{ "type": "bundle", "id": "bundle--5b27b1a5-34c4-4896-a522-473d950d210f", "objects": [ { "type": "identity", "spec_version": "2.1", "id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-10-26T14:22:53.000Z", "modified": "2018-10-26T14:22:53.000Z", "name": "CIRCL", "identity_class": "organization" }, { "type": "grouping", "spec_version": "2.1", "id": "grouping--5b27b1a5-34c4-4896-a522-473d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-10-26T14:22:53.000Z", "modified": "2018-10-26T14:22:53.000Z", "name": "OSINT - New Paradise Ransomware variant", "context": "suspicious-activity", "object_refs": [ "indicator--5b27b3c1-d6dc-4443-b8bf-ef38950d210f", "indicator--5b27b3c2-aca8-4318-92e2-ef38950d210f", "x-misp-object--5b27b1f9-8cf8-4ae9-9317-ee9f950d210f", "x-misp-object--5b27b397-a6e8-4a70-9151-ef38950d210f" ], "labels": [ "Threat-Report", "misp:tool=\"MISP-STIX-Converter\"", "malware_classification:malware-category=\"Ransomware\"", "circl:incident-classification=\"malware\"", "osint:source-type=\"microblog-post\"", "misp-galaxy:ransomware=\"Paradise Ransomware\"" ], "object_marking_refs": [ "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5b27b3c1-d6dc-4443-b8bf-ef38950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-06-18T13:29:37.000Z", "modified": "2018-06-18T13:29:37.000Z", "pattern": "[email-message:from_ref.value = 'paradise@all-ransomware.info']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-06-18T13:29:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"email-src\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5b27b3c2-aca8-4318-92e2-ef38950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-06-18T13:29:38.000Z", "modified": "2018-06-18T13:29:38.000Z", "description": "Ransomnote", "pattern": "[email-message:from_ref.value = 'paradise_readme_paradise@all-ransomware.info.txt']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-06-18T13:29:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"email-src\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--5b27b1f9-8cf8-4ae9-9317-ee9f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-06-18T13:22:01.000Z", "modified": "2018-06-18T13:22:01.000Z", "labels": [ "misp:name=\"microblog\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "text", "object_relation": "post", "value": "The new Paradise ransomware version stores the config in a section called \"trump\"...\r\n\ud83d\ude02\r\n@BleepinComputer @demonslay335", "category": "Other", "uuid": "5b27b1f9-8978-422d-b610-ee9f950d210f" }, { "type": "text", "object_relation": "type", "value": "Twitter", "category": "Other", "uuid": "5b27b1fa-4f88-45c7-87d6-ee9f950d210f" }, { "type": "url", "object_relation": "url", "value": "https://twitter.com/malwrhunterteam/status/993499349199056897", "category": "Network activity", "to_ids": true, "uuid": "5b27b1fa-8cfc-42d7-af0d-ee9f950d210f" }, { "type": "text", "object_relation": "username-quoted", "value": "@BleepinComputer @demonslay335", "category": "Other", "uuid": "5b27b1fb-a848-4aec-809e-ee9f950d210f" }, { "type": "datetime", "object_relation": "creation-date", "value": "7 May 2018", "category": "Other", "uuid": "5b27b1fd-3718-46a5-b53e-ee9f950d210f" }, { "type": "text", "object_relation": "username", "value": "@malwrhunterteam", "category": "Other", "uuid": "5b27b1fe-3f6c-4ad0-b15d-ee9f950d210f" } ], "x_misp_meta_category": "misc", "x_misp_name": "microblog" }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--5b27b397-a6e8-4a70-9151-ef38950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-06-18T13:28:55.000Z", "modified": "2018-06-18T13:28:55.000Z", "labels": [ "misp:name=\"microblog\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "text", "object_relation": "post", "value": "Latest sample of Paradise ransomware (RaaS?) still uses \"trump\" as section name ((link: https://twitter.com/malwrhunterteam/status/993499349199056897) twitter.com/malwrhuntertea\u2026) and mutex.\r\nUses GetUserDefaultLangID & checks for 12 values, then uses an IP API & 12 checks again. \r\nIf can't guess the values, see screens...\r\n@BleepinComputer @demonslay335", "category": "Other", "uuid": "5b27b397-74fc-41f8-bb77-ef38950d210f" }, { "type": "text", "object_relation": "type", "value": "Twitter", "category": "Other", "uuid": "5b27b398-75c4-406d-aabb-ef38950d210f" }, { "type": "url", "object_relation": "url", "value": "https://twitter.com/malwrhunterteam/status/1005420103415017472", "category": "Network activity", "to_ids": true, "uuid": "5b27b398-f3ac-47eb-af44-ef38950d210f" }, { "type": "text", "object_relation": "username-quoted", "value": "@BleepinComputer @demonslay335", "category": "Other", "uuid": "5b27b398-c6b4-47bd-8247-ef38950d210f" }, { "type": "datetime", "object_relation": "creation-date", "value": "9 Jun 2018", "category": "Other", "uuid": "5b27b399-ac90-496a-ba51-ef38950d210f" }, { "type": "text", "object_relation": "username", "value": "@malwrhunterteam", "category": "Other", "uuid": "5b27b399-c524-4b8c-936b-ef38950d210f" } ], "x_misp_meta_category": "misc", "x_misp_name": "microblog" }, { "type": "marking-definition", "spec_version": "2.1", "id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9", "created": "2017-01-20T00:00:00.000Z", "definition_type": "tlp", "name": "TLP:WHITE", "definition": { "tlp": "white" } } ] }