misp-circl-feed/feeds/circl/stix-2.1/5b27b1a5-34c4-4896-a522-473d950d210f.json

218 lines
No EOL
9 KiB
JSON

{
"type": "bundle",
"id": "bundle--5b27b1a5-34c4-4896-a522-473d950d210f",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-10-26T14:22:53.000Z",
"modified": "2018-10-26T14:22:53.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "grouping",
"spec_version": "2.1",
"id": "grouping--5b27b1a5-34c4-4896-a522-473d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-10-26T14:22:53.000Z",
"modified": "2018-10-26T14:22:53.000Z",
"name": "OSINT - New Paradise Ransomware variant",
"context": "suspicious-activity",
"object_refs": [
"indicator--5b27b3c1-d6dc-4443-b8bf-ef38950d210f",
"indicator--5b27b3c2-aca8-4318-92e2-ef38950d210f",
"x-misp-object--5b27b1f9-8cf8-4ae9-9317-ee9f950d210f",
"x-misp-object--5b27b397-a6e8-4a70-9151-ef38950d210f"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"malware_classification:malware-category=\"Ransomware\"",
"circl:incident-classification=\"malware\"",
"osint:source-type=\"microblog-post\"",
"misp-galaxy:ransomware=\"Paradise Ransomware\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b27b3c1-d6dc-4443-b8bf-ef38950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-06-18T13:29:37.000Z",
"modified": "2018-06-18T13:29:37.000Z",
"pattern": "[email-message:from_ref.value = 'paradise@all-ransomware.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-06-18T13:29:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-src\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b27b3c2-aca8-4318-92e2-ef38950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-06-18T13:29:38.000Z",
"modified": "2018-06-18T13:29:38.000Z",
"description": "Ransomnote",
"pattern": "[email-message:from_ref.value = 'paradise_readme_paradise@all-ransomware.info.txt']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-06-18T13:29:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-src\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--5b27b1f9-8cf8-4ae9-9317-ee9f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-06-18T13:22:01.000Z",
"modified": "2018-06-18T13:22:01.000Z",
"labels": [
"misp:name=\"microblog\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "post",
"value": "The new Paradise ransomware version stores the config in a section called \"trump\"...\r\n\ud83d\ude02\r\n@BleepinComputer @demonslay335",
"category": "Other",
"uuid": "5b27b1f9-8978-422d-b610-ee9f950d210f"
},
{
"type": "text",
"object_relation": "type",
"value": "Twitter",
"category": "Other",
"uuid": "5b27b1fa-4f88-45c7-87d6-ee9f950d210f"
},
{
"type": "url",
"object_relation": "url",
"value": "https://twitter.com/malwrhunterteam/status/993499349199056897",
"category": "Network activity",
"to_ids": true,
"uuid": "5b27b1fa-8cfc-42d7-af0d-ee9f950d210f"
},
{
"type": "text",
"object_relation": "username-quoted",
"value": "@BleepinComputer @demonslay335",
"category": "Other",
"uuid": "5b27b1fb-a848-4aec-809e-ee9f950d210f"
},
{
"type": "datetime",
"object_relation": "creation-date",
"value": "7 May 2018",
"category": "Other",
"uuid": "5b27b1fd-3718-46a5-b53e-ee9f950d210f"
},
{
"type": "text",
"object_relation": "username",
"value": "@malwrhunterteam",
"category": "Other",
"uuid": "5b27b1fe-3f6c-4ad0-b15d-ee9f950d210f"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "microblog"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--5b27b397-a6e8-4a70-9151-ef38950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-06-18T13:28:55.000Z",
"modified": "2018-06-18T13:28:55.000Z",
"labels": [
"misp:name=\"microblog\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "post",
"value": "Latest sample of Paradise ransomware (RaaS?) still uses \"trump\" as section name ((link: https://twitter.com/malwrhunterteam/status/993499349199056897) twitter.com/malwrhuntertea\u2026) and mutex.\r\nUses GetUserDefaultLangID & checks for 12 values, then uses an IP API & 12 checks again. \r\nIf can't guess the values, see screens...\r\n@BleepinComputer @demonslay335",
"category": "Other",
"uuid": "5b27b397-74fc-41f8-bb77-ef38950d210f"
},
{
"type": "text",
"object_relation": "type",
"value": "Twitter",
"category": "Other",
"uuid": "5b27b398-75c4-406d-aabb-ef38950d210f"
},
{
"type": "url",
"object_relation": "url",
"value": "https://twitter.com/malwrhunterteam/status/1005420103415017472",
"category": "Network activity",
"to_ids": true,
"uuid": "5b27b398-f3ac-47eb-af44-ef38950d210f"
},
{
"type": "text",
"object_relation": "username-quoted",
"value": "@BleepinComputer @demonslay335",
"category": "Other",
"uuid": "5b27b398-c6b4-47bd-8247-ef38950d210f"
},
{
"type": "datetime",
"object_relation": "creation-date",
"value": "9 Jun 2018",
"category": "Other",
"uuid": "5b27b399-ac90-496a-ba51-ef38950d210f"
},
{
"type": "text",
"object_relation": "username",
"value": "@malwrhunterteam",
"category": "Other",
"uuid": "5b27b399-c524-4b8c-936b-ef38950d210f"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "microblog"
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}