{ "type": "bundle", "id": "bundle--5c47f54e-1cf4-48d1-b188-245768f8e8cf", "objects": [ { "type": "identity", "spec_version": "2.1", "id": "identity--5bfa439e-c978-4dcd-b474-73f568f8e8cf", "created": "2021-05-24T09:53:16.000Z", "modified": "2021-05-24T09:53:16.000Z", "name": "VK-Intel", "identity_class": "organization" }, { "type": "report", "spec_version": "2.1", "id": "report--5c47f54e-1cf4-48d1-b188-245768f8e8cf", "created_by_ref": "identity--5bfa439e-c978-4dcd-b474-73f568f8e8cf", "created": "2021-05-24T09:53:16.000Z", "modified": "2021-05-24T09:53:16.000Z", "name": "2019-01-22: Emotet->TrickBot", "published": "2020-05-11T07:52:23Z", "object_refs": [ "indicator--5c47f54e-b264-446a-84d4-245768f8e8cf", "observed-data--5c4d8fac-8190-44f5-9bf5-4abc02de0b81", "url--5c4d8fac-8190-44f5-9bf5-4abc02de0b81", "observed-data--5c4d8fbf-a68c-4cd8-86ac-438702de0b81", "url--5c4d8fbf-a68c-4cd8-86ac-438702de0b81", "indicator--3ffca240-fd85-4f51-910b-ad6932f4c23a", "indicator--d135cc85-6672-4e0e-be10-90e91b894a9f" ], "labels": [ "Threat-Report", "misp:tool=\"MISP-STIX-Converter\"", "Banker: TrickBot", "Version: 1057", "core-parser.dll", "type:OSINT", "osint:lifetime=\"perpetual\"", "osint:certainty=\"50\"", "misp-galaxy:tool=\"Trick Bot\"", "misp-galaxy:banker=\"Trickbot\"", "misp-galaxy:tool=\"Emotet\"" ], "object_marking_refs": [ "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5c47f54e-b264-446a-84d4-245768f8e8cf", "created_by_ref": "identity--5bfa439e-c978-4dcd-b474-73f568f8e8cf", "created": "2019-01-23T05:02:06.000Z", "modified": "2019-01-23T05:02:06.000Z", "pattern": "[file:hashes.MD5 = 'e6aab38ff1d7cf9edd1f9279875248fa']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2019-01-23T05:02:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--5c4d8fac-8190-44f5-9bf5-4abc02de0b81", "created_by_ref": "identity--5bfa439e-c978-4dcd-b474-73f568f8e8cf", "created": "2019-01-27T11:03:18.000Z", "modified": "2019-01-27T11:03:18.000Z", "first_observed": "2019-01-27T11:03:18Z", "last_observed": "2019-01-27T11:03:18Z", "number_observed": 1, "object_refs": [ "url--5c4d8fac-8190-44f5-9bf5-4abc02de0b81" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"", "osint:source-type=\"blog-post\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--5c4d8fac-8190-44f5-9bf5-4abc02de0b81", "value": "https://www.virustotal.com/en/file/8e4cc0539b4921b0222081a0948bd149f10a027f73983e9ade36d4045f69921f/analysis/1548422859/" }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--5c4d8fbf-a68c-4cd8-86ac-438702de0b81", "created_by_ref": "identity--5bfa439e-c978-4dcd-b474-73f568f8e8cf", "created": "2019-01-27T11:03:17.000Z", "modified": "2019-01-27T11:03:17.000Z", "first_observed": "2019-01-27T11:03:17Z", "last_observed": "2019-01-27T11:03:17Z", "number_observed": 1, "object_refs": [ "url--5c4d8fbf-a68c-4cd8-86ac-438702de0b81" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"", "osint:source-type=\"blog-post\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--5c4d8fbf-a68c-4cd8-86ac-438702de0b81", "value": "https://github.com/k-vitali/TrickBot-share/blob/master/2019-01-22-TrickBot-banker-client-1057_misp.json" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3ffca240-fd85-4f51-910b-ad6932f4c23a", "created_by_ref": "identity--5bfa439e-c978-4dcd-b474-73f568f8e8cf", "created": "2019-01-23T05:03:33.000Z", "modified": "2019-01-23T05:03:33.000Z", "pattern": "[file:hashes.MD5 = 'e6aab38ff1d7cf9edd1f9279875248fa' AND file:hashes.SHA1 = 'fba09f81056ab943bb90e1500cb1d1317ae2e36e' AND file:hashes.SHA256 = '8e4cc0539b4921b0222081a0948bd149f10a027f73983e9ade36d4045f69921f' AND file:hashes.SHA512 = '5e17b9ac8e65b072249d7aa40fceac7f169fd43ce26b2a590dbc124a7257a4a19bd68df9551643a666c8837ce1f38d40b27bf39eba5ebfadb2986e661bfc652e' AND file:name = '2019-01-22-trickbot-loader.exe' AND file:size = '232960' AND file:x_misp_entropy = '7.682967694857']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2019-01-23T05:03:33Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d135cc85-6672-4e0e-be10-90e91b894a9f", "created_by_ref": "identity--5bfa439e-c978-4dcd-b474-73f568f8e8cf", "created": "2019-01-23T05:04:10.000Z", "modified": "2019-01-23T05:04:10.000Z", "pattern": "[file:hashes.MD5 = '4d0c97d8315be2c87c5b9ec855cad88d' AND file:hashes.SHA1 = 'fb5d538084489a7b7b4c9be80cd221b338c6b39c' AND file:hashes.SHA256 = '40bbc0b76af2a2130c3ceaba8a2f1fa255bbbef138e2f37c995ee32c6bcccbf8' AND file:hashes.SHA512 = 'b19d95f067e2adeda48554d33397ae16c296db6a4cf9eb66c7abb13ddd964d3c5a83cc7e6074168f512aeb8b64338d7c5cef93a629c8592d4b7ebb731d252d05' AND file:name = 'core-parser.dll' AND file:size = '217600' AND file:x_misp_entropy = '6.5165485023488']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2019-01-23T05:04:10Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "marking-definition", "spec_version": "2.1", "id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9", "created": "2017-01-20T00:00:00.000Z", "definition_type": "tlp", "name": "TLP:WHITE", "definition": { "tlp": "white" } } ] }