{ "type": "bundle", "id": "bundle--585b9a80-9910-4d24-a695-4ac4950d210f", "objects": [ { "type": "identity", "spec_version": "2.1", "id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:28:54.000Z", "modified": "2016-12-22T09:28:54.000Z", "name": "CIRCL", "identity_class": "organization" }, { "type": "report", "spec_version": "2.1", "id": "report--585b9a80-9910-4d24-a695-4ac4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:28:54.000Z", "modified": "2016-12-22T09:28:54.000Z", "name": "OSINT - New Linux/Rakos threat: devices and servers under SSH scan (again)", "published": "2016-12-22T09:29:15Z", "object_refs": [ "observed-data--585b9ab7-3758-4e28-8a36-420d950d210f", "url--585b9ab7-3758-4e28-8a36-420d950d210f", "x-misp-attribute--585b9acb-d250-4b85-9788-454d950d210f", "indicator--585b9b48-e214-418d-a783-4282950d210f", "indicator--585b9b49-9dbc-48f4-805c-4440950d210f", "indicator--585b9b49-1e04-4b8b-bf8d-4094950d210f", "indicator--585b9b4a-ac98-421e-9bad-4177950d210f", "indicator--585b9b4a-1170-424a-a910-47e2950d210f", "indicator--585b9b4b-e118-4029-acad-457c950d210f", "indicator--585b9b4b-f3e4-4409-9055-4e76950d210f", "indicator--585b9b4c-50fc-4127-8fe1-4124950d210f", "indicator--585b9b4d-8288-425a-b8ee-4ca7950d210f", "indicator--585b9b4d-db34-4230-90a2-4661950d210f", "indicator--585b9b5f-495c-448d-bf2f-453a950d210f", "indicator--585b9b5f-a210-4acc-afcb-4dc9950d210f", "indicator--585b9b60-ad74-4c0d-9e30-4464950d210f", "indicator--585b9b60-8f78-45ab-a703-42a7950d210f", "indicator--585b9b61-2478-4795-8f7f-4fd7950d210f", "indicator--585b9b62-9ef4-47e7-b2d5-42cc950d210f", "indicator--585b9b62-8c0c-435b-bbf7-4be8950d210f", "indicator--585b9b63-a688-4ec8-af50-4fe8950d210f", "indicator--585b9b63-0f50-43f1-b3e2-4e46950d210f", "indicator--585b9b64-2a68-480f-b9e2-4241950d210f", "indicator--585b9b64-a638-4fe0-b8ea-4b4d950d210f", "observed-data--585b9bb7-0e94-45e9-bc34-41d4950d210f", "url--585b9bb7-0e94-45e9-bc34-41d4950d210f", "indicator--585b9c37-6438-41d6-949a-47cd02de0b81", "indicator--585b9c38-6028-4ccd-b272-463302de0b81", "observed-data--585b9c38-f430-495f-9bdf-4cb802de0b81", "url--585b9c38-f430-495f-9bdf-4cb802de0b81", "indicator--585b9c39-5eac-4ab3-8d4d-46aa02de0b81", "indicator--585b9c3a-7244-475b-ab43-4a9302de0b81", "observed-data--585b9c3b-0fbc-42f5-93d8-43c902de0b81", "url--585b9c3b-0fbc-42f5-93d8-43c902de0b81", "indicator--585b9c3c-1334-426d-86a9-4aca02de0b81", "indicator--585b9c3c-33b4-45ad-baee-4b5f02de0b81", "observed-data--585b9c3d-a0d0-4704-9c9b-46d902de0b81", "url--585b9c3d-a0d0-4704-9c9b-46d902de0b81", "indicator--585b9c3e-5974-4d0d-89eb-4bb802de0b81", "indicator--585b9c3e-c5c0-404a-9afb-41c602de0b81", "observed-data--585b9c3f-5838-4479-af90-4fdf02de0b81", "url--585b9c3f-5838-4479-af90-4fdf02de0b81", "indicator--585b9c40-a4c4-45ee-a6ee-4d2d02de0b81", "indicator--585b9c41-9ce4-4657-8bf7-4add02de0b81", "observed-data--585b9c41-1c94-44e6-93f6-440b02de0b81", "url--585b9c41-1c94-44e6-93f6-440b02de0b81", "indicator--585b9c42-30e0-4919-b4cc-4bd902de0b81", "indicator--585b9c43-b8f0-4bd5-9366-4f9502de0b81", "observed-data--585b9c44-fad4-4ea6-a16a-4b6c02de0b81", "url--585b9c44-fad4-4ea6-a16a-4b6c02de0b81", "indicator--585b9c44-f7d0-4d5d-bb8b-417f02de0b81", "indicator--585b9c45-e288-4c14-9377-4e3b02de0b81", "observed-data--585b9c46-725c-4e0a-8f2a-41d802de0b81", "url--585b9c46-725c-4e0a-8f2a-41d802de0b81", "indicator--585b9c46-39d0-42e2-a244-41f802de0b81", "indicator--585b9c47-89cc-4c82-8a7e-440802de0b81", "observed-data--585b9c47-9508-4c02-b9dd-494402de0b81", "url--585b9c47-9508-4c02-b9dd-494402de0b81", "indicator--585b9c48-d588-436a-b429-45e802de0b81", "indicator--585b9c49-9cf0-478b-96a0-4bbb02de0b81", "observed-data--585b9c49-f154-4061-9dd2-418a02de0b81", "url--585b9c49-f154-4061-9dd2-418a02de0b81", "indicator--585b9c4a-c2c4-4696-9479-47cf02de0b81", "indicator--585b9c4a-ba88-4e51-9f22-4bab02de0b81", "observed-data--585b9c4b-5124-4940-b839-484202de0b81", "url--585b9c4b-5124-4940-b839-484202de0b81", "indicator--585b9cd6-d508-4a59-bc68-4d69950d210f" ], "labels": [ "Threat-Report", "misp:tool=\"MISP-STIX-Converter\"", "ms-caro-malware:malware-platform=\"Linux\"", "osint:source-type=\"blog-post\"" ], "object_marking_refs": [ "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--585b9ab7-3758-4e28-8a36-420d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:19:51.000Z", "modified": "2016-12-22T09:19:51.000Z", "first_observed": "2016-12-22T09:19:51Z", "last_observed": "2016-12-22T09:19:51Z", "number_observed": 1, "object_refs": [ "url--585b9ab7-3758-4e28-8a36-420d950d210f" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--585b9ab7-3758-4e28-8a36-420d950d210f", "value": "http://www.welivesecurity.com/2016/12/20/new-linuxrakos-threat-devices-servers-ssh-scan/" }, { "type": "x-misp-attribute", "spec_version": "2.1", "id": "x-misp-attribute--585b9acb-d250-4b85-9788-454d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:20:11.000Z", "modified": "2016-12-22T09:20:11.000Z", "labels": [ "misp:type=\"comment\"", "misp:category=\"External analysis\"" ], "x_misp_category": "External analysis", "x_misp_type": "comment", "x_misp_value": "Apparently, frustrated users complain more often recently on various forums about their embedded devices being overloaded with computing and network tasks. What these particular posts have in common is the name of the process causing the problem. It is executed from a temporary directory and disguised as a part of the Java framework, namely \u00e2\u20ac\u0153.javaxxx\u00e2\u20ac\u009d. Additional names like \u00e2\u20ac\u0153.swap\u00e2\u20ac\u009d or \u00e2\u20ac\u0153kworker\u00e2\u20ac\u009d are also used. A few weeks ago, we discussed the recent Mirai incidents and Mirai-connected IoT security problems in The Hive Mind: When IoT devices go rogue and all that was written then still holds true.\r\nAttack vector\r\n\r\nThe attack is performed via brute force attempts at SSH logins, in a similar way to that in which many Linux worms operate, including Linux/Moose (which spread by attacking Telnet logins) \u00e2\u20ac\u201c also referenced here \u00e2\u20ac\u201c as analyzed by ESET since last year. The targets include both embedded devices and servers with an open SSH port and where a very weak password has been set. The obvious aim of this trojan is to assemble a list of unsecured devices and to have an opportunity to create a botnet consisting of as many zombies as possible. The scan starts with not too extensive list of IPs and spreads incrementally to more targets. Only machines that represent low-hanging fruit from the security perspective are compromised. Note that victims reported cases when they had had a strong password but they forgot their device that had online service enabled and it was reverted to a default password after a factory reset. Just a couple of hours of online exposure was enough for such a reset machine to end up compromised!" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9b48-e214-418d-a783-4282950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:22:16.000Z", "modified": "2016-12-22T09:22:16.000Z", "description": "EM_X86_64 - 688", "pattern": "[file:hashes.SHA1 = 'f80836349d6e97251030190ecd30dda0047f1ee6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:22:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha1\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9b49-9dbc-48f4-805c-4440950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:22:17.000Z", "modified": "2016-12-22T09:22:17.000Z", "description": "EM_X86_64 - 694", "pattern": "[file:hashes.SHA1 = 'def04ec688ac6b41580dd3a6e78445b56536ba34']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:22:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha1\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9b49-1e04-4b8b-bf8d-4094950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:22:17.000Z", "modified": "2016-12-22T09:22:17.000Z", "description": "EM_X86_64 - 695", "pattern": "[file:hashes.SHA1 = '3435ca5505ce8dfe8e1b22e0ebd4f41c60050cc0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:22:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha1\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9b4a-ac98-421e-9bad-4177950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:22:18.000Z", "modified": "2016-12-22T09:22:18.000Z", "description": "EM_X86_64\t- 697", "pattern": "[file:hashes.SHA1 = 'e53c73fe6a552eab720e7ee685ea4e159ebd4fdd']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:22:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha1\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9b4a-1170-424a-a910-47e2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:22:18.000Z", "modified": "2016-12-22T09:22:18.000Z", "description": "EM_X86_64 - 698", "pattern": "[file:hashes.SHA1 = 'c93bddd9cdb4f2e185b54a4931257954e25e7c37']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:22:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha1\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9b4b-e118-4029-acad-457c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:22:19.000Z", "modified": "2016-12-22T09:22:19.000Z", "description": "EM_MIPS - ???", "pattern": "[file:hashes.SHA1 = '14af6254d9ca310b4d52778d050cb8dd7a5de1d8']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:22:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha1\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9b4b-f3e4-4409-9055-4e76950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:22:19.000Z", "modified": "2016-12-22T09:22:19.000Z", "description": "EM_386 - 700", "pattern": "[file:hashes.SHA1 = 'c54d50025d9f66ce2ace3361a8626aee468d94ba']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:22:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha1\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9b4c-50fc-4127-8fe1-4124950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:22:20.000Z", "modified": "2016-12-22T09:22:20.000Z", "description": "EM_386 - 706", "pattern": "[file:hashes.SHA1 = '36b2fffe98f517355425797fc242f2cb82271c0c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:22:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha1\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9b4d-8288-425a-b8ee-4ca7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:22:21.000Z", "modified": "2016-12-22T09:22:21.000Z", "description": "EM_386\t - 708", "pattern": "[file:hashes.SHA1 = 'e46e8e5e823eb0466981afb7683fd918d6fe78a9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:22:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha1\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9b4d-db34-4230-90a2-4661950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:22:21.000Z", "modified": "2016-12-22T09:22:21.000Z", "description": "EM_386\t - 711", "pattern": "[file:hashes.SHA1 = '0492e5c07c1426af9ce73ad33e00a3fd8477c6c2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:22:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha1\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9b5f-495c-448d-bf2f-453a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:22:39.000Z", "modified": "2016-12-22T09:22:39.000Z", "description": "C&C Servers", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '217.12.208.28']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:22:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9b5f-a210-4acc-afcb-4dc9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:22:39.000Z", "modified": "2016-12-22T09:22:39.000Z", "description": "C&C Servers", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '217.12.203.31']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:22:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9b60-ad74-4c0d-9e30-4464950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:22:40.000Z", "modified": "2016-12-22T09:22:40.000Z", "description": "C&C Servers", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '193.169.245.68']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:22:40Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9b60-8f78-45ab-a703-42a7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:22:40.000Z", "modified": "2016-12-22T09:22:40.000Z", "description": "C&C Servers", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.8.44.55']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:22:40Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9b61-2478-4795-8f7f-4fd7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:22:41.000Z", "modified": "2016-12-22T09:22:41.000Z", "description": "C&C Servers", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '195.123.210.100']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:22:41Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9b62-9ef4-47e7-b2d5-42cc950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:22:41.000Z", "modified": "2016-12-22T09:22:41.000Z", "description": "C&C Servers", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.34.183.231']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:22:41Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9b62-8c0c-435b-bbf7-4be8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:22:42.000Z", "modified": "2016-12-22T09:22:42.000Z", "description": "C&C Servers", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.34.180.64']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:22:42Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9b63-a688-4ec8-af50-4fe8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:22:43.000Z", "modified": "2016-12-22T09:22:43.000Z", "description": "C&C Servers", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '185.82.216.125']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:22:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9b63-0f50-43f1-b3e2-4e46950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:22:43.000Z", "modified": "2016-12-22T09:22:43.000Z", "description": "C&C Servers", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '185.14.30.78']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:22:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9b64-2a68-480f-b9e2-4241950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:22:44.000Z", "modified": "2016-12-22T09:22:44.000Z", "description": "C&C Servers", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '185.14.29.65']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:22:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9b64-a638-4fe0-b8ea-4b4d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:22:44.000Z", "modified": "2016-12-22T09:22:44.000Z", "description": "C&C Servers", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '185.20.184.117']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:22:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--585b9bb7-0e94-45e9-bc34-41d4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:24:07.000Z", "modified": "2016-12-22T09:24:07.000Z", "first_observed": "2016-12-22T09:24:07Z", "last_observed": "2016-12-22T09:24:07Z", "number_observed": 1, "object_refs": [ "url--585b9bb7-0e94-45e9-bc34-41d4950d210f" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--585b9bb7-0e94-45e9-bc34-41d4950d210f", "value": "https://github.com/eset/malware-ioc/tree/master/rakos" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9c37-6438-41d6-949a-47cd02de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:15.000Z", "modified": "2016-12-22T09:26:15.000Z", "description": "EM_386\t - 711 - Xchecked via VT: 0492e5c07c1426af9ce73ad33e00a3fd8477c6c2", "pattern": "[file:hashes.SHA256 = '62f875a31c5f8541a68176d03c3b9d6d0ee6fa90cf54307d7d07aed5fc573797']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:26:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9c38-6028-4ccd-b272-463302de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:16.000Z", "modified": "2016-12-22T09:26:16.000Z", "description": "EM_386\t - 711 - Xchecked via VT: 0492e5c07c1426af9ce73ad33e00a3fd8477c6c2", "pattern": "[file:hashes.MD5 = '7b88cf30540ab8df0ded406097c51b46']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:26:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--585b9c38-f430-495f-9bdf-4cb802de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:16.000Z", "modified": "2016-12-22T09:26:16.000Z", "first_observed": "2016-12-22T09:26:16Z", "last_observed": "2016-12-22T09:26:16Z", "number_observed": 1, "object_refs": [ "url--585b9c38-f430-495f-9bdf-4cb802de0b81" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--585b9c38-f430-495f-9bdf-4cb802de0b81", "value": "https://www.virustotal.com/file/62f875a31c5f8541a68176d03c3b9d6d0ee6fa90cf54307d7d07aed5fc573797/analysis/1481878860/" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9c39-5eac-4ab3-8d4d-46aa02de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:17.000Z", "modified": "2016-12-22T09:26:17.000Z", "description": "EM_386\t - 708 - Xchecked via VT: e46e8e5e823eb0466981afb7683fd918d6fe78a9", "pattern": "[file:hashes.SHA256 = '90cd3e16d6d0069e758bb7c1ec929354be24f52857bd77fdd246e20e4aaca75d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:26:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9c3a-7244-475b-ab43-4a9302de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:18.000Z", "modified": "2016-12-22T09:26:18.000Z", "description": "EM_386\t - 708 - Xchecked via VT: e46e8e5e823eb0466981afb7683fd918d6fe78a9", "pattern": "[file:hashes.MD5 = 'ca21c63269febcfe73fec9e1041ed903']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:26:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--585b9c3b-0fbc-42f5-93d8-43c902de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:19.000Z", "modified": "2016-12-22T09:26:19.000Z", "first_observed": "2016-12-22T09:26:19Z", "last_observed": "2016-12-22T09:26:19Z", "number_observed": 1, "object_refs": [ "url--585b9c3b-0fbc-42f5-93d8-43c902de0b81" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--585b9c3b-0fbc-42f5-93d8-43c902de0b81", "value": "https://www.virustotal.com/file/90cd3e16d6d0069e758bb7c1ec929354be24f52857bd77fdd246e20e4aaca75d/analysis/1481878661/" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9c3c-1334-426d-86a9-4aca02de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:20.000Z", "modified": "2016-12-22T09:26:20.000Z", "description": "EM_386 - 706 - Xchecked via VT: 36b2fffe98f517355425797fc242f2cb82271c0c", "pattern": "[file:hashes.SHA256 = '2a77e8d43b347c4ccf80271493eedf7b7b7f45d1e30e818e321657cf9a14f1d9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:26:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9c3c-33b4-45ad-baee-4b5f02de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:20.000Z", "modified": "2016-12-22T09:26:20.000Z", "description": "EM_386 - 706 - Xchecked via VT: 36b2fffe98f517355425797fc242f2cb82271c0c", "pattern": "[file:hashes.MD5 = '96c5ec03c20491389a240ead5cbd72fe']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:26:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--585b9c3d-a0d0-4704-9c9b-46d902de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:21.000Z", "modified": "2016-12-22T09:26:21.000Z", "first_observed": "2016-12-22T09:26:21Z", "last_observed": "2016-12-22T09:26:21Z", "number_observed": 1, "object_refs": [ "url--585b9c3d-a0d0-4704-9c9b-46d902de0b81" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--585b9c3d-a0d0-4704-9c9b-46d902de0b81", "value": "https://www.virustotal.com/file/2a77e8d43b347c4ccf80271493eedf7b7b7f45d1e30e818e321657cf9a14f1d9/analysis/1482355624/" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9c3e-5974-4d0d-89eb-4bb802de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:22.000Z", "modified": "2016-12-22T09:26:22.000Z", "description": "EM_386 - 700 - Xchecked via VT: c54d50025d9f66ce2ace3361a8626aee468d94ba", "pattern": "[file:hashes.SHA256 = 'efedce38a1908a27115e05b3e62fab52f68fae2db5ae1c50c455f007f964c6d2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:26:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9c3e-c5c0-404a-9afb-41c602de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:22.000Z", "modified": "2016-12-22T09:26:22.000Z", "description": "EM_386 - 700 - Xchecked via VT: c54d50025d9f66ce2ace3361a8626aee468d94ba", "pattern": "[file:hashes.MD5 = 'ce12f465f353bb1b64f790a5e4cd45af']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:26:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--585b9c3f-5838-4479-af90-4fdf02de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:23.000Z", "modified": "2016-12-22T09:26:23.000Z", "first_observed": "2016-12-22T09:26:23Z", "last_observed": "2016-12-22T09:26:23Z", "number_observed": 1, "object_refs": [ "url--585b9c3f-5838-4479-af90-4fdf02de0b81" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--585b9c3f-5838-4479-af90-4fdf02de0b81", "value": "https://www.virustotal.com/file/efedce38a1908a27115e05b3e62fab52f68fae2db5ae1c50c455f007f964c6d2/analysis/1482355624/" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9c40-a4c4-45ee-a6ee-4d2d02de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:24.000Z", "modified": "2016-12-22T09:26:24.000Z", "description": "EM_MIPS - ??? - Xchecked via VT: 14af6254d9ca310b4d52778d050cb8dd7a5de1d8", "pattern": "[file:hashes.SHA256 = 'a7ce7dc40bb8abf835efae5ebacc82cb8af2cc57b5021f0d28dc14924022c85d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:26:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9c41-9ce4-4657-8bf7-4add02de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:25.000Z", "modified": "2016-12-22T09:26:25.000Z", "description": "EM_MIPS - ??? - Xchecked via VT: 14af6254d9ca310b4d52778d050cb8dd7a5de1d8", "pattern": "[file:hashes.MD5 = '9a0ea27a15899e47bfe6fcc7c9df36c6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:26:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--585b9c41-1c94-44e6-93f6-440b02de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:25.000Z", "modified": "2016-12-22T09:26:25.000Z", "first_observed": "2016-12-22T09:26:25Z", "last_observed": "2016-12-22T09:26:25Z", "number_observed": 1, "object_refs": [ "url--585b9c41-1c94-44e6-93f6-440b02de0b81" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--585b9c41-1c94-44e6-93f6-440b02de0b81", "value": "https://www.virustotal.com/file/a7ce7dc40bb8abf835efae5ebacc82cb8af2cc57b5021f0d28dc14924022c85d/analysis/1482355624/" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9c42-30e0-4919-b4cc-4bd902de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:26.000Z", "modified": "2016-12-22T09:26:26.000Z", "description": "EM_X86_64 - 698 - Xchecked via VT: c93bddd9cdb4f2e185b54a4931257954e25e7c37", "pattern": "[file:hashes.SHA256 = 'd59ffe12b75f596a4a30074690f96497800a6ed97be8248c573e4048adac7e05']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:26:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9c43-b8f0-4bd5-9366-4f9502de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:27.000Z", "modified": "2016-12-22T09:26:27.000Z", "description": "EM_X86_64 - 698 - Xchecked via VT: c93bddd9cdb4f2e185b54a4931257954e25e7c37", "pattern": "[file:hashes.MD5 = 'eedab74ca1303647ade4fb0b0b588a36']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:26:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--585b9c44-fad4-4ea6-a16a-4b6c02de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:28.000Z", "modified": "2016-12-22T09:26:28.000Z", "first_observed": "2016-12-22T09:26:28Z", "last_observed": "2016-12-22T09:26:28Z", "number_observed": 1, "object_refs": [ "url--585b9c44-fad4-4ea6-a16a-4b6c02de0b81" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--585b9c44-fad4-4ea6-a16a-4b6c02de0b81", "value": "https://www.virustotal.com/file/d59ffe12b75f596a4a30074690f96497800a6ed97be8248c573e4048adac7e05/analysis/1482355623/" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9c44-f7d0-4d5d-bb8b-417f02de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:28.000Z", "modified": "2016-12-22T09:26:28.000Z", "description": "EM_X86_64\t- 697 - Xchecked via VT: e53c73fe6a552eab720e7ee685ea4e159ebd4fdd", "pattern": "[file:hashes.SHA256 = '3fe9e1e0a2e626ef10cc443ec1725a8c17cbfa323864e0eb9359399177998470']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:26:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9c45-e288-4c14-9377-4e3b02de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:29.000Z", "modified": "2016-12-22T09:26:29.000Z", "description": "EM_X86_64\t- 697 - Xchecked via VT: e53c73fe6a552eab720e7ee685ea4e159ebd4fdd", "pattern": "[file:hashes.MD5 = '19705141888917dddda4cac32ec8b6fc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:26:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--585b9c46-725c-4e0a-8f2a-41d802de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:30.000Z", "modified": "2016-12-22T09:26:30.000Z", "first_observed": "2016-12-22T09:26:30Z", "last_observed": "2016-12-22T09:26:30Z", "number_observed": 1, "object_refs": [ "url--585b9c46-725c-4e0a-8f2a-41d802de0b81" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--585b9c46-725c-4e0a-8f2a-41d802de0b81", "value": "https://www.virustotal.com/file/3fe9e1e0a2e626ef10cc443ec1725a8c17cbfa323864e0eb9359399177998470/analysis/1482355623/" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9c46-39d0-42e2-a244-41f802de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:30.000Z", "modified": "2016-12-22T09:26:30.000Z", "description": "EM_X86_64 - 695 - Xchecked via VT: 3435ca5505ce8dfe8e1b22e0ebd4f41c60050cc0", "pattern": "[file:hashes.SHA256 = 'd731ccb407a924ca56fa9b3690e0b7debd1cce61c6de8ec63ede3a992c8af33e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:26:30Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9c47-89cc-4c82-8a7e-440802de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:31.000Z", "modified": "2016-12-22T09:26:31.000Z", "description": "EM_X86_64 - 695 - Xchecked via VT: 3435ca5505ce8dfe8e1b22e0ebd4f41c60050cc0", "pattern": "[file:hashes.MD5 = '1c672ba32e481faeccade0ad43ea5a08']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:26:31Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--585b9c47-9508-4c02-b9dd-494402de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:31.000Z", "modified": "2016-12-22T09:26:31.000Z", "first_observed": "2016-12-22T09:26:31Z", "last_observed": "2016-12-22T09:26:31Z", "number_observed": 1, "object_refs": [ "url--585b9c47-9508-4c02-b9dd-494402de0b81" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--585b9c47-9508-4c02-b9dd-494402de0b81", "value": "https://www.virustotal.com/file/d731ccb407a924ca56fa9b3690e0b7debd1cce61c6de8ec63ede3a992c8af33e/analysis/1482355623/" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9c48-d588-436a-b429-45e802de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:32.000Z", "modified": "2016-12-22T09:26:32.000Z", "description": "EM_X86_64 - 694 - Xchecked via VT: def04ec688ac6b41580dd3a6e78445b56536ba34", "pattern": "[file:hashes.SHA256 = '83160da5a4cb335ea2a9a72bc96c833cd7eab9df96a61c1d6f01e13668046b25']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:26:32Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9c49-9cf0-478b-96a0-4bbb02de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:33.000Z", "modified": "2016-12-22T09:26:33.000Z", "description": "EM_X86_64 - 694 - Xchecked via VT: def04ec688ac6b41580dd3a6e78445b56536ba34", "pattern": "[file:hashes.MD5 = '4416e7bfbfa7318f10c8c08cff3fce5d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:26:33Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--585b9c49-f154-4061-9dd2-418a02de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:33.000Z", "modified": "2016-12-22T09:26:33.000Z", "first_observed": "2016-12-22T09:26:33Z", "last_observed": "2016-12-22T09:26:33Z", "number_observed": 1, "object_refs": [ "url--585b9c49-f154-4061-9dd2-418a02de0b81" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--585b9c49-f154-4061-9dd2-418a02de0b81", "value": "https://www.virustotal.com/file/83160da5a4cb335ea2a9a72bc96c833cd7eab9df96a61c1d6f01e13668046b25/analysis/1482355623/" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9c4a-c2c4-4696-9479-47cf02de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:34.000Z", "modified": "2016-12-22T09:26:34.000Z", "description": "EM_X86_64 - 688 - Xchecked via VT: f80836349d6e97251030190ecd30dda0047f1ee6", "pattern": "[file:hashes.SHA256 = 'ce4bb2ce2bf66ab721b808acf9d74a7a8afddd03cbaa6aa56c7788ff7b7251bb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:26:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9c4a-ba88-4e51-9f22-4bab02de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:34.000Z", "modified": "2016-12-22T09:26:34.000Z", "description": "EM_X86_64 - 688 - Xchecked via VT: f80836349d6e97251030190ecd30dda0047f1ee6", "pattern": "[file:hashes.MD5 = '841eac692e4c5fb09f18c229c59a3fcb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-12-22T09:26:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--585b9c4b-5124-4940-b839-484202de0b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:26:35.000Z", "modified": "2016-12-22T09:26:35.000Z", "first_observed": "2016-12-22T09:26:35Z", "last_observed": "2016-12-22T09:26:35Z", "number_observed": 1, "object_refs": [ "url--585b9c4b-5124-4940-b839-484202de0b81" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--585b9c4b-5124-4940-b839-484202de0b81", "value": "https://www.virustotal.com/file/ce4bb2ce2bf66ab721b808acf9d74a7a8afddd03cbaa6aa56c7788ff7b7251bb/analysis/1482247676/" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--585b9cd6-d508-4a59-bc68-4d69950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2016-12-22T09:28:54.000Z", "modified": "2016-12-22T09:28:54.000Z", "pattern": "[rule linux_rakos\r\n{\r\n meta:\r\n description = \"Linux/Rakos.A executable\"\r\n author = \"Peter K\u00c3\u00a1lnai\"\r\n date = \"2016-12-13\"\r\n reference = \"http://www.welivesecurity.com/2016/12/20/new-linuxrakos-threat-devices-servers-ssh-scan/\"\r\n version = \"1\"\r\n contact = \"threatintel@eset.com\"\r\n license = \"BSD 2-Clause\"\r\n\r\n\r\n strings:\r\n $ = \"upgrade/vars.yaml\"\r\n $ = \"MUTTER\"\r\n $ = \"/tmp/.javaxxx\"\r\n $ = \"uckmydi\"\r\n\r\n condition:\r\n 3 of them\r\n}]", "pattern_type": "yara", "valid_from": "2016-12-22T09:28:54Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"yara\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "marking-definition", "spec_version": "2.1", "id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9", "created": "2017-01-20T00:00:00.000Z", "definition_type": "tlp", "name": "TLP:WHITE", "definition": { "tlp": "white" } } ] }