{ "type": "bundle", "id": "bundle--5a54778c-3dac-4d36-b7c3-4d6e02de0b81", "objects": [ { "type": "identity", "spec_version": "2.1", "id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-01-10T03:00:26.000Z", "modified": "2018-01-10T03:00:26.000Z", "name": "CIRCL", "identity_class": "organization" }, { "type": "report", "spec_version": "2.1", "id": "report--5a54778c-3dac-4d36-b7c3-4d6e02de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-01-10T03:00:26.000Z", "modified": "2018-01-10T03:00:26.000Z", "name": "OSINT - A North Korean Monero Cryptocurrency Miner", "published": "2018-01-11T18:49:08Z", "object_refs": [ "observed-data--5a54779b-451c-4777-a15d-573002de0b81", "url--5a54779b-451c-4777-a15d-573002de0b81", "x-misp-attribute--5a5477ad-63d4-443a-a0d0-b52402de0b81", "indicator--5a5477c8-1d28-4171-9740-bc9302de0b81", "indicator--5a5477c8-8188-4ad5-bfbb-bc9302de0b81", "observed-data--5a5477f2-0068-4ce8-9be5-566802de0b81", "network-traffic--5a5477f2-0068-4ce8-9be5-566802de0b81", "ipv4-addr--5a5477f2-0068-4ce8-9be5-566802de0b81", "indicator--5a54780c-77cc-42c1-9633-bab602de0b81", "indicator--5a547824-c8c8-45b3-b19b-b73502de0b81", "indicator--5a547852-0478-476e-9703-4d6e02de0b81", "indicator--5a5478ba-6920-40a3-bedc-57fd02de0b81", "indicator--ecdcbae1-a690-4f9c-9ce7-b505f1c1a634", "x-misp-object--0b6118b9-a775-47cf-8f97-de518c5ffd7a", "indicator--62422a69-b558-4bbc-9e01-ff1038764faf", "x-misp-object--36e2da81-042e-4880-9f27-76ebec952ba0", "indicator--8a8becfb-f8ce-440a-9ffa-81a43239f4e2", "x-misp-object--fe330733-f2f4-490d-a9b8-c0f0da7353fe", "relationship--cbdb228b-a950-4c4a-b193-c20696fba2f8", "relationship--7919c346-d493-4993-b0d5-cc7153fc9e6d", "relationship--7929df89-0b86-4c3f-9dd5-bfe2fef0ff94" ], "labels": [ "Threat-Report", "misp:tool=\"MISP-STIX-Converter\"", "admiralty-scale:information-credibility=\"2\"", "osint:source-type=\"blog-post\"" ], "object_marking_refs": [ "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--5a54779b-451c-4777-a15d-573002de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-01-09T08:12:04.000Z", "modified": "2018-01-09T08:12:04.000Z", "first_observed": "2018-01-09T08:12:04Z", "last_observed": "2018-01-09T08:12:04Z", "number_observed": 1, "object_refs": [ "url--5a54779b-451c-4777-a15d-573002de0b81" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"", "osint:source-type=\"blog-post\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--5a54779b-451c-4777-a15d-573002de0b81", "value": "https://www.alienvault.com/blogs/labs-research/a-north-korean-monero-cryptocurrency-miner" }, { "type": "x-misp-attribute", "spec_version": "2.1", "id": "x-misp-attribute--5a5477ad-63d4-443a-a0d0-b52402de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-01-09T08:12:04.000Z", "modified": "2018-01-09T08:12:04.000Z", "labels": [ "misp:type=\"text\"", "misp:category=\"External analysis\"", "osint:source-type=\"blog-post\"" ], "x_misp_category": "External analysis", "x_misp_type": "text", "x_misp_value": "AlienVault labs recently analysed an application compiled on Christmas Eve 2017. It is an Installer for software to mine the Monero crypto-currency. Any mined currency is sent to Kim Il Sung University in Pyongyang, North Korea.\r\n\r\nThe Installer copies a file named intelservice.exe to the system. The filename intelservice.exe is often associated with crypto-currency mining malware. Based on the arguments it\u00e2\u20ac\u2122s executed with, it\u00e2\u20ac\u2122s likely a piece of software called xmrig. \r\n\r\nIt\u00e2\u20ac\u2122s not unusual to see xmrig in malware campaigns. It was recently used in some wide campaigns exploiting unpatched IIS servers to mine Monero." }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5a5477c8-1d28-4171-9740-bc9302de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-01-09T08:05:28.000Z", "modified": "2018-01-09T08:05:28.000Z", "description": "We identified two other pieces of software which share some code:", "pattern": "[file:hashes.MD5 = '762c3249904a8bf76802effb54426655']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-01-09T08:05:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5a5477c8-8188-4ad5-bfbb-bc9302de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-01-09T08:05:28.000Z", "modified": "2018-01-09T08:05:28.000Z", "description": "We identified two other pieces of software which share some code:", "pattern": "[file:hashes.MD5 = '42344bb45f351757e8638656e12a0135']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-01-09T08:05:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--5a5477f2-0068-4ce8-9be5-566802de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-01-09T08:10:10.000Z", "modified": "2018-01-09T08:10:10.000Z", "first_observed": "2018-01-09T08:10:10Z", "last_observed": "2018-01-09T08:10:10Z", "number_observed": 1, "object_refs": [ "network-traffic--5a5477f2-0068-4ce8-9be5-566802de0b81", "ipv4-addr--5a5477f2-0068-4ce8-9be5-566802de0b81" ], "labels": [ "misp:type=\"ip-src\"", "misp:category=\"Network activity\"" ] }, { "type": "network-traffic", "spec_version": "2.1", "id": "network-traffic--5a5477f2-0068-4ce8-9be5-566802de0b81", "src_ref": "ipv4-addr--5a5477f2-0068-4ce8-9be5-566802de0b81", "protocols": [ "tcp" ] }, { "type": "ipv4-addr", "spec_version": "2.1", "id": "ipv4-addr--5a5477f2-0068-4ce8-9be5-566802de0b81", "value": "175.45.178.19" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5a54780c-77cc-42c1-9633-bab602de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-01-09T08:07:15.000Z", "modified": "2018-01-09T08:07:15.000Z", "description": "Decompiled Code", "pattern": "[file:hashes.MD5 = '6a261443299788af1467142d5f538b2c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-01-09T08:07:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5a547824-c8c8-45b3-b19b-b73502de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-01-09T08:10:10.000Z", "modified": "2018-01-09T08:10:10.000Z", "pattern": "[rule nkminer_monero {\r\n\r\n meta:\r\n\r\n description = \"Detects installer of Monero miner that points to a NK domain\"\r\n\r\n author = \"cdoman@alienvault.com\"\r\n\r\n tlp = \"white\"\r\n\r\n license = \"MIT License\"\r\n\r\n strings:\r\n\r\n $a = \"82e999fb-a6e0-4094-aa1f-1a306069d1a5\" nocase wide ascii\r\n\r\n $b = \"4JUdGzvrMFDWrUUwY3toJATSeNwjn54LkCnKBPRzDuhzi5vSepHfUckJNxRL2gjkNrSqtCoRUrEDAgRwsQvVCjZbRy5YeFCqgoUMnzumvS\" nocase wide ascii\r\n\r\n $c = \"barjuok.ryongnamsan.edu.kp\" nocase wide ascii\r\n\r\n $d = \"C:\\\\SoftwaresInstall\\\\soft\" nocase wide ascii\r\n\r\n $e = \"C:\\\\Windows\\\\Sys64\\\\intelservice.exe\" nocase wide ascii\r\n\r\n $f = \"C:\\\\Windows\\\\Sys64\\\\updater.exe\" nocase wide ascii\r\n\r\n $g = \"C:\\\\Users\\\\Jawhar\\\\documents\\\\\" nocase wide ascii\r\n\r\n condition:\r\n\r\n any of them\r\n\r\n}]", "pattern_type": "yara", "pattern_version": "2.1", "valid_from": "2018-01-09T08:10:10Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"yara\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5a547852-0478-476e-9703-4d6e02de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-01-09T08:10:10.000Z", "modified": "2018-01-09T08:10:10.000Z", "description": "On port 5615", "pattern": "[domain-name:value = 'barjuok.ryongnamsan.edu.kp']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-01-09T08:10:10Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5a5478ba-6920-40a3-bedc-57fd02de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-01-09T08:09:30.000Z", "modified": "2018-01-09T08:09:30.000Z", "pattern": "[(network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '175.45.178.19') AND network-traffic:dst_port = '5615' AND network-traffic:x_misp_text = 'Arguments = ((\\\\\"-o barjuok.ryongnamsan.edu.kp:5615 -u 4JUdGzvrMFDWrUUwY3toJATSeNwjn54LkCnKBPRzDuhzi5vSepHfUckJNxRL2gjkNrSqtCoRUrEDAgRwsQvVCjZbRy5YeFCqgoUMnzumvS -p \\\\\" + str + \\\\\" -k -t \\\\\" + Conversions.ToString(value)) ?? \\\\\"\\\\\")']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-01-09T08:09:30Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "network" } ], "labels": [ "misp:name=\"ip-port\"", "misp:meta-category=\"network\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ecdcbae1-a690-4f9c-9ce7-b505f1c1a634", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-01-09T08:10:13.000Z", "modified": "2018-01-09T08:10:13.000Z", "pattern": "[file:hashes.MD5 = '762c3249904a8bf76802effb54426655' AND file:hashes.SHA1 = '0def199dbdb8dccf380511f67138088148ea83a3' AND file:hashes.SHA256 = '42300b6a09f183ae167d7a11d9c6df21d022a5f02df346350d3d875d557d3b76']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-01-09T08:10:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--0b6118b9-a775-47cf-8f97-de518c5ffd7a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-01-09T08:10:10.000Z", "modified": "2018-01-09T08:10:10.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/42300b6a09f183ae167d7a11d9c6df21d022a5f02df346350d3d875d557d3b76/analysis/1515484535/", "category": "External analysis", "comment": "We identified two other pieces of software which share some code:", "uuid": "5a5478e3-2394-4d96-a621-b75d02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "3/67", "category": "Other", "comment": "We identified two other pieces of software which share some code:", "uuid": "5a5478e3-ef44-4be0-99af-b75d02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-09T07:55:35", "category": "Other", "comment": "We identified two other pieces of software which share some code:", "uuid": "5a5478e3-d6f0-430c-b82c-b75d02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--62422a69-b558-4bbc-9e01-ff1038764faf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-01-09T08:10:14.000Z", "modified": "2018-01-09T08:10:14.000Z", "pattern": "[file:hashes.MD5 = '6a261443299788af1467142d5f538b2c' AND file:hashes.SHA1 = '8965381377a884aa68eeb451b3e62175968b0b04' AND file:hashes.SHA256 = 'c599f3ca3417169e4a620b8231f8a97ccc63e291b9e09c888e6807dd90f1f17c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-01-09T08:10:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--36e2da81-042e-4880-9f27-76ebec952ba0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-01-09T08:10:11.000Z", "modified": "2018-01-09T08:10:11.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/c599f3ca3417169e4a620b8231f8a97ccc63e291b9e09c888e6807dd90f1f17c/analysis/1515484533/", "category": "External analysis", "comment": "Decompiled Code", "uuid": "5a5478e3-1108-4a5e-93b1-b75d02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "6/68", "category": "Other", "comment": "Decompiled Code", "uuid": "5a5478e3-04d8-4a5a-ae0b-b75d02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-09T07:55:33", "category": "Other", "comment": "Decompiled Code", "uuid": "5a5478e3-0fa0-4ec3-b082-b75d02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8a8becfb-f8ce-440a-9ffa-81a43239f4e2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-01-09T08:10:14.000Z", "modified": "2018-01-09T08:10:14.000Z", "pattern": "[file:hashes.MD5 = '42344bb45f351757e8638656e12a0135' AND file:hashes.SHA1 = '7cab4853c370a2dd299a5ab3ebeccfe17455cb43' AND file:hashes.SHA256 = '0024e32c0199ded445c0b968601f21cc92fc0c534d2642f2dd64c1c978ff01f3']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-01-09T08:10:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--fe330733-f2f4-490d-a9b8-c0f0da7353fe", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-01-09T08:10:11.000Z", "modified": "2018-01-09T08:10:11.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/0024e32c0199ded445c0b968601f21cc92fc0c534d2642f2dd64c1c978ff01f3/analysis/1515484532/", "category": "External analysis", "comment": "We identified two other pieces of software which share some code:", "uuid": "5a5478e3-fa78-43c9-90a9-b75d02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "6/67", "category": "Other", "comment": "We identified two other pieces of software which share some code:", "uuid": "5a5478e3-e430-4494-8cd8-b75d02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-09T07:55:32", "category": "Other", "comment": "We identified two other pieces of software which share some code:", "uuid": "5a5478e3-546c-4052-abd1-b75d02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--cbdb228b-a950-4c4a-b193-c20696fba2f8", "created": "2018-01-11T18:49:07.000Z", "modified": "2018-01-11T18:49:07.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--ecdcbae1-a690-4f9c-9ce7-b505f1c1a634", "target_ref": "x-misp-object--0b6118b9-a775-47cf-8f97-de518c5ffd7a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--7919c346-d493-4993-b0d5-cc7153fc9e6d", "created": "2018-01-11T18:49:07.000Z", "modified": "2018-01-11T18:49:07.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--62422a69-b558-4bbc-9e01-ff1038764faf", "target_ref": "x-misp-object--36e2da81-042e-4880-9f27-76ebec952ba0" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--7929df89-0b86-4c3f-9dd5-bfe2fef0ff94", "created": "2018-01-11T18:49:08.000Z", "modified": "2018-01-11T18:49:08.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--8a8becfb-f8ce-440a-9ffa-81a43239f4e2", "target_ref": "x-misp-object--fe330733-f2f4-490d-a9b8-c0f0da7353fe" }, { "type": "marking-definition", "spec_version": "2.1", "id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9", "created": "2017-01-20T00:00:00.000Z", "definition_type": "tlp", "name": "TLP:WHITE", "definition": { "tlp": "white" } } ] }