218 lines
No EOL
9 KiB
JSON
218 lines
No EOL
9 KiB
JSON
{
|
|
"type": "bundle",
|
|
"id": "bundle--5b27b1a5-34c4-4896-a522-473d950d210f",
|
|
"objects": [
|
|
{
|
|
"type": "identity",
|
|
"spec_version": "2.1",
|
|
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2018-10-26T14:22:53.000Z",
|
|
"modified": "2018-10-26T14:22:53.000Z",
|
|
"name": "CIRCL",
|
|
"identity_class": "organization"
|
|
},
|
|
{
|
|
"type": "grouping",
|
|
"spec_version": "2.1",
|
|
"id": "grouping--5b27b1a5-34c4-4896-a522-473d950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2018-10-26T14:22:53.000Z",
|
|
"modified": "2018-10-26T14:22:53.000Z",
|
|
"name": "OSINT - New Paradise Ransomware variant",
|
|
"context": "suspicious-activity",
|
|
"object_refs": [
|
|
"indicator--5b27b3c1-d6dc-4443-b8bf-ef38950d210f",
|
|
"indicator--5b27b3c2-aca8-4318-92e2-ef38950d210f",
|
|
"x-misp-object--5b27b1f9-8cf8-4ae9-9317-ee9f950d210f",
|
|
"x-misp-object--5b27b397-a6e8-4a70-9151-ef38950d210f"
|
|
],
|
|
"labels": [
|
|
"Threat-Report",
|
|
"misp:tool=\"MISP-STIX-Converter\"",
|
|
"malware_classification:malware-category=\"Ransomware\"",
|
|
"circl:incident-classification=\"malware\"",
|
|
"osint:source-type=\"microblog-post\"",
|
|
"misp-galaxy:ransomware=\"Paradise Ransomware\""
|
|
],
|
|
"object_marking_refs": [
|
|
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--5b27b3c1-d6dc-4443-b8bf-ef38950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2018-06-18T13:29:37.000Z",
|
|
"modified": "2018-06-18T13:29:37.000Z",
|
|
"pattern": "[email-message:from_ref.value = 'paradise@all-ransomware.info']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2018-06-18T13:29:37Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"email-src\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--5b27b3c2-aca8-4318-92e2-ef38950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2018-06-18T13:29:38.000Z",
|
|
"modified": "2018-06-18T13:29:38.000Z",
|
|
"description": "Ransomnote",
|
|
"pattern": "[email-message:from_ref.value = 'paradise_readme_paradise@all-ransomware.info.txt']",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2018-06-18T13:29:38Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "Payload delivery"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:type=\"email-src\"",
|
|
"misp:category=\"Payload delivery\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "x-misp-object",
|
|
"spec_version": "2.1",
|
|
"id": "x-misp-object--5b27b1f9-8cf8-4ae9-9317-ee9f950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2018-06-18T13:22:01.000Z",
|
|
"modified": "2018-06-18T13:22:01.000Z",
|
|
"labels": [
|
|
"misp:name=\"microblog\"",
|
|
"misp:meta-category=\"misc\""
|
|
],
|
|
"x_misp_attributes": [
|
|
{
|
|
"type": "text",
|
|
"object_relation": "post",
|
|
"value": "The new Paradise ransomware version stores the config in a section called \"trump\"...\r\n\ud83d\ude02\r\n@BleepinComputer @demonslay335",
|
|
"category": "Other",
|
|
"uuid": "5b27b1f9-8978-422d-b610-ee9f950d210f"
|
|
},
|
|
{
|
|
"type": "text",
|
|
"object_relation": "type",
|
|
"value": "Twitter",
|
|
"category": "Other",
|
|
"uuid": "5b27b1fa-4f88-45c7-87d6-ee9f950d210f"
|
|
},
|
|
{
|
|
"type": "url",
|
|
"object_relation": "url",
|
|
"value": "https://twitter.com/malwrhunterteam/status/993499349199056897",
|
|
"category": "Network activity",
|
|
"to_ids": true,
|
|
"uuid": "5b27b1fa-8cfc-42d7-af0d-ee9f950d210f"
|
|
},
|
|
{
|
|
"type": "text",
|
|
"object_relation": "username-quoted",
|
|
"value": "@BleepinComputer @demonslay335",
|
|
"category": "Other",
|
|
"uuid": "5b27b1fb-a848-4aec-809e-ee9f950d210f"
|
|
},
|
|
{
|
|
"type": "datetime",
|
|
"object_relation": "creation-date",
|
|
"value": "7 May 2018",
|
|
"category": "Other",
|
|
"uuid": "5b27b1fd-3718-46a5-b53e-ee9f950d210f"
|
|
},
|
|
{
|
|
"type": "text",
|
|
"object_relation": "username",
|
|
"value": "@malwrhunterteam",
|
|
"category": "Other",
|
|
"uuid": "5b27b1fe-3f6c-4ad0-b15d-ee9f950d210f"
|
|
}
|
|
],
|
|
"x_misp_meta_category": "misc",
|
|
"x_misp_name": "microblog"
|
|
},
|
|
{
|
|
"type": "x-misp-object",
|
|
"spec_version": "2.1",
|
|
"id": "x-misp-object--5b27b397-a6e8-4a70-9151-ef38950d210f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2018-06-18T13:28:55.000Z",
|
|
"modified": "2018-06-18T13:28:55.000Z",
|
|
"labels": [
|
|
"misp:name=\"microblog\"",
|
|
"misp:meta-category=\"misc\""
|
|
],
|
|
"x_misp_attributes": [
|
|
{
|
|
"type": "text",
|
|
"object_relation": "post",
|
|
"value": "Latest sample of Paradise ransomware (RaaS?) still uses \"trump\" as section name ((link: https://twitter.com/malwrhunterteam/status/993499349199056897) twitter.com/malwrhuntertea\u2026) and mutex.\r\nUses GetUserDefaultLangID & checks for 12 values, then uses an IP API & 12 checks again. \r\nIf can't guess the values, see screens...\r\n@BleepinComputer @demonslay335",
|
|
"category": "Other",
|
|
"uuid": "5b27b397-74fc-41f8-bb77-ef38950d210f"
|
|
},
|
|
{
|
|
"type": "text",
|
|
"object_relation": "type",
|
|
"value": "Twitter",
|
|
"category": "Other",
|
|
"uuid": "5b27b398-75c4-406d-aabb-ef38950d210f"
|
|
},
|
|
{
|
|
"type": "url",
|
|
"object_relation": "url",
|
|
"value": "https://twitter.com/malwrhunterteam/status/1005420103415017472",
|
|
"category": "Network activity",
|
|
"to_ids": true,
|
|
"uuid": "5b27b398-f3ac-47eb-af44-ef38950d210f"
|
|
},
|
|
{
|
|
"type": "text",
|
|
"object_relation": "username-quoted",
|
|
"value": "@BleepinComputer @demonslay335",
|
|
"category": "Other",
|
|
"uuid": "5b27b398-c6b4-47bd-8247-ef38950d210f"
|
|
},
|
|
{
|
|
"type": "datetime",
|
|
"object_relation": "creation-date",
|
|
"value": "9 Jun 2018",
|
|
"category": "Other",
|
|
"uuid": "5b27b399-ac90-496a-ba51-ef38950d210f"
|
|
},
|
|
{
|
|
"type": "text",
|
|
"object_relation": "username",
|
|
"value": "@malwrhunterteam",
|
|
"category": "Other",
|
|
"uuid": "5b27b399-c524-4b8c-936b-ef38950d210f"
|
|
}
|
|
],
|
|
"x_misp_meta_category": "misc",
|
|
"x_misp_name": "microblog"
|
|
},
|
|
{
|
|
"type": "marking-definition",
|
|
"spec_version": "2.1",
|
|
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
|
|
"created": "2017-01-20T00:00:00.000Z",
|
|
"definition_type": "tlp",
|
|
"name": "TLP:WHITE",
|
|
"definition": {
|
|
"tlp": "white"
|
|
}
|
|
}
|
|
]
|
|
} |