misp-circl-feed/feeds/circl/misp/560460c7-a840-4949-a92e-3c09950d210b.json

646 lines
No EOL
30 KiB
JSON

{
"type": "bundle",
"id": "bundle--560460c7-a840-4949-a92e-3c09950d210b",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f",
"created": "2015-09-25T06:21:15.000Z",
"modified": "2015-09-25T06:21:15.000Z",
"name": "CthulhuSPRL.be",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--560460c7-a840-4949-a92e-3c09950d210b",
"created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f",
"created": "2015-09-25T06:21:15.000Z",
"modified": "2015-09-25T06:21:15.000Z",
"name": "OSINT Meet GreenDispenser: A New Breed of ATM Malware by ProofPoint",
"published": "2015-09-25T06:22:35Z",
"object_refs": [
"observed-data--560460d9-bf3c-4c26-86fc-4072950d210b",
"url--560460d9-bf3c-4c26-86fc-4072950d210b",
"x-misp-attribute--560460e4-1450-436c-8a5e-3c08950d210b",
"indicator--5604e734-ba4c-4eaf-85e6-4bbc950d210b",
"indicator--5604e734-b8f8-4c32-ae7e-484f950d210b",
"indicator--5604e734-1324-4ac8-9836-4a95950d210b",
"indicator--5604e734-b908-43ea-9db8-4391950d210b",
"indicator--5604e734-6af8-4e63-bb24-4d06950d210b",
"indicator--5604e75a-a28c-4783-947a-412e950d210b",
"indicator--5604e75a-7a7c-4aa6-96cb-4af4950d210b",
"observed-data--5604e75b-241c-41a9-91e3-47f3950d210b",
"url--5604e75b-241c-41a9-91e3-47f3950d210b",
"indicator--5604e75b-36a8-4889-b4cb-4fd5950d210b",
"indicator--5604e75c-653c-498a-81a5-4bc1950d210b",
"observed-data--5604e75c-ae18-459c-b4af-4b43950d210b",
"url--5604e75c-ae18-459c-b4af-4b43950d210b",
"indicator--5604e75c-a284-42e5-8eed-4d69950d210b",
"indicator--5604e75d-872c-497f-baa5-410d950d210b",
"observed-data--5604e75d-26e8-4f8f-9c72-40ce950d210b",
"url--5604e75d-26e8-4f8f-9c72-40ce950d210b",
"indicator--5604e75e-b604-447e-902a-460b950d210b",
"indicator--5604e75e-c110-4e21-97d1-46df950d210b",
"observed-data--5604e75f-d9f4-4589-8cf0-4836950d210b",
"url--5604e75f-d9f4-4589-8cf0-4836950d210b",
"indicator--5604e75f-d2c4-4f94-811d-4494950d210b",
"indicator--5604e760-48dc-4143-847a-4bbe950d210b",
"observed-data--5604e760-a404-4a18-8940-4b3e950d210b",
"url--5604e760-a404-4a18-8940-4b3e950d210b",
"observed-data--5604e777-35b8-43eb-aa1d-4f7c950d210b",
"mutex--5604e777-35b8-43eb-aa1d-4f7c950d210b",
"x-misp-attribute--5604e7a4-0054-4380-8b2f-4026950d210b",
"x-misp-attribute--5604e7db-6620-4451-8736-4bf2950d210b"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"type:OSINT"
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--560460d9-bf3c-4c26-86fc-4072950d210b",
"created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f",
"created": "2015-09-24T20:45:13.000Z",
"modified": "2015-09-24T20:45:13.000Z",
"first_observed": "2015-09-24T20:45:13Z",
"last_observed": "2015-09-24T20:45:13Z",
"number_observed": 1,
"object_refs": [
"url--560460d9-bf3c-4c26-86fc-4072950d210b"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--560460d9-bf3c-4c26-86fc-4072950d210b",
"value": "https://www.proofpoint.com/us/threat-insight/post/Meet-GreenDispenser"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--560460e4-1450-436c-8a5e-3c08950d210b",
"created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f",
"created": "2015-09-24T20:45:23.000Z",
"modified": "2015-09-24T20:45:23.000Z",
"labels": [
"misp:type=\"text\"",
"misp:category=\"External analysis\""
],
"x_misp_category": "External analysis",
"x_misp_type": "text",
"x_misp_value": "Green Dispenser"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5604e734-ba4c-4eaf-85e6-4bbc950d210b",
"created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f",
"created": "2015-09-25T06:18:28.000Z",
"modified": "2015-09-25T06:18:28.000Z",
"pattern": "[file:hashes.SHA256 = '20a1490b666f8c75c47b682cf10a48b7b0278068cb260b14d8d0584ee6c006a5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2015-09-25T06:18:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5604e734-b8f8-4c32-ae7e-484f950d210b",
"created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f",
"created": "2015-09-25T06:18:28.000Z",
"modified": "2015-09-25T06:18:28.000Z",
"pattern": "[file:hashes.SHA256 = '50db1f5e9692f217f356a592e413e6c9cb31105a94efc70a5ca1c2c73d95d572']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2015-09-25T06:18:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5604e734-1324-4ac8-9836-4a95950d210b",
"created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f",
"created": "2015-09-25T06:18:28.000Z",
"modified": "2015-09-25T06:18:28.000Z",
"pattern": "[file:hashes.SHA256 = '7544e7a798b791cb36caaa1860974f33d30bc4659ceab3063d1ab4fd71c8c7e0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2015-09-25T06:18:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5604e734-b908-43ea-9db8-4391950d210b",
"created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f",
"created": "2015-09-25T06:18:28.000Z",
"modified": "2015-09-25T06:18:28.000Z",
"pattern": "[file:hashes.SHA256 = 'b7e61f65e147885ec1fe6a787b62d9ee82d1f34f1c9ba8068d3570adca87c54f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2015-09-25T06:18:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5604e734-6af8-4e63-bb24-4d06950d210b",
"created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f",
"created": "2015-09-25T06:18:28.000Z",
"modified": "2015-09-25T06:18:28.000Z",
"pattern": "[file:hashes.SHA256 = '77850f738ba42fd9da299b2282314709ad8dc93623b318b116bfc25c5280c541']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2015-09-25T06:18:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5604e75a-a28c-4783-947a-412e950d210b",
"created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f",
"created": "2015-09-25T06:19:06.000Z",
"modified": "2015-09-25T06:19:06.000Z",
"description": "- Xchecked via VT: 77850f738ba42fd9da299b2282314709ad8dc93623b318b116bfc25c5280c541",
"pattern": "[file:hashes.SHA1 = '027f6e1ab57db86fc400e5c0ea8f943791ca9943']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2015-09-25T06:19:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5604e75a-7a7c-4aa6-96cb-4af4950d210b",
"created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f",
"created": "2015-09-25T06:19:06.000Z",
"modified": "2015-09-25T06:19:06.000Z",
"description": "- Xchecked via VT: 77850f738ba42fd9da299b2282314709ad8dc93623b318b116bfc25c5280c541",
"pattern": "[file:hashes.MD5 = 'e1f9360f952acf5dabdf2f46458e7842']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2015-09-25T06:19:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5604e75b-241c-41a9-91e3-47f3950d210b",
"created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f",
"created": "2015-09-25T06:19:07.000Z",
"modified": "2015-09-25T06:19:07.000Z",
"first_observed": "2015-09-25T06:19:07Z",
"last_observed": "2015-09-25T06:19:07Z",
"number_observed": 1,
"object_refs": [
"url--5604e75b-241c-41a9-91e3-47f3950d210b"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--5604e75b-241c-41a9-91e3-47f3950d210b",
"value": "https://www.virustotal.com/file/77850f738ba42fd9da299b2282314709ad8dc93623b318b116bfc25c5280c541/analysis/1443114801/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5604e75b-36a8-4889-b4cb-4fd5950d210b",
"created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f",
"created": "2015-09-25T06:19:07.000Z",
"modified": "2015-09-25T06:19:07.000Z",
"description": "- Xchecked via VT: b7e61f65e147885ec1fe6a787b62d9ee82d1f34f1c9ba8068d3570adca87c54f",
"pattern": "[file:hashes.SHA1 = '25f4d7bd393fb8e65de716e6353a1ec11bf6d3b2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2015-09-25T06:19:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5604e75c-653c-498a-81a5-4bc1950d210b",
"created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f",
"created": "2015-09-25T06:19:08.000Z",
"modified": "2015-09-25T06:19:08.000Z",
"description": "- Xchecked via VT: b7e61f65e147885ec1fe6a787b62d9ee82d1f34f1c9ba8068d3570adca87c54f",
"pattern": "[file:hashes.MD5 = 'bcd3cdbded825b96861bfbc7a399b89a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2015-09-25T06:19:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5604e75c-ae18-459c-b4af-4b43950d210b",
"created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f",
"created": "2015-09-25T06:19:08.000Z",
"modified": "2015-09-25T06:19:08.000Z",
"first_observed": "2015-09-25T06:19:08Z",
"last_observed": "2015-09-25T06:19:08Z",
"number_observed": 1,
"object_refs": [
"url--5604e75c-ae18-459c-b4af-4b43950d210b"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--5604e75c-ae18-459c-b4af-4b43950d210b",
"value": "https://www.virustotal.com/file/b7e61f65e147885ec1fe6a787b62d9ee82d1f34f1c9ba8068d3570adca87c54f/analysis/1443109076/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5604e75c-a284-42e5-8eed-4d69950d210b",
"created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f",
"created": "2015-09-25T06:19:08.000Z",
"modified": "2015-09-25T06:19:08.000Z",
"description": "- Xchecked via VT: 7544e7a798b791cb36caaa1860974f33d30bc4659ceab3063d1ab4fd71c8c7e0",
"pattern": "[file:hashes.SHA1 = 'd9aae7e14b1f6267bc37d5c2ea3ee681b90fbed2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2015-09-25T06:19:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5604e75d-872c-497f-baa5-410d950d210b",
"created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f",
"created": "2015-09-25T06:19:09.000Z",
"modified": "2015-09-25T06:19:09.000Z",
"description": "- Xchecked via VT: 7544e7a798b791cb36caaa1860974f33d30bc4659ceab3063d1ab4fd71c8c7e0",
"pattern": "[file:hashes.MD5 = 'bff1bf173b934a4255b4eca0fbaa6309']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2015-09-25T06:19:09Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5604e75d-26e8-4f8f-9c72-40ce950d210b",
"created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f",
"created": "2015-09-25T06:19:09.000Z",
"modified": "2015-09-25T06:19:09.000Z",
"first_observed": "2015-09-25T06:19:09Z",
"last_observed": "2015-09-25T06:19:09Z",
"number_observed": 1,
"object_refs": [
"url--5604e75d-26e8-4f8f-9c72-40ce950d210b"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--5604e75d-26e8-4f8f-9c72-40ce950d210b",
"value": "https://www.virustotal.com/file/7544e7a798b791cb36caaa1860974f33d30bc4659ceab3063d1ab4fd71c8c7e0/analysis/1442563668/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5604e75e-b604-447e-902a-460b950d210b",
"created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f",
"created": "2015-09-25T06:19:10.000Z",
"modified": "2015-09-25T06:19:10.000Z",
"description": "- Xchecked via VT: 50db1f5e9692f217f356a592e413e6c9cb31105a94efc70a5ca1c2c73d95d572",
"pattern": "[file:hashes.SHA1 = '8f9428c689aa1953293d240e83530ec00fe1df47']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2015-09-25T06:19:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5604e75e-c110-4e21-97d1-46df950d210b",
"created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f",
"created": "2015-09-25T06:19:10.000Z",
"modified": "2015-09-25T06:19:10.000Z",
"description": "- Xchecked via VT: 50db1f5e9692f217f356a592e413e6c9cb31105a94efc70a5ca1c2c73d95d572",
"pattern": "[file:hashes.MD5 = '1dbac403209d1f5aac9bdac28d4ea335']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2015-09-25T06:19:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5604e75f-d9f4-4589-8cf0-4836950d210b",
"created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f",
"created": "2015-09-25T06:19:11.000Z",
"modified": "2015-09-25T06:19:11.000Z",
"first_observed": "2015-09-25T06:19:11Z",
"last_observed": "2015-09-25T06:19:11Z",
"number_observed": 1,
"object_refs": [
"url--5604e75f-d9f4-4589-8cf0-4836950d210b"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--5604e75f-d9f4-4589-8cf0-4836950d210b",
"value": "https://www.virustotal.com/file/50db1f5e9692f217f356a592e413e6c9cb31105a94efc70a5ca1c2c73d95d572/analysis/1442618989/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5604e75f-d2c4-4f94-811d-4494950d210b",
"created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f",
"created": "2015-09-25T06:19:11.000Z",
"modified": "2015-09-25T06:19:11.000Z",
"description": "- Xchecked via VT: 20a1490b666f8c75c47b682cf10a48b7b0278068cb260b14d8d0584ee6c006a5",
"pattern": "[file:hashes.SHA1 = 'b3401a57ddde3b944bafd348f6575ce195883acc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2015-09-25T06:19:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5604e760-48dc-4143-847a-4bbe950d210b",
"created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f",
"created": "2015-09-25T06:19:12.000Z",
"modified": "2015-09-25T06:19:12.000Z",
"description": "- Xchecked via VT: 20a1490b666f8c75c47b682cf10a48b7b0278068cb260b14d8d0584ee6c006a5",
"pattern": "[file:hashes.MD5 = 'c10b0157f6fd6590424a748f3c6c80ee']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2015-09-25T06:19:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5604e760-a404-4a18-8940-4b3e950d210b",
"created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f",
"created": "2015-09-25T06:19:12.000Z",
"modified": "2015-09-25T06:19:12.000Z",
"first_observed": "2015-09-25T06:19:12Z",
"last_observed": "2015-09-25T06:19:12Z",
"number_observed": 1,
"object_refs": [
"url--5604e760-a404-4a18-8940-4b3e950d210b"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--5604e760-a404-4a18-8940-4b3e950d210b",
"value": "https://www.virustotal.com/file/20a1490b666f8c75c47b682cf10a48b7b0278068cb260b14d8d0584ee6c006a5/analysis/1443136260/"
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5604e777-35b8-43eb-aa1d-4f7c950d210b",
"created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f",
"created": "2015-09-25T06:19:35.000Z",
"modified": "2015-09-25T06:19:35.000Z",
"first_observed": "2015-09-25T06:19:35Z",
"last_observed": "2015-09-25T06:19:35Z",
"number_observed": 1,
"object_refs": [
"mutex--5604e777-35b8-43eb-aa1d-4f7c950d210b"
],
"labels": [
"misp:type=\"mutex\"",
"misp:category=\"Artifacts dropped\""
]
},
{
"type": "mutex",
"spec_version": "2.1",
"id": "mutex--5604e777-35b8-43eb-aa1d-4f7c950d210b",
"name": "dispenserprgm"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--5604e7a4-0054-4380-8b2f-4026950d210b",
"created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f",
"created": "2015-09-25T06:20:20.000Z",
"modified": "2015-09-25T06:20:20.000Z",
"labels": [
"misp:type=\"text\"",
"misp:category=\"Other\""
],
"x_misp_category": "Other",
"x_misp_type": "text",
"x_misp_value": "GreenDispenser"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--5604e7db-6620-4451-8736-4bf2950d210b",
"created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f",
"created": "2015-09-25T06:21:15.000Z",
"modified": "2015-09-25T06:21:15.000Z",
"labels": [
"misp:type=\"comment\"",
"misp:category=\"External analysis\""
],
"x_misp_category": "External analysis",
"x_misp_type": "comment",
"x_misp_value": "On the heels of recent disclosures of ATM malware such as Suceful [1], Plotus [2] and Padpin [3] (aka Tyupkin), Proofpoint research has discovered yet another variant of ATM malware, which we have dubbed GreenDispenser.\r\n\r\nGreenDispenser provides an attacker the ability to walk up to an infected ATM and drain its cash vault. When installed, GreenDispenser may display an \u00e2\u20ac\u02dcout of service\u00e2\u20ac\u2122 message on the ATM -- but attackers who enter the correct pin codes can then drain the ATM\u00e2\u20ac\u2122s cash vault and erase GreenDispenser using a deep delete process, leaving little if any trace of how the ATM was robbed.\r\n\r\nDeployment and Operation\r\n\r\nInitial malware installation likely requires physical access to the ATM, raising questions of compromised physical security or personnel. Once installed, GreenDispenser is similar in functionality to Padpin but does exhibit some unique functionality, such as date limited operation and a form of two-factor authentication.\r\n\r\nSpecifically, GreenDispenser like its predecessors interacts with the XFS middleware [4], which is widely adopted by various ATM vendors. The XFS middleware allows software to interact with the peripherals connected to the ATM such as the pinpad and the cash dispenser by referencing the specific peripheral name. GreenDispenser has the ability to target ATM hardware from multiple vendors using the XFS standard. It achieves this by querying for peripheral names from the registry hive before defaulting to hardcoded peripheral names.\r\n\r\nThe malware strains Proofpoint inspected were coded to run only if the year was 2015 and the month was earlier than September, suggesting that GreenDispenser was employed in a limited operation and designed to deactivate itself to avoid detection. Furthermore, GreenDispenser employs authentication using a static hardcoded PIN, followed by a second layer of authentication using a dynamic PIN, which is unique for each run of the malware. The attacker derives this second PIN from a QR code displayed on the screen of the infected ATM. We suspect that the attacker has an application that can run on a mobile phone with functionality to scan the barcode and derive the second PIN -- a two-factor authentication of sorts. This feature ensures that only an authorized individual has the ability to perform the heist. In addition, GreenDispenser has the capability to perform a deep delete after the heist to prevent forensic analysis and IR investigations."
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}