misp-circl-feed/feeds/circl/misp/59a3c0d9-6e00-4f61-b768-47d6950d210f.json

196 lines
No EOL
6.9 KiB
JSON

{
"Event": {
"analysis": "2",
"date": "2017-07-20",
"extends_uuid": "",
"info": "OSINT - The ZAYKA and NOOB CryptoMix Ransomware Variants Released in Quick Succession",
"publish_timestamp": "1503930201",
"published": true,
"threat_level_id": "3",
"timestamp": "1503930194",
"uuid": "59a3c0d9-6e00-4f61-b768-47d6950d210f",
"Orgc": {
"name": "CIRCL",
"uuid": "55f6ea5e-2c60-40e5-964f-47a8950d210f"
},
"Tag": [
{
"colour": "#0088cc",
"name": "misp-galaxy:ransomware=\"CryptoMix\""
},
{
"colour": "#004646",
"name": "type:OSINT"
},
{
"colour": "#ffffff",
"name": "tlp:white"
},
{
"colour": "#2c4f00",
"name": "malware_classification:malware-category=\"Ransomware\""
},
{
"colour": "#00223b",
"name": "osint:source-type=\"blog-post\""
}
],
"Attribute": [
{
"category": "External analysis",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1503930187",
"to_ids": false,
"type": "link",
"uuid": "59a3c0eb-d44c-4133-bf6c-4233950d210f",
"value": "https://www.bleepingcomputer.com/news/security/the-zayka-and-noob-cryptomix-ransomware-variants-released-in-quick-succession/",
"Tag": [
{
"colour": "#00223b",
"name": "osint:source-type=\"blog-post\""
}
]
},
{
"category": "External analysis",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1503930187",
"to_ids": false,
"type": "comment",
"uuid": "59a3c0fa-676c-4413-acb9-495a950d210f",
"value": "CryptoMix is releasing new variants very quickly now and is reminiscent of how the Locky developers used to distribute Locky. Yesterday, ID-Ransomware's Michael Gillespie & Malwarebytes malware researcher Marcelo Rivero discovered two new variants of the CryptoMix ransomware being distributed within a week or two of each other. These variants append either the NOOB or ZAYKA extension to encrypted files, but use the same contact email of admin@zayka.pro for payment instructions.",
"Tag": [
{
"colour": "#00223b",
"name": "osint:source-type=\"blog-post\""
}
]
},
{
"category": "Payload delivery",
"comment": "NOOB version",
"deleted": false,
"disable_correlation": false,
"timestamp": "1503930187",
"to_ids": true,
"type": "sha256",
"uuid": "59a3c152-41b0-4924-b651-493a950d210f",
"value": "ceaee070d84bb182593787002442520acbbac7a0e5ec6cecde40370d5d744023"
},
{
"category": "Payload delivery",
"comment": "ZAYKA version",
"deleted": false,
"disable_correlation": false,
"timestamp": "1503930187",
"to_ids": true,
"type": "sha256",
"uuid": "59a3c152-bd44-48cb-964f-4beb950d210f",
"value": "aaf7bdb7445d7d58e597240630b23bd7f3f2c6551de61029e932eaa09e27a685"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1503930187",
"to_ids": true,
"type": "filename",
"uuid": "59a3c160-4c58-46a3-b48a-47a5950d210f",
"value": "_HELP_INSTRUCTION.TXT"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1503930187",
"to_ids": true,
"type": "filename",
"uuid": "59a3c160-1068-438a-903f-4069950d210f",
"value": "%AppData%\\[random].exe"
},
{
"category": "Payload delivery",
"comment": "contact mail in the ransom note",
"deleted": false,
"disable_correlation": false,
"timestamp": "1503930187",
"to_ids": true,
"type": "email-src",
"uuid": "59a3c1ff-e884-4e50-9e49-44cb950d210f",
"value": "admin@zayka.pro"
},
{
"category": "Payload delivery",
"comment": "ZAYKA version - Xchecked via VT: aaf7bdb7445d7d58e597240630b23bd7f3f2c6551de61029e932eaa09e27a685",
"deleted": false,
"disable_correlation": false,
"timestamp": "1503930188",
"to_ids": true,
"type": "sha1",
"uuid": "59a4274c-b8f4-464b-b95b-459402de0b81",
"value": "53371fd7a36fcf23d615143ba82045a417850c08"
},
{
"category": "Payload delivery",
"comment": "ZAYKA version - Xchecked via VT: aaf7bdb7445d7d58e597240630b23bd7f3f2c6551de61029e932eaa09e27a685",
"deleted": false,
"disable_correlation": false,
"timestamp": "1503930188",
"to_ids": true,
"type": "md5",
"uuid": "59a4274c-f1e8-46ed-afa7-47f202de0b81",
"value": "c34e3bcddab6b671cccb1c5e9ba3a881"
},
{
"category": "External analysis",
"comment": "ZAYKA version - Xchecked via VT: aaf7bdb7445d7d58e597240630b23bd7f3f2c6551de61029e932eaa09e27a685",
"deleted": false,
"disable_correlation": false,
"timestamp": "1503930188",
"to_ids": false,
"type": "link",
"uuid": "59a4274c-a26c-4940-8ab2-4eb102de0b81",
"value": "https://www.virustotal.com/file/aaf7bdb7445d7d58e597240630b23bd7f3f2c6551de61029e932eaa09e27a685/analysis/1500647663/"
},
{
"category": "Payload delivery",
"comment": "NOOB version - Xchecked via VT: ceaee070d84bb182593787002442520acbbac7a0e5ec6cecde40370d5d744023",
"deleted": false,
"disable_correlation": false,
"timestamp": "1503930188",
"to_ids": true,
"type": "sha1",
"uuid": "59a4274c-9fbc-4261-86dc-44c502de0b81",
"value": "f71297632052974c83b95412dcb07090089b890d"
},
{
"category": "Payload delivery",
"comment": "NOOB version - Xchecked via VT: ceaee070d84bb182593787002442520acbbac7a0e5ec6cecde40370d5d744023",
"deleted": false,
"disable_correlation": false,
"timestamp": "1503930188",
"to_ids": true,
"type": "md5",
"uuid": "59a4274c-bb90-4eb0-8899-420a02de0b81",
"value": "a862f5ee210a43fddcb33ad2f01af73f"
},
{
"category": "External analysis",
"comment": "NOOB version - Xchecked via VT: ceaee070d84bb182593787002442520acbbac7a0e5ec6cecde40370d5d744023",
"deleted": false,
"disable_correlation": false,
"timestamp": "1503930188",
"to_ids": false,
"type": "link",
"uuid": "59a4274c-fbdc-40d5-ba87-44ae02de0b81",
"value": "https://www.virustotal.com/file/ceaee070d84bb182593787002442520acbbac7a0e5ec6cecde40370d5d744023/analysis/1503697510/"
}
]
}
}