misp-circl-feed/feeds/circl/misp/5ae2129e-15b4-41e9-9428-4f1e02de0b81.json

667 lines
No EOL
27 KiB
JSON

{
"Event": {
"analysis": "2",
"date": "2018-04-26",
"extends_uuid": "",
"info": "OSINT - Analyzing Operation GhostSecret: Attack Seeks to Steal Data Worldwide",
"publish_timestamp": "1524766440",
"published": true,
"threat_level_id": "2",
"timestamp": "1524766410",
"uuid": "5ae2129e-15b4-41e9-9428-4f1e02de0b81",
"Orgc": {
"name": "CIRCL",
"uuid": "55f6ea5e-2c60-40e5-964f-47a8950d210f"
},
"Tag": [
{
"colour": "#ffffff",
"local": false,
"name": "tlp:white",
"relationship_type": ""
},
{
"colour": "#0088cc",
"local": false,
"name": "misp-galaxy:mitre-enterprise-attack-attack-pattern=\"Exfiltration Over Command and Control Channel - T1041\"",
"relationship_type": ""
},
{
"colour": "#0088cc",
"local": false,
"name": "misp-galaxy:mitre-enterprise-attack-attack-pattern=\"Commonly Used Port - T1043\"",
"relationship_type": ""
},
{
"colour": "#0088cc",
"local": false,
"name": "misp-galaxy:mitre-enterprise-attack-attack-pattern=\"Service Execution - T1035\"",
"relationship_type": ""
},
{
"colour": "#0088cc",
"local": false,
"name": "misp-galaxy:mitre-enterprise-attack-attack-pattern=\"Automated Collection - T1119\"",
"relationship_type": ""
},
{
"colour": "#0088cc",
"local": false,
"name": "misp-galaxy:mitre-enterprise-attack-attack-pattern=\"Data from Local System - T1005\"",
"relationship_type": ""
},
{
"colour": "#0088cc",
"local": false,
"name": "misp-galaxy:mitre-enterprise-attack-attack-pattern=\"Process Discovery - T1057\"",
"relationship_type": ""
},
{
"colour": "#0088cc",
"local": false,
"name": "misp-galaxy:mitre-enterprise-attack-attack-pattern=\"System Time Discovery - T1124\"",
"relationship_type": ""
},
{
"colour": "#0088cc",
"local": false,
"name": "misp-galaxy:mitre-enterprise-attack-attack-pattern=\"File Deletion - T1107\"",
"relationship_type": ""
},
{
"colour": "#850048",
"local": false,
"name": "workflow:todo=\"create-missing-misp-galaxy-cluster-values\"",
"relationship_type": ""
}
],
"Attribute": [
{
"category": "External analysis",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1524766406",
"to_ids": false,
"type": "link",
"uuid": "5ae212a9-3388-451a-ae23-4d1c02de0b81",
"value": "https://securingtomorrow.mcafee.com/mcafee-labs/analyzing-operation-ghostsecret-attack-seeks-to-steal-data-worldwide/",
"Tag": [
{
"colour": "#00223b",
"local": false,
"name": "osint:source-type=\"blog-post\"",
"relationship_type": ""
},
{
"colour": "#001fc2",
"local": false,
"name": "estimative-language:likelihood-probability=\"almost-certain\"",
"relationship_type": ""
},
{
"colour": "#0026eb",
"local": false,
"name": "estimative-language:confidence-in-analytic-judgment=\"moderate\"",
"relationship_type": ""
}
]
},
{
"category": "External analysis",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1524766407",
"to_ids": false,
"type": "text",
"uuid": "5ae212bc-dbf8-4751-b05b-46ba02de0b81",
"value": "McAfee Advanced Threat Research analysts have uncovered a global data reconnaissance campaign assaulting a wide number of industries including critical infrastructure, entertainment, finance, health care, and telecommunications. This campaign, dubbed Operation GhostSecret, leverages multiple implants, tools, and malware variants associated with the state-sponsored cyber group Hidden Cobra. The infrastructure currently remains active. In this post, we dive deeply into this campaign. For a brief overview of this threat, see \u00e2\u20ac\u0153Global Malware Campaign Pilfers Data from Critical Infrastructure, Entertainment, Finance, Health Care, and Other Industries.\u00e2\u20ac\u009d\r\n\r\nOur investigation into this campaign reveals that the actor used multiple malware implants, including an unknown implant with capabilities similar to Bankshot. From March 18 to 26 we observed the malware operating in multiple areas of the world. This new variant resembles parts of the Destover malware, which was used in the 2014 Sony Pictures attack.\r\n\r\nFurthermore, the Advanced Threat Research team has discovered Proxysvc, which appears to be an undocumented implant. We have also uncovered additional control servers that are still active and associated with these new implants. Based on our analysis of public and private information from submissions, along with product telemetry, it appears Proxysvc was used alongside the 2017 Destover variant and has operated undetected since mid-2017.\r\n\r\nThe attackers behind Operation GhostSecret used a similar infrastructure to earlier threats, including SSL certificates used by FakeTLS in implants found in the Destover backdoor variant known as Escad, which was used in the Sony Pictures attack. Based on our technical analysis, telemetry, and data from submissions, we can assert with high confidence that this is the work of the Hidden Cobra group. The Advanced Threat Research team uncovered activity related to this campaign in March 2018, when the actors targeted Turkish banks. These initial findings appear to be the first stage of Operation GhostSecret. For more on the global aspect of this threat, see \u00e2\u20ac\u0153Global Malware Campaign Pilfers Data from Critical Infrastructure of Entertainment, Finance, Health Care, and Other Industries.\u00e2\u20ac\u009d",
"Tag": [
{
"colour": "#00223b",
"local": false,
"name": "osint:source-type=\"blog-post\"",
"relationship_type": ""
},
{
"colour": "#001fc2",
"local": false,
"name": "estimative-language:likelihood-probability=\"almost-certain\"",
"relationship_type": ""
},
{
"colour": "#0026eb",
"local": false,
"name": "estimative-language:confidence-in-analytic-judgment=\"moderate\"",
"relationship_type": ""
}
]
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1524765393",
"to_ids": true,
"type": "sha1",
"uuid": "5ae212d1-cfe0-4bf3-bd0c-4ed302de0b81",
"value": "fe887fcab66d7d7f79f05e0266c0649f0114ba7c"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1524765394",
"to_ids": true,
"type": "sha1",
"uuid": "5ae212d2-9d48-4402-b518-4f0f02de0b81",
"value": "8f2918c721511536d8c72144eabaf685ddc21a35"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1524765394",
"to_ids": true,
"type": "sha1",
"uuid": "5ae212d2-2dd8-4943-91c4-4b6302de0b81",
"value": "33ffbc8d6850794fa3b7bccb7b1aa1289e6eaa45"
},
{
"category": "Network activity",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1524766131",
"to_ids": true,
"type": "ip-dst",
"uuid": "5ae212e1-2a34-444c-a80c-441e02de0b81",
"value": "203.131.222.83"
},
{
"category": "Network activity",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1524766131",
"to_ids": true,
"type": "ip-dst",
"uuid": "5ae212e2-6960-43d3-9df3-4e4602de0b81",
"value": "14.140.116.172"
},
{
"category": "Network activity",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1524766131",
"to_ids": true,
"type": "ip-dst",
"uuid": "5ae212e2-4788-4879-aa82-465e02de0b81",
"value": "203.131.222.109"
},
{
"category": "Antivirus detection",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1524766132",
"to_ids": false,
"type": "text",
"uuid": "5ae2148d-c224-4ec6-b3e4-46df02de0b81",
"value": "Trojan-Bankshot2"
},
{
"category": "Network activity",
"comment": "Proxysvc makes an interesting check while accepting connections from a potential control server. It checks against a list of IP addresses to make sure the incoming connection is not from any of the following addresses. If the incoming request does come from one of these, the implant offers a zero response (ASCII \u00e2\u20ac\u01530\u00e2\u20ac\u009d) and shuts down the connection.",
"deleted": false,
"disable_correlation": false,
"timestamp": "1524766132",
"to_ids": false,
"type": "ip-src",
"uuid": "5ae214c7-aa40-4154-a878-452302de0b81",
"value": "121.240.155.74"
},
{
"category": "Network activity",
"comment": "Proxysvc makes an interesting check while accepting connections from a potential control server. It checks against a list of IP addresses to make sure the incoming connection is not from any of the following addresses. If the incoming request does come from one of these, the implant offers a zero response (ASCII \u00e2\u20ac\u01530\u00e2\u20ac\u009d) and shuts down the connection.",
"deleted": false,
"disable_correlation": false,
"timestamp": "1524766133",
"to_ids": false,
"type": "ip-src",
"uuid": "5ae214c8-dd6c-4b76-947e-49a302de0b81",
"value": "121.240.155.76"
},
{
"category": "Network activity",
"comment": "Proxysvc makes an interesting check while accepting connections from a potential control server. It checks against a list of IP addresses to make sure the incoming connection is not from any of the following addresses. If the incoming request does come from one of these, the implant offers a zero response (ASCII \u00e2\u20ac\u01530\u00e2\u20ac\u009d) and shuts down the connection.",
"deleted": false,
"disable_correlation": false,
"timestamp": "1524766133",
"to_ids": false,
"type": "ip-src",
"uuid": "5ae214c8-54f4-4deb-bf2e-41bf02de0b81",
"value": "121.240.155.77"
},
{
"category": "Network activity",
"comment": "Proxysvc makes an interesting check while accepting connections from a potential control server. It checks against a list of IP addresses to make sure the incoming connection is not from any of the following addresses. If the incoming request does come from one of these, the implant offers a zero response (ASCII \u00e2\u20ac\u01530\u00e2\u20ac\u009d) and shuts down the connection.",
"deleted": false,
"disable_correlation": false,
"timestamp": "1524766134",
"to_ids": false,
"type": "ip-src",
"uuid": "5ae214c9-f330-48a2-9ec7-451702de0b81",
"value": "121.240.155.78"
},
{
"category": "Network activity",
"comment": "Proxysvc makes an interesting check while accepting connections from a potential control server. It checks against a list of IP addresses to make sure the incoming connection is not from any of the following addresses. If the incoming request does come from one of these, the implant offers a zero response (ASCII \u00e2\u20ac\u01530\u00e2\u20ac\u009d) and shuts down the connection.",
"deleted": false,
"disable_correlation": false,
"timestamp": "1524766134",
"to_ids": false,
"type": "ip-src",
"uuid": "5ae214c9-bafc-47b3-b4f7-400202de0b81",
"value": "223.30.98.169"
},
{
"category": "Network activity",
"comment": "Proxysvc makes an interesting check while accepting connections from a potential control server. It checks against a list of IP addresses to make sure the incoming connection is not from any of the following addresses. If the incoming request does come from one of these, the implant offers a zero response (ASCII \u00e2\u20ac\u01530\u00e2\u20ac\u009d) and shuts down the connection.",
"deleted": false,
"disable_correlation": false,
"timestamp": "1524766134",
"to_ids": false,
"type": "ip-src",
"uuid": "5ae214ca-8200-4bee-9a0a-45ec02de0b81",
"value": "223.30.98.170"
},
{
"category": "Network activity",
"comment": "Proxysvc makes an interesting check while accepting connections from a potential control server. It checks against a list of IP addresses to make sure the incoming connection is not from any of the following addresses. If the incoming request does come from one of these, the implant offers a zero response (ASCII \u00e2\u20ac\u01530\u00e2\u20ac\u009d) and shuts down the connection.",
"deleted": false,
"disable_correlation": false,
"timestamp": "1524766135",
"to_ids": false,
"type": "ip-src",
"uuid": "5ae214ca-a294-408a-994d-4d0102de0b81",
"value": "14.140.116.172"
},
{
"category": "Payload delivery",
"comment": "Both of these control servers used the PolarSSL certificate",
"deleted": false,
"disable_correlation": false,
"timestamp": "1524766135",
"to_ids": true,
"type": "x509-fingerprint-sha1",
"uuid": "5ae21511-4b84-4dd2-a11a-4cd502de0b81",
"value": "d0cb9b2d4809575e1bc1f4657e0eb56f307c7a76"
},
{
"category": "Network activity",
"comment": "The 2015 implant does not contain a hardcoded value of the IP address it must connect to. Instead it contains a hardcoded sockaddr_in data structure (positioned at 0x270 bytes before the end of the binary) used by the connect() API to specify port 443 and control server IP addresses:",
"deleted": false,
"disable_correlation": false,
"timestamp": "1524766136",
"to_ids": false,
"type": "ip-dst",
"uuid": "5ae2152a-6adc-4f6c-a335-407802de0b81",
"value": "193.248.247.59"
},
{
"category": "Network activity",
"comment": "The 2015 implant does not contain a hardcoded value of the IP address it must connect to. Instead it contains a hardcoded sockaddr_in data structure (positioned at 0x270 bytes before the end of the binary) used by the connect() API to specify port 443 and control server IP addresses:",
"deleted": false,
"disable_correlation": false,
"timestamp": "1524766136",
"to_ids": false,
"type": "ip-dst",
"uuid": "5ae2152a-c9b4-4719-8dcb-4e3b02de0b81",
"value": "196.4.67.45"
},
{
"category": "Network activity",
"comment": "Further investigation into the control server infrastructure reveals the SSL certificate d0cb9b2d4809575e1bc1f4657e0eb56f307c7a76, which is tied to the control server 203.131.222.83, used by the February 2018 implant. This server resides at Thammasat University in Bangkok, Thailand. The same entity hosted the control server for the Sony Pictures implants. This SSL certificate has been used in Hidden Cobra operations since the Sony Pictures attack. Analyzing this certificate reveals additional control servers using the same PolarSSL certificate. Further analysis of McAfee telemetry data reveals several IP addresses that are active, two within the same network block as the 2018 Destover-like implant.",
"deleted": false,
"disable_correlation": false,
"timestamp": "1524766136",
"to_ids": true,
"type": "ip-dst",
"uuid": "5ae21588-3774-4c2c-bf14-420502de0b81",
"value": "203.131.222.95"
}
],
"Object": [
{
"comment": "",
"deleted": false,
"description": "File object describing a file with meta-information",
"meta-category": "file",
"name": "file",
"template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",
"template_version": "7",
"timestamp": "1524766140",
"uuid": "95673d0d-503f-4625-9e5d-b6771753df90",
"ObjectReference": [
{
"comment": "",
"object_uuid": "95673d0d-503f-4625-9e5d-b6771753df90",
"referenced_uuid": "f62ef2cf-61e4-4fcc-8c7b-5704df1d8cb8",
"relationship_type": "analysed-with",
"timestamp": "1524766144",
"uuid": "5ae215c0-1918-4488-a0ee-4ae302de0b81"
}
],
"Attribute": [
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "md5",
"timestamp": "1524766137",
"to_ids": true,
"type": "md5",
"uuid": "5ae215b9-a980-48ea-b7dc-4de102de0b81",
"value": "d1cced59ad97f0f7c0fad78a46cca151"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "sha1",
"timestamp": "1524766137",
"to_ids": true,
"type": "sha1",
"uuid": "5ae215b9-77e0-43af-b90f-496902de0b81",
"value": "8f2918c721511536d8c72144eabaf685ddc21a35"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "sha256",
"timestamp": "1524766138",
"to_ids": true,
"type": "sha256",
"uuid": "5ae215ba-1034-42c0-a7a5-457d02de0b81",
"value": "ae65288f5c96b4656402853b14acd1d060b2a6303d833df5b1f10cc7a34b0025"
}
]
},
{
"comment": "",
"deleted": false,
"description": "VirusTotal report",
"meta-category": "misc",
"name": "virustotal-report",
"template_uuid": "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4",
"template_version": "1",
"timestamp": "1524766138",
"uuid": "f62ef2cf-61e4-4fcc-8c7b-5704df1d8cb8",
"Attribute": [
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "last-submission",
"timestamp": "1524766138",
"to_ids": false,
"type": "datetime",
"uuid": "5ae215ba-5938-4881-b51c-465202de0b81",
"value": "2018-04-26T00:30:02"
},
{
"category": "External analysis",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "permalink",
"timestamp": "1524766139",
"to_ids": false,
"type": "link",
"uuid": "5ae215bb-24c8-49e2-84f4-4a1602de0b81",
"value": "https://www.virustotal.com/file/ae65288f5c96b4656402853b14acd1d060b2a6303d833df5b1f10cc7a34b0025/analysis/1524702602/"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "detection-ratio",
"timestamp": "1524766139",
"to_ids": false,
"type": "text",
"uuid": "5ae215bb-cc4c-4db4-9375-441c02de0b81",
"value": "48/67"
}
]
},
{
"comment": "",
"deleted": false,
"description": "File object describing a file with meta-information",
"meta-category": "file",
"name": "file",
"template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",
"template_version": "7",
"timestamp": "1524766142",
"uuid": "fdeba3ca-6ff5-43cf-a1af-95261b334cf1",
"ObjectReference": [
{
"comment": "",
"object_uuid": "fdeba3ca-6ff5-43cf-a1af-95261b334cf1",
"referenced_uuid": "c1a27f9e-61e5-485d-9294-7f9bf1daf55e",
"relationship_type": "analysed-with",
"timestamp": "1524766144",
"uuid": "5ae215c0-29b4-4033-a65f-493802de0b81"
}
],
"Attribute": [
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "md5",
"timestamp": "1524766139",
"to_ids": true,
"type": "md5",
"uuid": "5ae215bb-e42c-404c-aa83-4fe502de0b81",
"value": "87a9511137154886ee03610c7a346c59"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "sha1",
"timestamp": "1524766140",
"to_ids": true,
"type": "sha1",
"uuid": "5ae215bc-5138-44e9-b9fe-43e802de0b81",
"value": "fe887fcab66d7d7f79f05e0266c0649f0114ba7c"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "sha256",
"timestamp": "1524766140",
"to_ids": true,
"type": "sha256",
"uuid": "5ae215bc-ea24-4e5e-a3c8-4b4702de0b81",
"value": "45e68dce0f75353c448865b9abafbef5d4ed6492cd7058f65bf6aac182a9176a"
}
]
},
{
"comment": "",
"deleted": false,
"description": "VirusTotal report",
"meta-category": "misc",
"name": "virustotal-report",
"template_uuid": "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4",
"template_version": "1",
"timestamp": "1524766141",
"uuid": "c1a27f9e-61e5-485d-9294-7f9bf1daf55e",
"Attribute": [
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "last-submission",
"timestamp": "1524766141",
"to_ids": false,
"type": "datetime",
"uuid": "5ae215bd-d93c-4539-b75a-405202de0b81",
"value": "2018-04-26T00:30:05"
},
{
"category": "External analysis",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "permalink",
"timestamp": "1524766141",
"to_ids": false,
"type": "link",
"uuid": "5ae215bd-1f68-4b4a-a831-42b702de0b81",
"value": "https://www.virustotal.com/file/45e68dce0f75353c448865b9abafbef5d4ed6492cd7058f65bf6aac182a9176a/analysis/1524702605/"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "detection-ratio",
"timestamp": "1524766142",
"to_ids": false,
"type": "text",
"uuid": "5ae215be-e1e4-463a-8125-4e6a02de0b81",
"value": "44/66"
}
]
},
{
"comment": "",
"deleted": false,
"description": "File object describing a file with meta-information",
"meta-category": "file",
"name": "file",
"template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",
"template_version": "7",
"timestamp": "1524766145",
"uuid": "01a4b35a-bfe0-48cd-92f0-fde425538024",
"ObjectReference": [
{
"comment": "",
"object_uuid": "01a4b35a-bfe0-48cd-92f0-fde425538024",
"referenced_uuid": "ac8aaf36-e974-4941-8189-070a68af06ab",
"relationship_type": "analysed-with",
"timestamp": "1524766144",
"uuid": "5ae215c0-0ce4-4d3d-b945-44c402de0b81"
}
],
"Attribute": [
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "md5",
"timestamp": "1524766142",
"to_ids": true,
"type": "md5",
"uuid": "5ae215be-3434-41f8-9def-4a4602de0b81",
"value": "35cd770bd67168229200933511eb45f4"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "sha1",
"timestamp": "1524766142",
"to_ids": true,
"type": "sha1",
"uuid": "5ae215be-ac74-4986-8d05-4a7c02de0b81",
"value": "33ffbc8d6850794fa3b7bccb7b1aa1289e6eaa45"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "sha256",
"timestamp": "1524766143",
"to_ids": true,
"type": "sha256",
"uuid": "5ae215bf-fcf4-44b9-858a-41c202de0b81",
"value": "05a567fe3f7c22a0ef78cc39dcf2d9ff283580c82bdbe880af9549e7014becfc"
}
]
},
{
"comment": "",
"deleted": false,
"description": "VirusTotal report",
"meta-category": "misc",
"name": "virustotal-report",
"template_uuid": "d7dd0154-e04f-4c34-a2fb-79f3a3a52aa4",
"template_version": "1",
"timestamp": "1524766143",
"uuid": "ac8aaf36-e974-4941-8189-070a68af06ab",
"Attribute": [
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "last-submission",
"timestamp": "1524766143",
"to_ids": false,
"type": "datetime",
"uuid": "5ae215bf-9cac-4e5f-8fd6-4c6802de0b81",
"value": "2018-04-26T00:29:58"
},
{
"category": "External analysis",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "permalink",
"timestamp": "1524766143",
"to_ids": false,
"type": "link",
"uuid": "5ae215bf-2810-41d9-9c22-480502de0b81",
"value": "https://www.virustotal.com/file/05a567fe3f7c22a0ef78cc39dcf2d9ff283580c82bdbe880af9549e7014becfc/analysis/1524702598/"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "detection-ratio",
"timestamp": "1524766144",
"to_ids": false,
"type": "text",
"uuid": "5ae215c0-ff80-4bd3-b70a-44b602de0b81",
"value": "49/67"
}
]
}
]
}
}