misp-circl-feed/feeds/circl/misp/59a3d08d-5dc8-4153-bc7c-456d950d210f.json

144 lines
No EOL
4.7 KiB
JSON

{
"Event": {
"analysis": "2",
"date": "2017-08-25",
"extends_uuid": "",
"info": "OSINT - New Arena Crysis Ransomware Variant Released",
"publish_timestamp": "1503930329",
"published": true,
"threat_level_id": "3",
"timestamp": "1503930276",
"uuid": "59a3d08d-5dc8-4153-bc7c-456d950d210f",
"Orgc": {
"name": "CIRCL",
"uuid": "55f6ea5e-2c60-40e5-964f-47a8950d210f"
},
"Tag": [
{
"colour": "#0088cc",
"local": false,
"name": "misp-galaxy:ransomware=\"Dharma Ransomware\"",
"relationship_type": ""
},
{
"colour": "#004646",
"local": false,
"name": "type:OSINT",
"relationship_type": ""
},
{
"colour": "#ffffff",
"local": false,
"name": "tlp:white",
"relationship_type": ""
},
{
"colour": "#2c4f00",
"local": false,
"name": "malware_classification:malware-category=\"Ransomware\"",
"relationship_type": ""
},
{
"colour": "#00223b",
"local": false,
"name": "osint:source-type=\"blog-post\"",
"relationship_type": ""
}
],
"Attribute": [
{
"category": "External analysis",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1503930272",
"to_ids": false,
"type": "link",
"uuid": "59a3d0bb-a884-438b-b79f-4005950d210f",
"value": "https://www.bleepingcomputer.com/news/security/new-arena-crysis-ransomware-variant-released/",
"Tag": [
{
"colour": "#00223b",
"local": false,
"name": "osint:source-type=\"blog-post\"",
"relationship_type": ""
}
]
},
{
"category": "External analysis",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1503930272",
"to_ids": false,
"type": "comment",
"uuid": "59a3d0cd-96f4-4f05-9ec5-40a7950d210f",
"value": "Yesterday, ID-Ransomware's Michael Gillespie discovered a new variant of the Crysis/Dharma ransomware that is appending the .arena extension to encrypted files. It is not known exactly how this variant is being distributed, but in the past Crysis was typically spread by hacking into Remote Desktop Services and manually installing the ransomware.",
"Tag": [
{
"colour": "#00223b",
"local": false,
"name": "osint:source-type=\"blog-post\"",
"relationship_type": ""
}
]
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1503930272",
"to_ids": true,
"type": "sha256",
"uuid": "59a3d176-7af0-4784-a3aa-47b3950d210f",
"value": "a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e"
},
{
"category": "Payload delivery",
"comment": "Email to contact in ransom note",
"deleted": false,
"disable_correlation": false,
"timestamp": "1503930272",
"to_ids": true,
"type": "email-src",
"uuid": "59a3d190-0bb8-4bcd-b0d4-45df950d210f",
"value": "chivas@aolonline.top"
},
{
"category": "Payload delivery",
"comment": "- Xchecked via VT: a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e",
"deleted": false,
"disable_correlation": false,
"timestamp": "1503930272",
"to_ids": true,
"type": "sha1",
"uuid": "59a427a0-9500-426e-a8d8-dfd702de0b81",
"value": "60cbe0e3a70ef3d56810bd9178ce232529c09c5f"
},
{
"category": "Payload delivery",
"comment": "- Xchecked via VT: a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e",
"deleted": false,
"disable_correlation": false,
"timestamp": "1503930272",
"to_ids": true,
"type": "md5",
"uuid": "59a427a0-f6f8-4178-9e7d-dfd702de0b81",
"value": "f2679bdabe46e10edc6352fff3c829bc"
},
{
"category": "External analysis",
"comment": "- Xchecked via VT: a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e",
"deleted": false,
"disable_correlation": false,
"timestamp": "1503930272",
"to_ids": false,
"type": "link",
"uuid": "59a427a0-16f0-4270-a9a7-dfd702de0b81",
"value": "https://www.virustotal.com/file/a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e/analysis/1503922016/"
}
]
}
}