{ "Event": { "analysis": "2", "date": "2017-09-13", "extends_uuid": "", "info": "OSINT - DownAndExec: Banking malware utilizes CDNs in Brazil", "publish_timestamp": "1518771437", "published": true, "threat_level_id": "3", "timestamp": "1518231673", "uuid": "5a3bcbe0-3d70-427d-8744-4bdb950d210f", "Orgc": { "name": "CIRCL", "uuid": "55f6ea5e-2c60-40e5-964f-47a8950d210f" }, "Tag": [ { "colour": "#ffffff", "local": false, "name": "tlp:white", "relationship_type": "" }, { "colour": "#3a7300", "local": false, "name": "circl:incident-classification=\"malware\"", "relationship_type": "" }, { "colour": "#002f76", "local": false, "name": "ms-caro-malware-full:malware-family=\"Banker\"", "relationship_type": "" } ], "Attribute": [ { "category": "External analysis", "comment": "", "deleted": false, "disable_correlation": false, "timestamp": "1518185087", "to_ids": false, "type": "link", "uuid": "5a3cc4fd-5fd0-4c16-a65a-4c62950d210f", "value": "https://www.welivesecurity.com/2017/09/13/downandexec-banking-malware-cdns-brazil/", "Tag": [ { "colour": "#00223b", "local": false, "name": "osint:source-type=\"blog-post\"", "relationship_type": "" } ] }, { "category": "External analysis", "comment": "", "deleted": false, "disable_correlation": false, "timestamp": "1518185087", "to_ids": false, "type": "comment", "uuid": "5a5c6f2a-afc8-41e1-8a1f-43b9950d210f", "value": "Services like Netflix use content delivery networks (CDNs) to maximize bandwidth usage as it gives users greater speed when viewing the content, as the server is close to them and is part of the Netflix CDN. This results in faster loading times for series and movies, wherever you are in the world. But, apparently, the CDNs are starting to become a new way of spreading malware.\r\n\r\nThe attack chain is very extensive, and incorporates the execution of remote scripts (similar in some respects to the recent \u00e2\u20ac\u0153fileless\u00e2\u20ac\u009d banking malware trend), plus the use of CDNs for command and control (C&C), and other standard techniques for the execution and protection of malware.\r\n\r\nThe purpose of this article is to offer an analysis of the downAndExec standard that is making extensive use of JS scripts to download and execute \u00e2\u20ac\u201d in this particular instance, banking malware on victims\u00e2\u20ac\u2122 computers.", "Tag": [ { "colour": "#00223b", "local": false, "name": "osint:source-type=\"blog-post\"", "relationship_type": "" } ] }, { "category": "Payload delivery", "comment": "NSIS/TrojanDropper.Agent.CL", "deleted": false, "disable_correlation": false, "timestamp": "1516009242", "to_ids": true, "type": "sha1", "uuid": "5a5c771a-0068-47dc-8e20-47ad950d210f", "value": "30fc877887d6845007503f3abd44ec261a0d40c7" }, { "category": "Payload delivery", "comment": "NSIS/TrojanDropper.Agent.CL", "deleted": false, "disable_correlation": false, "timestamp": "1516009243", "to_ids": true, "type": "sha1", "uuid": "5a5c771b-1804-42f0-9701-4e5d950d210f", "value": "34f917aaba5684fbe56d3c57d48ef2a1aa7cf06d" }, { "category": "Payload delivery", "comment": "NSIS/TrojanDropper.Agent.CL", "deleted": false, "disable_correlation": false, "timestamp": "1516009243", "to_ids": true, "type": "sha1", "uuid": "5a5c771b-5054-4f25-914e-4aee950d210f", "value": "bffaabcce3f4cced896f745a7ec4eba207028683" }, { "category": "Payload delivery", "comment": "JS/TrojanDownloader.Agent.QPA", "deleted": false, "disable_correlation": false, "timestamp": "1516009243", "to_ids": true, "type": "md5", "uuid": "5a5c771b-6a2c-45ff-8d55-47b0950d210f", "value": "2ad3b1669e8302035e24c838b3c08f2c" }, { "category": "Payload delivery", "comment": "Win32/Spy.Banker.ADYV", "deleted": false, "disable_correlation": false, "timestamp": "1516009244", "to_ids": true, "type": "md5", "uuid": "5a5c771c-9a58-45ea-a3c7-4555950d210f", "value": "51aed47cc54e9671f3ea71f8ee584952" }, { "category": "Network activity", "comment": "", "deleted": false, "disable_correlation": false, "timestamp": "1518185088", "to_ids": true, "type": "url", "uuid": "5a5c7a0d-71d4-465e-b761-ae5c950d210f", "value": "https://1402712571.rsc.cdn77.org" }, { "category": "Network activity", "comment": "inactive", "deleted": false, "disable_correlation": false, "timestamp": "1518185088", "to_ids": true, "type": "url", "uuid": "5a5c7a0e-4c48-42d5-acbc-ae5c950d210f", "value": "https://1356485243.rsc.cdn77.org" } ], "Object": [ { "comment": "", "deleted": false, "description": "File object describing a file with meta-information", "meta-category": "file", "name": "file", "template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215", "template_version": "9", "timestamp": "1516007689", "uuid": "5a5c7109-1514-4b03-aca8-c84f950d210f", "Attribute": [ { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": true, "object_relation": "filename", "timestamp": "1516007689", "to_ids": true, "type": "filename", "uuid": "5a5c7109-5130-4ebe-b03f-c84f950d210f", "value": "AppAdobeFPlayer_1497851813.exe" }, { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "sha1", "timestamp": "1516007689", "to_ids": true, "type": "sha1", "uuid": "5a5c7109-2f84-45bc-9d98-c84f950d210f", "value": "37648e4b95636e3ee5a68e3fa8c0735125126c17" }, { "category": "Other", "comment": "", "deleted": false, "disable_correlation": true, "object_relation": "state", "timestamp": "1516007690", "to_ids": false, "type": "text", "uuid": "5a5c710a-8db4-4e36-b0fb-c84f950d210f", "value": "Malicious" } ] }, { "comment": "", "deleted": false, "description": "File object describing a file with meta-information", "meta-category": "file", "name": "file", "template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215", "template_version": "9", "timestamp": "1516007724", "uuid": "5a5c712c-c8f0-4033-a3c6-ae5c950d210f", "Attribute": [ { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": true, "object_relation": "filename", "timestamp": "1516007724", "to_ids": true, "type": "filename", "uuid": "5a5c712c-0134-4465-ba20-ae5c950d210f", "value": "Consulta_Resultado05062017.exe" }, { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "sha1", "timestamp": "1516007725", "to_ids": true, "type": "sha1", "uuid": "5a5c712d-e004-466f-962e-ae5c950d210f", "value": "38b7611bb20985512f86dc2c38247593e58a1df6" }, { "category": "Other", "comment": "", "deleted": false, "disable_correlation": true, "object_relation": "state", "timestamp": "1516007725", "to_ids": false, "type": "text", "uuid": "5a5c712d-95c8-4631-9db2-ae5c950d210f", "value": "Malicious" } ] }, { "comment": "", "deleted": false, "description": "File object describing a file with meta-information", "meta-category": "file", "name": "file", "template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215", "template_version": "9", "timestamp": "1516007763", "uuid": "5a5c7153-7a80-4f92-a162-af7f950d210f", "Attribute": [ { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": true, "object_relation": "filename", "timestamp": "1516007763", "to_ids": true, "type": "filename", "uuid": "5a5c7153-0adc-445d-b839-af7f950d210f", "value": "NotaFiscal.exe" }, { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "sha1", "timestamp": "1516007763", "to_ids": true, "type": "sha1", "uuid": "5a5c7153-2508-479f-9107-af7f950d210f", "value": "67458b503047852dd603080946842472e575b856" }, { "category": "Other", "comment": "", "deleted": false, "disable_correlation": true, "object_relation": "state", "timestamp": "1516007764", "to_ids": false, "type": "text", "uuid": "5a5c7154-87f0-429a-841b-af7f950d210f", "value": "Malicious" } ] }, { "comment": "", "deleted": false, "description": "File object describing a file with meta-information", "meta-category": "file", "name": "file", "template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215", "template_version": "9", "timestamp": "1516007781", "uuid": "5a5c7165-f8fc-41f9-84f1-4c94950d210f", "Attribute": [ { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": true, "object_relation": "filename", "timestamp": "1516007782", "to_ids": true, "type": "filename", "uuid": "5a5c7166-b778-4b50-bf8c-4a77950d210f", "value": "n\u00c3\u00a3o confirmado 923337.crdownload" }, { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "sha1", "timestamp": "1516007782", "to_ids": true, "type": "sha1", "uuid": "5a5c7166-feb8-4fe9-850f-4c20950d210f", "value": "8ea2c548bcb974a380fece046a7e3f0218632ff2" }, { "category": "Other", "comment": "", "deleted": false, "disable_correlation": true, "object_relation": "state", "timestamp": "1516007782", "to_ids": false, "type": "text", "uuid": "5a5c7166-c488-4cde-ba04-4555950d210f", "value": "Malicious" } ] }, { "comment": "", "deleted": false, "description": "File object describing a file with meta-information", "meta-category": "file", "name": "file", "template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215", "template_version": "9", "timestamp": "1516007805", "uuid": "5a5c717d-7e58-4fbf-8c33-c84f950d210f", "Attribute": [ { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": true, "object_relation": "filename", "timestamp": "1516007805", "to_ids": true, "type": "filename", "uuid": "5a5c717d-99a0-43bb-bdae-c84f950d210f", "value": "5ae9e0f3867ae8a317031fc9a5ed886e.virus" }, { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "sha1", "timestamp": "1516007806", "to_ids": true, "type": "sha1", "uuid": "5a5c717e-2c94-40f8-8d01-c84f950d210f", "value": "bffaabcce3f4cced896f745a7ec4eba2070286b3" }, { "category": "Other", "comment": "", "deleted": false, "disable_correlation": true, "object_relation": "state", "timestamp": "1516007806", "to_ids": false, "type": "text", "uuid": "5a5c717e-5a6c-4020-b20d-c84f950d210f", "value": "Malicious" } ] }, { "comment": "", "deleted": false, "description": "File object describing a file with meta-information", "meta-category": "file", "name": "file", "template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215", "template_version": "9", "timestamp": "1516007826", "uuid": "5a5c7192-cb54-4a77-8f2f-ae1e950d210f", "Attribute": [ { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": true, "object_relation": "filename", "timestamp": "1516007826", "to_ids": true, "type": "filename", "uuid": "5a5c7192-e888-4aa3-a6ee-ae1e950d210f", "value": "Consulta_Resultado05062017.exe" }, { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "sha1", "timestamp": "1516007827", "to_ids": true, "type": "sha1", "uuid": "5a5c7193-8034-49ae-8259-ae1e950d210f", "value": "effb36259accdfff07c036c5a41b357692577265" }, { "category": "Other", "comment": "", "deleted": false, "disable_correlation": true, "object_relation": "state", "timestamp": "1516007827", "to_ids": false, "type": "text", "uuid": "5a5c7193-8710-4df4-b99d-ae1e950d210f", "value": "Malicious" } ] }, { "comment": "", "deleted": false, "description": "File object describing a file with meta-information", "meta-category": "file", "name": "file", "template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215", "template_version": "7", "timestamp": "1518185091", "uuid": "352791b2-86bb-41ad-9481-10549ebea11f", "ObjectReference": [ { "comment": "", "object_uuid": "352791b2-86bb-41ad-9481-10549ebea11f", "referenced_uuid": "db289675-d7e8-42b0-a80d-1d0f73eac08b", "relationship_type": "analysed-with", "timestamp": "1518771436", "uuid": "5a7daa9b-5060-452a-89f5-448a02de0b81" } ], "Attribute": [ { "category": "Payload delivery", "comment": "Win32/Spy.Banker.ADYV", "deleted": false, "disable_correlation": false, "object_relation": "sha1", "timestamp": "1518185089", "to_ids": true, "type": "sha1", "uuid": "5a7daa81-4b18-40ae-8f01-431e02de0b81", "value": "5c5d23fcb759d900c0158948695b43f63df4a99d" }, { "category": "Payload delivery", "comment": "Win32/Spy.Banker.ADYV", "deleted": false, "disable_correlation": false, "object_relation": "sha256", "timestamp": "1518185089", "to_ids": true, "type": "sha256", "uuid": "5a7daa81-64f8-4faa-a99c-4d5302de0b81", "value": "08895e31448976adfbe419d1db92650bfb8b937f13597e6222fba965d3e999e0" }, { "category": "Payload delivery", "comment": "Win32/Spy.Banker.ADYV", "deleted": false, "disable_correlation": false, "object_relation": "md5", "timestamp": "1518185089", "to_ids": true, "type": "md5", "uuid": "5a7daa81-8ca8-4479-8be1-451102de0b81", "value": "51aed47cc54e9671f3ea71f8ee584952" } ] }, { "comment": "", "deleted": false, "description": "VirusTotal report", "meta-category": "misc", "name": "virustotal-report", "template_uuid": "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4", "template_version": "1", "timestamp": "1518185090", "uuid": "db289675-d7e8-42b0-a80d-1d0f73eac08b", "Attribute": [ { "category": "External analysis", "comment": "Win32/Spy.Banker.ADYV", "deleted": false, "disable_correlation": false, "object_relation": "permalink", "timestamp": "1518185090", "to_ids": false, "type": "link", "uuid": "5a7daa82-5084-4e96-b1b7-481e02de0b81", "value": "https://www.virustotal.com/file/08895e31448976adfbe419d1db92650bfb8b937f13597e6222fba965d3e999e0/analysis/1509045877/" }, { "category": "Other", "comment": "Win32/Spy.Banker.ADYV", "deleted": false, "disable_correlation": true, "object_relation": "detection-ratio", "timestamp": "1518185090", "to_ids": false, "type": "text", "uuid": "5a7daa82-ce04-4a13-b4dc-4dd902de0b81", "value": "42/66" }, { "category": "Other", "comment": "Win32/Spy.Banker.ADYV", "deleted": false, "disable_correlation": false, "object_relation": "last-submission", "timestamp": "1518185091", "to_ids": false, "type": "datetime", "uuid": "5a7daa83-7f20-42ba-9919-459c02de0b81", "value": "2017-10-26T19:24:37" } ] }, { "comment": "", "deleted": false, "description": "File object describing a file with meta-information", "meta-category": "file", "name": "file", "template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215", "template_version": "7", "timestamp": "1518185094", "uuid": "323bf06e-4c08-4825-9e3d-490b985d27f1", "ObjectReference": [ { "comment": "", "object_uuid": "323bf06e-4c08-4825-9e3d-490b985d27f1", "referenced_uuid": "3c950c89-f255-4ce4-bdf5-b3cb9a34eada", "relationship_type": "analysed-with", "timestamp": "1518771437", "uuid": "5a7daa9b-1a14-4a07-a404-480c02de0b81" } ], "Attribute": [ { "category": "Payload delivery", "comment": "JS/TrojanDownloader.Agent.QPA", "deleted": false, "disable_correlation": false, "object_relation": "sha1", "timestamp": "1518185091", "to_ids": true, "type": "sha1", "uuid": "5a7daa83-dc7c-4d41-8a83-439d02de0b81", "value": "21e6bfad68531acefa1a059015fb008742b5aeec" }, { "category": "Payload delivery", "comment": "JS/TrojanDownloader.Agent.QPA", "deleted": false, "disable_correlation": false, "object_relation": "sha256", "timestamp": "1518185092", "to_ids": true, "type": "sha256", "uuid": "5a7daa84-4450-4d1f-8a39-428802de0b81", "value": "15a739c1e02245e4f686ff46ca616ab73663fffac9c4de4290a1af4668405878" }, { "category": "Payload delivery", "comment": "JS/TrojanDownloader.Agent.QPA", "deleted": false, "disable_correlation": false, "object_relation": "md5", "timestamp": "1518185092", "to_ids": true, "type": "md5", "uuid": "5a7daa84-7690-4c43-bbf7-407302de0b81", "value": "2ad3b1669e8302035e24c838b3c08f2c" } ] }, { "comment": "", "deleted": false, "description": "VirusTotal report", "meta-category": "misc", "name": "virustotal-report", "template_uuid": "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4", "template_version": "1", "timestamp": "1518185093", "uuid": "3c950c89-f255-4ce4-bdf5-b3cb9a34eada", "Attribute": [ { "category": "External analysis", "comment": "JS/TrojanDownloader.Agent.QPA", "deleted": false, "disable_correlation": false, "object_relation": "permalink", "timestamp": "1518185093", "to_ids": false, "type": "link", "uuid": "5a7daa85-4e94-4767-b81b-491502de0b81", "value": "https://www.virustotal.com/file/15a739c1e02245e4f686ff46ca616ab73663fffac9c4de4290a1af4668405878/analysis/1509155544/" }, { "category": "Other", "comment": "JS/TrojanDownloader.Agent.QPA", "deleted": false, "disable_correlation": true, "object_relation": "detection-ratio", "timestamp": "1518185093", "to_ids": false, "type": "text", "uuid": "5a7daa85-34f4-42de-856c-427902de0b81", "value": "26/59" }, { "category": "Other", "comment": "JS/TrojanDownloader.Agent.QPA", "deleted": false, "disable_correlation": false, "object_relation": "last-submission", "timestamp": "1518185094", "to_ids": false, "type": "datetime", "uuid": "5a7daa86-e0c4-4f48-a687-466c02de0b81", "value": "2017-10-28T01:52:24" } ] }, { "comment": "", "deleted": false, "description": "File object describing a file with meta-information", "meta-category": "file", "name": "file", "template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215", "template_version": "7", "timestamp": "1518185097", "uuid": "989dca8a-94e7-414f-9bb9-299b6407cfe4", "ObjectReference": [ { "comment": "", "object_uuid": "989dca8a-94e7-414f-9bb9-299b6407cfe4", "referenced_uuid": "b8d9d264-06d8-465a-81c9-a4cd48c9deaa", "relationship_type": "analysed-with", "timestamp": "1518771437", "uuid": "5a7daa9b-4a50-4114-bb65-418202de0b81" } ], "Attribute": [ { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "sha1", "timestamp": "1518185094", "to_ids": true, "type": "sha1", "uuid": "5a7daa86-b30c-4e77-b3a5-4bef02de0b81", "value": "37648e4b95636e3ee5a68e3fa8c0735125126c17" }, { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "sha256", "timestamp": "1518185094", "to_ids": true, "type": "sha256", "uuid": "5a7daa87-3a34-46e3-b034-4e5602de0b81", "value": "ce300e38c0adbba46b1d46066cc3be3e5ce990c6406cb3e1713936acd124d174" }, { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "md5", "timestamp": "1518185095", "to_ids": true, "type": "md5", "uuid": "5a7daa87-95f8-4f8e-b7f8-495a02de0b81", "value": "c5d56198560f2e263c7ae1af6fccae6c" } ] }, { "comment": "", "deleted": false, "description": "VirusTotal report", "meta-category": "misc", "name": "virustotal-report", "template_uuid": "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4", "template_version": "1", "timestamp": "1518185095", "uuid": "b8d9d264-06d8-465a-81c9-a4cd48c9deaa", "Attribute": [ { "category": "External analysis", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "permalink", "timestamp": "1518185095", "to_ids": false, "type": "link", "uuid": "5a7daa87-4afc-47dd-876d-492602de0b81", "value": "https://www.virustotal.com/file/ce300e38c0adbba46b1d46066cc3be3e5ce990c6406cb3e1713936acd124d174/analysis/1509045679/" }, { "category": "Other", "comment": "", "deleted": false, "disable_correlation": true, "object_relation": "detection-ratio", "timestamp": "1518185096", "to_ids": false, "type": "text", "uuid": "5a7daa88-e2ac-4bd7-a8c1-484502de0b81", "value": "45/67" }, { "category": "Other", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "last-submission", "timestamp": "1518185096", "to_ids": false, "type": "datetime", "uuid": "5a7daa88-7f20-461d-890d-44bc02de0b81", "value": "2017-10-26T19:21:19" } ] }, { "comment": "", "deleted": false, "description": "File object describing a file with meta-information", "meta-category": "file", "name": "file", "template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215", "template_version": "7", "timestamp": "1518185100", "uuid": "ec87a3b7-5f72-4b59-8d53-6e2767f4328f", "ObjectReference": [ { "comment": "", "object_uuid": "ec87a3b7-5f72-4b59-8d53-6e2767f4328f", "referenced_uuid": "8c9d5426-4f3b-4bfd-b166-40f4e69c8998", "relationship_type": "analysed-with", "timestamp": "1518771437", "uuid": "5a7daa9b-fed4-4fae-a8a4-48cb02de0b81" } ], "Attribute": [ { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "sha1", "timestamp": "1518185097", "to_ids": true, "type": "sha1", "uuid": "5a7daa89-5b00-47b6-8e10-414002de0b81", "value": "67458b503047852dd603080946842472e575b856" }, { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "sha256", "timestamp": "1518185097", "to_ids": true, "type": "sha256", "uuid": "5a7daa89-0be8-4c1a-9aed-4fa802de0b81", "value": "d7b430e18426fad00576add9e88c6b0c78eb194376dfa416ab805f5757188990" }, { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "md5", "timestamp": "1518185098", "to_ids": true, "type": "md5", "uuid": "5a7daa8a-a198-4534-a467-4db302de0b81", "value": "1a5748d445565bf35a3cb6e6b6959fe2" } ] }, { "comment": "", "deleted": false, "description": "VirusTotal report", "meta-category": "misc", "name": "virustotal-report", "template_uuid": "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4", "template_version": "1", "timestamp": "1518185098", "uuid": "8c9d5426-4f3b-4bfd-b166-40f4e69c8998", "Attribute": [ { "category": "External analysis", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "permalink", "timestamp": "1518185098", "to_ids": false, "type": "link", "uuid": "5a7daa8a-7c2c-4d8b-b395-413b02de0b81", "value": "https://www.virustotal.com/file/d7b430e18426fad00576add9e88c6b0c78eb194376dfa416ab805f5757188990/analysis/1509045752/" }, { "category": "Other", "comment": "", "deleted": false, "disable_correlation": true, "object_relation": "detection-ratio", "timestamp": "1518185099", "to_ids": false, "type": "text", "uuid": "5a7daa8b-6934-465e-8d8e-4ff202de0b81", "value": "40/67" }, { "category": "Other", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "last-submission", "timestamp": "1518185099", "to_ids": false, "type": "datetime", "uuid": "5a7daa8b-a6c8-404d-af6d-4e1302de0b81", "value": "2017-10-26T19:22:32" } ] }, { "comment": "", "deleted": false, "description": "File object describing a file with meta-information", "meta-category": "file", "name": "file", "template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215", "template_version": "7", "timestamp": "1518185102", "uuid": "5e44b32b-6d75-4ac9-a643-96970dee4e3e", "ObjectReference": [ { "comment": "", "object_uuid": "5e44b32b-6d75-4ac9-a643-96970dee4e3e", "referenced_uuid": "532bbc5d-ad5f-4281-88f9-a027f31718ae", "relationship_type": "analysed-with", "timestamp": "1518771437", "uuid": "5a7daa9b-8594-4197-bfec-42de02de0b81" } ], "Attribute": [ { "category": "Payload delivery", "comment": "NSIS/TrojanDropper.Agent.CL", "deleted": false, "disable_correlation": false, "object_relation": "sha1", "timestamp": "1518185099", "to_ids": true, "type": "sha1", "uuid": "5a7daa8b-3a50-4639-b8cf-440f02de0b81", "value": "30fc877887d6845007503f3abd44ec261a0d40c7" }, { "category": "Payload delivery", "comment": "NSIS/TrojanDropper.Agent.CL", "deleted": false, "disable_correlation": false, "object_relation": "sha256", "timestamp": "1518185100", "to_ids": true, "type": "sha256", "uuid": "5a7daa8c-34c4-4126-8a4c-45b102de0b81", "value": "74c115091077182b4e9f1dc141fd2c91c50b0c61fd22117f71f880ebc4fe72bc" }, { "category": "Payload delivery", "comment": "NSIS/TrojanDropper.Agent.CL", "deleted": false, "disable_correlation": false, "object_relation": "md5", "timestamp": "1518185100", "to_ids": true, "type": "md5", "uuid": "5a7daa8c-c330-4a61-a4e8-412602de0b81", "value": "ab4832be975c95ce0348416741225143" } ] }, { "comment": "", "deleted": false, "description": "VirusTotal report", "meta-category": "misc", "name": "virustotal-report", "template_uuid": "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4", "template_version": "1", "timestamp": "1518185101", "uuid": "532bbc5d-ad5f-4281-88f9-a027f31718ae", "Attribute": [ { "category": "External analysis", "comment": "NSIS/TrojanDropper.Agent.CL", "deleted": false, "disable_correlation": false, "object_relation": "permalink", "timestamp": "1518185101", "to_ids": false, "type": "link", "uuid": "5a7daa8d-995c-4415-90b2-41a602de0b81", "value": "https://www.virustotal.com/file/74c115091077182b4e9f1dc141fd2c91c50b0c61fd22117f71f880ebc4fe72bc/analysis/1509045590/" }, { "category": "Other", "comment": "NSIS/TrojanDropper.Agent.CL", "deleted": false, "disable_correlation": true, "object_relation": "detection-ratio", "timestamp": "1518185101", "to_ids": false, "type": "text", "uuid": "5a7daa8d-7378-4f23-913b-467a02de0b81", "value": "36/66" }, { "category": "Other", "comment": "NSIS/TrojanDropper.Agent.CL", "deleted": false, "disable_correlation": false, "object_relation": "last-submission", "timestamp": "1518185101", "to_ids": false, "type": "datetime", "uuid": "5a7daa8d-bf5c-453b-8111-49d202de0b81", "value": "2017-10-26T19:19:50" } ] }, { "comment": "", "deleted": false, "description": "File object describing a file with meta-information", "meta-category": "file", "name": "file", "template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215", "template_version": "7", "timestamp": "1518185105", "uuid": "362d20e1-90b1-45c8-b536-5e2fc281fe8a", "ObjectReference": [ { "comment": "", "object_uuid": "362d20e1-90b1-45c8-b536-5e2fc281fe8a", "referenced_uuid": "0d641165-660b-4c56-a989-5f27840d94f1", "relationship_type": "analysed-with", "timestamp": "1518771437", "uuid": "5a7daa9b-f4c4-4ba5-9428-4b5002de0b81" } ], "Attribute": [ { "category": "Payload delivery", "comment": "NSIS/TrojanDropper.Agent.CL", "deleted": false, "disable_correlation": false, "object_relation": "sha1", "timestamp": "1518185102", "to_ids": true, "type": "sha1", "uuid": "5a7daa8e-faf0-4774-bfb6-4c6c02de0b81", "value": "34f917aaba5684fbe56d3c57d48ef2a1aa7cf06d" }, { "category": "Payload delivery", "comment": "NSIS/TrojanDropper.Agent.CL", "deleted": false, "disable_correlation": false, "object_relation": "sha256", "timestamp": "1518185102", "to_ids": true, "type": "sha256", "uuid": "5a7daa8e-2fb4-4d5d-8ceb-408602de0b81", "value": "027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745" }, { "category": "Payload delivery", "comment": "NSIS/TrojanDropper.Agent.CL", "deleted": false, "disable_correlation": false, "object_relation": "md5", "timestamp": "1518185103", "to_ids": true, "type": "md5", "uuid": "5a7daa8f-fccc-4952-a114-445002de0b81", "value": "71b6a493388e7d0b40c83ce903bc6b04" } ] }, { "comment": "", "deleted": false, "description": "VirusTotal report", "meta-category": "misc", "name": "virustotal-report", "template_uuid": "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4", "template_version": "1", "timestamp": "1518185103", "uuid": "0d641165-660b-4c56-a989-5f27840d94f1", "Attribute": [ { "category": "External analysis", "comment": "NSIS/TrojanDropper.Agent.CL", "deleted": false, "disable_correlation": false, "object_relation": "permalink", "timestamp": "1518185103", "to_ids": false, "type": "link", "uuid": "5a7daa8f-e930-4c13-b96f-493d02de0b81", "value": "https://www.virustotal.com/file/027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745/analysis/1517914078/" }, { "category": "Other", "comment": "NSIS/TrojanDropper.Agent.CL", "deleted": false, "disable_correlation": true, "object_relation": "detection-ratio", "timestamp": "1518185104", "to_ids": false, "type": "text", "uuid": "5a7daa90-99dc-4e0c-b651-4bbc02de0b81", "value": "59/65" }, { "category": "Other", "comment": "NSIS/TrojanDropper.Agent.CL", "deleted": false, "disable_correlation": false, "object_relation": "last-submission", "timestamp": "1518185104", "to_ids": false, "type": "datetime", "uuid": "5a7daa90-e0ec-488b-87f7-418802de0b81", "value": "2018-02-06T10:47:58" } ] }, { "comment": "", "deleted": false, "description": "File object describing a file with meta-information", "meta-category": "file", "name": "file", "template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215", "template_version": "7", "timestamp": "1518185108", "uuid": "9e1132f7-a6f0-4966-8d8e-a8ba91337184", "ObjectReference": [ { "comment": "", "object_uuid": "9e1132f7-a6f0-4966-8d8e-a8ba91337184", "referenced_uuid": "9ddbe62a-df3a-4968-8fb1-4b46e61d0abe", "relationship_type": "analysed-with", "timestamp": "1518771437", "uuid": "5a7daa9b-7d98-4166-acd6-475202de0b81" } ], "Attribute": [ { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "sha1", "timestamp": "1518185105", "to_ids": true, "type": "sha1", "uuid": "5a7daa91-0ed8-4164-ad3f-4f8e02de0b81", "value": "bffaabcce3f4cced896f745a7ec4eba2070286b3" }, { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "sha256", "timestamp": "1518185105", "to_ids": true, "type": "sha256", "uuid": "5a7daa91-3f68-4a2c-ab50-47f202de0b81", "value": "45211c815cac28a399e3ad01d742b5811dae54d93918e969c685d4e8356d7c28" }, { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "md5", "timestamp": "1518185105", "to_ids": true, "type": "md5", "uuid": "5a7daa91-ce94-4fb6-a16d-4b8602de0b81", "value": "5ae9e0f3867ae8a317031fc9a5ed886e" } ] }, { "comment": "", "deleted": false, "description": "VirusTotal report", "meta-category": "misc", "name": "virustotal-report", "template_uuid": "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4", "template_version": "1", "timestamp": "1518185106", "uuid": "9ddbe62a-df3a-4968-8fb1-4b46e61d0abe", "Attribute": [ { "category": "External analysis", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "permalink", "timestamp": "1518185106", "to_ids": false, "type": "link", "uuid": "5a7daa92-a268-4a80-8fe2-422502de0b81", "value": "https://www.virustotal.com/file/45211c815cac28a399e3ad01d742b5811dae54d93918e969c685d4e8356d7c28/analysis/1505331152/" }, { "category": "Other", "comment": "", "deleted": false, "disable_correlation": true, "object_relation": "detection-ratio", "timestamp": "1518185106", "to_ids": false, "type": "text", "uuid": "5a7daa92-9ac8-48be-a710-4ceb02de0b81", "value": "39/64" }, { "category": "Other", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "last-submission", "timestamp": "1518185107", "to_ids": false, "type": "datetime", "uuid": "5a7daa93-b3d4-4672-b604-454802de0b81", "value": "2017-09-13T19:32:32" } ] }, { "comment": "", "deleted": false, "description": "File object describing a file with meta-information", "meta-category": "file", "name": "file", "template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215", "template_version": "7", "timestamp": "1518185110", "uuid": "a4602179-8407-4714-8ce8-73e739f8f93e", "ObjectReference": [ { "comment": "", "object_uuid": "a4602179-8407-4714-8ce8-73e739f8f93e", "referenced_uuid": "23e90ff7-f68e-4f1e-abfb-1d24b0480d18", "relationship_type": "analysed-with", "timestamp": "1518771437", "uuid": "5a7daa9b-f750-46d3-9e5b-41c302de0b81" } ], "Attribute": [ { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "sha1", "timestamp": "1518185107", "to_ids": true, "type": "sha1", "uuid": "5a7daa93-e5f8-4fb3-80ad-46ef02de0b81", "value": "38b7611bb20985512f86dc2c38247593e58a1df6" }, { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "sha256", "timestamp": "1518185108", "to_ids": true, "type": "sha256", "uuid": "5a7daa94-e6a0-4933-a1a8-443202de0b81", "value": "6b08e5d92c7067eae8e222f2d13ba2a59fe36421eb2ece5054b5d97c593a38e2" }, { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "md5", "timestamp": "1518185108", "to_ids": true, "type": "md5", "uuid": "5a7daa94-c79c-4d5b-8de5-4edc02de0b81", "value": "e383d317b3c7bbd65a7c303746b7f12d" } ] }, { "comment": "", "deleted": false, "description": "VirusTotal report", "meta-category": "misc", "name": "virustotal-report", "template_uuid": "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4", "template_version": "1", "timestamp": "1518185108", "uuid": "23e90ff7-f68e-4f1e-abfb-1d24b0480d18", "Attribute": [ { "category": "External analysis", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "permalink", "timestamp": "1518185109", "to_ids": false, "type": "link", "uuid": "5a7daa95-e77c-431d-bc9c-4cdc02de0b81", "value": "https://www.virustotal.com/file/6b08e5d92c7067eae8e222f2d13ba2a59fe36421eb2ece5054b5d97c593a38e2/analysis/1509045704/" }, { "category": "Other", "comment": "", "deleted": false, "disable_correlation": true, "object_relation": "detection-ratio", "timestamp": "1518185109", "to_ids": false, "type": "text", "uuid": "5a7daa95-db80-4bcf-8c20-450a02de0b81", "value": "39/67" }, { "category": "Other", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "last-submission", "timestamp": "1518185109", "to_ids": false, "type": "datetime", "uuid": "5a7daa95-88e8-49fe-be81-421b02de0b81", "value": "2017-10-26T19:21:44" } ] }, { "comment": "", "deleted": false, "description": "File object describing a file with meta-information", "meta-category": "file", "name": "file", "template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215", "template_version": "7", "timestamp": "1518185113", "uuid": "368ea62b-9c92-41fd-aa29-ad77f6f49144", "ObjectReference": [ { "comment": "", "object_uuid": "368ea62b-9c92-41fd-aa29-ad77f6f49144", "referenced_uuid": "ffa1925f-32e0-4ddf-ac99-db930609d495", "relationship_type": "analysed-with", "timestamp": "1518771437", "uuid": "5a7daa9b-de8c-45d3-bcdd-433202de0b81" } ], "Attribute": [ { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "sha1", "timestamp": "1518185110", "to_ids": true, "type": "sha1", "uuid": "5a7daa96-4bf0-4ab4-950f-4a8e02de0b81", "value": "8ea2c548bcb974a380fece046a7e3f0218632ff2" }, { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "sha256", "timestamp": "1518185110", "to_ids": true, "type": "sha256", "uuid": "5a7daa96-26bc-4e71-8b7d-40f602de0b81", "value": "66d9360a2a41a119a9337539e110d79f6e74e405755029d9241bf9afc20beed6" }, { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "md5", "timestamp": "1518185111", "to_ids": true, "type": "md5", "uuid": "5a7daa97-0970-4c6b-9cc0-4c4102de0b81", "value": "782eace45e76c28862396a2b6d5b3f1c" } ] }, { "comment": "", "deleted": false, "description": "VirusTotal report", "meta-category": "misc", "name": "virustotal-report", "template_uuid": "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4", "template_version": "1", "timestamp": "1518185111", "uuid": "ffa1925f-32e0-4ddf-ac99-db930609d495", "Attribute": [ { "category": "External analysis", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "permalink", "timestamp": "1518185111", "to_ids": false, "type": "link", "uuid": "5a7daa97-96ac-4b57-877e-4cc502de0b81", "value": "https://www.virustotal.com/file/66d9360a2a41a119a9337539e110d79f6e74e405755029d9241bf9afc20beed6/analysis/1510180391/" }, { "category": "Other", "comment": "", "deleted": false, "disable_correlation": true, "object_relation": "detection-ratio", "timestamp": "1518185111", "to_ids": false, "type": "text", "uuid": "5a7daa97-1e08-4336-bef5-44c302de0b81", "value": "41/67" }, { "category": "Other", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "last-submission", "timestamp": "1518185112", "to_ids": false, "type": "datetime", "uuid": "5a7daa98-6474-4cc5-85d9-481a02de0b81", "value": "2017-11-08T22:33:11" } ] }, { "comment": "", "deleted": false, "description": "File object describing a file with meta-information", "meta-category": "file", "name": "file", "template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215", "template_version": "7", "timestamp": "1518185115", "uuid": "b4c72aed-63bf-4f2a-8794-047d36abe533", "ObjectReference": [ { "comment": "", "object_uuid": "b4c72aed-63bf-4f2a-8794-047d36abe533", "referenced_uuid": "43e3402c-ec4a-4afc-859b-18cdd344f48f", "relationship_type": "analysed-with", "timestamp": "1518771437", "uuid": "5a7daa9b-37dc-4b69-808c-4fc502de0b81" } ], "Attribute": [ { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "sha1", "timestamp": "1518185112", "to_ids": true, "type": "sha1", "uuid": "5a7daa98-4df8-4fcf-a9f7-400e02de0b81", "value": "effb36259accdfff07c036c5a41b357692577265" }, { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "sha256", "timestamp": "1518185113", "to_ids": true, "type": "sha256", "uuid": "5a7daa99-e394-4da0-b7ab-47ba02de0b81", "value": "91301d3daab1a87dfc8b4e39f8a120ea5523e04ac86fee970cecc6760e05c8fe" }, { "category": "Payload delivery", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "md5", "timestamp": "1518185113", "to_ids": true, "type": "md5", "uuid": "5a7daa99-ace0-4814-8d0c-469e02de0b81", "value": "b917b09c778d7aa7e5a2d98a5fba5b1e" } ] }, { "comment": "", "deleted": false, "description": "VirusTotal report", "meta-category": "misc", "name": "virustotal-report", "template_uuid": "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4", "template_version": "1", "timestamp": "1518185113", "uuid": "43e3402c-ec4a-4afc-859b-18cdd344f48f", "Attribute": [ { "category": "External analysis", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "permalink", "timestamp": "1518185114", "to_ids": false, "type": "link", "uuid": "5a7daa9a-b7e8-4340-a315-416602de0b81", "value": "https://www.virustotal.com/file/91301d3daab1a87dfc8b4e39f8a120ea5523e04ac86fee970cecc6760e05c8fe/analysis/1509045798/" }, { "category": "Other", "comment": "", "deleted": false, "disable_correlation": true, "object_relation": "detection-ratio", "timestamp": "1518185114", "to_ids": false, "type": "text", "uuid": "5a7daa9a-f554-4959-827d-4d0702de0b81", "value": "38/67" }, { "category": "Other", "comment": "", "deleted": false, "disable_correlation": false, "object_relation": "last-submission", "timestamp": "1518185114", "to_ids": false, "type": "datetime", "uuid": "5a7daa9a-d1fc-4984-9be0-45e902de0b81", "value": "2017-10-26T19:23:18" } ] } ] } }