misp-circl-feed/feeds/circl/misp/58dd02b3-cfa8-4044-b533-4935950d210f.json

476 lines
No EOL
22 KiB
JSON

{
"type": "bundle",
"id": "bundle--58dd02b3-cfa8-4044-b533-4935950d210f",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-30T13:17:01.000Z",
"modified": "2017-03-30T13:17:01.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--58dd02b3-cfa8-4044-b533-4935950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-30T13:17:01.000Z",
"modified": "2017-03-30T13:17:01.000Z",
"name": "OSINT - Trochilus and New MoonWind RATs Used In Attack Against Thai Organizations",
"published": "2017-03-30T13:17:28Z",
"object_refs": [
"observed-data--58dd02c0-3028-4d64-95ee-40b6950d210f",
"url--58dd02c0-3028-4d64-95ee-40b6950d210f",
"x-misp-attribute--58dd02cd-d94c-4787-bbc0-4fd8950d210f",
"indicator--58dd03ab-29ac-47c6-8607-4e72950d210f",
"indicator--58dd03ac-8dc4-4450-8213-4c30950d210f",
"indicator--58dd03b9-9bb0-4402-82d2-4aa8950d210f",
"indicator--58dd03c4-9234-4631-939b-42b8950d210f",
"indicator--58dd03d2-2338-4147-9aa4-4d53950d210f",
"indicator--58dd03d3-7828-47bd-8b3e-4f62950d210f",
"indicator--58dd03d4-cf54-4aed-b402-4a06950d210f",
"indicator--58dd03d5-4f64-40f1-b5f7-4004950d210f",
"indicator--58dd03f4-b198-4a25-beff-4772950d210f",
"indicator--58dd0513-3288-4c5f-822f-4cc402de0b81",
"indicator--58dd0514-8510-4c9e-ab20-49bb02de0b81",
"observed-data--58dd0515-b4ac-4721-9936-4a7b02de0b81",
"url--58dd0515-b4ac-4721-9936-4a7b02de0b81",
"indicator--58dd0516-b8d4-4956-bd8c-4bd402de0b81",
"indicator--58dd0517-5b48-425e-bf27-433b02de0b81",
"observed-data--58dd0518-22f4-4dd1-948d-4fc302de0b81",
"url--58dd0518-22f4-4dd1-948d-4fc302de0b81"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"misp-galaxy:tool=\"Trochilus\"",
"misp-galaxy:tool=\"MoonWind\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58dd02c0-3028-4d64-95ee-40b6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-30T13:15:53.000Z",
"modified": "2017-03-30T13:15:53.000Z",
"first_observed": "2017-03-30T13:15:53Z",
"last_observed": "2017-03-30T13:15:53Z",
"number_observed": 1,
"object_refs": [
"url--58dd02c0-3028-4d64-95ee-40b6950d210f"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\"",
"osint:source-type=\"blog-post\"",
"admiralty-scale:source-reliability=\"b\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58dd02c0-3028-4d64-95ee-40b6950d210f",
"value": "http://researchcenter.paloaltonetworks.com/2017/03/unit42-trochilus-rat-new-moonwind-rat-used-attack-thai-utility-organizations/"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--58dd02cd-d94c-4787-bbc0-4fd8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-30T13:15:53.000Z",
"modified": "2017-03-30T13:15:53.000Z",
"labels": [
"misp:type=\"text\"",
"misp:category=\"External analysis\"",
"osint:source-type=\"blog-post\"",
"admiralty-scale:source-reliability=\"b\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
],
"x_misp_category": "External analysis",
"x_misp_type": "text",
"x_misp_value": "From September 2016 through late November 2016, a threat actor group used both the Trochilus RAT and a newly idenfied RAT we\u00e2\u20ac\u2122ve named MoonWind to target organizations in Thailand, including a utility organization. We chose the name \u00e2\u20ac\u02dcMoonWind\u00e2\u20ac\u2122 based on debugging strings we saw within the samples, as well as the compiler used to generate the samples. The attackers compromised two legitimate Thai websites to host the malware, which is a tactic this group has used in the past. Both the Trochilus and MoonWind RATs were hosted on the same compromised sites and used to target the same organization at the same time. The attackers used different command and control servers (C2s) for each malware family, a tactic we believe was meant to thwart attempts to tie the attacks together using infrastructure alone. The compromised websites are the site for a group of information technology companies in Thailand, and all the tools were stored in the same directory.\r\n\r\nWe were also able to find a post-compromise tool along with the two RATs, which afforeded us insight into one of the tools the attackers used once they gained a foothold inside an organization. In addition to Trochilus and MoonWind we found Mimikatz, a popular credential harvesting tool.\r\n\r\nFurther research led us to additional MoonWind samples using the same C2 (dns[.] webswindows [.]com) but hosted on a different compromised but legitimate website. The attacks in that case took place in late September to early October 2016 and the attackers stored the MoonWind samples as RAR files, while in the November attacks the RATs were stored as executables. We were not able to find additional tools, but the attackers again compromised a legitimate Thai website to host their malware, in this case the student portal for a Thai University."
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58dd03ab-29ac-47c6-8607-4e72950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-30T13:15:53.000Z",
"modified": "2017-03-30T13:15:53.000Z",
"description": "Trochilus C&C",
"pattern": "[domain-name:value = 'webswindows.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-30T13:15:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58dd03ac-8dc4-4450-8213-4c30950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-30T13:15:53.000Z",
"modified": "2017-03-30T13:15:53.000Z",
"description": "Trochilus C&C",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '192.225.226.195']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-30T13:15:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58dd03b9-9bb0-4402-82d2-4aa8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-30T13:15:53.000Z",
"modified": "2017-03-30T13:15:53.000Z",
"description": "Trochilus",
"pattern": "[file:hashes.SHA256 = '59f8a31d66f053f1efcc8d7c7ebb209a8c12233423cc2dc3673373dde9b3a149']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-30T13:15:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58dd03c4-9234-4631-939b-42b8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-30T13:15:53.000Z",
"modified": "2017-03-30T13:15:53.000Z",
"description": "MoonWind Persistence Mechanism",
"pattern": "[file:hashes.SHA256 = '815df680be80b26b5dff0bcaf73f7495b9cae5e3ad3acb7348be188af3e75201']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-30T13:15:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58dd03d2-2338-4147-9aa4-4d53950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-30T13:15:53.000Z",
"modified": "2017-03-30T13:15:53.000Z",
"description": "MoonWind",
"pattern": "[file:hashes.SHA256 = 'fd4856f2ec676f273ff71e1b0a1729cf6251c82780fc9e7d628deca690b02928']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-30T13:15:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58dd03d3-7828-47bd-8b3e-4f62950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-30T13:15:53.000Z",
"modified": "2017-03-30T13:15:53.000Z",
"description": "MoonWind",
"pattern": "[file:hashes.SHA256 = 'ce3da112e68e00621920911b1f9c72d7175894901173e703a44ac3700e4d427c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-30T13:15:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58dd03d4-cf54-4aed-b402-4a06950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-30T13:15:53.000Z",
"modified": "2017-03-30T13:15:53.000Z",
"description": "MoonWind",
"pattern": "[file:hashes.SHA256 = 'e31679b82be58ace96b1d9fdfc2b62b6e91d371ed93957e0764cd7c464b04b9d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-30T13:15:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58dd03d5-4f64-40f1-b5f7-4004950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-30T13:15:53.000Z",
"modified": "2017-03-30T13:15:53.000Z",
"description": "MoonWind",
"pattern": "[file:hashes.SHA256 = 'f2589745671949422b19beec0856ca8b9608c02d5df4402f92c0dcc9d403010b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-30T13:15:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58dd03f4-b198-4a25-beff-4772950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-30T13:15:53.000Z",
"modified": "2017-03-30T13:15:53.000Z",
"description": "C&C",
"pattern": "[domain-name:value = 'dns.webswindows.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-30T13:15:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58dd0513-3288-4c5f-822f-4cc402de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-30T13:16:03.000Z",
"modified": "2017-03-30T13:16:03.000Z",
"description": "MoonWind - Xchecked via VT: ce3da112e68e00621920911b1f9c72d7175894901173e703a44ac3700e4d427c",
"pattern": "[file:hashes.SHA1 = 'ae2905c603ebc1b41c11ef26ac344bd695a24580']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-30T13:16:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58dd0514-8510-4c9e-ab20-49bb02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-30T13:16:04.000Z",
"modified": "2017-03-30T13:16:04.000Z",
"description": "MoonWind - Xchecked via VT: ce3da112e68e00621920911b1f9c72d7175894901173e703a44ac3700e4d427c",
"pattern": "[file:hashes.MD5 = '278a95ffe4e8f8f33d56ae4276b4799b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-30T13:16:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58dd0515-b4ac-4721-9936-4a7b02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-30T13:16:05.000Z",
"modified": "2017-03-30T13:16:05.000Z",
"first_observed": "2017-03-30T13:16:05Z",
"last_observed": "2017-03-30T13:16:05Z",
"number_observed": 1,
"object_refs": [
"url--58dd0515-b4ac-4721-9936-4a7b02de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58dd0515-b4ac-4721-9936-4a7b02de0b81",
"value": "https://www.virustotal.com/file/ce3da112e68e00621920911b1f9c72d7175894901173e703a44ac3700e4d427c/analysis/1477397321/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58dd0516-b8d4-4956-bd8c-4bd402de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-30T13:16:06.000Z",
"modified": "2017-03-30T13:16:06.000Z",
"description": "MoonWind - Xchecked via VT: fd4856f2ec676f273ff71e1b0a1729cf6251c82780fc9e7d628deca690b02928",
"pattern": "[file:hashes.SHA1 = '36e367bd403f30d18314911ad129810cc7aa03aa']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-30T13:16:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58dd0517-5b48-425e-bf27-433b02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-30T13:16:07.000Z",
"modified": "2017-03-30T13:16:07.000Z",
"description": "MoonWind - Xchecked via VT: fd4856f2ec676f273ff71e1b0a1729cf6251c82780fc9e7d628deca690b02928",
"pattern": "[file:hashes.MD5 = '9ad1b81ca2d37a63faf2aaf279fed71c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-03-30T13:16:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58dd0518-22f4-4dd1-948d-4fc302de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-03-30T13:16:08.000Z",
"modified": "2017-03-30T13:16:08.000Z",
"first_observed": "2017-03-30T13:16:08Z",
"last_observed": "2017-03-30T13:16:08Z",
"number_observed": 1,
"object_refs": [
"url--58dd0518-22f4-4dd1-948d-4fc302de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58dd0518-22f4-4dd1-948d-4fc302de0b81",
"value": "https://www.virustotal.com/file/fd4856f2ec676f273ff71e1b0a1729cf6251c82780fc9e7d628deca690b02928/analysis/1481830025/"
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}