518 lines
No EOL
20 KiB
JSON
518 lines
No EOL
20 KiB
JSON
{
|
|
"Event": {
|
|
"analysis": "2",
|
|
"date": "2018-01-09",
|
|
"extends_uuid": "",
|
|
"info": "OSINT - A North Korean Monero Cryptocurrency Miner",
|
|
"publish_timestamp": "1515696548",
|
|
"published": true,
|
|
"threat_level_id": "3",
|
|
"timestamp": "1515553226",
|
|
"uuid": "5a54778c-3dac-4d36-b7c3-4d6e02de0b81",
|
|
"Orgc": {
|
|
"name": "CIRCL",
|
|
"uuid": "55f6ea5e-2c60-40e5-964f-47a8950d210f"
|
|
},
|
|
"Tag": [
|
|
{
|
|
"colour": "#ffffff",
|
|
"local": false,
|
|
"name": "tlp:white",
|
|
"relationship_type": ""
|
|
},
|
|
{
|
|
"colour": "#0fc000",
|
|
"local": false,
|
|
"name": "admiralty-scale:information-credibility=\"2\"",
|
|
"relationship_type": ""
|
|
},
|
|
{
|
|
"colour": "#00223b",
|
|
"local": false,
|
|
"name": "osint:source-type=\"blog-post\"",
|
|
"relationship_type": ""
|
|
}
|
|
],
|
|
"Attribute": [
|
|
{
|
|
"category": "External analysis",
|
|
"comment": "",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1515485524",
|
|
"to_ids": false,
|
|
"type": "link",
|
|
"uuid": "5a54779b-451c-4777-a15d-573002de0b81",
|
|
"value": "https://www.alienvault.com/blogs/labs-research/a-north-korean-monero-cryptocurrency-miner",
|
|
"Tag": [
|
|
{
|
|
"colour": "#00223b",
|
|
"local": false,
|
|
"name": "osint:source-type=\"blog-post\"",
|
|
"relationship_type": ""
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"category": "External analysis",
|
|
"comment": "",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1515485524",
|
|
"to_ids": false,
|
|
"type": "text",
|
|
"uuid": "5a5477ad-63d4-443a-a0d0-b52402de0b81",
|
|
"value": "AlienVault labs recently analysed an application compiled on Christmas Eve 2017. It is an Installer for software to mine the Monero crypto-currency. Any mined currency is sent to Kim Il Sung University in Pyongyang, North Korea.\r\n\r\nThe Installer copies a file named intelservice.exe to the system. The filename intelservice.exe is often associated with crypto-currency mining malware. Based on the arguments it\u00e2\u20ac\u2122s executed with, it\u00e2\u20ac\u2122s likely a piece of software called xmrig. \r\n\r\nIt\u00e2\u20ac\u2122s not unusual to see xmrig in malware campaigns. It was recently used in some wide campaigns exploiting unpatched IIS servers to mine Monero.",
|
|
"Tag": [
|
|
{
|
|
"colour": "#00223b",
|
|
"local": false,
|
|
"name": "osint:source-type=\"blog-post\"",
|
|
"relationship_type": ""
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "We identified two other pieces of software which share some code:",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1515485128",
|
|
"to_ids": true,
|
|
"type": "md5",
|
|
"uuid": "5a5477c8-1d28-4171-9740-bc9302de0b81",
|
|
"value": "762c3249904a8bf76802effb54426655"
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "We identified two other pieces of software which share some code:",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1515485128",
|
|
"to_ids": true,
|
|
"type": "md5",
|
|
"uuid": "5a5477c8-8188-4ad5-bfbb-bc9302de0b81",
|
|
"value": "42344bb45f351757e8638656e12a0135"
|
|
},
|
|
{
|
|
"category": "Network activity",
|
|
"comment": "has been active on BitCoin trading sites:",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1515485410",
|
|
"to_ids": false,
|
|
"type": "ip-src",
|
|
"uuid": "5a5477f2-0068-4ce8-9be5-566802de0b81",
|
|
"value": "175.45.178.19"
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "Decompiled Code",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1515485235",
|
|
"to_ids": true,
|
|
"type": "md5",
|
|
"uuid": "5a54780c-77cc-42c1-9633-bab602de0b81",
|
|
"value": "6a261443299788af1467142d5f538b2c"
|
|
},
|
|
{
|
|
"category": "Artifacts dropped",
|
|
"comment": "",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1515485410",
|
|
"to_ids": true,
|
|
"type": "yara",
|
|
"uuid": "5a547824-c8c8-45b3-b19b-b73502de0b81",
|
|
"value": "rule nkminer_monero {\r\n\r\n meta:\r\n\r\n description = \"Detects installer of Monero miner that points to a NK domain\"\r\n\r\n author = \"cdoman@alienvault.com\"\r\n\r\n tlp = \"white\"\r\n\r\n license = \"MIT License\"\r\n\r\n strings:\r\n\r\n $a = \"82e999fb-a6e0-4094-aa1f-1a306069d1a5\" nocase wide ascii\r\n\r\n $b = \"4JUdGzvrMFDWrUUwY3toJATSeNwjn54LkCnKBPRzDuhzi5vSepHfUckJNxRL2gjkNrSqtCoRUrEDAgRwsQvVCjZbRy5YeFCqgoUMnzumvS\" nocase wide ascii\r\n\r\n $c = \"barjuok.ryongnamsan.edu.kp\" nocase wide ascii\r\n\r\n $d = \"C:\\\\SoftwaresInstall\\\\soft\" nocase wide ascii\r\n\r\n $e = \"C:\\\\Windows\\\\Sys64\\\\intelservice.exe\" nocase wide ascii\r\n\r\n $f = \"C:\\\\Windows\\\\Sys64\\\\updater.exe\" nocase wide ascii\r\n\r\n $g = \"C:\\\\Users\\\\Jawhar\\\\documents\\\\\" nocase wide ascii\r\n\r\n condition:\r\n\r\n any of them\r\n\r\n}"
|
|
},
|
|
{
|
|
"category": "Network activity",
|
|
"comment": "On port 5615",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1515485410",
|
|
"to_ids": true,
|
|
"type": "hostname",
|
|
"uuid": "5a547852-0478-476e-9703-4d6e02de0b81",
|
|
"value": "barjuok.ryongnamsan.edu.kp"
|
|
}
|
|
],
|
|
"Object": [
|
|
{
|
|
"comment": "",
|
|
"deleted": false,
|
|
"description": "An IP address and a port seen as a tuple (or as a triple) in a specific time frame.",
|
|
"meta-category": "network",
|
|
"name": "ip-port",
|
|
"template_uuid": "9f8cea74-16fe-4968-a2b4-026676949ac6",
|
|
"template_version": "5",
|
|
"timestamp": "1515485370",
|
|
"uuid": "5a5478ba-6920-40a3-bedc-57fd02de0b81",
|
|
"Attribute": [
|
|
{
|
|
"category": "Network activity",
|
|
"comment": "",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"object_relation": "dst-port",
|
|
"timestamp": "1515485370",
|
|
"to_ids": false,
|
|
"type": "port",
|
|
"uuid": "5a5478ba-372c-4127-a9e4-57fd02de0b81",
|
|
"value": "5615"
|
|
},
|
|
{
|
|
"category": "Network activity",
|
|
"comment": "",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"object_relation": "ip",
|
|
"timestamp": "1515485370",
|
|
"to_ids": true,
|
|
"type": "ip-dst",
|
|
"uuid": "5a5478ba-38dc-4458-ab14-57fd02de0b81",
|
|
"value": "175.45.178.19"
|
|
},
|
|
{
|
|
"category": "Other",
|
|
"comment": "",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"object_relation": "text",
|
|
"timestamp": "1515485370",
|
|
"to_ids": false,
|
|
"type": "text",
|
|
"uuid": "5a5478ba-e60c-4cce-80df-57fd02de0b81",
|
|
"value": "Arguments = ((\"-o barjuok.ryongnamsan.edu.kp:5615 -u 4JUdGzvrMFDWrUUwY3toJATSeNwjn54LkCnKBPRzDuhzi5vSepHfUckJNxRL2gjkNrSqtCoRUrEDAgRwsQvVCjZbRy5YeFCqgoUMnzumvS -p \" + str + \" -k -t \" + Conversions.ToString(value)) ?? \"\")"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"comment": "",
|
|
"deleted": false,
|
|
"description": "File object describing a file with meta-information",
|
|
"meta-category": "file",
|
|
"name": "file",
|
|
"template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",
|
|
"template_version": "7",
|
|
"timestamp": "1515485413",
|
|
"uuid": "ecdcbae1-a690-4f9c-9ce7-b505f1c1a634",
|
|
"ObjectReference": [
|
|
{
|
|
"comment": "",
|
|
"object_uuid": "ecdcbae1-a690-4f9c-9ce7-b505f1c1a634",
|
|
"referenced_uuid": "0b6118b9-a775-47cf-8f97-de518c5ffd7a",
|
|
"relationship_type": "analysed-with",
|
|
"timestamp": "1515696547",
|
|
"uuid": "5a5478e3-4548-4777-a03f-b75d02de0b81"
|
|
}
|
|
],
|
|
"Attribute": [
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "We identified two other pieces of software which share some code:",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"object_relation": "sha1",
|
|
"timestamp": "1515485410",
|
|
"to_ids": true,
|
|
"type": "sha1",
|
|
"uuid": "5a5478e2-563c-46c6-9664-b75d02de0b81",
|
|
"value": "0def199dbdb8dccf380511f67138088148ea83a3"
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "We identified two other pieces of software which share some code:",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"object_relation": "md5",
|
|
"timestamp": "1515485410",
|
|
"to_ids": true,
|
|
"type": "md5",
|
|
"uuid": "5a5478e2-6a0c-4cf3-8df8-b75d02de0b81",
|
|
"value": "762c3249904a8bf76802effb54426655"
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "We identified two other pieces of software which share some code:",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"object_relation": "sha256",
|
|
"timestamp": "1515485410",
|
|
"to_ids": true,
|
|
"type": "sha256",
|
|
"uuid": "5a5478e2-9af0-4d71-90d9-b75d02de0b81",
|
|
"value": "42300b6a09f183ae167d7a11d9c6df21d022a5f02df346350d3d875d557d3b76"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"comment": "",
|
|
"deleted": false,
|
|
"description": "VirusTotal report",
|
|
"meta-category": "misc",
|
|
"name": "virustotal-report",
|
|
"template_uuid": "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4",
|
|
"template_version": "1",
|
|
"timestamp": "1515485410",
|
|
"uuid": "0b6118b9-a775-47cf-8f97-de518c5ffd7a",
|
|
"Attribute": [
|
|
{
|
|
"category": "External analysis",
|
|
"comment": "We identified two other pieces of software which share some code:",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"object_relation": "permalink",
|
|
"timestamp": "1515485411",
|
|
"to_ids": false,
|
|
"type": "link",
|
|
"uuid": "5a5478e3-2394-4d96-a621-b75d02de0b81",
|
|
"value": "https://www.virustotal.com/file/42300b6a09f183ae167d7a11d9c6df21d022a5f02df346350d3d875d557d3b76/analysis/1515484535/"
|
|
},
|
|
{
|
|
"category": "Other",
|
|
"comment": "We identified two other pieces of software which share some code:",
|
|
"deleted": false,
|
|
"disable_correlation": true,
|
|
"object_relation": "detection-ratio",
|
|
"timestamp": "1515485411",
|
|
"to_ids": false,
|
|
"type": "text",
|
|
"uuid": "5a5478e3-ef44-4be0-99af-b75d02de0b81",
|
|
"value": "3/67"
|
|
},
|
|
{
|
|
"category": "Other",
|
|
"comment": "We identified two other pieces of software which share some code:",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"object_relation": "last-submission",
|
|
"timestamp": "1515485411",
|
|
"to_ids": false,
|
|
"type": "datetime",
|
|
"uuid": "5a5478e3-d6f0-430c-b82c-b75d02de0b81",
|
|
"value": "2018-01-09T07:55:35"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"comment": "",
|
|
"deleted": false,
|
|
"description": "File object describing a file with meta-information",
|
|
"meta-category": "file",
|
|
"name": "file",
|
|
"template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",
|
|
"template_version": "7",
|
|
"timestamp": "1515485414",
|
|
"uuid": "62422a69-b558-4bbc-9e01-ff1038764faf",
|
|
"ObjectReference": [
|
|
{
|
|
"comment": "",
|
|
"object_uuid": "62422a69-b558-4bbc-9e01-ff1038764faf",
|
|
"referenced_uuid": "36e2da81-042e-4880-9f27-76ebec952ba0",
|
|
"relationship_type": "analysed-with",
|
|
"timestamp": "1515696547",
|
|
"uuid": "5a5478e3-55e0-4423-9961-b75d02de0b81"
|
|
}
|
|
],
|
|
"Attribute": [
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "Decompiled Code",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"object_relation": "sha1",
|
|
"timestamp": "1515485411",
|
|
"to_ids": true,
|
|
"type": "sha1",
|
|
"uuid": "5a5478e3-fb0c-4974-a73c-b75d02de0b81",
|
|
"value": "8965381377a884aa68eeb451b3e62175968b0b04"
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "Decompiled Code",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"object_relation": "md5",
|
|
"timestamp": "1515485411",
|
|
"to_ids": true,
|
|
"type": "md5",
|
|
"uuid": "5a5478e3-d088-4128-9a8b-b75d02de0b81",
|
|
"value": "6a261443299788af1467142d5f538b2c"
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "Decompiled Code",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"object_relation": "sha256",
|
|
"timestamp": "1515485411",
|
|
"to_ids": true,
|
|
"type": "sha256",
|
|
"uuid": "5a5478e3-aa24-4e9e-bb93-b75d02de0b81",
|
|
"value": "c599f3ca3417169e4a620b8231f8a97ccc63e291b9e09c888e6807dd90f1f17c"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"comment": "",
|
|
"deleted": false,
|
|
"description": "VirusTotal report",
|
|
"meta-category": "misc",
|
|
"name": "virustotal-report",
|
|
"template_uuid": "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4",
|
|
"template_version": "1",
|
|
"timestamp": "1515485411",
|
|
"uuid": "36e2da81-042e-4880-9f27-76ebec952ba0",
|
|
"Attribute": [
|
|
{
|
|
"category": "External analysis",
|
|
"comment": "Decompiled Code",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"object_relation": "permalink",
|
|
"timestamp": "1515485411",
|
|
"to_ids": false,
|
|
"type": "link",
|
|
"uuid": "5a5478e3-1108-4a5e-93b1-b75d02de0b81",
|
|
"value": "https://www.virustotal.com/file/c599f3ca3417169e4a620b8231f8a97ccc63e291b9e09c888e6807dd90f1f17c/analysis/1515484533/"
|
|
},
|
|
{
|
|
"category": "Other",
|
|
"comment": "Decompiled Code",
|
|
"deleted": false,
|
|
"disable_correlation": true,
|
|
"object_relation": "detection-ratio",
|
|
"timestamp": "1515485411",
|
|
"to_ids": false,
|
|
"type": "text",
|
|
"uuid": "5a5478e3-04d8-4a5a-ae0b-b75d02de0b81",
|
|
"value": "6/68"
|
|
},
|
|
{
|
|
"category": "Other",
|
|
"comment": "Decompiled Code",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"object_relation": "last-submission",
|
|
"timestamp": "1515485411",
|
|
"to_ids": false,
|
|
"type": "datetime",
|
|
"uuid": "5a5478e3-0fa0-4ec3-b082-b75d02de0b81",
|
|
"value": "2018-01-09T07:55:33"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"comment": "",
|
|
"deleted": false,
|
|
"description": "File object describing a file with meta-information",
|
|
"meta-category": "file",
|
|
"name": "file",
|
|
"template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",
|
|
"template_version": "7",
|
|
"timestamp": "1515485414",
|
|
"uuid": "8a8becfb-f8ce-440a-9ffa-81a43239f4e2",
|
|
"ObjectReference": [
|
|
{
|
|
"comment": "",
|
|
"object_uuid": "8a8becfb-f8ce-440a-9ffa-81a43239f4e2",
|
|
"referenced_uuid": "fe330733-f2f4-490d-a9b8-c0f0da7353fe",
|
|
"relationship_type": "analysed-with",
|
|
"timestamp": "1515696548",
|
|
"uuid": "5a5478e3-39bc-4941-8e3a-b75d02de0b81"
|
|
}
|
|
],
|
|
"Attribute": [
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "We identified two other pieces of software which share some code:",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"object_relation": "sha1",
|
|
"timestamp": "1515485411",
|
|
"to_ids": true,
|
|
"type": "sha1",
|
|
"uuid": "5a5478e3-4cc8-44f8-900e-b75d02de0b81",
|
|
"value": "7cab4853c370a2dd299a5ab3ebeccfe17455cb43"
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "We identified two other pieces of software which share some code:",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"object_relation": "md5",
|
|
"timestamp": "1515485411",
|
|
"to_ids": true,
|
|
"type": "md5",
|
|
"uuid": "5a5478e3-a69c-4ef3-b0f9-b75d02de0b81",
|
|
"value": "42344bb45f351757e8638656e12a0135"
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "We identified two other pieces of software which share some code:",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"object_relation": "sha256",
|
|
"timestamp": "1515485411",
|
|
"to_ids": true,
|
|
"type": "sha256",
|
|
"uuid": "5a5478e3-85ec-4d15-8de3-b75d02de0b81",
|
|
"value": "0024e32c0199ded445c0b968601f21cc92fc0c534d2642f2dd64c1c978ff01f3"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"comment": "",
|
|
"deleted": false,
|
|
"description": "VirusTotal report",
|
|
"meta-category": "misc",
|
|
"name": "virustotal-report",
|
|
"template_uuid": "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4",
|
|
"template_version": "1",
|
|
"timestamp": "1515485411",
|
|
"uuid": "fe330733-f2f4-490d-a9b8-c0f0da7353fe",
|
|
"Attribute": [
|
|
{
|
|
"category": "External analysis",
|
|
"comment": "We identified two other pieces of software which share some code:",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"object_relation": "permalink",
|
|
"timestamp": "1515485411",
|
|
"to_ids": false,
|
|
"type": "link",
|
|
"uuid": "5a5478e3-fa78-43c9-90a9-b75d02de0b81",
|
|
"value": "https://www.virustotal.com/file/0024e32c0199ded445c0b968601f21cc92fc0c534d2642f2dd64c1c978ff01f3/analysis/1515484532/"
|
|
},
|
|
{
|
|
"category": "Other",
|
|
"comment": "We identified two other pieces of software which share some code:",
|
|
"deleted": false,
|
|
"disable_correlation": true,
|
|
"object_relation": "detection-ratio",
|
|
"timestamp": "1515485411",
|
|
"to_ids": false,
|
|
"type": "text",
|
|
"uuid": "5a5478e3-e430-4494-8cd8-b75d02de0b81",
|
|
"value": "6/67"
|
|
},
|
|
{
|
|
"category": "Other",
|
|
"comment": "We identified two other pieces of software which share some code:",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"object_relation": "last-submission",
|
|
"timestamp": "1515485411",
|
|
"to_ids": false,
|
|
"type": "datetime",
|
|
"uuid": "5a5478e3-546c-4052-abd1-b75d02de0b81",
|
|
"value": "2018-01-09T07:55:32"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
} |