misp-circl-feed/feeds/circl/misp/e3b6b6a1-fe4a-4475-948b-fe763b7254a4.json

415 lines
No EOL
17 KiB
JSON

{
"type": "bundle",
"id": "bundle--e3b6b6a1-fe4a-4475-948b-fe763b7254a4",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2023-09-11T06:58:38.000Z",
"modified": "2023-09-11T06:58:38.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--e3b6b6a1-fe4a-4475-948b-fe763b7254a4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2023-09-11T06:58:38.000Z",
"modified": "2023-09-11T06:58:38.000Z",
"name": "Spyware Telegram mod distributed via Google Play - Evil Telegram doppelganger attacks Chinese users",
"published": "2023-09-11T06:58:46Z",
"object_refs": [
"indicator--83aadc2b-44f4-4738-8f78-098e41255d4a",
"indicator--12bcd121-7b31-4adf-9562-c745a9aba991",
"indicator--a5dac10b-60b8-450d-8242-848b4c3b4eb5",
"indicator--b3da79d0-621c-42cc-8c6a-058e9937714f",
"indicator--75bbf299-9426-410a-bdba-d62e0b4b83bb",
"indicator--c4e4d6d6-bea5-4bf2-b778-a3b8378dac28",
"indicator--e26db0bf-8249-4eea-a5d2-a849cfd4bf9b",
"indicator--10adc0e7-32f1-4fad-b078-41aaca610978",
"indicator--d8a7cf9f-2216-4ea5-851e-496eac78deab",
"indicator--5b3ee997-0541-4199-98ce-e05e64730321",
"x-misp-object--1b6a0b6f-1365-44ef-ba5c-9f8af907febe",
"x-misp-object--b390191c-a16c-415c-ba31-78a2c2a698bf",
"relationship--7488b70e-da11-4d34-bd0a-e8193bad5c87"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"type:OSINT",
"osint:lifetime=\"perpetual\"",
"tlp:clear",
"misp-galaxy:mitre-attack-pattern=\"Deliver Malicious App via Authorized App Store - T1475\"",
"misp-galaxy:target-information=\"China\"",
"misp-galaxy:mitre-attack-pattern=\"Data Manipulation - T1565\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--83aadc2b-44f4-4738-8f78-098e41255d4a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2023-09-11T06:48:10.000Z",
"modified": "2023-09-11T06:48:10.000Z",
"pattern": "[file:hashes.MD5 = '39df26099caf5d5edf264801a486e4ee']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2023-09-11T06:48:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--12bcd121-7b31-4adf-9562-c745a9aba991",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2023-09-11T06:48:10.000Z",
"modified": "2023-09-11T06:48:10.000Z",
"pattern": "[file:hashes.MD5 = 'b9e9a29229a10deecc104654cb7c71ae']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2023-09-11T06:48:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a5dac10b-60b8-450d-8242-848b4c3b4eb5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2023-09-11T06:48:10.000Z",
"modified": "2023-09-11T06:48:10.000Z",
"pattern": "[file:hashes.MD5 = 'e0dab7efb9cea5b6a010c8c5fee1a285']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2023-09-11T06:48:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b3da79d0-621c-42cc-8c6a-058e9937714f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2023-09-11T06:48:10.000Z",
"modified": "2023-09-11T06:48:10.000Z",
"pattern": "[file:hashes.MD5 = 'efcbcd6a2166745153c329fd2d486b3a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2023-09-11T06:48:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--75bbf299-9426-410a-bdba-d62e0b4b83bb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2023-09-11T06:48:10.000Z",
"modified": "2023-09-11T06:48:10.000Z",
"pattern": "[file:hashes.MD5 = '8e878695aab7ab16e38265c3a5f17970']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2023-09-11T06:48:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c4e4d6d6-bea5-4bf2-b778-a3b8378dac28",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2023-09-11T06:48:10.000Z",
"modified": "2023-09-11T06:48:10.000Z",
"pattern": "[file:hashes.MD5 = '65377fa1d86351c7bd353b51f68f6b80']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2023-09-11T06:48:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e26db0bf-8249-4eea-a5d2-a849cfd4bf9b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2023-09-11T06:48:10.000Z",
"modified": "2023-09-11T06:48:10.000Z",
"pattern": "[file:hashes.MD5 = '19f927386a03ce8d2866879513f37ea0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2023-09-11T06:48:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--10adc0e7-32f1-4fad-b078-41aaca610978",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2023-09-11T06:48:10.000Z",
"modified": "2023-09-11T06:48:10.000Z",
"pattern": "[file:hashes.MD5 = 'a0e197b9c359b89e48c3f0c01af21713']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2023-09-11T06:48:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d8a7cf9f-2216-4ea5-851e-496eac78deab",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2023-09-11T06:48:10.000Z",
"modified": "2023-09-11T06:48:10.000Z",
"pattern": "[file:hashes.MD5 = 'c7a8c3c78ac973785f700c537fbfcb00']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2023-09-11T06:48:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b3ee997-0541-4199-98ce-e05e64730321",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2023-09-11T06:48:39.000Z",
"modified": "2023-09-11T06:48:39.000Z",
"pattern": "[domain-name:value = 'sg.telegrnm.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2023-09-11T06:48:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--1b6a0b6f-1365-44ef-ba5c-9f8af907febe",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2023-09-11T06:49:29.000Z",
"modified": "2023-09-11T06:49:29.000Z",
"labels": [
"misp:name=\"passive-dns\"",
"misp:meta-category=\"network\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "rdata",
"value": "103.148.186.32",
"category": "Other",
"comment": "Result from a rrset lookup on DNSDB about the hostname: sg.telegrnm.org",
"uuid": "bff0d874-84e6-432a-be38-8caa68d8250d"
},
{
"type": "counter",
"object_relation": "count",
"value": "258",
"category": "Other",
"comment": "Result from a rrset lookup on DNSDB about the hostname: sg.telegrnm.org",
"uuid": "6f25b86b-91d2-4ad7-be11-ecad7993bb50"
},
{
"type": "datetime",
"object_relation": "time_first",
"value": "2023-02-12T15:26:41+00:00",
"category": "Other",
"comment": "Result from a rrset lookup on DNSDB about the hostname: sg.telegrnm.org",
"uuid": "0c4e545a-1695-4bea-9aed-001f6a7255f1"
},
{
"type": "datetime",
"object_relation": "time_last",
"value": "2023-09-10T14:33:58+00:00",
"category": "Other",
"comment": "Result from a rrset lookup on DNSDB about the hostname: sg.telegrnm.org",
"uuid": "b79c91e3-4825-4e5b-bdde-060687684499"
},
{
"type": "text",
"object_relation": "rrname",
"value": "sg.telegrnm.org.",
"category": "Other",
"comment": "Result from a rrset lookup on DNSDB about the hostname: sg.telegrnm.org",
"uuid": "a28c90a5-20c1-4b5d-808d-5eead02d25c9"
},
{
"type": "text",
"object_relation": "rrtype",
"value": "A",
"category": "Other",
"comment": "Result from a rrset lookup on DNSDB about the hostname: sg.telegrnm.org",
"uuid": "e5828613-c8cb-458b-8e6b-49252371b86d"
},
{
"type": "domain",
"object_relation": "bailiwick",
"value": "telegrnm.org",
"category": "Network activity",
"comment": "Result from a rrset lookup on DNSDB about the hostname: sg.telegrnm.org",
"to_ids": true,
"uuid": "ff8f605a-8398-4743-9c1b-0d130dfb14fc"
}
],
"x_misp_comment": "sg.telegrnm.org: Enriched via the farsight_passivedns module",
"x_misp_meta_category": "network",
"x_misp_name": "passive-dns"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--b390191c-a16c-415c-ba31-78a2c2a698bf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2023-09-11T06:57:27.000Z",
"modified": "2023-09-11T06:57:27.000Z",
"labels": [
"misp:name=\"report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "link",
"value": "https://securelist.com/trojanized-telegram-mod-attacking-chinese-users/110482/",
"category": "External analysis",
"uuid": "3306d70b-3806-4926-ad3d-643238f9fec8"
},
{
"type": "text",
"object_relation": "summary",
"value": "Evil Telegram doppelganger attacks Chinese users",
"category": "Other",
"uuid": "97ecae7a-4806-490b-b674-e2b561a1793a"
},
{
"type": "text",
"object_relation": "type",
"value": "Blog",
"category": "Other",
"uuid": "19fbec9f-5913-486b-bfc5-a00fad5ae39c"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "report"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--7488b70e-da11-4d34-bd0a-e8193bad5c87",
"created": "2023-09-11T06:49:29.000Z",
"modified": "2023-09-11T06:49:29.000Z",
"relationship_type": "related-to",
"source_ref": "x-misp-object--1b6a0b6f-1365-44ef-ba5c-9f8af907febe",
"target_ref": "indicator--5b3ee997-0541-4199-98ce-e05e64730321"
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}