249 lines
No EOL
7.4 KiB
JSON
249 lines
No EOL
7.4 KiB
JSON
{
|
|
"Event": {
|
|
"analysis": "1",
|
|
"date": "2020-03-12",
|
|
"extends_uuid": "",
|
|
"info": "Rhombus - Linux DDoS botnet aims VPS & IoT, w/persistence & dropper",
|
|
"publish_timestamp": "1584048355",
|
|
"published": true,
|
|
"threat_level_id": "3",
|
|
"timestamp": "1584048290",
|
|
"uuid": "5e6aa53c-bcf8-4279-9c48-40d0950d210f",
|
|
"Orgc": {
|
|
"name": "MalwareMustDie",
|
|
"uuid": "569e04b2-efd0-45bd-b83a-4f7b950d210f"
|
|
},
|
|
"Tag": [
|
|
{
|
|
"colour": "#ffffff",
|
|
"local": "0",
|
|
"name": "tlp:white",
|
|
"relationship_type": ""
|
|
},
|
|
{
|
|
"colour": "#22681c",
|
|
"local": "0",
|
|
"name": "malware_classification:malware-category=\"Botnet\"",
|
|
"relationship_type": ""
|
|
},
|
|
{
|
|
"colour": "#32003e",
|
|
"local": "0",
|
|
"name": "ms-caro-malware:malware-type=\"DDoS\"",
|
|
"relationship_type": ""
|
|
},
|
|
{
|
|
"colour": "#5ed600",
|
|
"local": "0",
|
|
"name": "ddos:type=\"flooding-attack\"",
|
|
"relationship_type": ""
|
|
},
|
|
{
|
|
"colour": "#001a42",
|
|
"local": "0",
|
|
"name": "ms-caro-malware-full:malware-platform=\"Linux\"",
|
|
"relationship_type": ""
|
|
}
|
|
],
|
|
"Attribute": [
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "Malware payloads and installers(dropper)",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1584047562",
|
|
"to_ids": false,
|
|
"type": "md5",
|
|
"uuid": "5e6aa5ca-9d98-4a8b-8abd-c5a7950d210f",
|
|
"value": "5fd910e87382d838d9ff17e4ad5843fb"
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "Malware payloads and installers(dropper)",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1584047562",
|
|
"to_ids": false,
|
|
"type": "md5",
|
|
"uuid": "5e6aa5ca-1470-4d9e-88f7-c5a7950d210f",
|
|
"value": "d93c7daebe7adc95e575c9934248d00f"
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "Malware payloads and installers(dropper)",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1584047562",
|
|
"to_ids": false,
|
|
"type": "md5",
|
|
"uuid": "5e6aa5ca-12a4-4a7a-84ac-c5a7950d210f",
|
|
"value": "239aecbf01af2ff17b6cfbe606db5808"
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "Malware payloads and installers(dropper)",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1584047562",
|
|
"to_ids": false,
|
|
"type": "md5",
|
|
"uuid": "5e6aa5ca-1e10-41b9-91f2-c5a7950d210f",
|
|
"value": "ba42665872ea41e3d2edd8978bc38c24"
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "Malware payloads and installers(dropper)",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1584047562",
|
|
"to_ids": false,
|
|
"type": "md5",
|
|
"uuid": "5e6aa5ca-41cc-4e2c-8dd6-c5a7950d210f",
|
|
"value": "e7b10bb7b81346d31f126e202d62a157"
|
|
},
|
|
{
|
|
"category": "Network activity",
|
|
"comment": "C2 IP address",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1584047631",
|
|
"to_ids": false,
|
|
"type": "ip-dst",
|
|
"uuid": "5e6aa60f-fcf0-4630-9bd1-4930950d210f",
|
|
"value": "209.126.69.167"
|
|
},
|
|
{
|
|
"category": "Network activity",
|
|
"comment": "C2 IP address",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1584047635",
|
|
"to_ids": false,
|
|
"type": "ip-dst",
|
|
"uuid": "5e6aa613-ee50-4601-809d-4f37950d210f",
|
|
"value": "45.135.134.132"
|
|
},
|
|
{
|
|
"category": "Network activity",
|
|
"comment": "C2 IP address",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1584047635",
|
|
"to_ids": false,
|
|
"type": "ip-dst",
|
|
"uuid": "5e6aa613-8d04-427a-af67-49e5950d210f",
|
|
"value": "167.172.128.4"
|
|
},
|
|
{
|
|
"category": "Network activity",
|
|
"comment": "C2 IP address",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1584047635",
|
|
"to_ids": false,
|
|
"type": "ip-dst",
|
|
"uuid": "5e6aa613-54dc-4a5e-b9f0-435e950d210f",
|
|
"value": "205.185.122.243"
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "Persistence setup filename",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1584047745",
|
|
"to_ids": false,
|
|
"type": "filename",
|
|
"uuid": "5e6aa681-e5f8-4a06-bb94-46b1950d210f",
|
|
"value": "/etc/rc.d/rc.local"
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "Persistence setup filename",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1584047745",
|
|
"to_ids": false,
|
|
"type": "filename",
|
|
"uuid": "5e6aa681-6304-499c-a869-4b57950d210f",
|
|
"value": "/etc/rc.local"
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "Persistence setup filename",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1584047745",
|
|
"to_ids": false,
|
|
"type": "filename",
|
|
"uuid": "5e6aa681-94d4-4fd3-b587-424b950d210f",
|
|
"value": "/etc/cron.hourly/0"
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1584047865",
|
|
"to_ids": false,
|
|
"type": "filename",
|
|
"uuid": "5e6aa6f9-aa4c-4ef7-a13f-4510950d210f",
|
|
"value": "RHOMBUS.arm5"
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1584047865",
|
|
"to_ids": false,
|
|
"type": "filename",
|
|
"uuid": "5e6aa6f9-fd94-4d86-8b46-46a4950d210f",
|
|
"value": "RHOMBUS.mpsl"
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1584047865",
|
|
"to_ids": false,
|
|
"type": "filename",
|
|
"uuid": "5e6aa6f9-0084-4eeb-977b-4cdf950d210f",
|
|
"value": "RHOMBUS.sh4"
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1584047865",
|
|
"to_ids": false,
|
|
"type": "filename",
|
|
"uuid": "5e6aa6f9-43f4-4e3d-9902-4780950d210f",
|
|
"value": "RHOMBUS.x86"
|
|
},
|
|
{
|
|
"category": "Payload delivery",
|
|
"comment": "",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1584047865",
|
|
"to_ids": false,
|
|
"type": "filename",
|
|
"uuid": "5e6aa6f9-8078-42d1-ac45-40c3950d210f",
|
|
"value": "RHOMBUS.x86_64"
|
|
},
|
|
{
|
|
"category": "Internal reference",
|
|
"comment": "Threat report",
|
|
"deleted": false,
|
|
"disable_correlation": false,
|
|
"timestamp": "1584047924",
|
|
"to_ids": false,
|
|
"type": "link",
|
|
"uuid": "5e6aa734-6504-4610-abbb-4a01950d210f",
|
|
"value": "https://reddit.com/r/LinuxMalware/comments/fh3zar/memo_rhombus_an_elf_bot_installerdropper/"
|
|
}
|
|
]
|
|
}
|
|
} |