misp-circl-feed/feeds/circl/misp/5e6aa53c-bcf8-4279-9c48-40d0950d210f.json

239 lines
No EOL
7.1 KiB
JSON

{
"Event": {
"analysis": "1",
"date": "2020-03-12",
"extends_uuid": "",
"info": "Rhombus - Linux DDoS botnet aims VPS & IoT, w/persistence & dropper",
"publish_timestamp": "1584048355",
"published": true,
"threat_level_id": "3",
"timestamp": "1584048290",
"uuid": "5e6aa53c-bcf8-4279-9c48-40d0950d210f",
"Orgc": {
"name": "MalwareMustDie",
"uuid": "569e04b2-efd0-45bd-b83a-4f7b950d210f"
},
"Tag": [
{
"colour": "#ffffff",
"name": "tlp:white"
},
{
"colour": "#22681c",
"name": "malware_classification:malware-category=\"Botnet\""
},
{
"colour": "#32003e",
"name": "ms-caro-malware:malware-type=\"DDoS\""
},
{
"colour": "#5ed600",
"name": "ddos:type=\"flooding-attack\""
},
{
"colour": "#001a42",
"name": "ms-caro-malware-full:malware-platform=\"Linux\""
}
],
"Attribute": [
{
"category": "Payload delivery",
"comment": "Malware payloads and installers(dropper)",
"deleted": false,
"disable_correlation": false,
"timestamp": "1584047562",
"to_ids": false,
"type": "md5",
"uuid": "5e6aa5ca-9d98-4a8b-8abd-c5a7950d210f",
"value": "5fd910e87382d838d9ff17e4ad5843fb"
},
{
"category": "Payload delivery",
"comment": "Malware payloads and installers(dropper)",
"deleted": false,
"disable_correlation": false,
"timestamp": "1584047562",
"to_ids": false,
"type": "md5",
"uuid": "5e6aa5ca-1470-4d9e-88f7-c5a7950d210f",
"value": "d93c7daebe7adc95e575c9934248d00f"
},
{
"category": "Payload delivery",
"comment": "Malware payloads and installers(dropper)",
"deleted": false,
"disable_correlation": false,
"timestamp": "1584047562",
"to_ids": false,
"type": "md5",
"uuid": "5e6aa5ca-12a4-4a7a-84ac-c5a7950d210f",
"value": "239aecbf01af2ff17b6cfbe606db5808"
},
{
"category": "Payload delivery",
"comment": "Malware payloads and installers(dropper)",
"deleted": false,
"disable_correlation": false,
"timestamp": "1584047562",
"to_ids": false,
"type": "md5",
"uuid": "5e6aa5ca-1e10-41b9-91f2-c5a7950d210f",
"value": "ba42665872ea41e3d2edd8978bc38c24"
},
{
"category": "Payload delivery",
"comment": "Malware payloads and installers(dropper)",
"deleted": false,
"disable_correlation": false,
"timestamp": "1584047562",
"to_ids": false,
"type": "md5",
"uuid": "5e6aa5ca-41cc-4e2c-8dd6-c5a7950d210f",
"value": "e7b10bb7b81346d31f126e202d62a157"
},
{
"category": "Network activity",
"comment": "C2 IP address",
"deleted": false,
"disable_correlation": false,
"timestamp": "1584047631",
"to_ids": false,
"type": "ip-dst",
"uuid": "5e6aa60f-fcf0-4630-9bd1-4930950d210f",
"value": "209.126.69.167"
},
{
"category": "Network activity",
"comment": "C2 IP address",
"deleted": false,
"disable_correlation": false,
"timestamp": "1584047635",
"to_ids": false,
"type": "ip-dst",
"uuid": "5e6aa613-ee50-4601-809d-4f37950d210f",
"value": "45.135.134.132"
},
{
"category": "Network activity",
"comment": "C2 IP address",
"deleted": false,
"disable_correlation": false,
"timestamp": "1584047635",
"to_ids": false,
"type": "ip-dst",
"uuid": "5e6aa613-8d04-427a-af67-49e5950d210f",
"value": "167.172.128.4"
},
{
"category": "Network activity",
"comment": "C2 IP address",
"deleted": false,
"disable_correlation": false,
"timestamp": "1584047635",
"to_ids": false,
"type": "ip-dst",
"uuid": "5e6aa613-54dc-4a5e-b9f0-435e950d210f",
"value": "205.185.122.243"
},
{
"category": "Payload delivery",
"comment": "Persistence setup filename",
"deleted": false,
"disable_correlation": false,
"timestamp": "1584047745",
"to_ids": false,
"type": "filename",
"uuid": "5e6aa681-e5f8-4a06-bb94-46b1950d210f",
"value": "/etc/rc.d/rc.local"
},
{
"category": "Payload delivery",
"comment": "Persistence setup filename",
"deleted": false,
"disable_correlation": false,
"timestamp": "1584047745",
"to_ids": false,
"type": "filename",
"uuid": "5e6aa681-6304-499c-a869-4b57950d210f",
"value": "/etc/rc.local"
},
{
"category": "Payload delivery",
"comment": "Persistence setup filename",
"deleted": false,
"disable_correlation": false,
"timestamp": "1584047745",
"to_ids": false,
"type": "filename",
"uuid": "5e6aa681-94d4-4fd3-b587-424b950d210f",
"value": "/etc/cron.hourly/0"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1584047865",
"to_ids": false,
"type": "filename",
"uuid": "5e6aa6f9-aa4c-4ef7-a13f-4510950d210f",
"value": "RHOMBUS.arm5"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1584047865",
"to_ids": false,
"type": "filename",
"uuid": "5e6aa6f9-fd94-4d86-8b46-46a4950d210f",
"value": "RHOMBUS.mpsl"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1584047865",
"to_ids": false,
"type": "filename",
"uuid": "5e6aa6f9-0084-4eeb-977b-4cdf950d210f",
"value": "RHOMBUS.sh4"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1584047865",
"to_ids": false,
"type": "filename",
"uuid": "5e6aa6f9-43f4-4e3d-9902-4780950d210f",
"value": "RHOMBUS.x86"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"timestamp": "1584047865",
"to_ids": false,
"type": "filename",
"uuid": "5e6aa6f9-8078-42d1-ac45-40c3950d210f",
"value": "RHOMBUS.x86_64"
},
{
"category": "Internal reference",
"comment": "Threat report",
"deleted": false,
"disable_correlation": false,
"timestamp": "1584047924",
"to_ids": false,
"type": "link",
"uuid": "5e6aa734-6504-4610-abbb-4a01950d210f",
"value": "https://reddit.com/r/LinuxMalware/comments/fh3zar/memo_rhombus_an_elf_bot_installerdropper/"
}
]
}
}