misp-circl-feed/feeds/circl/stix-2.1/580dabb4-0938-48b7-abf9-4e37950d210f.json

205 lines
No EOL
10 KiB
JSON

{
"type": "bundle",
"id": "bundle--580dabb4-0938-48b7-abf9-4e37950d210f",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-10-24T06:40:39.000Z",
"modified": "2016-10-24T06:40:39.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--580dabb4-0938-48b7-abf9-4e37950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-10-24T06:40:39.000Z",
"modified": "2016-10-24T06:40:39.000Z",
"name": "OSINT - TeamXRat: Brazilian cybercrime meets ransomware",
"published": "2016-10-24T06:49:12Z",
"object_refs": [
"observed-data--580dac12-2cec-4e51-9a4e-4731950d210f",
"url--580dac12-2cec-4e51-9a4e-4731950d210f",
"x-misp-attribute--580dac22-98c0-478c-ae59-4118950d210f",
"x-misp-attribute--580dac3e-98f0-4f78-a6a9-4f5d950d210f",
"indicator--580dac7f-93d8-46f4-bbcb-4371950d210f",
"indicator--580dace7-1508-4f27-8e8a-4dc9950d210f",
"indicator--580dace7-d574-4770-af0f-4171950d210f",
"indicator--580dace8-ac34-4aaa-b094-4344950d210f"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"ecsirt:malicious-code=\"ransomware\"",
"ms-caro-malware:malware-type=\"Ransom\"",
"malware_classification:malware-category=\"Ransomware\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--580dac12-2cec-4e51-9a4e-4731950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-10-24T06:37:06.000Z",
"modified": "2016-10-24T06:37:06.000Z",
"first_observed": "2016-10-24T06:37:06Z",
"last_observed": "2016-10-24T06:37:06Z",
"number_observed": 1,
"object_refs": [
"url--580dac12-2cec-4e51-9a4e-4731950d210f"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--580dac12-2cec-4e51-9a4e-4731950d210f",
"value": "https://securelist.com/blog/research/76153/teamxrat-brazilian-cybercrime-meets-ransomware/"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--580dac22-98c0-478c-ae59-4118950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-10-24T06:37:22.000Z",
"modified": "2016-10-24T06:37:22.000Z",
"labels": [
"misp:type=\"comment\"",
"misp:category=\"External analysis\""
],
"x_misp_category": "External analysis",
"x_misp_type": "comment",
"x_misp_value": "Brazilian cybercriminals are notorious for their ability to develop banking trojans but now they have started to focus their efforts in new areas, including ransomware. We discovered a new variant of a Brazilian-made ransomware, Trojan-Ransom.Win32.Xpan, that is being used to infect local companies and hospitals, directly affecting innocent people, encrypting their files using the extension \u00e2\u20ac\u0153.___xratteamLucked\u00e2\u20ac\u009d and asking to pay the ransom.\r\n\r\nThe Kaspersky Anti-Ransom team decrypted the Xpan Trojan, allowing them to rescue the files of a Hospital in Brazil that had fallen victim to this Ransomware family.\r\n\r\nActually, this is not the first ransomware to come out of Brazil. In the past, we investigated TorLocker and its flawed encryption, which was created and negotiated worldwide by a Brazilian cybercriminal. We also saw a lot of copycats use HiddenTear in local attacks. Trojan Ransom Xpan was created by an organized gang, which used targeted attacks via RDP that abused weak passwords and wrong implementations.\r\n\r\nIn this post, we\u00e2\u20ac\u2122ll explain this new Ransomware family and how Brazilian coders are creating new ransomware from scratch."
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--580dac3e-98f0-4f78-a6a9-4f5d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-10-24T06:37:50.000Z",
"modified": "2016-10-24T06:37:50.000Z",
"labels": [
"misp:type=\"pattern-in-memory\"",
"misp:category=\"Artifacts dropped\""
],
"x_misp_category": "Artifacts dropped",
"x_misp_type": "pattern-in-memory",
"x_misp_value": ".___xratteamLucked"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--580dac7f-93d8-46f4-bbcb-4371950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-10-24T06:38:55.000Z",
"modified": "2016-10-24T06:38:55.000Z",
"pattern": "[file:hashes.MD5 = '34260178f9e3b2e769accdee56dac793']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-10-24T06:38:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--580dace7-1508-4f27-8e8a-4dc9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-10-24T06:40:39.000Z",
"modified": "2016-10-24T06:40:39.000Z",
"description": "The ransom texts used by the group are written in Portuguese from Brazil. The messages do not inform how much the victim has to pay to retrieve their files, nor the payment method required (which is usually Bitcoins). Instead, they instruct the victim to send an email to one of the anonymous email services Mail2Tor or Email.tg.",
"pattern": "[email-message:from_ref.value = 'corporacaoxrat@mail2tor.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-10-24T06:40:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-src\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--580dace7-d574-4770-af0f-4171950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-10-24T06:40:39.000Z",
"modified": "2016-10-24T06:40:39.000Z",
"description": "The ransom texts used by the group are written in Portuguese from Brazil. The messages do not inform how much the victim has to pay to retrieve their files, nor the payment method required (which is usually Bitcoins). Instead, they instruct the victim to send an email to one of the anonymous email services Mail2Tor or Email.tg.",
"pattern": "[email-message:from_ref.value = 'xratteam@mail2tor.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-10-24T06:40:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-src\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--580dace8-ac34-4aaa-b094-4344950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-10-24T06:40:40.000Z",
"modified": "2016-10-24T06:40:40.000Z",
"description": "The ransom texts used by the group are written in Portuguese from Brazil. The messages do not inform how much the victim has to pay to retrieve their files, nor the payment method required (which is usually Bitcoins). Instead, they instruct the victim to send an email to one of the anonymous email services Mail2Tor or Email.tg.",
"pattern": "[email-message:from_ref.value = 'xratteam@email.tg']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-10-24T06:40:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-src\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}