--5e211f39-d0a8-43d2-8995-48cf950d210f", "created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f", "created": "2020-01-17T02:43:05.000Z", "modified": "2020-01-17T02:43:05.000Z", "first_observed": "2020-01-17T02:43:05Z", "last_observed": "2020-01-17T02:43:05Z", "number_observed": 1, "object_refs": [ "network-traffic--5e211f39-d0a8-43d2-8995-48cf950d210f", "ipv4-addr--5e211f39-d0a8-43d2-8995-48cf950d210f" ], "labels": [ "misp:type=\"ip-src\"", "misp:category=\"Network activity\"" ] }, { "type": "network-traffic", "spec_version": "2.1", "id": "network-traffic--5e211f39-d0a8-43d2-8995-48cf950d210f", "src_ref": "ipv4-addr--5e211f39-d0a8-43d2-8995-48cf950d210f", "protocols": [ "tcp" ] }, { "type": "ipv4-addr", "spec_version": "2.1", "id": "ipv4-addr--5e211f39-d0a8-43d2-8995-48cf950d210f", "value": "185.167.160.83" }, { "type": "x-misp-attribute", "spec_version": "2.1", "id": "x-misp-attribute--5e211f8e-94cc-4067-b97f-485f950d210f", "created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f", "created": "2020-01-17T15:27:10.000Z", "modified": "2020-01-17T15:27:10.000Z", "labels": [ "misp:type=\"other\"", "misp:category=\"Other\"" ], "x_misp_category": "Other", "x_misp_type": "other", "x_misp_value": "Tor Ransom page\r\n\r\nhttp://kwvhrdibgmmpkhkidrby4mccwqpds5za6uo2thcw5gz75qncv7rbhyad.onion/C2SNJM7PHLUI0QQV" }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--5e213034-de04-4974-820b-4b35950d210f", "created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f", "created": "2020-01-17T15:41:31.000Z", "modified": "2020-01-17T15:41:31.000Z", "first_observed": "2020-01-17T15:41:31Z", "last_observed": "2020-01-17T15:41:31Z", "number_observed": 1, "object_refs": [ "url--5e213034-de04-4974-820b-4b35950d210f" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--5e213034-de04-4974-820b-4b35950d210f", "value": "https://wilbursecurity.com/2020/01/ako-ransomware" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5e21d353-e354-456a-ba6b-4647950d210f", "created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f", "created": "2020-01-17T15:44:10.000Z", "modified": "2020-01-17T15:44:10.000Z", "pattern": "[windows-registry-key:key = 'HKLM\\\\SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Policies\\\\System' AND windows-registry-key:values[0].data = '1' AND windows-registry-key:values[0].name = 'EnableLinkedConnections']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-01-17T15:44:10Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"registry-key\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5e21d432-c228-4d2c-8d51-43ab950d210f", "created_by_ref": "identity--5e16d2bc-5c68-4ef1-bc80-47f5950d210f", "created": "2020-01-17T15:35:14.000Z", "modified": "2020-01-17T15:35:14.000Z", "pattern": "[windows-registry-key:key = 'HKEY_CURRENT_USER\\\\Software\\\\acfg' AND windows-registry-key:values[0].data = '.(randomly generated key)' AND windows-registry-key:values[0].name = 'aid']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-01-17T15:35:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"registry-key\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "marking-definition", "spec_version": "2.1", "id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9", "created": "2017-01-20T00:00:00.000Z", "definition_type": "tlp", "name": "TLP:WHITE", "definition": { "tlp": "white" } } ] }