misp-circl-feed/feeds/circl/misp/5a54778c-3dac-4d36-b7c3-4d6e02de0b81.json

504 lines
No EOL
23 KiB
JSON

{
"type": "bundle",
"id": "bundle--5a54778c-3dac-4d36-b7c3-4d6e02de0b81",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-10T03:00:26.000Z",
"modified": "2018-01-10T03:00:26.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--5a54778c-3dac-4d36-b7c3-4d6e02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-10T03:00:26.000Z",
"modified": "2018-01-10T03:00:26.000Z",
"name": "OSINT - A North Korean Monero Cryptocurrency Miner",
"published": "2018-01-11T18:49:08Z",
"object_refs": [
"observed-data--5a54779b-451c-4777-a15d-573002de0b81",
"url--5a54779b-451c-4777-a15d-573002de0b81",
"x-misp-attribute--5a5477ad-63d4-443a-a0d0-b52402de0b81",
"indicator--5a5477c8-1d28-4171-9740-bc9302de0b81",
"indicator--5a5477c8-8188-4ad5-bfbb-bc9302de0b81",
"observed-data--5a5477f2-0068-4ce8-9be5-566802de0b81",
"network-traffic--5a5477f2-0068-4ce8-9be5-566802de0b81",
"ipv4-addr--5a5477f2-0068-4ce8-9be5-566802de0b81",
"indicator--5a54780c-77cc-42c1-9633-bab602de0b81",
"indicator--5a547824-c8c8-45b3-b19b-b73502de0b81",
"indicator--5a547852-0478-476e-9703-4d6e02de0b81",
"indicator--5a5478ba-6920-40a3-bedc-57fd02de0b81",
"indicator--ecdcbae1-a690-4f9c-9ce7-b505f1c1a634",
"x-misp-object--0b6118b9-a775-47cf-8f97-de518c5ffd7a",
"indicator--62422a69-b558-4bbc-9e01-ff1038764faf",
"x-misp-object--36e2da81-042e-4880-9f27-76ebec952ba0",
"indicator--8a8becfb-f8ce-440a-9ffa-81a43239f4e2",
"x-misp-object--fe330733-f2f4-490d-a9b8-c0f0da7353fe",
"relationship--3e8d6237-bdd1-4a4a-aac0-290ef45df159",
"relationship--e569ab38-433f-4a4b-8f01-660309d07090",
"relationship--af53bfb2-b8de-4c94-aae7-558164209341"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"admiralty-scale:information-credibility=\"2\"",
"osint:source-type=\"blog-post\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5a54779b-451c-4777-a15d-573002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-09T08:12:04.000Z",
"modified": "2018-01-09T08:12:04.000Z",
"first_observed": "2018-01-09T08:12:04Z",
"last_observed": "2018-01-09T08:12:04Z",
"number_observed": 1,
"object_refs": [
"url--5a54779b-451c-4777-a15d-573002de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\"",
"osint:source-type=\"blog-post\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--5a54779b-451c-4777-a15d-573002de0b81",
"value": "https://www.alienvault.com/blogs/labs-research/a-north-korean-monero-cryptocurrency-miner"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--5a5477ad-63d4-443a-a0d0-b52402de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-09T08:12:04.000Z",
"modified": "2018-01-09T08:12:04.000Z",
"labels": [
"misp:type=\"text\"",
"misp:category=\"External analysis\"",
"osint:source-type=\"blog-post\""
],
"x_misp_category": "External analysis",
"x_misp_type": "text",
"x_misp_value": "AlienVault labs recently analysed an application compiled on Christmas Eve 2017. It is an Installer for software to mine the Monero crypto-currency. Any mined currency is sent to Kim Il Sung University in Pyongyang, North Korea.\r\n\r\nThe Installer copies a file named intelservice.exe to the system. The filename intelservice.exe is often associated with crypto-currency mining malware. Based on the arguments it\u00e2\u20ac\u2122s executed with, it\u00e2\u20ac\u2122s likely a piece of software called xmrig. \r\n\r\nIt\u00e2\u20ac\u2122s not unusual to see xmrig in malware campaigns. It was recently used in some wide campaigns exploiting unpatched IIS servers to mine Monero."
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a5477c8-1d28-4171-9740-bc9302de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-09T08:05:28.000Z",
"modified": "2018-01-09T08:05:28.000Z",
"description": "We identified two other pieces of software which share some code:",
"pattern": "[file:hashes.MD5 = '762c3249904a8bf76802effb54426655']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-09T08:05:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a5477c8-8188-4ad5-bfbb-bc9302de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-09T08:05:28.000Z",
"modified": "2018-01-09T08:05:28.000Z",
"description": "We identified two other pieces of software which share some code:",
"pattern": "[file:hashes.MD5 = '42344bb45f351757e8638656e12a0135']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-09T08:05:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5a5477f2-0068-4ce8-9be5-566802de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-09T08:10:10.000Z",
"modified": "2018-01-09T08:10:10.000Z",
"first_observed": "2018-01-09T08:10:10Z",
"last_observed": "2018-01-09T08:10:10Z",
"number_observed": 1,
"object_refs": [
"network-traffic--5a5477f2-0068-4ce8-9be5-566802de0b81",
"ipv4-addr--5a5477f2-0068-4ce8-9be5-566802de0b81"
],
"labels": [
"misp:type=\"ip-src\"",
"misp:category=\"Network activity\""
]
},
{
"type": "network-traffic",
"spec_version": "2.1",
"id": "network-traffic--5a5477f2-0068-4ce8-9be5-566802de0b81",
"src_ref": "ipv4-addr--5a5477f2-0068-4ce8-9be5-566802de0b81",
"protocols": [
"tcp"
]
},
{
"type": "ipv4-addr",
"spec_version": "2.1",
"id": "ipv4-addr--5a5477f2-0068-4ce8-9be5-566802de0b81",
"value": "175.45.178.19"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a54780c-77cc-42c1-9633-bab602de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-09T08:07:15.000Z",
"modified": "2018-01-09T08:07:15.000Z",
"description": "Decompiled Code",
"pattern": "[file:hashes.MD5 = '6a261443299788af1467142d5f538b2c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-09T08:07:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a547824-c8c8-45b3-b19b-b73502de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-09T08:10:10.000Z",
"modified": "2018-01-09T08:10:10.000Z",
"pattern": "[rule nkminer_monero {\r\n\r\n meta:\r\n\r\n description = \"Detects installer of Monero miner that points to a NK domain\"\r\n\r\n author = \"cdoman@alienvault.com\"\r\n\r\n tlp = \"white\"\r\n\r\n license = \"MIT License\"\r\n\r\n strings:\r\n\r\n $a = \"82e999fb-a6e0-4094-aa1f-1a306069d1a5\" nocase wide ascii\r\n\r\n $b = \"4JUdGzvrMFDWrUUwY3toJATSeNwjn54LkCnKBPRzDuhzi5vSepHfUckJNxRL2gjkNrSqtCoRUrEDAgRwsQvVCjZbRy5YeFCqgoUMnzumvS\" nocase wide ascii\r\n\r\n $c = \"barjuok.ryongnamsan.edu.kp\" nocase wide ascii\r\n\r\n $d = \"C:\\\\SoftwaresInstall\\\\soft\" nocase wide ascii\r\n\r\n $e = \"C:\\\\Windows\\\\Sys64\\\\intelservice.exe\" nocase wide ascii\r\n\r\n $f = \"C:\\\\Windows\\\\Sys64\\\\updater.exe\" nocase wide ascii\r\n\r\n $g = \"C:\\\\Users\\\\Jawhar\\\\documents\\\\\" nocase wide ascii\r\n\r\n condition:\r\n\r\n any of them\r\n\r\n}]",
"pattern_type": "yara",
"pattern_version": "2.1",
"valid_from": "2018-01-09T08:10:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"yara\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a547852-0478-476e-9703-4d6e02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-09T08:10:10.000Z",
"modified": "2018-01-09T08:10:10.000Z",
"description": "On port 5615",
"pattern": "[domain-name:value = 'barjuok.ryongnamsan.edu.kp']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-09T08:10:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a5478ba-6920-40a3-bedc-57fd02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-09T08:09:30.000Z",
"modified": "2018-01-09T08:09:30.000Z",
"pattern": "[(network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '175.45.178.19') AND network-traffic:dst_port = '5615' AND network-traffic:x_misp_text = 'Arguments = ((\\\\\"-o barjuok.ryongnamsan.edu.kp:5615 -u 4JUdGzvrMFDWrUUwY3toJATSeNwjn54LkCnKBPRzDuhzi5vSepHfUckJNxRL2gjkNrSqtCoRUrEDAgRwsQvVCjZbRy5YeFCqgoUMnzumvS -p \\\\\" + str + \\\\\" -k -t \\\\\" + Conversions.ToString(value)) ?? \\\\\"\\\\\")']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-09T08:09:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "network"
}
],
"labels": [
"misp:name=\"ip-port\"",
"misp:meta-category=\"network\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ecdcbae1-a690-4f9c-9ce7-b505f1c1a634",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-09T08:10:13.000Z",
"modified": "2018-01-09T08:10:13.000Z",
"pattern": "[file:hashes.MD5 = '762c3249904a8bf76802effb54426655' AND file:hashes.SHA1 = '0def199dbdb8dccf380511f67138088148ea83a3' AND file:hashes.SHA256 = '42300b6a09f183ae167d7a11d9c6df21d022a5f02df346350d3d875d557d3b76']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-09T08:10:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--0b6118b9-a775-47cf-8f97-de518c5ffd7a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-09T08:10:10.000Z",
"modified": "2018-01-09T08:10:10.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/42300b6a09f183ae167d7a11d9c6df21d022a5f02df346350d3d875d557d3b76/analysis/1515484535/",
"category": "External analysis",
"comment": "We identified two other pieces of software which share some code:",
"uuid": "5a5478e3-2394-4d96-a621-b75d02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "3/67",
"category": "Other",
"comment": "We identified two other pieces of software which share some code:",
"uuid": "5a5478e3-ef44-4be0-99af-b75d02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-09T07:55:35",
"category": "Other",
"comment": "We identified two other pieces of software which share some code:",
"uuid": "5a5478e3-d6f0-430c-b82c-b75d02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--62422a69-b558-4bbc-9e01-ff1038764faf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-09T08:10:14.000Z",
"modified": "2018-01-09T08:10:14.000Z",
"pattern": "[file:hashes.MD5 = '6a261443299788af1467142d5f538b2c' AND file:hashes.SHA1 = '8965381377a884aa68eeb451b3e62175968b0b04' AND file:hashes.SHA256 = 'c599f3ca3417169e4a620b8231f8a97ccc63e291b9e09c888e6807dd90f1f17c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-09T08:10:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--36e2da81-042e-4880-9f27-76ebec952ba0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-09T08:10:11.000Z",
"modified": "2018-01-09T08:10:11.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/c599f3ca3417169e4a620b8231f8a97ccc63e291b9e09c888e6807dd90f1f17c/analysis/1515484533/",
"category": "External analysis",
"comment": "Decompiled Code",
"uuid": "5a5478e3-1108-4a5e-93b1-b75d02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "6/68",
"category": "Other",
"comment": "Decompiled Code",
"uuid": "5a5478e3-04d8-4a5a-ae0b-b75d02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-09T07:55:33",
"category": "Other",
"comment": "Decompiled Code",
"uuid": "5a5478e3-0fa0-4ec3-b082-b75d02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8a8becfb-f8ce-440a-9ffa-81a43239f4e2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-09T08:10:14.000Z",
"modified": "2018-01-09T08:10:14.000Z",
"pattern": "[file:hashes.MD5 = '42344bb45f351757e8638656e12a0135' AND file:hashes.SHA1 = '7cab4853c370a2dd299a5ab3ebeccfe17455cb43' AND file:hashes.SHA256 = '0024e32c0199ded445c0b968601f21cc92fc0c534d2642f2dd64c1c978ff01f3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-09T08:10:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--fe330733-f2f4-490d-a9b8-c0f0da7353fe",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-09T08:10:11.000Z",
"modified": "2018-01-09T08:10:11.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/0024e32c0199ded445c0b968601f21cc92fc0c534d2642f2dd64c1c978ff01f3/analysis/1515484532/",
"category": "External analysis",
"comment": "We identified two other pieces of software which share some code:",
"uuid": "5a5478e3-fa78-43c9-90a9-b75d02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "6/67",
"category": "Other",
"comment": "We identified two other pieces of software which share some code:",
"uuid": "5a5478e3-e430-4494-8cd8-b75d02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-09T07:55:32",
"category": "Other",
"comment": "We identified two other pieces of software which share some code:",
"uuid": "5a5478e3-546c-4052-abd1-b75d02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--3e8d6237-bdd1-4a4a-aac0-290ef45df159",
"created": "2018-01-11T18:49:07.000Z",
"modified": "2018-01-11T18:49:07.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ecdcbae1-a690-4f9c-9ce7-b505f1c1a634",
"target_ref": "x-misp-object--0b6118b9-a775-47cf-8f97-de518c5ffd7a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e569ab38-433f-4a4b-8f01-660309d07090",
"created": "2018-01-11T18:49:07.000Z",
"modified": "2018-01-11T18:49:07.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--62422a69-b558-4bbc-9e01-ff1038764faf",
"target_ref": "x-misp-object--36e2da81-042e-4880-9f27-76ebec952ba0"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--af53bfb2-b8de-4c94-aae7-558164209341",
"created": "2018-01-11T18:49:08.000Z",
"modified": "2018-01-11T18:49:08.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--8a8becfb-f8ce-440a-9ffa-81a43239f4e2",
"target_ref": "x-misp-object--fe330733-f2f4-490d-a9b8-c0f0da7353fe"
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}