296 lines
No EOL
16 KiB
JSON
296 lines
No EOL
16 KiB
JSON
{
|
|
"type": "bundle",
|
|
"id": "bundle--8cc5335e-915b-4e16-837d-49143e6987b4",
|
|
"objects": [
|
|
{
|
|
"type": "identity",
|
|
"spec_version": "2.1",
|
|
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2022-01-16T15:59:12.000Z",
|
|
"modified": "2022-01-16T15:59:12.000Z",
|
|
"name": "CIRCL",
|
|
"identity_class": "organization"
|
|
},
|
|
{
|
|
"type": "report",
|
|
"spec_version": "2.1",
|
|
"id": "report--8cc5335e-915b-4e16-837d-49143e6987b4",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2022-01-16T15:59:12.000Z",
|
|
"modified": "2022-01-16T15:59:12.000Z",
|
|
"name": "MSFT - MSTIC - Destructive malware targeting Ukrainian organizations",
|
|
"published": "2022-01-16T16:21:26Z",
|
|
"object_refs": [
|
|
"x-misp-attribute--78878812-d712-4bdb-b383-dee68c322b3d",
|
|
"x-misp-object--6a975fb9-d969-43e4-bd82-0fb95834cdb8",
|
|
"x-misp-object--a30c962e-674e-482e-9f93-dd99a6f44cf6",
|
|
"x-misp-object--8f2d984e-5949-4a3f-8a71-2aeef9902aa1",
|
|
"indicator--7a41ba78-2acf-4af3-9beb-46bef578cc82",
|
|
"indicator--3d8cc8f9-5f4c-4236-b56a-7ebfd02129aa",
|
|
"x-misp-object--043ad7de-27a2-4292-8aa2-5c05739275bb",
|
|
"x-misp-object--11817599-476e-4b7b-9cd2-e2bc933ea892"
|
|
],
|
|
"labels": [
|
|
"Threat-Report",
|
|
"misp:tool=\"MISP-STIX-Converter\"",
|
|
"type:OSINT",
|
|
"osint:lifetime=\"perpetual\"",
|
|
"osint:certainty=\"50\"",
|
|
"misp-galaxy:mitre-attack-pattern=\"Data Destruction - T1485\"",
|
|
"misp-galaxy:target-information=\"Ukraine\"",
|
|
"collaborative-intelligence:request=\"related-samples\"",
|
|
"collaborative-intelligence:request=\"sample\""
|
|
],
|
|
"object_marking_refs": [
|
|
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
|
|
]
|
|
},
|
|
{
|
|
"type": "x-misp-attribute",
|
|
"spec_version": "2.1",
|
|
"id": "x-misp-attribute--78878812-d712-4bdb-b383-dee68c322b3d",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2022-01-16T15:24:32.000Z",
|
|
"modified": "2022-01-16T15:24:32.000Z",
|
|
"labels": [
|
|
"misp:type=\"text\"",
|
|
"misp:category=\"Other\""
|
|
],
|
|
"x_misp_category": "Other",
|
|
"x_misp_comment": "1AVNM68gj6PGPFcJuftKATa4WLnzg8fpfv: Enriched via the btc_steroids module",
|
|
"x_misp_type": "text",
|
|
"x_misp_value": "Address:\t1AVNM68gj6PGPFcJuftKATa4WLnzg8fpfvBalance:\t0.0001185800 BTC (+0.0001185800 BTC / -0.0000000000 BTC)Transactions:\t1\t (previewing up to 5 most recent)======================================================================================#1\t14 Jan 2022 14:01:25 UTC\t 0.00011858 BTC 5.11 USD\t 4.48 EUR"
|
|
},
|
|
{
|
|
"type": "x-misp-object",
|
|
"spec_version": "2.1",
|
|
"id": "x-misp-object--6a975fb9-d969-43e4-bd82-0fb95834cdb8",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2022-01-16T15:21:45.000Z",
|
|
"modified": "2022-01-16T15:21:45.000Z",
|
|
"labels": [
|
|
"misp:name=\"report\"",
|
|
"misp:meta-category=\"misc\""
|
|
],
|
|
"x_misp_attributes": [
|
|
{
|
|
"type": "link",
|
|
"object_relation": "link",
|
|
"value": "https://www.microsoft.com/security/blog/2022/01/15/destructive-malware-targeting-ukrainian-organizations/",
|
|
"category": "External analysis",
|
|
"uuid": "c8da9b75-1b0d-4b69-a0ab-66bd656114e1"
|
|
},
|
|
{
|
|
"type": "text",
|
|
"object_relation": "summary",
|
|
"value": "Microsoft Threat Intelligence Center (MSTIC) has identified evidence of a destructive malware operation targeting multiple organizations in Ukraine. This malware first appeared on victim systems in Ukraine on January 13, 2022. Microsoft is aware of the ongoing geopolitical events in Ukraine and surrounding region and encourages organizations to use the information in this post to proactively protect from any malicious activity.\r\n\r\nWhile our investigation is continuing, MSTIC has not found any notable associations between this observed activity, tracked as DEV-0586, and other known activity groups. MSTIC assesses that the malware, which is designed to look like ransomware but lacking a ransom recovery mechanism, is intended to be destructive and designed to render targeted devices inoperable rather than to obtain a ransom.\r\n\r\nAt present and based on Microsoft visibility, our investigation teams have identified the malware on dozens of impacted systems and that number could grow as our investigation continues. These systems span multiple government, non-profit, and information technology organizations, all based in Ukraine. We do not know the current stage of this attacker\u2019s operational cycle or how many other victim organizations may exist in Ukraine or other geographic locations. However, it is unlikely these impacted systems represent the full scope of impact as other organizations are reporting.\r\n\r\nGiven the scale of the observed intrusions, MSTIC is not able to assess intent of the identified destructive actions but does believe these actions represent an elevated risk to any government agency, non-profit or enterprise located or with systems in Ukraine. We strongly encourage all organizations to immediately conduct a thorough investigation and to implement defenses using the information provided in this post. MSTIC will update this blog as we have additional information to share.\r\n\r\nAs with any observed nation-state actor activity, Microsoft directly and proactively notifies customers that have been targeted or compromised, providing them with the information they need to guide their investigations. MSTIC is also actively working with members of the global security community and other strategic partners to share information that can address this evolving threat through multiple channels. Microsoft uses DEV-#### designations as a temporary name given to an unknown, emerging, or a developing cluster of threat activity, allowing MSTIC to track it as a unique set of information until we reach a high confidence about the origin or identity of the actor behind the activity. Once it meets the criteria, a DEV is converted to a named actor or merged with existing actors.",
|
|
"category": "Other",
|
|
"uuid": "430ccaab-1f97-4d8a-b198-00410e9c6737"
|
|
},
|
|
{
|
|
"type": "text",
|
|
"object_relation": "type",
|
|
"value": "Blog post",
|
|
"category": "Other",
|
|
"uuid": "81a1cb8c-f4cf-4ab3-80ed-5bb85aa194d9"
|
|
},
|
|
{
|
|
"type": "text",
|
|
"object_relation": "case-number",
|
|
"value": "DEV-0586",
|
|
"category": "Other",
|
|
"uuid": "40f28a5c-bcc2-4351-9813-6b51a827a494"
|
|
}
|
|
],
|
|
"x_misp_meta_category": "misc",
|
|
"x_misp_name": "report"
|
|
},
|
|
{
|
|
"type": "x-misp-object",
|
|
"spec_version": "2.1",
|
|
"id": "x-misp-object--a30c962e-674e-482e-9f93-dd99a6f44cf6",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2022-01-16T15:23:55.000Z",
|
|
"modified": "2022-01-16T15:23:55.000Z",
|
|
"labels": [
|
|
"misp:name=\"coin-address\"",
|
|
"misp:meta-category=\"financial\""
|
|
],
|
|
"x_misp_attributes": [
|
|
{
|
|
"type": "btc",
|
|
"object_relation": "address",
|
|
"value": "1AVNM68gj6PGPFcJuftKATa4WLnzg8fpfv",
|
|
"category": "Financial fraud",
|
|
"to_ids": true,
|
|
"uuid": "b4de6e74-7a43-4efa-9365-b9f6c35ec177"
|
|
},
|
|
{
|
|
"type": "text",
|
|
"object_relation": "symbol",
|
|
"value": "BTC",
|
|
"category": "Other",
|
|
"uuid": "fe71e9c8-03d7-45df-a9e8-011cf339ac74"
|
|
},
|
|
{
|
|
"type": "text",
|
|
"object_relation": "text",
|
|
"value": "The two-stage malware overwrites the Master Boot Record (MBR) on victim systems with a ransom note (Stage 1). The MBR is the part of a hard drive that tells the computer how to load its operating system. The ransom note contains a Bitcoin wallet and Tox ID (a unique account identifier used in the Tox encrypted messaging protocol) that have not been previously observed by MSTIC:\r\n\r\nYour hard drive has been corrupted.\r\nIn case you want to recover all hard drives\r\nof your organization,\r\nYou should pay us $10k via bitcoin wallet\r\n1AVNM68gj6PGPFcJuftKATa4WLnzg8fpfv and send message via\r\ntox ID 8BEDC411012A33BA34F49130D0F186993C6A32DAD8976F6A5D82C1ED23054C057ECED5496F65\r\nwith your organization name.\r\nWe will contact you to give further instructions.",
|
|
"category": "Other",
|
|
"uuid": "ebf79d73-a7cc-4065-92ce-61cf8b1991f5"
|
|
}
|
|
],
|
|
"x_misp_meta_category": "financial",
|
|
"x_misp_name": "coin-address"
|
|
},
|
|
{
|
|
"type": "x-misp-object",
|
|
"spec_version": "2.1",
|
|
"id": "x-misp-object--8f2d984e-5949-4a3f-8a71-2aeef9902aa1",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2022-01-16T15:25:20.000Z",
|
|
"modified": "2022-01-16T15:25:20.000Z",
|
|
"labels": [
|
|
"misp:name=\"command-line\"",
|
|
"misp:meta-category=\"misc\""
|
|
],
|
|
"x_misp_attributes": [
|
|
{
|
|
"type": "text",
|
|
"object_relation": "value",
|
|
"value": "cmd.exe /Q /c start c:\\stage1.exe 1> \\\\127.0.0.1\\ADMIN$\\__[TIMESTAMP] 2>&1",
|
|
"category": "Other",
|
|
"uuid": "c01659cb-5767-425d-b00a-779993d6f830"
|
|
},
|
|
{
|
|
"type": "text",
|
|
"object_relation": "description",
|
|
"value": "Example Impacket command line showing the execution of the destructive malware. The working directory has varied in observed intrusions.",
|
|
"category": "Other",
|
|
"uuid": "ffbdbc52-6baf-40b4-8ac4-e98c0900d435"
|
|
}
|
|
],
|
|
"x_misp_meta_category": "misc",
|
|
"x_misp_name": "command-line"
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--7a41ba78-2acf-4af3-9beb-46bef578cc82",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2022-01-16T15:27:28.000Z",
|
|
"modified": "2022-01-16T15:27:28.000Z",
|
|
"description": "Hash of destructive malware stage1.exe",
|
|
"pattern": "[file:hashes.SHA256 = 'a196c6b8ffcb97ffb276d04f354696e2391311db3841ae16c8c9f56f36a38e92' AND file:name = 'stage1.exe' AND file:x_misp_state = 'Malicious']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2022-01-16T15:27:28Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "file"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:name=\"file\"",
|
|
"misp:meta-category=\"file\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--3d8cc8f9-5f4c-4236-b56a-7ebfd02129aa",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2022-01-16T15:27:12.000Z",
|
|
"modified": "2022-01-16T15:27:12.000Z",
|
|
"description": "Hash of stage2.exe",
|
|
"pattern": "[file:hashes.SHA256 = 'dcbbae5a1c61dbbbb7dcd6dc5dd1eb1169f5329958d38b58c3fd9384081c9b78' AND file:name = 'stage2.exe' AND file:x_misp_state = 'Malicious']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2022-01-16T15:27:12Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "file"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:name=\"file\"",
|
|
"misp:meta-category=\"file\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "x-misp-object",
|
|
"spec_version": "2.1",
|
|
"id": "x-misp-object--043ad7de-27a2-4292-8aa2-5c05739275bb",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2022-01-16T15:31:19.000Z",
|
|
"modified": "2022-01-16T15:31:19.000Z",
|
|
"labels": [
|
|
"misp:name=\"av-signature\"",
|
|
"misp:meta-category=\"misc\""
|
|
],
|
|
"x_misp_attributes": [
|
|
{
|
|
"type": "text",
|
|
"object_relation": "signature",
|
|
"value": "WhisperGate",
|
|
"category": "Antivirus detection",
|
|
"uuid": "499fd717-835c-4273-afc4-993042722618"
|
|
},
|
|
{
|
|
"type": "text",
|
|
"object_relation": "software",
|
|
"value": "Microsoft 365 Defender",
|
|
"category": "Antivirus detection",
|
|
"uuid": "df08f949-327d-4da3-9da8-3e56626c42fa"
|
|
}
|
|
],
|
|
"x_misp_meta_category": "misc",
|
|
"x_misp_name": "av-signature"
|
|
},
|
|
{
|
|
"type": "x-misp-object",
|
|
"spec_version": "2.1",
|
|
"id": "x-misp-object--11817599-476e-4b7b-9cd2-e2bc933ea892",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2022-01-16T15:59:12.000Z",
|
|
"modified": "2022-01-16T15:59:12.000Z",
|
|
"labels": [
|
|
"misp:name=\"instant-message\"",
|
|
"misp:meta-category=\"misc\""
|
|
],
|
|
"x_misp_attributes": [
|
|
{
|
|
"type": "text",
|
|
"object_relation": "from-user",
|
|
"value": "8BEDC411012A33BA34F49130D0F186993C6A32DAD8976F6A5D82C1ED23054C057ECED5496F65",
|
|
"category": "Other",
|
|
"uuid": "d3e52216-4a08-4bd0-8b1d-c2d7e22e42d6"
|
|
},
|
|
{
|
|
"type": "text",
|
|
"object_relation": "app-used",
|
|
"value": "Tox",
|
|
"category": "Other",
|
|
"uuid": "7b06931c-8d88-40cb-9165-1f324f0561f8"
|
|
}
|
|
],
|
|
"x_misp_meta_category": "misc",
|
|
"x_misp_name": "instant-message"
|
|
},
|
|
{
|
|
"type": "marking-definition",
|
|
"spec_version": "2.1",
|
|
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
|
|
"created": "2017-01-20T00:00:00.000Z",
|
|
"definition_type": "tlp",
|
|
"name": "TLP:WHITE",
|
|
"definition": {
|
|
"tlp": "white"
|
|
}
|
|
}
|
|
]
|
|
} |