id
int64
105
14.4k
text
stringlengths
39
889
entities
list
relations
list
Comments
list
3,348
The Cobalt Strike loader, which has a PDB string “C:\Users\test\Desktop\fishmaster\x64\Release\fishmaster.pdb”, connects to the C&C server “download[.]google-images[.]ml”.
[ { "id": 48959, "label": "tools", "start_offset": 4, "end_offset": 17 }, { "id": 48960, "label": "FILEPATH", "start_offset": 50, "end_offset": 109 }, { "id": 48961, "label": "DOMAIN", "start_offset": 140, "end_offset": 169 } ]
[ { "id": 511, "from_id": 48960, "to_id": 48959, "type": "indicates" }, { "id": 514, "from_id": 48959, "to_id": 48961, "type": "beacons-to" } ]
[]
3,350
While these connections allow us to link the malware to the Winnti Group, the different targets between BIOPASS RAT and the current operations by Winnti’s that we are tracking makes associating the two more difficult.
[ { "id": 48963, "label": "threat-actor", "start_offset": 60, "end_offset": 72 }, { "id": 48964, "label": "malware", "start_offset": 104, "end_offset": 115 }, { "id": 48965, "label": "threat-actor", "start_offset": 146, "end_offset": 152 } ]
[ { "id": 515, "from_id": 48963, "to_id": 48964, "type": "uses" } ]
[]
3,359
Indicators of Compromise (IoCs) SHA256 Filename Note Analysis 84fbf74896d2a1b62d73b9a5d0be2f627d522fc811fe08044e5485492d2d4249 big.txt BIOPASS RAT Python Script (Version 3) TrojanSpy.Python.BIOPASS.A f3c96145c9d6972df265e12accfcd1588cee8af1b67093011e31b44d0200871f c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan.Python.BIOPASS.A 0f8a87ca5f94949904804442c1a0651f99ba17ecf989f46a3b2fde8de455c4a4 c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan.Python.BIOPASS.A d8b1c4ad8f31c735c51cb24e9f767649f78ef5c571769fbaac9891c899c33444 c1222.txt BIOPASS RAT Python Script (C1222 module)
[ { "id": 10167, "label": "SHA1", "start_offset": 71, "end_offset": 135 }, { "id": 10168, "label": "malware", "start_offset": 146, "end_offset": 157 }, { "id": 10169, "label": "SHA1", "start_offset": 213, "end_offset": 277 }, { "id": 10170, "label": "malware", "start_offset": 290, "end_offset": 301 }, { "id": 10171, "label": "SHA2", "start_offset": 357, "end_offset": 421 }, { "id": 10172, "label": "malware", "start_offset": 434, "end_offset": 445 }, { "id": 10173, "label": "SHA2", "start_offset": 501, "end_offset": 565 }, { "id": 10174, "label": "malware", "start_offset": 578, "end_offset": 589 }, { "id": 48970, "label": "FILEPATH", "start_offset": 137, "end_offset": 144 }, { "id": 48972, "label": "FILEPATH", "start_offset": 279, "end_offset": 288 }, { "id": 48975, "label": "malware", "start_offset": 476, "end_offset": 499 }, { "id": 48976, "label": "FILEPATH", "start_offset": 567, "end_offset": 576 }, { "id": 48974, "label": "FILEPATH", "start_offset": 423, "end_offset": 432 }, { "id": 48971, "label": "malware", "start_offset": 185, "end_offset": 211 }, { "id": 48973, "label": "malware", "start_offset": 332, "end_offset": 355 } ]
[ { "id": 516, "from_id": 10167, "to_id": 10168, "type": "indicates" }, { "id": 517, "from_id": 48970, "to_id": 10168, "type": "indicates" }, { "id": 519, "from_id": 48970, "to_id": 10167, "type": "duplicate-of" }, { "id": 520, "from_id": 10168, "to_id": 48971, "type": "duplicate-of" }, { "id": 521, "from_id": 10169, "to_id": 10170, "type": "indicates" }, { "id": 522, "from_id": 48972, "to_id": 10170, "type": "indicates" }, { "id": 523, "from_id": 48972, "to_id": 10169, "type": "duplicate-of" }, { "id": 524, "from_id": 48973, "to_id": 10170, "type": "duplicate-of" }, { "id": 525, "from_id": 10171, "to_id": 10172, "type": "indicates" }, { "id": 526, "from_id": 48974, "to_id": 10172, "type": "indicates" }, { "id": 527, "from_id": 48975, "to_id": 10172, "type": "duplicate-of" }, { "id": 528, "from_id": 48974, "to_id": 10171, "type": "duplicate-of" }, { "id": 529, "from_id": 10173, "to_id": 10174, "type": "indicates" }, { "id": 530, "from_id": 48976, "to_id": 10174, "type": "indicates" }, { "id": 531, "from_id": 48976, "to_id": 10173, "type": "duplicate-of" } ]
[]
3,361
Python.BIOPASS.A ee4150f18ed826c032e7407468beea3b1f738ba80b75a6be21bb8d59ee345466
[ { "id": 10175, "label": "SHA2", "start_offset": 18, "end_offset": 82 }, { "id": 48977, "label": "malware", "start_offset": 0, "end_offset": 16 } ]
[ { "id": 532, "from_id": 10175, "to_id": 48977, "type": "indicates" } ]
[]
3,362
c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan
[ { "id": 10176, "label": "malware", "start_offset": 11, "end_offset": 22 }, { "id": 48978, "label": "FILEPATH", "start_offset": 0, "end_offset": 9 } ]
[ { "id": 533, "from_id": 48978, "to_id": 10176, "type": "indicates" } ]
[]
3,363
.Python.BIOPASS.A 34be85754a84cc44e5bb752ee3a95e2832e7be1f611dd99e9a1233c812a6dad2 c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan
[ { "id": 10177, "label": "SHA2", "start_offset": 19, "end_offset": 83 }, { "id": 10178, "label": "malware", "start_offset": 96, "end_offset": 107 }, { "id": 48979, "label": "malware", "start_offset": 0, "end_offset": 17 }, { "id": 48980, "label": "FILEPATH", "start_offset": 85, "end_offset": 94 } ]
[ { "id": 534, "from_id": 48979, "to_id": 10178, "type": "duplicate-of" }, { "id": 535, "from_id": 48980, "to_id": 10177, "type": "duplicate-of" }, { "id": 536, "from_id": 10177, "to_id": 10178, "type": "indicates" }, { "id": 537, "from_id": 48980, "to_id": 10178, "type": "indicates" } ]
[]
3,364
.Python.BIOPASS.A 30ccfbf24b7c8cc15f85541d5ec18feb0e19e75e1e4d2bca9941e6585dad7bc7 cdaemon.txt BIOPASS RAT Python Script (Cdaemon module) Trojan
[ { "id": 10180, "label": "malware", "start_offset": 98, "end_offset": 109 }, { "id": 10179, "label": "SHA2", "start_offset": 19, "end_offset": 83 }, { "id": 48981, "label": "malware", "start_offset": 1, "end_offset": 17 }, { "id": 48982, "label": "FILEPATH", "start_offset": 85, "end_offset": 96 } ]
[ { "id": 538, "from_id": 48982, "to_id": 10179, "type": "duplicate-of" }, { "id": 539, "from_id": 10179, "to_id": 10180, "type": "indicates" }, { "id": 540, "from_id": 48982, "to_id": 10180, "type": "indicates" }, { "id": 541, "from_id": 48981, "to_id": 10180, "type": "duplicate-of" } ]
[]
3,365
.Python.BIOPASS.A f21decb19da8d8c07066a78839ffd8af6721b1f4323f10a1df030325a1a5e159 cdaemon.txt BIOPASS RAT Python Script (Cdaemon module)
[ { "id": 10182, "label": "malware", "start_offset": 98, "end_offset": 109 }, { "id": 10181, "label": "SHA2", "start_offset": 19, "end_offset": 83 }, { "id": 48983, "label": "FILEPATH", "start_offset": 85, "end_offset": 96 }, { "id": 48984, "label": "malware", "start_offset": 1, "end_offset": 17 } ]
[ { "id": 542, "from_id": 10181, "to_id": 10182, "type": "indicates" }, { "id": 543, "from_id": 48983, "to_id": 10182, "type": "indicates" }, { "id": 544, "from_id": 48983, "to_id": 10181, "type": "duplicate-of" }, { "id": 545, "from_id": 48984, "to_id": 10182, "type": "duplicate-of" } ]
[]
3,369
cdaemon.txt BIOPASS RAT Python Script (Cdaemon module) Trojan
[ { "id": 10184, "label": "malware", "start_offset": 13, "end_offset": 24 }, { "id": 48986, "label": "FILEPATH", "start_offset": 0, "end_offset": 11 } ]
[ { "id": 547, "from_id": 48986, "to_id": 10184, "type": "indicates" } ]
[]
3,370
.Python.BIOPASS.A e479823aa41d3f6416233dba8e765cf2abaa38ad18328859a20b88df7f1d88d5 sc2.txt BIOPASS RAT encoded Cobalt Strike shellcode Trojan.Win32.COBEACON.A e567fd0f08fdafc5a89c9084373f3308ef464918ff7e4ecd7fb3135d777e946d sc3.txt
[ { "id": 10186, "label": "malware", "start_offset": 94, "end_offset": 105 }, { "id": 10187, "label": "tools", "start_offset": 114, "end_offset": 127 }, { "id": 10188, "label": "SHA2", "start_offset": 164, "end_offset": 228 }, { "id": 10185, "label": "SHA2", "start_offset": 19, "end_offset": 83 }, { "id": 48989, "label": "malware", "start_offset": 139, "end_offset": 162 }, { "id": 48987, "label": "malware", "start_offset": 1, "end_offset": 17 }, { "id": 48988, "label": "FILEPATH", "start_offset": 85, "end_offset": 92 }, { "id": 48990, "label": "FILEPATH", "start_offset": 230, "end_offset": 237 } ]
[ { "id": 548, "from_id": 10185, "to_id": 10186, "type": "indicates" }, { "id": 549, "from_id": 48988, "to_id": 10186, "type": "indicates" }, { "id": 553, "from_id": 10187, "to_id": 48989, "type": "related-to" }, { "id": 550, "from_id": 48987, "to_id": 10186, "type": "duplicate-of" }, { "id": 551, "from_id": 10185, "to_id": 48988, "type": "duplicate-of" }, { "id": 552, "from_id": 10186, "to_id": 10187, "type": "uses" }, { "id": 554, "from_id": 10188, "to_id": 48989, "type": "indicates" }, { "id": 555, "from_id": 48990, "to_id": 48989, "type": "indicates" }, { "id": 556, "from_id": 48989, "to_id": 10186, "type": "duplicate-of" } ]
[]
3,374
Silverlight_ins.exe BIOPASS RAT Loader
[ { "id": 10218, "label": "malware", "start_offset": 21, "end_offset": 32 }, { "id": 49020, "label": "FILEPATH", "start_offset": 0, "end_offset": 19 } ]
[ { "id": 557, "from_id": 49020, "to_id": 10218, "type": "indicates" } ]
[]
3,375
Backdoor.Win64.BIOPASS.A 0f18694b400e14eb995003541f16f75a5afc2478cc415a6295d171ba93565a82 flash_installer.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 11b785e77cbfa2d3849575cdfabd85d41bae3f2e0d33a77e7e2c46a45732d6e4 System.exe
[ { "id": 10219, "label": "SHA2", "start_offset": 27, "end_offset": 91 }, { "id": 10220, "label": "malware", "start_offset": 114, "end_offset": 125 }, { "id": 49022, "label": "FILEPATH", "start_offset": 93, "end_offset": 112 }, { "id": 10221, "label": "SHA2", "start_offset": 160, "end_offset": 224 }, { "id": 49021, "label": "malware", "start_offset": 1, "end_offset": 25 }, { "id": 49023, "label": "malware", "start_offset": 134, "end_offset": 158 }, { "id": 49024, "label": "FILEPATH", "start_offset": 226, "end_offset": 236 } ]
[ { "id": 558, "from_id": 10219, "to_id": 10220, "type": "indicates" }, { "id": 559, "from_id": 49022, "to_id": 10220, "type": "indicates" }, { "id": 560, "from_id": 10221, "to_id": 49023, "type": "indicates" }, { "id": 561, "from_id": 49024, "to_id": 49023, "type": "indicates" }, { "id": 562, "from_id": 49023, "to_id": 10220, "type": "duplicate-of" }, { "id": 563, "from_id": 49021, "to_id": 10220, "type": "duplicate-of" }, { "id": 564, "from_id": 10219, "to_id": 49022, "type": "duplicate-of" }, { "id": 565, "from_id": 10221, "to_id": 49024, "type": "duplicate-of" } ]
[]
3,379
test3.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 281c938448e32eb12fe8c5439ef06cea848668cf57fed5ad64b9a8d1e07de561
[ { "id": 10224, "label": "malware", "start_offset": 11, "end_offset": 22 }, { "id": 10225, "label": "SHA2", "start_offset": 57, "end_offset": 121 }, { "id": 49026, "label": "FILEPATH", "start_offset": 0, "end_offset": 9 }, { "id": 49027, "label": "malware", "start_offset": 31, "end_offset": 55 } ]
[ { "id": 566, "from_id": 49026, "to_id": 10224, "type": "indicates" }, { "id": 567, "from_id": 10225, "to_id": 10224, "type": "indicates" }, { "id": 568, "from_id": 49027, "to_id": 10224, "type": "duplicate-of" }, { "id": 569, "from_id": 49026, "to_id": 10225, "type": "duplicate-of" } ]
[]
3,381
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 2b580af1cdc4655ae75ef503aba7600e05cdd68b056a9354a2184b7fbb24db6f Silverlight_ins.exe
[ { "id": 10226, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 10227, "label": "SHA2", "start_offset": 46, "end_offset": 110 }, { "id": 49029, "label": "malware", "start_offset": 20, "end_offset": 44 }, { "id": 49030, "label": "FILEPATH", "start_offset": 112, "end_offset": 131 } ]
[ { "id": 570, "from_id": 10226, "to_id": 49029, "type": "duplicate-of" }, { "id": 571, "from_id": 10227, "to_id": 49029, "type": "indicates" }, { "id": 572, "from_id": 49030, "to_id": 49029, "type": "indicates" }, { "id": 573, "from_id": 49030, "to_id": 10227, "type": "duplicate-of" } ]
[]
3,382
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 30a65a54acfbf8d412ade728cad86c5c769befa4e456f7c0e552e1ab0862a446 flash-64.exe
[ { "id": 10228, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 10229, "label": "SHA2", "start_offset": 46, "end_offset": 110 }, { "id": 49032, "label": "FILEPATH", "start_offset": 112, "end_offset": 124 }, { "id": 49031, "label": "malware", "start_offset": 20, "end_offset": 44 } ]
[ { "id": 574, "from_id": 49032, "to_id": 10229, "type": "duplicate-of" }, { "id": 575, "from_id": 10228, "to_id": 49031, "type": "duplicate-of" }, { "id": 576, "from_id": 49032, "to_id": 49031, "type": "indicates" }, { "id": 577, "from_id": 10229, "to_id": 49031, "type": "indicates" } ]
[]
3,383
BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A 30d9ffd4b92a4ed67569a78ceb25bb6f66346d1c0a7d6d6305e235cbdfe61ebe Silverlight_ins.exe
[ { "id": 10230, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 10231, "label": "SHA2", "start_offset": 46, "end_offset": 110 }, { "id": 49034, "label": "FILEPATH", "start_offset": 112, "end_offset": 131 }, { "id": 49033, "label": "malware", "start_offset": 20, "end_offset": 44 } ]
[ { "id": 578, "from_id": 10230, "to_id": 49033, "type": "duplicate-of" }, { "id": 579, "from_id": 49034, "to_id": 10231, "type": "duplicate-of" }, { "id": 580, "from_id": 49034, "to_id": 49033, "type": "indicates" }, { "id": 581, "from_id": 10231, "to_id": 49033, "type": "indicates" } ]
[]
3,384
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 3195c355aa564ea66b4b37baa9547cb53dde7cf4ae7010256db92fff0bde873d flash.exe
[ { "id": 10232, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 10233, "label": "SHA2", "start_offset": 46, "end_offset": 110 }, { "id": 49035, "label": "malware", "start_offset": 20, "end_offset": 44 }, { "id": 49036, "label": "FILEPATH", "start_offset": 112, "end_offset": 121 } ]
[ { "id": 582, "from_id": 10232, "to_id": 49035, "type": "duplicate-of" }, { "id": 583, "from_id": 49036, "to_id": 10233, "type": "duplicate-of" }, { "id": 584, "from_id": 49036, "to_id": 49035, "type": "indicates" }, { "id": 585, "from_id": 10233, "to_id": 49035, "type": "indicates" } ]
[]
3,385
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 32a3934d96a8f2dae805fa28355cd0155c22ffad4545f9cd9c1ba1e9545b39ac
[ { "id": 10234, "label": "malware", "start_offset": 1, "end_offset": 12 }, { "id": 10235, "label": "SHA2", "start_offset": 47, "end_offset": 111 }, { "id": 49037, "label": "malware", "start_offset": 21, "end_offset": 45 } ]
[ { "id": 586, "from_id": 10234, "to_id": 49037, "type": "duplicate-of" }, { "id": 587, "from_id": 10235, "to_id": 49037, "type": "indicates" } ]
[]
3,389
test3.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 344cdbc2a7e0908cb6638bc7b81b6b697b32755bad3bed09c511866eff3876c7
[ { "id": 10238, "label": "malware", "start_offset": 11, "end_offset": 22 }, { "id": 10239, "label": "SHA2", "start_offset": 57, "end_offset": 121 }, { "id": 49041, "label": "malware", "start_offset": 31, "end_offset": 55 }, { "id": 49040, "label": "FILEPATH", "start_offset": 0, "end_offset": 9 } ]
[ { "id": 588, "from_id": 49040, "to_id": 49041, "type": "indicates" }, { "id": 589, "from_id": 10238, "to_id": 49041, "type": "duplicate-of" }, { "id": 590, "from_id": 49040, "to_id": 10239, "type": "duplicate-of" }, { "id": 591, "from_id": 10239, "to_id": 49041, "type": "indicates" } ]
[]
3,390
test4.exe BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A 3589e53c59d9807cca709387bbcaaffc7e24e15d9a78425b717fc55c779b928e
[ { "id": 10240, "label": "malware", "start_offset": 11, "end_offset": 22 }, { "id": 10241, "label": "SHA2", "start_offset": 57, "end_offset": 121 }, { "id": 49042, "label": "FILEPATH", "start_offset": 0, "end_offset": 9 }, { "id": 49043, "label": "malware", "start_offset": 31, "end_offset": 55 } ]
[ { "id": 592, "from_id": 49042, "to_id": 49043, "type": "indicates" }, { "id": 593, "from_id": 10241, "to_id": 49043, "type": "indicates" }, { "id": 594, "from_id": 10240, "to_id": 49043, "type": "duplicate-of" }, { "id": 595, "from_id": 49042, "to_id": 10241, "type": "duplicate-of" } ]
[]
3,392
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 36e3fcd6a4c7c9db985be77ea6394b2ed019332fdae4739df2f96a541ea52617 Silverlight.exe
[ { "id": 10242, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 10243, "label": "SHA2", "start_offset": 46, "end_offset": 110 }, { "id": 49045, "label": "malware", "start_offset": 20, "end_offset": 44 }, { "id": 49046, "label": "FILEPATH", "start_offset": 112, "end_offset": 127 } ]
[ { "id": 596, "from_id": 10242, "to_id": 49045, "type": "duplicate-of" }, { "id": 597, "from_id": 49046, "to_id": 10243, "type": "duplicate-of" }, { "id": 598, "from_id": 49046, "to_id": 49045, "type": "indicates" }, { "id": 599, "from_id": 10243, "to_id": 49045, "type": "indicates" } ]
[]
3,393
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 3e8f8b8a5f70c195a2e4d4fc7f80523809f6dbf9ead061ce8ef04fb489a577cf test-flash.exe BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A 5d7aa3474e734913ecb4b820c0c546c92f7684081c519eecd3990e11a19bf2ba flash_installer.exe
[ { "id": 10244, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 10246, "label": "malware", "start_offset": 128, "end_offset": 139 }, { "id": 10245, "label": "SHA2", "start_offset": 46, "end_offset": 110 }, { "id": 10247, "label": "SHA2", "start_offset": 174, "end_offset": 238 }, { "id": 49048, "label": "malware", "start_offset": 20, "end_offset": 44 }, { "id": 49047, "label": "malware", "start_offset": 148, "end_offset": 172 }, { "id": 49050, "label": "FILEPATH", "start_offset": 240, "end_offset": 259 }, { "id": 49049, "label": "FILEPATH", "start_offset": 112, "end_offset": 126 } ]
[ { "id": 600, "from_id": 10244, "to_id": 49048, "type": "duplicate-of" }, { "id": 601, "from_id": 10246, "to_id": 49047, "type": "duplicate-of" }, { "id": 602, "from_id": 49049, "to_id": 10245, "type": "duplicate-of" }, { "id": 603, "from_id": 49050, "to_id": 10247, "type": "duplicate-of" }, { "id": 604, "from_id": 10247, "to_id": 49047, "type": "indicates" }, { "id": 605, "from_id": 49050, "to_id": 49047, "type": "indicates" }, { "id": 606, "from_id": 49049, "to_id": 49048, "type": "indicates" }, { "id": 607, "from_id": 10245, "to_id": 49048, "type": "indicates" } ]
[]
3,394
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 5fd2da648068f75a4a66b08d6d93793f735be62ae88085a79d839b6a0d6d859a flash1.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 660cef8210f823acb0b31d78fbce1d6f3f8c4f43231286f7ac69f75b2c42c020 flashplayerpp_install_cn.exe
[ { "id": 10248, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 10249, "label": "SHA2", "start_offset": 46, "end_offset": 110 }, { "id": 10250, "label": "malware", "start_offset": 124, "end_offset": 135 }, { "id": 10251, "label": "SHA2", "start_offset": 170, "end_offset": 234 }, { "id": 49052, "label": "malware", "start_offset": 144, "end_offset": 168 }, { "id": 49053, "label": "FILEPATH", "start_offset": 236, "end_offset": 264 }, { "id": 49054, "label": "FILEPATH", "start_offset": 112, "end_offset": 122 }, { "id": 49051, "label": "malware", "start_offset": 20, "end_offset": 44 } ]
[ { "id": 608, "from_id": 10248, "to_id": 49051, "type": "duplicate-of" }, { "id": 609, "from_id": 10250, "to_id": 49052, "type": "duplicate-of" }, { "id": 610, "from_id": 49054, "to_id": 10249, "type": "duplicate-of" }, { "id": 611, "from_id": 49053, "to_id": 10251, "type": "duplicate-of" }, { "id": 612, "from_id": 10251, "to_id": 49052, "type": "indicates" }, { "id": 613, "from_id": 49053, "to_id": 49052, "type": "indicates" }, { "id": 614, "from_id": 49054, "to_id": 49051, "type": "indicates" }, { "id": 615, "from_id": 10249, "to_id": 49051, "type": "indicates" } ]
[]
3,395
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 69d930050b2445937ec6a4f9887296928bf663f7a71132676be3f112e80fe275 test.exe
[ { "id": 10252, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 10253, "label": "SHA2", "start_offset": 46, "end_offset": 110 }, { "id": 49056, "label": "FILEPATH", "start_offset": 112, "end_offset": 120 }, { "id": 49055, "label": "malware", "start_offset": 20, "end_offset": 44 } ]
[ { "id": 616, "from_id": 49056, "to_id": 10253, "type": "duplicate-of" }, { "id": 617, "from_id": 10252, "to_id": 49055, "type": "duplicate-of" }, { "id": 619, "from_id": 10253, "to_id": 49055, "type": "indicates" }, { "id": 618, "from_id": 49056, "to_id": 49055, "type": "indicates" } ]
[]
3,396
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 6a0976e5f9d07ff3d80fa2958976183758ba5fcdd4645e391614a347b4b8e64b f0b96efe2f714e7bddf76cc90a8b8c88_se.exe
[ { "id": 10254, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 10255, "label": "SHA2", "start_offset": 46, "end_offset": 110 }, { "id": 10256, "label": "FILEPATH", "start_offset": 112, "end_offset": 151 }, { "id": 49057, "label": "malware", "start_offset": 20, "end_offset": 44 } ]
[ { "id": 620, "from_id": 10254, "to_id": 49057, "type": "duplicate-of" }, { "id": 621, "from_id": 10256, "to_id": 10255, "type": "duplicate-of" }, { "id": 622, "from_id": 10256, "to_id": 49057, "type": "indicates" }, { "id": 623, "from_id": 10255, "to_id": 49057, "type": "indicates" } ]
[]
3,397
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 6ee8f6a0c514a5bd25f7a32210f4b3fe878d9d417a7ebe07befc285131bae10e news.exe
[ { "id": 10258, "label": "SHA2", "start_offset": 46, "end_offset": 110 }, { "id": 10257, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 49059, "label": "FILEPATH", "start_offset": 112, "end_offset": 120 }, { "id": 49058, "label": "malware", "start_offset": 20, "end_offset": 44 } ]
[ { "id": 626, "from_id": 49059, "to_id": 49058, "type": "indicates" }, { "id": 627, "from_id": 10258, "to_id": 49058, "type": "indicates" }, { "id": 624, "from_id": 10257, "to_id": 49058, "type": "duplicate-of" }, { "id": 625, "from_id": 49059, "to_id": 10258, "type": "duplicate-of" } ]
[]
3,398
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 75e03f40a088903579a436c0d8e8bc3d0d71cf2942ad793cc948f36866a2e1ad silverlight_ins.exe
[ { "id": 10259, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 49060, "label": "malware", "start_offset": 20, "end_offset": 44 }, { "id": 10260, "label": "SHA2", "start_offset": 46, "end_offset": 110 }, { "id": 49061, "label": "FILEPATH", "start_offset": 112, "end_offset": 131 } ]
[ { "id": 628, "from_id": 49061, "to_id": 10260, "type": "duplicate-of" }, { "id": 629, "from_id": 10259, "to_id": 49060, "type": "duplicate-of" }, { "id": 630, "from_id": 10260, "to_id": 49060, "type": "indicates" }, { "id": 631, "from_id": 49061, "to_id": 49060, "type": "indicates" } ]
[]
3,399
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 7d0d7d416db5bd7201420982987e213a129eef2314193e4558a24f3c9a91a38e flash_installer.exe
[ { "id": 10261, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 10262, "label": "SHA2", "start_offset": 46, "end_offset": 110 }, { "id": 49062, "label": "malware", "start_offset": 20, "end_offset": 44 }, { "id": 49063, "label": "FILEPATH", "start_offset": 112, "end_offset": 131 } ]
[ { "id": 632, "from_id": 49063, "to_id": 49062, "type": "indicates" }, { "id": 633, "from_id": 10262, "to_id": 49062, "type": "indicates" }, { "id": 634, "from_id": 10261, "to_id": 49062, "type": "duplicate-of" }, { "id": 635, "from_id": 10262, "to_id": 49063, "type": "duplicate-of" } ]
[]
3,400
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0 Silverlight.exe
[ { "id": 10263, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 10264, "label": "SHA2", "start_offset": 46, "end_offset": 110 }, { "id": 49064, "label": "malware", "start_offset": 20, "end_offset": 44 }, { "id": 49065, "label": "FILEPATH", "start_offset": 112, "end_offset": 127 } ]
[ { "id": 636, "from_id": 10263, "to_id": 49064, "type": "duplicate-of" }, { "id": 637, "from_id": 49065, "to_id": 10264, "type": "duplicate-of" }, { "id": 638, "from_id": 10264, "to_id": 49064, "type": "indicates" }, { "id": 639, "from_id": 49065, "to_id": 49064, "type": "indicates" } ]
[]
3,401
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 8445c0189735766edf0e3d01b91f6f98563fef272ac5c92d3701a1174ad072dd Silverlight_ins.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 89c0b2036ce8d1d91f6d8b8171219aafcd6237c811770fa16edf922cedfecc54 MTYwOTI1MzEzNQ==.exe BIOPASS RAT Loader Backdoor.
[ { "id": 10265, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 10266, "label": "SHA2", "start_offset": 46, "end_offset": 110 }, { "id": 10267, "label": "malware", "start_offset": 133, "end_offset": 144 }, { "id": 10268, "label": "SHA2", "start_offset": 179, "end_offset": 243 }, { "id": 10269, "label": "malware", "start_offset": 267, "end_offset": 278 }, { "id": 49066, "label": "malware", "start_offset": 20, "end_offset": 44 }, { "id": 49067, "label": "FILEPATH", "start_offset": 112, "end_offset": 131 }, { "id": 49068, "label": "malware", "start_offset": 153, "end_offset": 177 }, { "id": 49069, "label": "FILEPATH", "start_offset": 245, "end_offset": 265 } ]
[ { "id": 640, "from_id": 10265, "to_id": 49066, "type": "duplicate-of" }, { "id": 641, "from_id": 49067, "to_id": 10266, "type": "duplicate-of" }, { "id": 642, "from_id": 10267, "to_id": 49068, "type": "duplicate-of" }, { "id": 643, "from_id": 10269, "to_id": 49068, "type": "duplicate-of" }, { "id": 644, "from_id": 10268, "to_id": 49069, "type": "duplicate-of" }, { "id": 645, "from_id": 49067, "to_id": 49066, "type": "indicates" }, { "id": 646, "from_id": 10266, "to_id": 49066, "type": "indicates" }, { "id": 647, "from_id": 10268, "to_id": 10269, "type": "indicates" }, { "id": 648, "from_id": 49069, "to_id": 10269, "type": "indicates" } ]
[]
3,403
8b5d4840bbdce0798950cd5584e3d4564581a7698bc6cfb2892c97b826129cec Silverlight_ins.exe
[ { "id": 10270, "label": "SHA2", "start_offset": 1, "end_offset": 65 }, { "id": 49071, "label": "FILEPATH", "start_offset": 67, "end_offset": 86 } ]
[ { "id": 649, "from_id": 10270, "to_id": 49071, "type": "duplicate-of" } ]
[]
3,408
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 98a91356e0094c96d81bd27af407dd48c3c91aaf97da6794aeb303597a773749 Silverlight1.exe
[ { "id": 10273, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 10274, "label": "SHA2", "start_offset": 46, "end_offset": 110 }, { "id": 49074, "label": "malware", "start_offset": 20, "end_offset": 44 }, { "id": 49075, "label": "FILEPATH", "start_offset": 112, "end_offset": 128 } ]
[ { "id": 650, "from_id": 10273, "to_id": 49074, "type": "duplicate-of" }, { "id": 651, "from_id": 49075, "to_id": 10274, "type": "duplicate-of" }, { "id": 652, "from_id": 49075, "to_id": 49074, "type": "indicates" }, { "id": 653, "from_id": 10274, "to_id": 49074, "type": "indicates" } ]
[]
3,409
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 9eed9a2e0edf38f6354f4e57b3a6b9bed5b19263f54bcee19e66fc8af0c29e4e test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 9f34d28562e7e1e3721bbf679c58aa8f5898995ed999a641f26de120f3a42cf4 Silverlight1.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 9ff906ffcde32e4c6fb3ea4652e6d6326713a7fde8bb783b52f12a1f382f8798 test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A a7c4dac7176e291bd2aba860e1aa301fb5f7d880794f493f2dea0982e2b7eb31 test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A b48e01ff816f12125f9f4cfc9180d534c7c57ef4ee50c0ebbe445e88d4ade939 test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A b82bde3fe5ee900a76ac27b4869ed9aa0802c63bbd72b3bfb0f1abce6340cc6c Silverlight_ins.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A b9d0838be8952ebd4218c8f548ce94901f789ec1e32f5eaf46733f0c94c77999 Silverlight_ins.exe
[ { "id": 10275, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 10276, "label": "SHA2", "start_offset": 46, "end_offset": 110 }, { "id": 10277, "label": "malware", "start_offset": 122, "end_offset": 133 }, { "id": 10279, "label": "malware", "start_offset": 252, "end_offset": 263 }, { "id": 10281, "label": "malware", "start_offset": 374, "end_offset": 385 }, { "id": 10282, "label": "SHA2", "start_offset": 420, "end_offset": 484 }, { "id": 10283, "label": "malware", "start_offset": 496, "end_offset": 507 }, { "id": 10284, "label": "SHA2", "start_offset": 542, "end_offset": 606 }, { "id": 10285, "label": "malware", "start_offset": 618, "end_offset": 629 }, { "id": 10286, "label": "SHA2", "start_offset": 664, "end_offset": 728 }, { "id": 10287, "label": "malware", "start_offset": 751, "end_offset": 762 }, { "id": 10288, "label": "SHA2", "start_offset": 797, "end_offset": 861 }, { "id": 10278, "label": "SHA2", "start_offset": 168, "end_offset": 232 }, { "id": 10280, "label": "SHA2", "start_offset": 298, "end_offset": 362 }, { "id": 49076, "label": "malware", "start_offset": 20, "end_offset": 44 }, { "id": 49078, "label": "FILEPATH", "start_offset": 234, "end_offset": 250 }, { "id": 49079, "label": "malware", "start_offset": 272, "end_offset": 296 }, { "id": 49081, "label": "malware", "start_offset": 394, "end_offset": 418 }, { "id": 49083, "label": "malware", "start_offset": 516, "end_offset": 540 }, { "id": 49087, "label": "malware", "start_offset": 771, "end_offset": 795 }, { "id": 49077, "label": "malware", "start_offset": 142, "end_offset": 166 }, { "id": 49080, "label": "FILEPATH", "start_offset": 364, "end_offset": 372 }, { "id": 49084, "label": "FILEPATH", "start_offset": 608, "end_offset": 616 }, { "id": 49086, "label": "FILEPATH", "start_offset": 730, "end_offset": 749 }, { "id": 49088, "label": "FILEPATH", "start_offset": 863, "end_offset": 882 }, { "id": 49089, "label": "FILEPATH", "start_offset": 112, "end_offset": 120 }, { "id": 49082, "label": "FILEPATH", "start_offset": 486, "end_offset": 494 }, { "id": 49085, "label": "malware", "start_offset": 638, "end_offset": 662 } ]
[ { "id": 654, "from_id": 10275, "to_id": 49076, "type": "duplicate-of" }, { "id": 655, "from_id": 10277, "to_id": 49077, "type": "duplicate-of" }, { "id": 656, "from_id": 10279, "to_id": 49079, "type": "duplicate-of" }, { "id": 657, "from_id": 10281, "to_id": 49081, "type": "duplicate-of" }, { "id": 658, "from_id": 10283, "to_id": 49083, "type": "duplicate-of" }, { "id": 659, "from_id": 10285, "to_id": 49085, "type": "duplicate-of" }, { "id": 660, "from_id": 10287, "to_id": 49087, "type": "duplicate-of" }, { "id": 661, "from_id": 49088, "to_id": 10288, "type": "duplicate-of" }, { "id": 662, "from_id": 49086, "to_id": 10286, "type": "duplicate-of" }, { "id": 663, "from_id": 49084, "to_id": 10284, "type": "duplicate-of" }, { "id": 664, "from_id": 49082, "to_id": 10282, "type": "duplicate-of" }, { "id": 665, "from_id": 49080, "to_id": 10280, "type": "duplicate-of" }, { "id": 666, "from_id": 49078, "to_id": 10278, "type": "duplicate-of" }, { "id": 667, "from_id": 49089, "to_id": 10276, "type": "duplicate-of" }, { "id": 668, "from_id": 10276, "to_id": 49076, "type": "indicates" }, { "id": 669, "from_id": 49089, "to_id": 49076, "type": "indicates" }, { "id": 670, "from_id": 49078, "to_id": 49077, "type": "indicates" }, { "id": 671, "from_id": 10278, "to_id": 49077, "type": "indicates" }, { "id": 672, "from_id": 49080, "to_id": 49079, "type": "indicates" }, { "id": 673, "from_id": 10280, "to_id": 49079, "type": "indicates" }, { "id": 674, "from_id": 49082, "to_id": 49081, "type": "indicates" }, { "id": 675, "from_id": 10282, "to_id": 49081, "type": "indicates" }, { "id": 676, "from_id": 49084, "to_id": 49083, "type": "indicates" }, { "id": 677, "from_id": 10284, "to_id": 49083, "type": "indicates" }, { "id": 678, "from_id": 49086, "to_id": 49085, "type": "indicates" }, { "id": 679, "from_id": 10286, "to_id": 49085, "type": "indicates" }, { "id": 680, "from_id": 49088, "to_id": 10287, "type": "indicates" } ]
[]
3,410
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A ba44c22a3224c3a201202b69d86df2a78f0cd1d4ac1119eb29cae33f09027a9a Silverlight2.exe
[ { "id": 10289, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 10290, "label": "SHA2", "start_offset": 46, "end_offset": 110 }, { "id": 49090, "label": "malware", "start_offset": 20, "end_offset": 44 }, { "id": 49091, "label": "FILEPATH", "start_offset": 112, "end_offset": 128 } ]
[ { "id": 681, "from_id": 10289, "to_id": 49090, "type": "duplicate-of" }, { "id": 682, "from_id": 49091, "to_id": 10290, "type": "duplicate-of" }, { "id": 683, "from_id": 49091, "to_id": 49090, "type": "indicates" }, { "id": 684, "from_id": 10290, "to_id": 49090, "type": "indicates" } ]
[]
3,411
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A bd8dc7e3909f6663c0fff653d7afbca2b89f2e9bc6f27adaab27f640ccf52975 Silverlight.exe
[ { "id": 10291, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 10292, "label": "SHA2", "start_offset": 46, "end_offset": 110 }, { "id": 49092, "label": "malware", "start_offset": 20, "end_offset": 44 }, { "id": 49093, "label": "FILEPATH", "start_offset": 112, "end_offset": 127 } ]
[ { "id": 685, "from_id": 10291, "to_id": 49092, "type": "duplicate-of" }, { "id": 686, "from_id": 49093, "to_id": 10292, "type": "duplicate-of" }, { "id": 687, "from_id": 49093, "to_id": 49092, "type": "indicates" }, { "id": 688, "from_id": 10292, "to_id": 49092, "type": "indicates" } ]
[]
3,412
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A bf4f50979b7b29f2b6d192630b8d7b76adb9cb65157a1c70924a47bf519c4edd test.exe
[ { "id": 10293, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 10294, "label": "SHA2", "start_offset": 46, "end_offset": 110 }, { "id": 49094, "label": "malware", "start_offset": 20, "end_offset": 44 }, { "id": 49095, "label": "FILEPATH", "start_offset": 112, "end_offset": 120 } ]
[ { "id": 689, "from_id": 10293, "to_id": 49094, "type": "duplicate-of" }, { "id": 690, "from_id": 49095, "to_id": 10294, "type": "duplicate-of" }, { "id": 691, "from_id": 49095, "to_id": 49094, "type": "indicates" }, { "id": 692, "from_id": 10294, "to_id": 49094, "type": "indicates" } ]
[]
3,413
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A c11906210465045a54a5de1053ce0624308a8c7b342bb707a24e534ca662dc89 test-flash.exe BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A c3fa69e15a63b151f8d1dc3018284e153ad2eb672d54555eaeaac79396b64e3b test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A c47fabc47806961f908bed37d6b1bbbfd183d564a2d01b7cae87bd95c20ff8a5 flashplayerpp_install_cn.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A c8542bffc7a2074b8d84c4de5f18e3c8ced30b1f6edc13047ce99794b388285c flash2.exe BIOPASS RAT Loader Backdoor.
[ { "id": 10295, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 10296, "label": "SHA2", "start_offset": 46, "end_offset": 110 }, { "id": 10297, "label": "malware", "start_offset": 128, "end_offset": 139 }, { "id": 10298, "label": "SHA2", "start_offset": 174, "end_offset": 238 }, { "id": 10299, "label": "malware", "start_offset": 250, "end_offset": 261 }, { "id": 10300, "label": "SHA2", "start_offset": 296, "end_offset": 360 }, { "id": 10301, "label": "malware", "start_offset": 392, "end_offset": 403 }, { "id": 10303, "label": "malware", "start_offset": 516, "end_offset": 527 }, { "id": 10302, "label": "SHA2", "start_offset": 438, "end_offset": 502 }, { "id": 49098, "label": "FILEPATH", "start_offset": 112, "end_offset": 126 }, { "id": 49101, "label": "FILEPATH", "start_offset": 362, "end_offset": 390 }, { "id": 49102, "label": "malware", "start_offset": 412, "end_offset": 436 }, { "id": 49096, "label": "malware", "start_offset": 20, "end_offset": 44 }, { "id": 49097, "label": "malware", "start_offset": 148, "end_offset": 172 }, { "id": 49099, "label": "FILEPATH", "start_offset": 240, "end_offset": 248 }, { "id": 49100, "label": "malware", "start_offset": 270, "end_offset": 294 }, { "id": 49103, "label": "FILEPATH", "start_offset": 504, "end_offset": 514 } ]
[ { "id": 696, "from_id": 10298, "to_id": 49099, "type": "duplicate-of" }, { "id": 698, "from_id": 49101, "to_id": 10300, "type": "duplicate-of" }, { "id": 700, "from_id": 49103, "to_id": 10302, "type": "duplicate-of" }, { "id": 701, "from_id": 10296, "to_id": 49096, "type": "indicates" }, { "id": 702, "from_id": 49098, "to_id": 49096, "type": "indicates" }, { "id": 703, "from_id": 10298, "to_id": 49097, "type": "indicates" }, { "id": 704, "from_id": 49099, "to_id": 49097, "type": "indicates" }, { "id": 693, "from_id": 10295, "to_id": 49096, "type": "duplicate-of" }, { "id": 694, "from_id": 49098, "to_id": 10296, "type": "duplicate-of" }, { "id": 695, "from_id": 10297, "to_id": 49097, "type": "duplicate-of" }, { "id": 697, "from_id": 10299, "to_id": 49100, "type": "duplicate-of" }, { "id": 699, "from_id": 10301, "to_id": 49102, "type": "duplicate-of" }, { "id": 705, "from_id": 49101, "to_id": 49100, "type": "indicates" }, { "id": 706, "from_id": 10300, "to_id": 49100, "type": "indicates" }, { "id": 707, "from_id": 10302, "to_id": 49102, "type": "indicates" }, { "id": 708, "from_id": 49103, "to_id": 49102, "type": "indicates" } ]
[]
3,417
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A d18d84d32a340d20ab07a36f9e4b959495ecd88d7b0e9799399fcc4e959f536b flash_installer.exe
[ { "id": 10305, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 10306, "label": "SHA2", "start_offset": 46, "end_offset": 110 }, { "id": 49106, "label": "malware", "start_offset": 20, "end_offset": 44 }, { "id": 49107, "label": "FILEPATH", "start_offset": 112, "end_offset": 131 } ]
[ { "id": 709, "from_id": 10305, "to_id": 49106, "type": "duplicate-of" }, { "id": 711, "from_id": 10306, "to_id": 49106, "type": "indicates" }, { "id": 710, "from_id": 49107, "to_id": 10306, "type": "duplicate-of" }, { "id": 712, "from_id": 49107, "to_id": 49106, "type": "indicates" } ]
[]
3,422
Backdoor.Win64.BIOPASS.A e52ea54cfe3afd93a53e368245c5630425e326291bf1b2599b75dbf8e75b7aeb flashplayer_install_cn.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A f1ad25b594a855a3c9af75c5da74b44d900f6fbb655033f9a98a956292011c8e Silverlight.exe
[ { "id": 10311, "label": "malware", "start_offset": 121, "end_offset": 132 }, { "id": 10310, "label": "SHA2", "start_offset": 27, "end_offset": 91 }, { "id": 10312, "label": "SHA2", "start_offset": 167, "end_offset": 231 }, { "id": 49110, "label": "malware", "start_offset": 1, "end_offset": 25 }, { "id": 49111, "label": "malware", "start_offset": 141, "end_offset": 165 }, { "id": 49112, "label": "FILEPATH", "start_offset": 93, "end_offset": 119 }, { "id": 49113, "label": "FILEPATH", "start_offset": 233, "end_offset": 248 } ]
[ { "id": 716, "from_id": 49113, "to_id": 49111, "type": "indicates" }, { "id": 717, "from_id": 10311, "to_id": 49111, "type": "duplicate-of" }, { "id": 713, "from_id": 49112, "to_id": 10310, "type": "duplicate-of" }, { "id": 714, "from_id": 49113, "to_id": 10312, "type": "duplicate-of" }, { "id": 715, "from_id": 10312, "to_id": 49111, "type": "indicates" }, { "id": 718, "from_id": 49112, "to_id": 49110, "type": "indicates" }, { "id": 719, "from_id": 10310, "to_id": 49110, "type": "indicates" } ]
[]
3,423
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A fa1d70b6b5b1a5e478c7d9d840aae0cc23d80476d9eea884a73d1b7e3926a209 64.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A fa7fbca583b22d92ae6d832d90ee637cc6ac840203cd059c6582298beb955aee test.exe BIOPASS RAT Loader Backdoor.
[ { "id": 10313, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 10315, "label": "malware", "start_offset": 120, "end_offset": 131 }, { "id": 10317, "label": "malware", "start_offset": 242, "end_offset": 253 }, { "id": 10314, "label": "SHA2", "start_offset": 46, "end_offset": 110 }, { "id": 10316, "label": "SHA2", "start_offset": 166, "end_offset": 230 }, { "id": 49115, "label": "FILEPATH", "start_offset": 112, "end_offset": 118 }, { "id": 49116, "label": "malware", "start_offset": 140, "end_offset": 164 }, { "id": 49117, "label": "FILEPATH", "start_offset": 232, "end_offset": 240 }, { "id": 49114, "label": "malware", "start_offset": 20, "end_offset": 44 } ]
[ { "id": 720, "from_id": 10313, "to_id": 49114, "type": "duplicate-of" }, { "id": 723, "from_id": 10317, "to_id": 49116, "type": "duplicate-of" }, { "id": 728, "from_id": 10316, "to_id": 49116, "type": "indicates" }, { "id": 721, "from_id": 49115, "to_id": 10314, "type": "duplicate-of" }, { "id": 722, "from_id": 49117, "to_id": 10316, "type": "duplicate-of" }, { "id": 724, "from_id": 10315, "to_id": 49116, "type": "duplicate-of" }, { "id": 725, "from_id": 10314, "to_id": 49114, "type": "indicates" }, { "id": 726, "from_id": 49115, "to_id": 49114, "type": "indicates" }, { "id": 727, "from_id": 49117, "to_id": 49116, "type": "indicates" } ]
[]
3,433
aos.exe BIOPASS RAT binary (PyInstaller) Trojan.Win32.BIOPASS.A afbfe16cbdd574d64c24ad97810b04db509505522e5bb7b9ca3b497efc731045 socketio.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A 0b9f605926df4ff190ddc6c11e0f5839bffe431a3ddfd90acde1fcd2f91dada3 socketio.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A 6fc307063c376b8be2d3a9545959e068884d9cf7f819b176adf676fc4addef7d flash_ins_bak.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A 7249ad971283e164b0489110c23f4e40c64ee49b49bcc5cd0d32d9e701ec2114 files.zip BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A de17e583a4d112ce513efd4b7cb575d272dcceef229f81360ebdfa5a1e083f11 fn.exe BIOPASS RAT binary (Nuitka) Trojan
[ { "id": 10324, "label": "SHA2", "start_offset": 67, "end_offset": 131 }, { "id": 10330, "label": "SHA2", "start_offset": 471, "end_offset": 535 }, { "id": 10332, "label": "SHA2", "start_offset": 601, "end_offset": 665 }, { "id": 10326, "label": "SHA2", "start_offset": 200, "end_offset": 264 }, { "id": 10328, "label": "SHA2", "start_offset": 333, "end_offset": 397 }, { "id": 49123, "label": "FILEPATH", "start_offset": 0, "end_offset": 7 }, { "id": 49129, "label": "malware", "start_offset": 280, "end_offset": 307 }, { "id": 49132, "label": "FILEPATH", "start_offset": 667, "end_offset": 673 }, { "id": 49135, "label": "malware", "start_offset": 147, "end_offset": 174 }, { "id": 49136, "label": "malware", "start_offset": 418, "end_offset": 445 }, { "id": 49124, "label": "malware", "start_offset": 43, "end_offset": 65 }, { "id": 49125, "label": "FILEPATH", "start_offset": 133, "end_offset": 145 }, { "id": 49126, "label": "malware", "start_offset": 176, "end_offset": 198 }, { "id": 49127, "label": "FILEPATH", "start_offset": 266, "end_offset": 278 }, { "id": 49128, "label": "malware", "start_offset": 309, "end_offset": 331 }, { "id": 49130, "label": "FILEPATH", "start_offset": 399, "end_offset": 416 }, { "id": 49131, "label": "FILEPATH", "start_offset": 537, "end_offset": 546 }, { "id": 49133, "label": "malware", "start_offset": 577, "end_offset": 599 }, { "id": 49134, "label": "malware", "start_offset": 9, "end_offset": 41 }, { "id": 49137, "label": "malware", "start_offset": 447, "end_offset": 469 }, { "id": 49138, "label": "malware", "start_offset": 548, "end_offset": 575 }, { "id": 49139, "label": "malware", "start_offset": 675, "end_offset": 710 } ]
[ { "id": 729, "from_id": 49123, "to_id": 49124, "type": "indicates" }, { "id": 730, "from_id": 49134, "to_id": 49124, "type": "duplicate-of" }, { "id": 731, "from_id": 10324, "to_id": 49124, "type": "indicates" }, { "id": 732, "from_id": 49125, "to_id": 49124, "type": "indicates" }, { "id": 733, "from_id": 49135, "to_id": 49126, "type": "duplicate-of" }, { "id": 734, "from_id": 10326, "to_id": 49126, "type": "indicates" }, { "id": 735, "from_id": 49127, "to_id": 49126, "type": "indicates" }, { "id": 736, "from_id": 49127, "to_id": 10326, "type": "duplicate-of" }, { "id": 737, "from_id": 49129, "to_id": 49128, "type": "duplicate-of" }, { "id": 738, "from_id": 10328, "to_id": 49128, "type": "indicates" }, { "id": 739, "from_id": 49130, "to_id": 49128, "type": "indicates" }, { "id": 740, "from_id": 49130, "to_id": 10328, "type": "duplicate-of" }, { "id": 741, "from_id": 49136, "to_id": 49137, "type": "duplicate-of" }, { "id": 742, "from_id": 49131, "to_id": 10330, "type": "duplicate-of" }, { "id": 743, "from_id": 49131, "to_id": 49137, "type": "indicates" }, { "id": 744, "from_id": 10330, "to_id": 49137, "type": "indicates" }, { "id": 745, "from_id": 49138, "to_id": 49133, "type": "duplicate-of" }, { "id": 746, "from_id": 49139, "to_id": 49133, "type": "duplicate-of" }, { "id": 747, "from_id": 49132, "to_id": 10332, "type": "duplicate-of" }, { "id": 748, "from_id": 49132, "to_id": 49133, "type": "indicates" }, { "id": 749, "from_id": 10332, "to_id": 49133, "type": "indicates" } ]
[]
3,436
This post is also available in: 日本語 (Japanese) On May 4, 2022, F5 released a security advisory for a remote code execution vulnerability in the iControlREST component of its BIG-IP product tracked in CVE-2022-1388.
[ { "id": 49195, "label": "vulnerability", "start_offset": 206, "end_offset": 219 }, { "id": 49196, "label": "vulnerability", "start_offset": 107, "end_offset": 142 }, { "id": 49193, "label": "TIME", "start_offset": 53, "end_offset": 67 }, { "id": 49194, "label": "identity", "start_offset": 69, "end_offset": 71 }, { "id": 49197, "label": "tools", "start_offset": 150, "end_offset": 162 } ]
[ { "id": 750, "from_id": 49196, "to_id": 49195, "type": "duplicate-of" }, { "id": 751, "from_id": 49197, "to_id": 49195, "type": "has" } ]
[]
3,437
Threat actors can exploit this vulnerability to bypass authentication and run arbitrary code on unpatched systems.
[ { "id": 49198, "label": "attack-pattern", "start_offset": 48, "end_offset": 69 }, { "id": 49200, "label": "vulnerability", "start_offset": 26, "end_offset": 44 }, { "id": 49199, "label": "attack-pattern", "start_offset": 74, "end_offset": 113 } ]
[ { "id": 752, "from_id": 49198, "to_id": 49200, "type": "targets" }, { "id": 753, "from_id": 49199, "to_id": 49200, "type": "targets" } ]
[]
3,439
Since the release of this advisory, mass scanning activity has started to occur, seeking unpatched systems, and in-the-wild exploitation has begun. Palo Alto Networks released a Threat Prevention signature for the F5 BIG-IP Authentication Bypass Vulnerability (92570) and within just 10 hours, the signature triggered 2,552 times due to vulnerability scanning and active exploitation attempts.
[ { "id": 49201, "label": "identity", "start_offset": 149, "end_offset": 168 }, { "id": 49203, "label": "vulnerability", "start_offset": 225, "end_offset": 268 }, { "id": 49204, "label": "TIME", "start_offset": 285, "end_offset": 293 }, { "id": 49202, "label": "tools", "start_offset": 215, "end_offset": 224 } ]
[ { "id": 754, "from_id": 49202, "to_id": 49203, "type": "has" } ]
[]
3,442
Vulnerable Systems Mitigation Actions Observed in the Wild Conclusion Additional Resources Indicators of Compromise The F5 product vulnerable to CVE-2022-1388 is BIG-IP with the following versions: The vulnerability exists within the iControl REST framework used by BIG-IP.
[ { "id": 49208, "label": "vulnerability", "start_offset": 201, "end_offset": 218 }, { "id": 49209, "label": "tools", "start_offset": 118, "end_offset": 132 }, { "id": 49207, "label": "vulnerability", "start_offset": 146, "end_offset": 160 }, { "id": 49210, "label": "tools", "start_offset": 237, "end_offset": 260 } ]
[ { "id": 755, "from_id": 49208, "to_id": 49207, "type": "duplicate-of" }, { "id": 756, "from_id": 49209, "to_id": 49207, "type": "has" }, { "id": 757, "from_id": 49210, "to_id": 49208, "type": "has" } ]
[]
3,443
We recommend that customers update their F5 BIG-IP deployments to one of the following versions that have patches to mitigate CVE-2022-1388:
[ { "id": 49212, "label": "tools", "start_offset": 42, "end_offset": 51 }, { "id": 49211, "label": "vulnerability", "start_offset": 127, "end_offset": 140 } ]
[ { "id": 758, "from_id": 49212, "to_id": 49211, "type": "has" } ]
[]
3,448
These were found by analysis of the packet captures that triggered the F5 BIG-IP Authentication Bypass Vulnerability signature.
[ { "id": 49220, "label": "vulnerability", "start_offset": 81, "end_offset": 116 }, { "id": 49221, "label": "tools", "start_offset": 71, "end_offset": 80 } ]
[ { "id": 759, "from_id": 49221, "to_id": 49220, "type": "has" } ]
[]
3,451
K23605346: BIG-IP iControl REST vulnerability CVE-2022-1388 EnemyBot Attempts to Exploit CVE-2022-1388 30f7e1998d162dfad69d6d8abb763ae4033bbd4a015d170b1ad3e20d39cd4e20 da647646cd36a3acb716b4266e9032f9c1caf555b7667e1dbe5bef89e7d2fdbb b39d2a1202351d3be5d9906ec47ee05c305302124dddec5538dc7b9924c6b85d ad6d44c70f83431bedf890967f2da0607c9b1f79591fb1b2697160f5b1c1a75c 1f93a6696f7bf1b2067cc503583deb4840404ebeeba89579bd303f57000baeb7 9a72aab2a3d1d6e66c185966597a52a8726ca25f5d9e2195af44f98d8b1847d5 53214f4d2d2dfd02b46f416cbdcb6f3a764820a50da4d59926f829b96cf82a6c 20.187.67[.]224 192.132.218[.]149 85.203.23[.]73 116.48.110[.]159 hxxps://transfer[.]sh/dlxo3I/1.sh hxxp://20.239.193[.]47/kele.sh hxxp://20.239.193[.]47/kele1 hxxp://20.187.86[.]47/dadda Updated May 16, 2022 Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[ { "id": 10440, "label": "malware", "start_offset": 61, "end_offset": 69 }, { "id": 10442, "label": "SHA2", "start_offset": 170, "end_offset": 234 }, { "id": 10443, "label": "SHA2", "start_offset": 235, "end_offset": 299 }, { "id": 10444, "label": "SHA2", "start_offset": 300, "end_offset": 364 }, { "id": 10446, "label": "SHA2", "start_offset": 430, "end_offset": 494 }, { "id": 10447, "label": "SHA2", "start_offset": 495, "end_offset": 559 }, { "id": 10448, "label": "IPV4", "start_offset": 561, "end_offset": 576 }, { "id": 10449, "label": "IPV4", "start_offset": 577, "end_offset": 594 }, { "id": 10450, "label": "IPV4", "start_offset": 595, "end_offset": 609 }, { "id": 10451, "label": "IPV4", "start_offset": 610, "end_offset": 626 }, { "id": 10441, "label": "SHA2", "start_offset": 105, "end_offset": 169 }, { "id": 10445, "label": "SHA2", "start_offset": 365, "end_offset": 429 }, { "id": 49225, "label": "vulnerability", "start_offset": 12, "end_offset": 60 }, { "id": 49228, "label": "DOMAIN", "start_offset": 662, "end_offset": 692 }, { "id": 49229, "label": "DOMAIN", "start_offset": 693, "end_offset": 721 }, { "id": 49226, "label": "vulnerability", "start_offset": 90, "end_offset": 103 }, { "id": 49230, "label": "DOMAIN", "start_offset": 722, "end_offset": 749 }, { "id": 49231, "label": "TIME", "start_offset": 759, "end_offset": 771 }, { "id": 49227, "label": "DOMAIN", "start_offset": 628, "end_offset": 661 } ]
[ { "id": 760, "from_id": 10440, "to_id": 49226, "type": "exploits" } ]
[]
3,454
Blackgear (also known as Topgear and Comnie) is a cyberespionage campaign dating back to 2008, at least based on the Protux backdoor used by its operators.
[ { "id": 49232, "label": "campaign", "start_offset": 0, "end_offset": 9 }, { "id": 49233, "label": "campaign", "start_offset": 25, "end_offset": 32 }, { "id": 49234, "label": "campaign", "start_offset": 37, "end_offset": 43 }, { "id": 49235, "label": "TIME", "start_offset": 89, "end_offset": 93 }, { "id": 49236, "label": "malware", "start_offset": 117, "end_offset": 132 } ]
[ { "id": 761, "from_id": 49233, "to_id": 49232, "type": "duplicate-of" }, { "id": 762, "from_id": 49234, "to_id": 49232, "type": "duplicate-of" } ]
[]
3,458
A notable characteristic of Blackgear is the degree to which its attacks are taken to evade detection, abusing blogging, microblogging, and social media services to hide its command-and-control (C&C) configuration.
[ { "id": 49244, "label": "attack-pattern", "start_offset": 86, "end_offset": 101 }, { "id": 49247, "label": "attack-pattern", "start_offset": 165, "end_offset": 213 }, { "id": 49248, "label": "attack-pattern", "start_offset": 103, "end_offset": 161 }, { "id": 49243, "label": "threat-actor", "start_offset": 28, "end_offset": 37 } ]
[ { "id": 763, "from_id": 49243, "to_id": 49244, "type": "uses" }, { "id": 765, "from_id": 49243, "to_id": 49247, "type": "uses" }, { "id": 766, "from_id": 49243, "to_id": 49248, "type": "uses" } ]
[]
3,461
Analyzing the Marade downloader (detected by Trend Micro as TSPY_MARADE.ZTBC) and the version of Protux (BKDR_PROTUX.ZTBC) employed by Blackgear’s latest campaigns, we found their encrypted configurations on blog and social media posts (see Figure 1).
[ { "id": 49251, "label": "malware", "start_offset": 14, "end_offset": 31 }, { "id": 49252, "label": "identity", "start_offset": 45, "end_offset": 56 }, { "id": 49254, "label": "malware", "start_offset": 97, "end_offset": 122 }, { "id": 49255, "label": "threat-actor", "start_offset": 135, "end_offset": 144 }, { "id": 49253, "label": "malware", "start_offset": 60, "end_offset": 76 } ]
[ { "id": 767, "from_id": 49253, "to_id": 49251, "type": "duplicate-of" }, { "id": 768, "from_id": 49254, "to_id": 49251, "type": "based-on" }, { "id": 769, "from_id": 49251, "to_id": 49255, "type": "authored-by" } ]
[]
3,463
Figure 1. Marade’s encrypted configuration on a Facebook post Figure 2. Infection chain of Blackgear’s attack Attack chain
[ { "id": 49258, "label": "threat-actor", "start_offset": 91, "end_offset": 100 }, { "id": 49256, "label": "malware", "start_offset": 10, "end_offset": 17 }, { "id": 49257, "label": "SOFTWARE", "start_offset": 48, "end_offset": 56 } ]
[ { "id": 770, "from_id": 49256, "to_id": 49257, "type": "uses" } ]
[]
3,465
Here’s a summary of Blackgear’s latest campaign: Use a decoy document or fake installer file, sent via spam email to lure a potential victim into clicking it.
[ { "id": 49260, "label": "campaign", "start_offset": 20, "end_offset": 47 }, { "id": 49262, "label": "attack-pattern", "start_offset": 104, "end_offset": 114 }, { "id": 49261, "label": "attack-pattern", "start_offset": 56, "end_offset": 93 } ]
[ { "id": 771, "from_id": 49260, "to_id": 49261, "type": "uses" }, { "id": 772, "from_id": 49260, "to_id": 49262, "type": "uses" } ]
[]
3,466
The decoy document will extract the Marade downloader.
[ { "id": 49264, "label": "malware", "start_offset": 36, "end_offset": 53 }, { "id": 49265, "label": "attack-pattern", "start_offset": 4, "end_offset": 18 } ]
[ { "id": 774, "from_id": 49265, "to_id": 49264, "type": "delivers" } ]
[]
3,469
If the affected system can connect online and doesn’t have AV software, Marade will connect to a Blackgear-controlled public blog or social media post to retrieve an encrypted C&C configuration.
[ { "id": 49269, "label": "Infrastucture", "start_offset": 118, "end_offset": 193 }, { "id": 49267, "label": "malware", "start_offset": 72, "end_offset": 78 }, { "id": 49268, "label": "threat-actor", "start_offset": 97, "end_offset": 106 } ]
[ { "id": 775, "from_id": 49268, "to_id": 49269, "type": "controls" }, { "id": 776, "from_id": 49267, "to_id": 49269, "type": "beacons-to" } ]
[]
3,474
Protux, a known backdoor, is executed by abusing the rundll32 dynamic-link library (DLL).
[ { "id": 49273, "label": "malware", "start_offset": 0, "end_offset": 6 }, { "id": 49274, "label": "attack-pattern", "start_offset": 41, "end_offset": 88 } ]
[ { "id": 777, "from_id": 49273, "to_id": 49274, "type": "uses" } ]
[]
3,479
Encrypted configurations of Protux (top) and Marade (bottom) in the same blog post Correlating Marade and Protux
[ { "id": 49281, "label": "malware", "start_offset": 28, "end_offset": 34 }, { "id": 49282, "label": "malware", "start_offset": 45, "end_offset": 51 }, { "id": 49283, "label": "malware", "start_offset": 95, "end_offset": 101 }, { "id": 49284, "label": "malware", "start_offset": 106, "end_offset": 112 } ]
[ { "id": 778, "from_id": 49283, "to_id": 49284, "type": "variant-of" } ]
[]
3,502
Based on the controller’s behavior, we can posit that both Marade and Protux were authored by the same threat actors.
[ { "id": 49298, "label": "malware", "start_offset": 70, "end_offset": 76 }, { "id": 49297, "label": "malware", "start_offset": 59, "end_offset": 65 } ]
[ { "id": 780, "from_id": 49297, "to_id": 49298, "type": "variant-of" } ]
[]
3,528
Protux’s latest version, 3.7, uses the open-source compiler OpenCSP to generate a session key with the RSA algorithm.
[ { "id": 10665, "label": "malware", "start_offset": 0, "end_offset": 6 }, { "id": 49309, "label": "tools", "start_offset": 60, "end_offset": 67 } ]
[ { "id": 781, "from_id": 10665, "to_id": 49309, "type": "uses" } ]
[]
3,530
Different versions of Protux used by Blackgear Figure 9.
[ { "id": 49310, "label": "malware", "start_offset": 22, "end_offset": 28 }, { "id": 49311, "label": "threat-actor", "start_offset": 37, "end_offset": 46 } ]
[ { "id": 782, "from_id": 49311, "to_id": 49310, "type": "uses" } ]
[]
3,545
Blackgear’s campaigns also use email as an entry point, which is why it’s important to secure the email gateway.
[ { "id": 49322, "label": "threat-actor", "start_offset": 0, "end_offset": 9 }, { "id": 49323, "label": "attack-pattern", "start_offset": 27, "end_offset": 54 } ]
[ { "id": 783, "from_id": 49322, "to_id": 49323, "type": "uses" } ]
[]
3,550
In November 2019, we published a blog analyzing an exploit kit we named Capesand that exploited Adobe Flash and Microsoft Internet Explorer flaws.
[ { "id": 49331, "label": "TIME", "start_offset": 3, "end_offset": 16 }, { "id": 49332, "label": "malware", "start_offset": 72, "end_offset": 80 }, { "id": 49333, "label": "SOFTWARE", "start_offset": 96, "end_offset": 107 }, { "id": 49334, "label": "SOFTWARE", "start_offset": 112, "end_offset": 139 } ]
[ { "id": 784, "from_id": 49332, "to_id": 49333, "type": "exploits" }, { "id": 785, "from_id": 49332, "to_id": 49334, "type": "exploits" } ]
[]
3,555
We took a look at one of the samples captured from Capesand that was used to deploy the njRat malware – notably its main executable NotepadEx.
[ { "id": 10758, "label": "malware", "start_offset": 88, "end_offset": 93 }, { "id": 49337, "label": "malware", "start_offset": 51, "end_offset": 59 } ]
[ { "id": 786, "from_id": 49337, "to_id": 10758, "type": "delivers" } ]
[]
3,558
Examining the Capesand samples The simplified diagram taken from the previous blog shows the combination of ConfuserEx and Cassandra via the second layer of obfuscation protection, which involves the DLL CyaX_Sharp Assembly (both CyaX_Sharp and CyaX are part of the Cassandra protector).
[ { "id": 49341, "label": "malware", "start_offset": 14, "end_offset": 22 }, { "id": 49342, "label": "tools", "start_offset": 108, "end_offset": 118 }, { "id": 49343, "label": "tools", "start_offset": 123, "end_offset": 132 }, { "id": 49344, "label": "tools", "start_offset": 230, "end_offset": 240 }, { "id": 49345, "label": "tools", "start_offset": 245, "end_offset": 249 }, { "id": 49346, "label": "tools", "start_offset": 266, "end_offset": 285 } ]
[ { "id": 787, "from_id": 49341, "to_id": 49342, "type": "uses" }, { "id": 788, "from_id": 49341, "to_id": 49343, "type": "uses" } ]
[]
3,585
Next, let’s look for the attribute indicator, starting with the CyaX assembly used in the NotepadEx attack.
[ { "id": 49368, "label": "campaign", "start_offset": 90, "end_offset": 99 }, { "id": 49367, "label": "tools", "start_offset": 64, "end_offset": 68 } ]
[ { "id": 789, "from_id": 49368, "to_id": 49367, "type": "uses" } ]
[]
3,611
Indicators of Compromise (IoCs) Indicator Attribution Trend Micro Pattern Detection 068d32a43191dc0164b600b85a1621be0154504fd477167422ff4a8fb3406d73 AnimalGames Backdoor.
[ { "id": 10902, "label": "SHA2", "start_offset": 85, "end_offset": 149 }, { "id": 49391, "label": "identity", "start_offset": 55, "end_offset": 66 }, { "id": 49392, "label": "malware", "start_offset": 150, "end_offset": 170 } ]
[ { "id": 790, "from_id": 10902, "to_id": 49392, "type": "indicates" } ]
[]
3,617
In our new research blog “FreeMilk: A Highly Targeted Spear Phishing Campaign”, our Unit 42 research team has discovered an attack campaign that takes spear phishing targeting to the next level by hijacking in-progress email conversations.
[ { "id": 49399, "label": "identity", "start_offset": 84, "end_offset": 105 }, { "id": 49400, "label": "attack-pattern", "start_offset": 151, "end_offset": 165 }, { "id": 49401, "label": "attack-pattern", "start_offset": 197, "end_offset": 238 }, { "id": 49402, "label": "campaign", "start_offset": 131, "end_offset": 139 } ]
[ { "id": 791, "from_id": 49402, "to_id": 49400, "type": "uses" }, { "id": 792, "from_id": 49402, "to_id": 49401, "type": "uses" } ]
[]
3,624
A good example of a generalized phishing campaign is the Blank Slate Campaign we wrote about in March 2017.
[ { "id": 49409, "label": "campaign", "start_offset": 58, "end_offset": 78 }, { "id": 49410, "label": "TIME", "start_offset": 97, "end_offset": 107 }, { "id": 49408, "label": "attack-pattern", "start_offset": 33, "end_offset": 50 } ]
[ { "id": 793, "from_id": 49409, "to_id": 49408, "type": "uses" } ]
[]
3,628
For example, a spear phishing attack could use email messages about military exercises sent to military or government targets like we saw with our recent research into CMSTAR Trojan attacks.
[ { "id": 10953, "label": "attack-pattern", "start_offset": 15, "end_offset": 29 }, { "id": 10954, "label": "malware", "start_offset": 168, "end_offset": 174 } ]
[ { "id": 794, "from_id": 10954, "to_id": 10953, "type": "uses" } ]
[]
3,661
MITRE also identifies different main targets for each group: While Carbanak focuses on banking institutions, FIN7 targets food, hospitality, and retail establishments.
[ { "id": 49437, "label": "threat-actor", "start_offset": 67, "end_offset": 75 }, { "id": 49438, "label": "threat-actor", "start_offset": 109, "end_offset": 113 }, { "id": 49436, "label": "identity", "start_offset": 0, "end_offset": 5 }, { "id": 49439, "label": "identity", "start_offset": 87, "end_offset": 107 }, { "id": 49440, "label": "identity", "start_offset": 122, "end_offset": 166 } ]
[ { "id": 795, "from_id": 49437, "to_id": 49439, "type": "targets" }, { "id": 796, "from_id": 49438, "to_id": 49440, "type": "targets" } ]
[]
3,668
After this, the Carbanak backdoor can then be used to log keystrokes and capture screenshots, steal and delete cookies, inject malicious code on sites, and monitor various traffic.
[ { "id": 49452, "label": "malware", "start_offset": 16, "end_offset": 33 }, { "id": 49453, "label": "attack-pattern", "start_offset": 54, "end_offset": 68 }, { "id": 49456, "label": "attack-pattern", "start_offset": 120, "end_offset": 150 }, { "id": 49457, "label": "attack-pattern", "start_offset": 156, "end_offset": 179 }, { "id": 49455, "label": "attack-pattern", "start_offset": 94, "end_offset": 118 }, { "id": 49454, "label": "attack-pattern", "start_offset": 73, "end_offset": 92 } ]
[ { "id": 797, "from_id": 49452, "to_id": 49453, "type": "uses" }, { "id": 798, "from_id": 49452, "to_id": 49454, "type": "uses" }, { "id": 799, "from_id": 49452, "to_id": 49455, "type": "uses" }, { "id": 800, "from_id": 49452, "to_id": 49456, "type": "uses" }, { "id": 801, "from_id": 49452, "to_id": 49457, "type": "uses" } ]
[]
3,670
To be more specific in terms of ATT&CK® techniques, Carbanak and FIN7 share a notable number of similarities.
[ { "id": 49461, "label": "threat-actor", "start_offset": 65, "end_offset": 69 }, { "id": 49460, "label": "threat-actor", "start_offset": 52, "end_offset": 60 } ]
[ { "id": 802, "from_id": 49460, "to_id": 49461, "type": "related-to" } ]
[]
3,684
We detected a variant of the Carbanak malware that adds registry entries and keys as an autostart technique.
[ { "id": 49477, "label": "malware", "start_offset": 29, "end_offset": 45 }, { "id": 49479, "label": "attack-pattern", "start_offset": 51, "end_offset": 107 } ]
[ { "id": 803, "from_id": 49477, "to_id": 49479, "type": "uses" } ]
[]
3,692
FIN7 attacks can and inject code into processes and hijack the search order used to load DLL files.
[ { "id": 49484, "label": "threat-actor", "start_offset": 0, "end_offset": 4 }, { "id": 49485, "label": "attack-pattern", "start_offset": 21, "end_offset": 32 }, { "id": 49486, "label": "attack-pattern", "start_offset": 52, "end_offset": 98 } ]
[ { "id": 804, "from_id": 49484, "to_id": 49485, "type": "uses" }, { "id": 805, "from_id": 49484, "to_id": 49486, "type": "uses" } ]
[]
3,697
Carbanak also performs techniques for disabling security tools, deleting files that are left in malicious activity, and modifying registry to hide configuration information.
[ { "id": 49494, "label": "attack-pattern", "start_offset": 120, "end_offset": 138 }, { "id": 49493, "label": "attack-pattern", "start_offset": 64, "end_offset": 78 }, { "id": 49491, "label": "attack-pattern", "start_offset": 38, "end_offset": 62 }, { "id": 49492, "label": "threat-actor", "start_offset": 0, "end_offset": 8 } ]
[ { "id": 806, "from_id": 49492, "to_id": 49491, "type": "uses" }, { "id": 807, "from_id": 49492, "to_id": 49493, "type": "uses" }, { "id": 808, "from_id": 49492, "to_id": 49494, "type": "uses" } ]
[]
3,698
FIN7 utilizes guardrails to restrict execution and abused utilities that allow indirect command execution that can go past security restrictions.
[ { "id": 49495, "label": "attack-pattern", "start_offset": 79, "end_offset": 105 }, { "id": 49496, "label": "threat-actor", "start_offset": 0, "end_offset": 4 }, { "id": 49497, "label": "tools", "start_offset": 14, "end_offset": 24 } ]
[ { "id": 809, "from_id": 49496, "to_id": 49497, "type": "uses" }, { "id": 810, "from_id": 49496, "to_id": 49495, "type": "uses" } ]
[]
3,705
On the other hand, FIN7 performs hooking.
[ { "id": 11240, "label": "attack-pattern", "start_offset": 33, "end_offset": 40 }, { "id": 49500, "label": "threat-actor", "start_offset": 19, "end_offset": 23 } ]
[ { "id": 811, "from_id": 49500, "to_id": 11240, "type": "uses" } ]
[]
3,713
In Carbanak attacks, the groups’ attacks can involve logging into services that accept remote connections and using stolen password hashes through the “pass the hash” method.
[ { "id": 49509, "label": "attack-pattern", "start_offset": 152, "end_offset": 165 }, { "id": 49510, "label": "threat-actor", "start_offset": 3, "end_offset": 11 }, { "id": 49511, "label": "attack-pattern", "start_offset": 110, "end_offset": 138 } ]
[ { "id": 812, "from_id": 49510, "to_id": 49511, "type": "uses" }, { "id": 813, "from_id": 49510, "to_id": 49509, "type": "uses" } ]
[]
3,716
At the collection phase, Carbanak and FIN7 campaigns harvest data from local system sources and through input and screen capture (as performed in a related campaign using the Tirion malware).
[ { "id": 49515, "label": "attack-pattern", "start_offset": 53, "end_offset": 91 }, { "id": 49516, "label": "attack-pattern", "start_offset": 114, "end_offset": 128 }, { "id": 49512, "label": "threat-actor", "start_offset": 25, "end_offset": 33 }, { "id": 49513, "label": "threat-actor", "start_offset": 38, "end_offset": 42 }, { "id": 49514, "label": "malware", "start_offset": 175, "end_offset": 189 } ]
[ { "id": 814, "from_id": 49512, "to_id": 49513, "type": "related-to" }, { "id": 815, "from_id": 49512, "to_id": 49515, "type": "uses" }, { "id": 816, "from_id": 49512, "to_id": 49516, "type": "uses" } ]
[]
3,719
In both Carbanak and FIN7 attacks, communication with users’ compromised systems is done through bypassing firewalls or network detection systems via commonly used ports, using connection proxies to avoid direct connections to the threat group’s infrastructure, employing the command-and-control channel to remotely copy files from an external system, blending in with existing network traffic by using standard application layer protocol, and taking advantage of standard cryptographic protocol to disguise command-and-control traffic.
[ { "id": 49518, "label": "threat-actor", "start_offset": 8, "end_offset": 16 }, { "id": 49519, "label": "threat-actor", "start_offset": 21, "end_offset": 25 }, { "id": 49520, "label": "attack-pattern", "start_offset": 97, "end_offset": 116 }, { "id": 49521, "label": "attack-pattern", "start_offset": 171, "end_offset": 195 }, { "id": 49522, "label": "attack-pattern", "start_offset": 352, "end_offset": 393 } ]
[ { "id": 817, "from_id": 49518, "to_id": 49519, "type": "related-to" }, { "id": 818, "from_id": 49519, "to_id": 49520, "type": "uses" }, { "id": 819, "from_id": 49519, "to_id": 49521, "type": "uses" }, { "id": 820, "from_id": 49519, "to_id": 49522, "type": "uses" } ]
[]
3,730
On April 6, 2022, VMware published a security advisory mentioning eight vulnerabilities, including CVE-2022-22954 and CVE-2022-22960 impacting their products VMware Workspace ONE Access, Identity Manager and vRealize Automation.
[ { "id": 49530, "label": "vulnerability", "start_offset": 99, "end_offset": 113 }, { "id": 49531, "label": "vulnerability", "start_offset": 118, "end_offset": 132 }, { "id": 49533, "label": "SOFTWARE", "start_offset": 187, "end_offset": 203 }, { "id": 49534, "label": "SOFTWARE", "start_offset": 208, "end_offset": 227 }, { "id": 49532, "label": "SOFTWARE", "start_offset": 158, "end_offset": 185 }, { "id": 49528, "label": "TIME", "start_offset": 3, "end_offset": 16 }, { "id": 49529, "label": "identity", "start_offset": 18, "end_offset": 24 } ]
[ { "id": 821, "from_id": 49532, "to_id": 49530, "type": "has" }, { "id": 822, "from_id": 49532, "to_id": 49531, "type": "has" }, { "id": 823, "from_id": 49533, "to_id": 49530, "type": "has" }, { "id": 824, "from_id": 49533, "to_id": 49531, "type": "has" }, { "id": 825, "from_id": 49534, "to_id": 49530, "type": "has" }, { "id": 826, "from_id": 49534, "to_id": 49531, "type": "has" } ]
[]
3,736
Timeline for VMware Vulnerabilities CVE-2022-22954 in the Wild Direct Downloads Mirai/Gafgyt Dropper Scripts or Variants Webshells Perl Shellbot Base64 Injections SSH Key Targeting CVE-2022-22960 in the Wild Conclusion Indicators of Compromise
[ { "id": 49545, "label": "vulnerability", "start_offset": 13, "end_offset": 50 }, { "id": 49546, "label": "malware", "start_offset": 80, "end_offset": 85 }, { "id": 49547, "label": "malware", "start_offset": 86, "end_offset": 100 }, { "id": 49548, "label": "vulnerability", "start_offset": 181, "end_offset": 195 } ]
[ { "id": 827, "from_id": 49546, "to_id": 49547, "type": "related-to" }, { "id": 828, "from_id": 49546, "to_id": 49545, "type": "exploits" }, { "id": 829, "from_id": 49546, "to_id": 49548, "type": "exploits" } ]
[]
3,748
CVE-2022-22954, a remote code execution (RCE) vulnerability due to server-side template injection in VMware Workspace ONE Access and Identity Manager, is trivial to exploit with a single HTTP request to a vulnerable device.
[ { "id": 49573, "label": "attack-pattern", "start_offset": 19, "end_offset": 46 }, { "id": 49574, "label": "attack-pattern", "start_offset": 68, "end_offset": 98 }, { "id": 49572, "label": "vulnerability", "start_offset": 1, "end_offset": 15 }, { "id": 49575, "label": "SOFTWARE", "start_offset": 102, "end_offset": 150 } ]
[ { "id": 830, "from_id": 49575, "to_id": 49572, "type": "has" }, { "id": 831, "from_id": 49572, "to_id": 49573, "type": "uses" }, { "id": 832, "from_id": 49572, "to_id": 49574, "type": "uses" } ]
[]
3,750
The injected commands worth mentioning that intended to further download payloads to a vulnerable machine can be categorized into the following broad categories: We observed several instances of CVE-2022-22954 being exploited to drop variants of the Mirai malware.
[ { "id": 49577, "label": "vulnerability", "start_offset": 196, "end_offset": 210 }, { "id": 49578, "label": "malware", "start_offset": 251, "end_offset": 264 } ]
[ { "id": 833, "from_id": 49578, "to_id": 49577, "type": "exploits" } ]
[]
3,752
Instead, they were either non-specific Mirai variants or contained previously known exploits such as CVE-2017-17215.
[ { "id": 49581, "label": "malware", "start_offset": 39, "end_offset": 44 }, { "id": 49580, "label": "vulnerability", "start_offset": 101, "end_offset": 115 } ]
[ { "id": 834, "from_id": 49581, "to_id": 49580, "type": "exploits" } ]
[]
3,753
The exception to this is Enemybot, a currently prevalent botnet built with bits of code from both Gafgyt and Mirai source code.
[ { "id": 49584, "label": "malware", "start_offset": 110, "end_offset": 115 }, { "id": 49582, "label": "malware", "start_offset": 26, "end_offset": 34 }, { "id": 49583, "label": "malware", "start_offset": 99, "end_offset": 105 } ]
[ { "id": 835, "from_id": 49582, "to_id": 49583, "type": "variant-of" }, { "id": 836, "from_id": 49582, "to_id": 49584, "type": "variant-of" } ]
[]
3,754
The exploits involving Enemybot eventually download Enemybot samples that themselves embed CVE-2022-22954 exploits for further exploitation and propagation.
[ { "id": 11380, "label": "malware", "start_offset": 23, "end_offset": 31 }, { "id": 49586, "label": "vulnerability", "start_offset": 91, "end_offset": 105 }, { "id": 49585, "label": "malware", "start_offset": 52, "end_offset": 60 } ]
[ { "id": 837, "from_id": 49585, "to_id": 49586, "type": "exploits" }, { "id": 838, "from_id": 11380, "to_id": 49585, "type": "downloads" } ]
[]
3,763
CVE-2022-22960 is a privilege escalation vulnerability in VMware Workspace ONE Access, Identity Manager and vRealize Automation instances, due to improper permissions in support scripts.
[ { "id": 49592, "label": "attack-pattern", "start_offset": 21, "end_offset": 41 }, { "id": 49593, "label": "SOFTWARE", "start_offset": 59, "end_offset": 128 }, { "id": 49591, "label": "vulnerability", "start_offset": 1, "end_offset": 15 } ]
[ { "id": 839, "from_id": 49591, "to_id": 49592, "type": "uses" }, { "id": 840, "from_id": 49593, "to_id": 49591, "type": "has" } ]
[]
3,766
Attackers can, therefore, leverage CVE-2022-22954 to remotely execute commands to overwrite specific paths.
[ { "id": 49598, "label": "attack-pattern", "start_offset": 83, "end_offset": 107 }, { "id": 49596, "label": "vulnerability", "start_offset": 36, "end_offset": 50 }, { "id": 49597, "label": "attack-pattern", "start_offset": 54, "end_offset": 79 } ]
[ { "id": 842, "from_id": 49596, "to_id": 49597, "type": "uses" }, { "id": 843, "from_id": 49596, "to_id": 49598, "type": "uses" } ]
[]
3,768
Our research so far has shown one publicly known sample demonstrating exploitation of CVE-2022-22960 by overwriting the /usr/local/horizon/scripts/publishCaCert.hzn file.
[ { "id": 49600, "label": "vulnerability", "start_offset": 87, "end_offset": 101 }, { "id": 49601, "label": "FILEPATH", "start_offset": 121, "end_offset": 165 } ]
[ { "id": 841, "from_id": 49601, "to_id": 49600, "type": "related-to" } ]
[]
3,781
Mirai/Gafgyt dropper scripts or variants Perl Shellbot Coinminer activity Webshell downloads (full injected command) Callback/Scanning activity Direct Download exploits where payloads were no longer live at the time of analysis: Sample hashes 801b23bffa65facee1da69bc6f72f8e1e4e1aeefc63dfd3a99b238d4f9d0a637 6d403c3fc246d6d493a6f4acc18c1c292f710db6ad9c3ea2ff065595c5ad3c5b 940a674cfe8179b2b8964bf408037e0e5a5ab7e47354fe4fa7a9289732e1f1b8 fdc94d0dedf6e53dd435d2b5eacb4c34923fadee50529db6f3de38c71f325e05 85143ecc41fb6aadd822ed2d6f20c721a83ae1088f406f29b8b0b05459053a03 bot.v 0b4b25fab4c922e752e689111f38957e0402fd83f6b1d69e8f43c6f4b68fc1ba C2 server : 5[.]39.217.212:80
[ { "id": 11449, "label": "malware", "start_offset": 58, "end_offset": 67 }, { "id": 11452, "label": "SHA2", "start_offset": 251, "end_offset": 315 }, { "id": 11453, "label": "SHA2", "start_offset": 316, "end_offset": 380 }, { "id": 11454, "label": "SHA2", "start_offset": 381, "end_offset": 445 }, { "id": 11455, "label": "SHA2", "start_offset": 446, "end_offset": 510 }, { "id": 11456, "label": "SHA2", "start_offset": 511, "end_offset": 575 }, { "id": 11457, "label": "SHA2", "start_offset": 583, "end_offset": 647 }, { "id": 49619, "label": "IPV4", "start_offset": 660, "end_offset": 677 }, { "id": 49620, "label": "malware", "start_offset": 1, "end_offset": 21 } ]
[ { "id": 845, "from_id": 11453, "to_id": 49620, "type": "indicates" }, { "id": 844, "from_id": 11452, "to_id": 49620, "type": "indicates" }, { "id": 846, "from_id": 11454, "to_id": 49620, "type": "indicates" }, { "id": 847, "from_id": 11455, "to_id": 49620, "type": "indicates" }, { "id": 848, "from_id": 11456, "to_id": 49620, "type": "indicates" }, { "id": 849, "from_id": 11457, "to_id": 49620, "type": "indicates" }, { "id": 850, "from_id": 49620, "to_id": 49619, "type": "communicates-with" } ]
[]
3,788
At the time, we found ChessMaster targeting different sectors from the academe to media and government agencies in Japan.
[ { "id": 49628, "label": "campaign", "start_offset": 22, "end_offset": 33 }, { "id": 49629, "label": "identity", "start_offset": 71, "end_offset": 111 }, { "id": 49630, "label": "location", "start_offset": 115, "end_offset": 120 } ]
[ { "id": 851, "from_id": 49628, "to_id": 49629, "type": "targets" }, { "id": 852, "from_id": 49629, "to_id": 49630, "type": "located-at" } ]
[]
3,791
While the original campaign was comprehensive and used remote access Trojans (RATs) such as ChChes and RedLeaves, this new campaign used a new backdoor (Detected by Trend Micro as BKDR_ANEL.ZKEI) that leverages the CVE-2017-8759 vulnerability for its cyberespionage activities.
[ { "id": 49632, "label": "malware", "start_offset": 93, "end_offset": 99 }, { "id": 49633, "label": "malware", "start_offset": 104, "end_offset": 113 }, { "id": 49634, "label": "malware", "start_offset": 181, "end_offset": 195 }, { "id": 49636, "label": "identity", "start_offset": 166, "end_offset": 177 }, { "id": 49635, "label": "vulnerability", "start_offset": 216, "end_offset": 229 } ]
[ { "id": 853, "from_id": 49634, "to_id": 49635, "type": "exploits" } ]
[]
3,798
When we tracked ChessMaster back in November, we noted that it exploited the SOAP WSDL parser vulnerability CVE-2017-8759 (patched in September 2017) within the Microsoft .NET framework to download additional malware.
[ { "id": 49661, "label": "malware", "start_offset": 16, "end_offset": 27 }, { "id": 49664, "label": "TIME", "start_offset": 134, "end_offset": 148 }, { "id": 49666, "label": "vulnerability", "start_offset": 77, "end_offset": 121 }, { "id": 49662, "label": "TIME", "start_offset": 36, "end_offset": 44 }, { "id": 49667, "label": "SOFTWARE", "start_offset": 161, "end_offset": 185 } ]
[ { "id": 854, "from_id": 49661, "to_id": 49666, "type": "exploits" }, { "id": 855, "from_id": 49667, "to_id": 49666, "type": "has" } ]
[]
3,799
While ChessMaster still uses the previous exploit, it also added more methods to its arsenal: one exploits another vulnerability, CVE-2017-11882 (patched in November 2017), which was also exploited to deliver illegal versions of the Loki infostealer.
[ { "id": 49668, "label": "malware", "start_offset": 233, "end_offset": 249 }, { "id": 49669, "label": "TIME", "start_offset": 157, "end_offset": 170 }, { "id": 49670, "label": "vulnerability", "start_offset": 130, "end_offset": 144 }, { "id": 49671, "label": "malware", "start_offset": 6, "end_offset": 17 } ]
[ { "id": 856, "from_id": 49671, "to_id": 49670, "type": "exploits" }, { "id": 857, "from_id": 49670, "to_id": 49668, "type": "drops" } ]
[]
3,810
ChessMaster can utilize any of these methods to download the next malware in the chain, the open source post-exploitation tool known as “Koadic,” which the previous campaign also used.
[ { "id": 49682, "label": "malware", "start_offset": 0, "end_offset": 11 }, { "id": 49683, "label": "malware", "start_offset": 137, "end_offset": 143 } ]
[ { "id": 858, "from_id": 49682, "to_id": 49683, "type": "downloads" } ]
[]
3,830
If Koadic finds that the system is conducive to the attacker’s interests, it downloads a base64-encrypted version of the ANEL malware from the Command-and-Control (C&C) server and executes it. Encrypted ANEL is decrypted using the “certutil -docode” command.
[ { "id": 11615, "label": "malware", "start_offset": 121, "end_offset": 125 }, { "id": 11618, "label": "malware", "start_offset": 204, "end_offset": 208 }, { "id": 49688, "label": "malware", "start_offset": 3, "end_offset": 9 } ]
[ { "id": 859, "from_id": 49688, "to_id": 11615, "type": "downloads" } ]
[]
3,833
Base64 encoded ANEL downloaded by Koadic ANEL will send the infected environment’s information to the C&C server.
[ { "id": 49689, "label": "malware", "start_offset": 15, "end_offset": 19 }, { "id": 49690, "label": "malware", "start_offset": 34, "end_offset": 40 }, { "id": 49691, "label": "malware", "start_offset": 41, "end_offset": 45 }, { "id": 49692, "label": "Infrastucture", "start_offset": 102, "end_offset": 112 } ]
[ { "id": 860, "from_id": 49690, "to_id": 49689, "type": "downloads" }, { "id": 861, "from_id": 49691, "to_id": 49692, "type": "exfiltrates-to" } ]
[]
3,858
After the execution of accevent.exe, it loads event.dll, which will be placed in the same folder (so it takes loading priority), after which event.dll decrypts and loads the encrypted backdoor ssssss.ddd, which is BKDR_ANEL.
[ { "id": 49719, "label": "FILEPATH", "start_offset": 141, "end_offset": 150 }, { "id": 49717, "label": "FILEPATH", "start_offset": 23, "end_offset": 35 }, { "id": 49718, "label": "FILEPATH", "start_offset": 46, "end_offset": 55 }, { "id": 49720, "label": "FILEPATH", "start_offset": 193, "end_offset": 203 }, { "id": 49721, "label": "malware", "start_offset": 214, "end_offset": 223 } ]
[ { "id": 862, "from_id": 49717, "to_id": 49718, "type": "downloads" }, { "id": 863, "from_id": 49720, "to_id": 49721, "type": "duplicate-of" } ]
[]
3,897
The fact sheet comes after numerous ransomware attacks on key critical infrastructures in the US and abroad, including the attack on Colonial Pipeline by DarkSide.
[ { "id": 49749, "label": "location", "start_offset": 94, "end_offset": 96 }, { "id": 49751, "label": "threat-actor", "start_offset": 154, "end_offset": 162 }, { "id": 49750, "label": "identity", "start_offset": 133, "end_offset": 150 } ]
[ { "id": 864, "from_id": 49751, "to_id": 49750, "type": "targets" } ]
[]