197 lines
No EOL
7.8 KiB
JSON
197 lines
No EOL
7.8 KiB
JSON
{
|
|
"Event": {
|
|
"analysis": "2",
|
|
"date": "2017-08-03",
|
|
"extends_uuid": "",
|
|
"info": "OSINT - A Look at JS_POWMET, a Completely Fileless Malware",
|
|
"publish_timestamp": "1501744556",
|
|
"published": true,
|
|
"threat_level_id": "3",
|
|
"timestamp": "1501744539",
|
|
"uuid": "5982cc0a-db3c-40f9-9873-e54e02de0b81",
|
|
"Orgc": {
|
|
"name": "CIRCL",
|
|
"uuid": "55f6ea5e-2c60-40e5-964f-47a8950d210f"
|
|
},
|
|
"Tag": [
|
|
{
|
|
"colour": "#ffffff",
|
|
"local": "0",
|
|
"name": "tlp:white",
|
|
"relationship_type": ""
|
|
}
|
|
],
|
|
"Attribute": [
|
|
{
|
|
"category": "External analysis",
|
|
"comment": "",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1501744539",
|
|
"to_ids": false,
|
|
"type": "text",
|
|
"uuid": "5982cc1c-0170-4580-bbf0-e4a202de0b81",
|
|
"value": "As cybercriminals start to focus on pulling off attacks without leaving a trace, fileless malware, such as the recent SOREBRECT ransomware, will become a more common attack method. However, many of these malware are fileless only while entering a user\u00e2\u20ac\u2122s system, as they eventually reveal themselves when they execute their payload. Attacks that use completely fileless malware are a rare occurrence, so we thought it important to discuss a new trojan known as JS_POWMET (Detected by Trend Micro as JS_POWMET.DE), which arrives via an autostart registry procedure. By utilizing a completely fileless infection chain, the malware will be more difficult to analyze using a sandbox, making it more difficult for anti-malware engineers to examine.\r\n\r\nInitial reports from our Smart Protection Network (SPN) data reveals JS_POWMET affecting APAC the most, with almost 90% of the infections coming from the region.",
|
|
"Tag": [
|
|
{
|
|
"colour": "#00223b",
|
|
"local": "0",
|
|
"name": "osint:source-type=\"blog-post\"",
|
|
"relationship_type": ""
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"category": "External analysis",
|
|
"comment": "",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1501744539",
|
|
"to_ids": false,
|
|
"type": "link",
|
|
"uuid": "5982cc29-8840-4c94-84a8-e78402de0b81",
|
|
"value": "http://blog.trendmicro.com/trendlabs-security-intelligence/look-js_powmet-completely-fileless-malware/",
|
|
"Tag": [
|
|
{
|
|
"colour": "#00223b",
|
|
"local": "0",
|
|
"name": "osint:source-type=\"blog-post\"",
|
|
"relationship_type": ""
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "TROJ_PSINJECT.A",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1501744539",
|
|
"to_ids": true,
|
|
"type": "sha256",
|
|
"uuid": "5982cc88-5c08-41f0-8089-c46702de0b81",
|
|
"value": "7004b6c1829a745002feb7fbb0aad1a4d32c640a6c257dc8d0c39ce7b63b58cc"
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "JS_POWMET.DE",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1501744539",
|
|
"to_ids": true,
|
|
"type": "sha256",
|
|
"uuid": "5982cc88-602c-40a7-aa70-c46702de0b81",
|
|
"value": "e27f417b96a33d8449f6cf00b8306160e2f1b845ca2c9666081166620651a3ae"
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "BKDR_ANDROM.ETIN",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1501744539",
|
|
"to_ids": true,
|
|
"type": "sha256",
|
|
"uuid": "5982cc88-d6a0-4a83-aa9a-c46702de0b81",
|
|
"value": "bff21cbf95da5f3149c67f2c0f2576a6de44fa9d0cb093259c9a5db919599940"
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "BKDR_ANDROM.ETIN - Xchecked via VT: bff21cbf95da5f3149c67f2c0f2576a6de44fa9d0cb093259c9a5db919599940",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1501744539",
|
|
"to_ids": true,
|
|
"type": "sha1",
|
|
"uuid": "5982cd9b-d078-4bf7-9650-c41602de0b81",
|
|
"value": "5ef5fbb4fe16133f05f77b9ec33e2f484cfa70db"
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "BKDR_ANDROM.ETIN - Xchecked via VT: bff21cbf95da5f3149c67f2c0f2576a6de44fa9d0cb093259c9a5db919599940",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1501744539",
|
|
"to_ids": true,
|
|
"type": "md5",
|
|
"uuid": "5982cd9b-bd40-4a53-85db-c41602de0b81",
|
|
"value": "ad7cd3237ed058b7bda6e72af9d61e0e"
|
|
},
|
|
{
|
|
"category": "External analysis",
|
|
"comment": "BKDR_ANDROM.ETIN - Xchecked via VT: bff21cbf95da5f3149c67f2c0f2576a6de44fa9d0cb093259c9a5db919599940",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1501744539",
|
|
"to_ids": false,
|
|
"type": "link",
|
|
"uuid": "5982cd9b-62d4-42c9-bddb-c41602de0b81",
|
|
"value": "https://www.virustotal.com/file/bff21cbf95da5f3149c67f2c0f2576a6de44fa9d0cb093259c9a5db919599940/analysis/1501703489/"
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "JS_POWMET.DE - Xchecked via VT: e27f417b96a33d8449f6cf00b8306160e2f1b845ca2c9666081166620651a3ae",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1501744539",
|
|
"to_ids": true,
|
|
"type": "sha1",
|
|
"uuid": "5982cd9b-2930-469a-999b-c41602de0b81",
|
|
"value": "ff3d0b399eec8675c5df8360aeb29daab0e5062b"
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "JS_POWMET.DE - Xchecked via VT: e27f417b96a33d8449f6cf00b8306160e2f1b845ca2c9666081166620651a3ae",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1501744539",
|
|
"to_ids": true,
|
|
"type": "md5",
|
|
"uuid": "5982cd9b-75d0-4c48-9ebe-c41602de0b81",
|
|
"value": "bf265e2d56750f7c8a358687eed6a3a9"
|
|
},
|
|
{
|
|
"category": "External analysis",
|
|
"comment": "JS_POWMET.DE - Xchecked via VT: e27f417b96a33d8449f6cf00b8306160e2f1b845ca2c9666081166620651a3ae",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1501744539",
|
|
"to_ids": false,
|
|
"type": "link",
|
|
"uuid": "5982cd9b-d49c-416e-991b-c41602de0b81",
|
|
"value": "https://www.virustotal.com/file/e27f417b96a33d8449f6cf00b8306160e2f1b845ca2c9666081166620651a3ae/analysis/1501700791/"
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "TROJ_PSINJECT.A - Xchecked via VT: 7004b6c1829a745002feb7fbb0aad1a4d32c640a6c257dc8d0c39ce7b63b58cc",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1501744539",
|
|
"to_ids": true,
|
|
"type": "sha1",
|
|
"uuid": "5982cd9b-eecc-40bf-a192-c41602de0b81",
|
|
"value": "a5d3538940ca4b2418f491806f81ba66da343fa6"
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "TROJ_PSINJECT.A - Xchecked via VT: 7004b6c1829a745002feb7fbb0aad1a4d32c640a6c257dc8d0c39ce7b63b58cc",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1501744539",
|
|
"to_ids": true,
|
|
"type": "md5",
|
|
"uuid": "5982cd9b-b1e0-4707-9a7c-c41602de0b81",
|
|
"value": "8a68142686238428480b7342c95e20c7"
|
|
},
|
|
{
|
|
"category": "External analysis",
|
|
"comment": "TROJ_PSINJECT.A - Xchecked via VT: 7004b6c1829a745002feb7fbb0aad1a4d32c640a6c257dc8d0c39ce7b63b58cc",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1501744539",
|
|
"to_ids": false,
|
|
"type": "link",
|
|
"uuid": "5982cd9b-9114-48f7-90c8-c41602de0b81",
|
|
"value": "https://www.virustotal.com/file/7004b6c1829a745002feb7fbb0aad1a4d32c640a6c257dc8d0c39ce7b63b58cc/analysis/1501703398/"
|
|
}
|
|
]
|
|
}
|
|
} |