misp-circl-feed/feeds/circl/misp/5a708104-c8b0-4e69-8ac8-4db3950d210f.json

284 lines
No EOL
12 KiB
JSON

{
"type": "bundle",
"id": "bundle--5a708104-c8b0-4e69-8ac8-4db3950d210f",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-30T15:01:16.000Z",
"modified": "2018-01-30T15:01:16.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--5a708104-c8b0-4e69-8ac8-4db3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-30T15:01:16.000Z",
"modified": "2018-01-30T15:01:16.000Z",
"name": "OSINT - TelegramRAT evades traditional defenses via the cloud",
"published": "2018-02-09T12:39:47Z",
"object_refs": [
"observed-data--5a708123-d9cc-48c7-ba90-44bd950d210f",
"url--5a708123-d9cc-48c7-ba90-44bd950d210f",
"x-misp-attribute--5a708146-11e4-454f-b1a3-437d950d210f",
"indicator--5a70845e-154c-4c86-bf70-856c950d210f",
"indicator--5a70845f-5620-404f-b086-856c950d210f",
"indicator--5a70845f-8aac-4e96-b0e7-856c950d210f",
"indicator--5a708460-f210-4fd3-9e8f-856c950d210f",
"indicator--5a708460-0274-4da4-ad64-856c950d210f",
"indicator--5a708461-b188-4cab-bbad-856c950d210f",
"indicator--5a708775-f370-4189-8442-64b5950d210f",
"indicator--5a708803-fa5c-4bb6-abce-856c950d210f"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"misp-galaxy:rat=\"RATAttack\"",
"osint:source-type=\"blog-post\"",
"enisa:nefarious-activity-abuse=\"remote-access-tool\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5a708123-d9cc-48c7-ba90-44bd950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-30T14:28:58.000Z",
"modified": "2018-01-30T14:28:58.000Z",
"first_observed": "2018-01-30T14:28:58Z",
"last_observed": "2018-01-30T14:28:58Z",
"number_observed": 1,
"object_refs": [
"url--5a708123-d9cc-48c7-ba90-44bd950d210f"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\"",
"osint:source-type=\"blog-post\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--5a708123-d9cc-48c7-ba90-44bd950d210f",
"value": "https://www.netskope.com/blog/telegramrat-evades-traditional-defenses-via-cloud/"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--5a708146-11e4-454f-b1a3-437d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-30T14:29:33.000Z",
"modified": "2018-01-30T14:29:33.000Z",
"labels": [
"misp:type=\"comment\"",
"misp:category=\"External analysis\"",
"osint:source-type=\"blog-post\""
],
"x_misp_category": "External analysis",
"x_misp_type": "comment",
"x_misp_value": "Netskope Threat Research Labs discovered a cloud application native Remote Access Trojan (RAT) that we have dubbed TelegramRAT. TelegramRAT uses the Telegram Messenger application for its command and control, and a cloud storage platform for its payload host. This cloud-native approach is designed to evade traditional security scanners that are not able to inspect SSL or not able to provide Cloud Application Instance level traffic inspection.\r\n\r\nTelegramRAT begins its attack as a malicious Microsoft Office document exploiting the November CVE-2017-11882 vulnerability. The document uses the Bit.ly URL redirection service to conceal the TelegramRAT payload hosted on Dropbox. As we have in the past, Netskope Threat Research Labs is actively working with the Dropbox security team to remediate known threats.\r\n\r\nThe TelegramRAT payload downloaded from Dropbox uses the open source Python TelegramRAT code hosted in GitHub. The unique aspect of this malware is the use of Telegram BOT API to receive commands and send responses to the attacker via an HTTPS secure communication channel. TelegramRAT\u00e2\u20ac\u2122s use of SSL cloud applications for infection and C&C operation ensures that traditional network security solutions are opaque to the communication"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a70845e-154c-4c86-bf70-856c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-30T14:46:49.000Z",
"modified": "2018-01-30T14:46:49.000Z",
"pattern": "[file:name = 'Adventurer LOG.doc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-30T14:46:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"filename\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a70845f-5620-404f-b086-856c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-30T14:42:39.000Z",
"modified": "2018-01-30T14:42:39.000Z",
"pattern": "[url:value = 'http://bit.ly/2zyHw08']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-30T14:42:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a70845f-8aac-4e96-b0e7-856c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-30T14:42:39.000Z",
"modified": "2018-01-30T14:42:39.000Z",
"pattern": "[file:name = 'C:UsersSectask.exe']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-30T14:42:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"filename\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a708460-f210-4fd3-9e8f-856c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-30T14:42:40.000Z",
"modified": "2018-01-30T14:42:40.000Z",
"pattern": "[url:value = 'https://www.dropbox.com/s/lhey3uvqkph0mri/taskhost.exe?dl=1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-30T14:42:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a708460-0274-4da4-ad64-856c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-30T14:42:40.000Z",
"modified": "2018-01-30T14:42:40.000Z",
"pattern": "[file:name = 'MSOffice.exe']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-30T14:42:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"filename\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a708461-b188-4cab-bbad-856c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-30T14:42:41.000Z",
"modified": "2018-01-30T14:42:41.000Z",
"pattern": "[file:name = 'MSOffice.LNK']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-30T14:42:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"filename\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a708775-f370-4189-8442-64b5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-30T14:55:49.000Z",
"modified": "2018-01-30T14:55:49.000Z",
"pattern": "[file:name = '\\\\%USERPROFILE\\\\%\\\\task.exe']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-30T14:55:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"filename\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a708803-fa5c-4bb6-abce-856c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-30T14:58:11.000Z",
"modified": "2018-01-30T14:58:11.000Z",
"pattern": "[file:name = 'RATAttack']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-30T14:58:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"filename\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}