392 lines
No EOL
17 KiB
JSON
392 lines
No EOL
17 KiB
JSON
{
|
|
"type": "bundle",
|
|
"id": "bundle--5a265a9e-9e54-4d44-a04e-42af950d210f",
|
|
"objects": [
|
|
{
|
|
"type": "identity",
|
|
"spec_version": "2.1",
|
|
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-12-06T10:03:09.000Z",
|
|
"modified": "2017-12-06T10:03:09.000Z",
|
|
"name": "CIRCL",
|
|
"identity_class": "organization"
|
|
},
|
|
{
|
|
"type": "report",
|
|
"spec_version": "2.1",
|
|
"id": "report--5a265a9e-9e54-4d44-a04e-42af950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-12-06T10:03:09.000Z",
|
|
"modified": "2017-12-06T10:03:09.000Z",
|
|
"name": "OSINT - Halloware Ransomware on Sale on the Dark Web for Only $40",
|
|
"published": "2017-12-06T10:03:18Z",
|
|
"object_refs": [
|
|
"observed-data--5a265ab9-fd00-469a-a5fa-4019950d210f",
|
|
"url--5a265ab9-fd00-469a-a5fa-4019950d210f",
|
|
"x-misp-attribute--5a265d95-5644-43e2-ac0f-4744950d210f",
|
|
"indicator--5a265dba-e3e0-45fb-8c3a-42b7950d210f",
|
|
"indicator--5a265dba-0bc0-4d83-b3c8-4f6a950d210f",
|
|
"indicator--5a265dba-a5a8-4c74-8d40-4951950d210f",
|
|
"indicator--5a27c054-fd60-48db-a4b6-476a02de0b81",
|
|
"indicator--5a27c054-dee8-42e8-ba80-495202de0b81",
|
|
"observed-data--5a27c054-28b4-434a-8d0f-433b02de0b81",
|
|
"url--5a27c054-28b4-434a-8d0f-433b02de0b81",
|
|
"indicator--5a27c054-2594-4b77-8d21-494b02de0b81",
|
|
"indicator--5a27c054-4f14-494f-95de-44e802de0b81",
|
|
"observed-data--5a27c054-1928-4147-99a8-40e102de0b81",
|
|
"url--5a27c054-1928-4147-99a8-40e102de0b81",
|
|
"indicator--5a27c054-8dfc-40d4-9787-4bbc02de0b81",
|
|
"indicator--5a27c054-6144-49b2-9c3c-499902de0b81",
|
|
"observed-data--5a27c054-4558-4dc5-ac31-494f02de0b81",
|
|
"url--5a27c054-4558-4dc5-ac31-494f02de0b81"
|
|
],
|
|
"labels": [
|
|
"Threat-Report",
|
|
"misp:tool=\"MISP-STIX-Converter\"",
|
|
"type:OSINT",
|
|
"malware_classification:malware-category=\"Ransomware\"",
|
|
"osint:source-type=\"blog-post\""
|
|
],
|
|
"object_marking_refs": [
|
|
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
|
|
]
|
|
},
|
|
{
|
|
"type": "observed-data",
|
|
"spec_version": "2.1",
|
|
"id": "observed-data--5a265ab9-fd00-469a-a5fa-4019950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-12-06T10:02:59.000Z",
|
|
"modified": "2017-12-06T10:02:59.000Z",
|
|
"first_observed": "2017-12-06T10:02:59Z",
|
|
"last_observed": "2017-12-06T10:02:59Z",
|
|
"number_observed": 1,
|
|
"object_refs": [
|
|
"url--5a265ab9-fd00-469a-a5fa-4019950d210f"
|
|
],
|
|
"labels": [
|
|
"misp:type=\"link\"",
|
|
"misp:category=\"External analysis\"",
|
|
"osint:source-type=\"blog-post\""
|
|
]
|
|
},
|
|
{
|
|
"type": "url",
|
|
"spec_version": "2.1",
|
|
"id": "url--5a265ab9-fd00-469a-a5fa-4019950d210f",
|
|
"value": "https://www.bleepingcomputer.com/news/security/halloware-ransomware-on-sale-on-the-dark-web-for-only-40/"
|
|
},
|
|
{
|
|
"type": "x-misp-attribute",
|
|
"spec_version": "2.1",
|
|
"id": "x-misp-attribute--5a265d95-5644-43e2-ac0f-4744950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-12-06T10:03:00.000Z",
|
|
"modified": "2017-12-06T10:03:00.000Z",
|
|
"labels": [
|
|
"misp:type=\"comment\"",
|
|
"misp:category=\"External analysis\"",
|
|
"osint:source-type=\"blog-post\""
|
|
],
|
|
"x_misp_category": "External analysis",
|
|
"x_misp_type": "comment",
|
|
"x_misp_value": "A malware author by the name of Luc1F3R is peddling a new ransomware strain called Halloware for the lowly price of $40. Based on evidence gathered by Bleeping Computer, Luc1F3R started selling his ransomware this week, beginning Thursday.\r\n\r\nCurrently, the malware dev is selling and/or advertising his ransomware on a dedicated Dark Web portal, on Dark Web forums, two sites hosted on the public Internet, and via videos hosted on YouTube."
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--5a265dba-e3e0-45fb-8c3a-42b7950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-12-06T10:03:00.000Z",
|
|
"modified": "2017-12-06T10:03:00.000Z",
|
|
"pattern": "[file:hashes.SHA256 = '007c1f11afb195d77c176891d54b9cfd37c87b13dfe0ab5b6c368125e4459b8c']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-12-06T10:03:00Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"sha256\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--5a265dba-0bc0-4d83-b3c8-4f6a950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-12-06T10:03:00.000Z",
|
|
"modified": "2017-12-06T10:03:00.000Z",
|
|
"pattern": "[file:hashes.SHA256 = 'd5b58bdda4ece79fbc264fff7f32df584d7b0051a5493119d336252f4668c73c']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-12-06T10:03:00Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"sha256\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--5a265dba-a5a8-4c74-8d40-4951950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-12-06T10:03:00.000Z",
|
|
"modified": "2017-12-06T10:03:00.000Z",
|
|
"pattern": "[file:hashes.SHA256 = 'c6d2e486109dc37f451dccce716e99e8a2653475d5605531d52756fc4fc88f09']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-12-06T10:03:00Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"sha256\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--5a27c054-fd60-48db-a4b6-476a02de0b81",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-12-06T10:03:00.000Z",
|
|
"modified": "2017-12-06T10:03:00.000Z",
|
|
"description": "- Xchecked via VT: c6d2e486109dc37f451dccce716e99e8a2653475d5605531d52756fc4fc88f09",
|
|
"pattern": "[file:hashes.SHA1 = 'd94437d6aa2b74d56626e1cb31230949e21c4f48']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-12-06T10:03:00Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"sha1\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--5a27c054-dee8-42e8-ba80-495202de0b81",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-12-06T10:03:00.000Z",
|
|
"modified": "2017-12-06T10:03:00.000Z",
|
|
"description": "- Xchecked via VT: c6d2e486109dc37f451dccce716e99e8a2653475d5605531d52756fc4fc88f09",
|
|
"pattern": "[file:hashes.MD5 = '220cd79a8eddbfb19121e0b67165ab1c']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-12-06T10:03:00Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"md5\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "observed-data",
|
|
"spec_version": "2.1",
|
|
"id": "observed-data--5a27c054-28b4-434a-8d0f-433b02de0b81",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-12-06T10:03:00.000Z",
|
|
"modified": "2017-12-06T10:03:00.000Z",
|
|
"first_observed": "2017-12-06T10:03:00Z",
|
|
"last_observed": "2017-12-06T10:03:00Z",
|
|
"number_observed": 1,
|
|
"object_refs": [
|
|
"url--5a27c054-28b4-434a-8d0f-433b02de0b81"
|
|
],
|
|
"labels": [
|
|
"misp:type=\"link\"",
|
|
"misp:category=\"External analysis\""
|
|
]
|
|
},
|
|
{
|
|
"type": "url",
|
|
"spec_version": "2.1",
|
|
"id": "url--5a27c054-28b4-434a-8d0f-433b02de0b81",
|
|
"value": "https://www.virustotal.com/file/c6d2e486109dc37f451dccce716e99e8a2653475d5605531d52756fc4fc88f09/analysis/1512455978/"
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--5a27c054-2594-4b77-8d21-494b02de0b81",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-12-06T10:03:00.000Z",
|
|
"modified": "2017-12-06T10:03:00.000Z",
|
|
"description": "- Xchecked via VT: d5b58bdda4ece79fbc264fff7f32df584d7b0051a5493119d336252f4668c73c",
|
|
"pattern": "[file:hashes.SHA1 = '56db07c9905d9bd2cc5fbc0f7091982b7e0aadc2']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-12-06T10:03:00Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"sha1\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--5a27c054-4f14-494f-95de-44e802de0b81",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-12-06T10:03:00.000Z",
|
|
"modified": "2017-12-06T10:03:00.000Z",
|
|
"description": "- Xchecked via VT: d5b58bdda4ece79fbc264fff7f32df584d7b0051a5493119d336252f4668c73c",
|
|
"pattern": "[file:hashes.MD5 = 'b01230be6e42bf7210ce244ca493a697']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-12-06T10:03:00Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"md5\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "observed-data",
|
|
"spec_version": "2.1",
|
|
"id": "observed-data--5a27c054-1928-4147-99a8-40e102de0b81",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-12-06T10:03:00.000Z",
|
|
"modified": "2017-12-06T10:03:00.000Z",
|
|
"first_observed": "2017-12-06T10:03:00Z",
|
|
"last_observed": "2017-12-06T10:03:00Z",
|
|
"number_observed": 1,
|
|
"object_refs": [
|
|
"url--5a27c054-1928-4147-99a8-40e102de0b81"
|
|
],
|
|
"labels": [
|
|
"misp:type=\"link\"",
|
|
"misp:category=\"External analysis\""
|
|
]
|
|
},
|
|
{
|
|
"type": "url",
|
|
"spec_version": "2.1",
|
|
"id": "url--5a27c054-1928-4147-99a8-40e102de0b81",
|
|
"value": "https://www.virustotal.com/file/d5b58bdda4ece79fbc264fff7f32df584d7b0051a5493119d336252f4668c73c/analysis/1512445343/"
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--5a27c054-8dfc-40d4-9787-4bbc02de0b81",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-12-06T10:03:00.000Z",
|
|
"modified": "2017-12-06T10:03:00.000Z",
|
|
"description": "- Xchecked via VT: 007c1f11afb195d77c176891d54b9cfd37c87b13dfe0ab5b6c368125e4459b8c",
|
|
"pattern": "[file:hashes.SHA1 = 'e3902bc1f576ad063db6da455a820a840c1556a4']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-12-06T10:03:00Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"sha1\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--5a27c054-6144-49b2-9c3c-499902de0b81",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-12-06T10:03:00.000Z",
|
|
"modified": "2017-12-06T10:03:00.000Z",
|
|
"description": "- Xchecked via VT: 007c1f11afb195d77c176891d54b9cfd37c87b13dfe0ab5b6c368125e4459b8c",
|
|
"pattern": "[file:hashes.MD5 = '7c10cf39ee3169bb3e46aac14c888228']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2017-12-06T10:03:00Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"md5\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "observed-data",
|
|
"spec_version": "2.1",
|
|
"id": "observed-data--5a27c054-4558-4dc5-ac31-494f02de0b81",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2017-12-06T10:03:00.000Z",
|
|
"modified": "2017-12-06T10:03:00.000Z",
|
|
"first_observed": "2017-12-06T10:03:00Z",
|
|
"last_observed": "2017-12-06T10:03:00Z",
|
|
"number_observed": 1,
|
|
"object_refs": [
|
|
"url--5a27c054-4558-4dc5-ac31-494f02de0b81"
|
|
],
|
|
"labels": [
|
|
"misp:type=\"link\"",
|
|
"misp:category=\"External analysis\""
|
|
]
|
|
},
|
|
{
|
|
"type": "url",
|
|
"spec_version": "2.1",
|
|
"id": "url--5a27c054-4558-4dc5-ac31-494f02de0b81",
|
|
"value": "https://www.virustotal.com/file/007c1f11afb195d77c176891d54b9cfd37c87b13dfe0ab5b6c368125e4459b8c/analysis/1512445313/"
|
|
},
|
|
{
|
|
"type": "marking-definition",
|
|
"spec_version": "2.1",
|
|
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
|
|
"created": "2017-01-20T00:00:00.000Z",
|
|
"definition_type": "tlp",
|
|
"name": "TLP:WHITE",
|
|
"definition": {
|
|
"tlp": "white"
|
|
}
|
|
}
|
|
]
|
|
} |