diff --git a/.script/tests/detectionTemplateSchemaValidation/ValidConnectorIds.json b/.script/tests/detectionTemplateSchemaValidation/ValidConnectorIds.json index f4e980f0f0a..48256400d64 100644 --- a/.script/tests/detectionTemplateSchemaValidation/ValidConnectorIds.json +++ b/.script/tests/detectionTemplateSchemaValidation/ValidConnectorIds.json @@ -94,6 +94,7 @@ "GCPDNSDataConnector", "GWorkspaceRAPI", "GoogleWorkspaceReportsAPI", + "GreyNoise2SentinelAPI", "IdentityInfo", "ImpervaWAFCloudAPI", "ImpervaWAFGateway", diff --git a/Logos/greynoise_logomark_black.svg b/Logos/greynoise_logomark_black.svg new file mode 100644 index 00000000000..12c2e131372 --- /dev/null +++ b/Logos/greynoise_logomark_black.svg @@ -0,0 +1,42 @@ + + + + + + + + + + + + + + + + + + + + + diff --git a/Sample Data/Custom/GreyNoiseEvent.json b/Sample Data/Custom/GreyNoiseEvent.json new file mode 100644 index 00000000000..11ca680281b --- /dev/null +++ b/Sample Data/Custom/GreyNoiseEvent.json @@ -0,0 +1,72 @@ +[ + { + "ip": "1.1.2.2", + "metadata": { + "asn": "AS25000", + "city": "Ta’if", + "country": "Saudi Arabia", + "country_code": "SA", + "organization": "Saudi Telecom Company JSC", + "category": "isp", + "tor": false, + "rdns": "" , + "os": "Windows 7/8", + "sensor_count": 78, + "sensor_hits": 433, + "region": "Mecca Region", + "destination_countries": [ + "Belarus", + "United States", + "Saudi Arabia", + "Bulgaria", + "United Kingdom", + "Israel", + "Australia", + "Indonesia", + "South Korea" + ], + "source_country": "Saudi Arabia", + "source_country_code": "SA", + "destination_country_codes": [ + "BY", + "US", + "SA", + "BG", + "GB", + "IL", + "AU", + "ID", + "KR" + ] + }, + "bot": false, + "vpn": false, + "vpn_service": "N/A", + "spoofable": false, + "raw_data": { + "scan": [ + { + "port": 445, + "protocol": "TCP" + }, + { + "port": 1433, + "protocol": "TCP" + } + ], + "web": {}, + "ja3": [], + "hassh": [] + }, + "first_seen": "2023-08-23", + "last_seen": "2023-08-25", + "seen": true, + "tags": [ + "MSSQL Bruteforcer", + "SMBv1 Crawler" + ], + "actor": "unknown", + "classification": "malicious", + "cve": [] + } +] \ No newline at end of file diff --git a/Sample Data/Custom/Recoreded Future/RecordedFutureDomainWorkbook_ExampleDomainProxyLog_IngestedLogs.csv b/Sample Data/Custom/Recoreded Future/RecordedFutureDomainWorkbook_ExampleDomainProxyLog_IngestedLogs.csv new file mode 100644 index 00000000000..9b5e0198802 --- /dev/null +++ b/Sample Data/Custom/Recoreded Future/RecordedFutureDomainWorkbook_ExampleDomainProxyLog_IngestedLogs.csv @@ -0,0 +1,13 @@ +TenantId,SourceSystem,MG,ManagementGroupName,"TimeGenerated [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",Computer,RawData,"Action_s","Content_Type_s","Device_s","Domain_s","Response_s","Src_IPv4_s","URL_s",Type,"_ResourceId",parts,tld,"DNS_TimeGenerated [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",TenantId1,"TimeGenerated1 [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",SourceSystem1,Action,ActivityGroupNames,AdditionalInformation,ApplicationId,AzureTenantId,ConfidenceScore,Description,DiamondModel,ExternalIndicatorId,"ExpirationDateTime [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",IndicatorId,ThreatType,Active,KillChainActions,KillChainC2,KillChainDelivery,KillChainExploitation,KillChainReconnaissance,KillChainWeaponization,KnownFalsePositives,MalwareNames,PassiveOnly,ThreatSeverity,Tags,TrafficLightProtocolLevel,EmailEncoding,EmailLanguage,EmailRecipient,EmailSenderAddress,EmailSenderName,EmailSourceDomain,EmailSourceIpAddress,EmailSubject,EmailXMailer,"FileCompileDateTime [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]","FileCreatedDateTime [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",FileHashType,FileHashValue,FileMutexName,FileName,FilePacker,FilePath,FileSize,FileType,DomainName,NetworkIP,NetworkPort,NetworkDestinationAsn,NetworkDestinationCidrBlock,NetworkDestinationIP,NetworkCidrBlock,NetworkDestinationPort,NetworkProtocol,NetworkSourceAsn,NetworkSourceCidrBlock,NetworkSourceIP,NetworkSourcePort,Url,UserAgent,IndicatorProvider,Type1 +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/16/2023, 4:05:13.099 PM",,,GET,"text/javascript","Squid_Proxy","ikomoouessgqekmc.xyz","TCP_MISS/200","10.1.70.199","http://ikomoouessgqekmc.xyz/qgdaxsi","Squid_Proxy_Domain_CL",,"[""ikomoouessgqekmc"",""xyz""]",xyz,"9/16/2023, 4:05:13.099 PM","f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:08:06.074 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",90,"Recorded Future - Domains - Command and Control Activity",,"indicator--b29ed22d-bc66-4ea3-9527-cb1f7d5996de","9/19/2023, 7:07:35.900 PM",4B5338C3FB62BE62671A9C63A9FB11D83CE2B9E9DC70D082C46256A054D65280,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Recent C&C DNS Name\"",\""EvidenceString\"":\""1 sighting on 1 source: Bambenek Consulting C&C Blocklist.\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1695057312382,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,"ikomoouessgqekmc.xyz",,,,,,,,,,,,,,,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 4:05:12.176 PM",,,GET,"image/webp","Squid_Proxy","nihsxhvkfjwotm.bid","TCP_MISS/304","10.1.147.78","http://nihsxhvkfjwotm.bid/nkavfib","Squid_Proxy_Domain_CL",,"[""nihsxhvkfjwotm"",""bid""]",bid,"9/15/2023, 4:05:12.176 PM","f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:08:06.117 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",92,"Recorded Future - Domains - Command and Control Activity",,"indicator--0fc20b4c-3c37-4321-b991-2eaafc2d744e","9/19/2023, 7:07:36.511 PM",95956A998E54BBE5EFCA1E68B6AE8DE2FF31FA3B286070A6931C18CD8FB19965,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported Botnet Domain\"",\""EvidenceString\"":\""9 sightings on 1 source: External Sensor Data Analysis. nihsxhvkfjwotm.bid is observed to be a botnet domain from which network attacks are launched. Attacks may include SPAM messages, DOS, SQL injections, proxy jacking, and other unsolicited contacts.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691544788241,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 2 sources: Bambenek Consulting C&C Blocklist, Recently Viewed Integrations Indicators. Observed between Mar 5, 2023, and Mar 8, 2023.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1695104194129,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recent C&C DNS Name\"",\""EvidenceString\"":\""1 sighting on 1 source: Bambenek Consulting C&C Blocklist.\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1695104194092,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,"nihsxhvkfjwotm.bid",,,,,,,,,,,,,,,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/19/2023, 5:08:25.443 PM",,,GET,"text/css","Squid_Proxy","csyeywqwyikqaiim.xyz","TCP_MISS/304","10.1.203.27","http://csyeywqwyikqaiim.xyz/wixylmz","Squid_Proxy_Domain_CL",,"[""csyeywqwyikqaiim"",""xyz""]",xyz,"9/19/2023, 5:08:25.443 PM","f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:08:06.343 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",91,"Recorded Future - Domains - Command and Control Activity",,"indicator--78c75a0a-c236-4f67-907f-facde94f5c6d","9/19/2023, 7:07:32.698 PM",7E44E1F99140ED284EF6D4379ED8B40505BCA4A18FDDFECC3818DDA1ABB06581,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged DNS Name\"",\""EvidenceString\"":\""1 sighting on 1 source: Twitter. Most recent link (Jul 5, 2023): https://twitter.com/0xToxin/statuses/1676578018985123841\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1688562323000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recent C&C DNS Name\"",\""EvidenceString\"":\""1 sighting on 1 source: Bambenek Consulting C&C Blocklist.\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1695051741313,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,"csyeywqwyikqaiim.xyz",,,,,,,,,,,,,,,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/19/2023, 11:20:55.461 AM",,,GET,"text/css","Squid_Proxy","snfrpmnq.org","TCP_MISS/200","10.1.4.174","http://snfrpmnq.org/xsqvmdw","Squid_Proxy_Domain_CL",,"[""snfrpmnq"",""org""]",org,"9/19/2023, 11:20:55.461 AM","f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:08:06.351 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",92,"Recorded Future - Domains - Command and Control Activity",,"indicator--027005e3-dfe2-41d2-bd06-e8ac80b9aab8","9/19/2023, 7:07:32.983 PM",8BD4D42FFD595F366EA42C53950192F049B8D0F8E2BADF9A90272D0814364FB0,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged DNS Name\"",\""EvidenceString\"":\""1 sighting on 1 source: @DGAFeedAlerts. Most recent tweet: New unknownmalware Dom: snfrpmnq[.]org IP: 169[.]50[.]13[.]61 NS: https://t.co/JxUb8f0Cir https://t.co/RCTjQ7czQd. Most recent link (May 5, 2020): https://twitter.com/DGAFeedAlerts/statuses/1257784471450980354\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1588714161000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 2 sources: Bambenek Consulting C&C Blocklist, Recently Viewed Integrations Indicators. Observed between Mar 5, 2023, and Mar 8, 2023.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1695056485635,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recent C&C DNS Name\"",\""EvidenceString\"":\""1 sighting on 1 source: Bambenek Consulting C&C Blocklist.\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1695056485614,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,"snfrpmnq.org",,,,,,,,,,,,,,,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/19/2023, 5:08:25.443 PM",,,GET,"text/css","Squid_Proxy","csyeywqwyikqaiim.xyz","TCP_MISS/304","10.1.203.27","http://csyeywqwyikqaiim.xyz/wixylmz","Squid_Proxy_Domain_CL",,"[""csyeywqwyikqaiim"",""xyz""]",xyz,"9/19/2023, 5:08:25.443 PM","f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:08:08.349 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",91,"Recorded Future - Domains - Command and Control Activity",,"indicator--edf873d9-031f-4512-9377-7c66b70d6d84","9/19/2023, 7:07:37.897 PM",7E44E1F99140ED284EF6D4379ED8B40505BCA4A18FDDFECC3818DDA1ABB06581,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged DNS Name\"",\""EvidenceString\"":\""1 sighting on 1 source: Twitter. Most recent link (Jul 5, 2023): https://twitter.com/0xToxin/statuses/1676578018985123841\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1688562323000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recent C&C DNS Name\"",\""EvidenceString\"":\""1 sighting on 1 source: Bambenek Consulting C&C Blocklist.\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1695051741313,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,"csyeywqwyikqaiim.xyz",,,,,,,,,,,,,,,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/19/2023, 11:20:55.461 AM",,,GET,"text/css","Squid_Proxy","snfrpmnq.org","TCP_MISS/200","10.1.4.174","http://snfrpmnq.org/xsqvmdw","Squid_Proxy_Domain_CL",,"[""snfrpmnq"",""org""]",org,"9/19/2023, 11:20:55.461 AM","f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:08:08.353 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",92,"Recorded Future - Domains - Command and Control Activity",,"indicator--ef68f1ed-1f9b-4f90-9048-4f9dfc514708","9/19/2023, 7:07:38.169 PM",8BD4D42FFD595F366EA42C53950192F049B8D0F8E2BADF9A90272D0814364FB0,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged DNS Name\"",\""EvidenceString\"":\""1 sighting on 1 source: @DGAFeedAlerts. Most recent tweet: New unknownmalware Dom: snfrpmnq[.]org IP: 169[.]50[.]13[.]61 NS: https://t.co/JxUb8f0Cir https://t.co/RCTjQ7czQd. Most recent link (May 5, 2020): https://twitter.com/DGAFeedAlerts/statuses/1257784471450980354\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1588714161000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 2 sources: Bambenek Consulting C&C Blocklist, Recently Viewed Integrations Indicators. Observed between Mar 5, 2023, and Mar 8, 2023.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1695056485635,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recent C&C DNS Name\"",\""EvidenceString\"":\""1 sighting on 1 source: Bambenek Consulting C&C Blocklist.\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1695056485614,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,"snfrpmnq.org",,,,,,,,,,,,,,,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/16/2023, 4:05:13.099 PM",,,GET,"text/javascript","Squid_Proxy","ikomoouessgqekmc.xyz","TCP_MISS/200","10.1.70.199","http://ikomoouessgqekmc.xyz/qgdaxsi","Squid_Proxy_Domain_CL",,"[""ikomoouessgqekmc"",""xyz""]",xyz,"9/16/2023, 4:05:13.099 PM","f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:08:11.465 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",90,"Recorded Future - Domains - Command and Control Activity",,"indicator--72b32039-662f-4dca-9155-4f4d982e846f","9/19/2023, 7:07:40.318 PM",4B5338C3FB62BE62671A9C63A9FB11D83CE2B9E9DC70D082C46256A054D65280,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Recent C&C DNS Name\"",\""EvidenceString\"":\""1 sighting on 1 source: Bambenek Consulting C&C Blocklist.\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1695057312382,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,"ikomoouessgqekmc.xyz",,,,,,,,,,,,,,,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 4:05:12.176 PM",,,GET,"image/webp","Squid_Proxy","nihsxhvkfjwotm.bid","TCP_MISS/304","10.1.147.78","http://nihsxhvkfjwotm.bid/nkavfib","Squid_Proxy_Domain_CL",,"[""nihsxhvkfjwotm"",""bid""]",bid,"9/15/2023, 4:05:12.176 PM","f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:08:11.662 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",92,"Recorded Future - Domains - Command and Control Activity",,"indicator--640d024a-2112-4662-bd03-853659264c71","9/19/2023, 7:07:40.943 PM",95956A998E54BBE5EFCA1E68B6AE8DE2FF31FA3B286070A6931C18CD8FB19965,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported Botnet Domain\"",\""EvidenceString\"":\""9 sightings on 1 source: External Sensor Data Analysis. nihsxhvkfjwotm.bid is observed to be a botnet domain from which network attacks are launched. Attacks may include SPAM messages, DOS, SQL injections, proxy jacking, and other unsolicited contacts.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691544788241,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 2 sources: Bambenek Consulting C&C Blocklist, Recently Viewed Integrations Indicators. Observed between Mar 5, 2023, and Mar 8, 2023.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1695104194129,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recent C&C DNS Name\"",\""EvidenceString\"":\""1 sighting on 1 source: Bambenek Consulting C&C Blocklist.\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1695104194092,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,"nihsxhvkfjwotm.bid",,,,,,,,,,,,,,,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 4:05:12.176 PM",,,GET,"image/webp","Squid_Proxy","nihsxhvkfjwotm.bid","TCP_MISS/304","10.1.147.78","http://nihsxhvkfjwotm.bid/nkavfib","Squid_Proxy_Domain_CL",,"[""nihsxhvkfjwotm"",""bid""]",bid,"9/15/2023, 4:05:12.176 PM","f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 7:08:50.963 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",92,"Recorded Future - Domains - Command and Control Activity",,"indicator--a5882cfd-0384-4071-b400-df9cfc514767","9/19/2023, 9:08:27.378 PM",95956A998E54BBE5EFCA1E68B6AE8DE2FF31FA3B286070A6931C18CD8FB19965,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported Botnet Domain\"",\""EvidenceString\"":\""9 sightings on 1 source: External Sensor Data Analysis. nihsxhvkfjwotm.bid is observed to be a botnet domain from which network attacks are launched. Attacks may include SPAM messages, DOS, SQL injections, proxy jacking, and other unsolicited contacts.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691544788241,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 2 sources: Bambenek Consulting C&C Blocklist, Recently Viewed Integrations Indicators. Observed between Mar 5, 2023, and Mar 8, 2023.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1695104194129,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recent C&C DNS Name\"",\""EvidenceString\"":\""1 sighting on 1 source: Bambenek Consulting C&C Blocklist.\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1695104194092,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,"nihsxhvkfjwotm.bid",,,,,,,,,,,,,,,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/19/2023, 5:08:25.443 PM",,,GET,"text/css","Squid_Proxy","csyeywqwyikqaiim.xyz","TCP_MISS/304","10.1.203.27","http://csyeywqwyikqaiim.xyz/wixylmz","Squid_Proxy_Domain_CL",,"[""csyeywqwyikqaiim"",""xyz""]",xyz,"9/19/2023, 5:08:25.443 PM","f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 7:08:50.964 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",91,"Recorded Future - Domains - Command and Control Activity",,"indicator--e6b91855-bc05-4724-b425-b72faf48773a","9/19/2023, 9:08:27.494 PM",7E44E1F99140ED284EF6D4379ED8B40505BCA4A18FDDFECC3818DDA1ABB06581,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged DNS Name\"",\""EvidenceString\"":\""1 sighting on 1 source: Twitter. Most recent link (Jul 5, 2023): https://twitter.com/0xToxin/statuses/1676578018985123841\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1688562323000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recent C&C DNS Name\"",\""EvidenceString\"":\""1 sighting on 1 source: Bambenek Consulting C&C Blocklist.\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1695139103510,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,"csyeywqwyikqaiim.xyz",,,,,,,,,,,,,,,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/16/2023, 4:05:13.099 PM",,,GET,"text/javascript","Squid_Proxy","ikomoouessgqekmc.xyz","TCP_MISS/200","10.1.70.199","http://ikomoouessgqekmc.xyz/qgdaxsi","Squid_Proxy_Domain_CL",,"[""ikomoouessgqekmc"",""xyz""]",xyz,"9/16/2023, 4:05:13.099 PM","f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 7:08:51.412 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",90,"Recorded Future - Domains - Command and Control Activity",,"indicator--307dc0e1-825a-4b37-9b48-d380004c11ce","9/19/2023, 9:08:26.824 PM",4B5338C3FB62BE62671A9C63A9FB11D83CE2B9E9DC70D082C46256A054D65280,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Recent C&C DNS Name\"",\""EvidenceString\"":\""1 sighting on 1 source: Bambenek Consulting C&C Blocklist.\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1695057312382,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,"ikomoouessgqekmc.xyz",,,,,,,,,,,,,,,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/19/2023, 11:20:55.461 AM",,,GET,"text/css","Squid_Proxy","snfrpmnq.org","TCP_MISS/200","10.1.4.174","http://snfrpmnq.org/xsqvmdw","Squid_Proxy_Domain_CL",,"[""snfrpmnq"",""org""]",org,"9/19/2023, 11:20:55.461 AM","f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 7:08:51.904 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",92,"Recorded Future - Domains - Command and Control Activity",,"indicator--360a7529-56ba-4d31-85b0-3865aff91310","9/19/2023, 9:08:24.489 PM",8BD4D42FFD595F366EA42C53950192F049B8D0F8E2BADF9A90272D0814364FB0,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged DNS Name\"",\""EvidenceString\"":\""1 sighting on 1 source: @DGAFeedAlerts. Most recent tweet: New unknownmalware Dom: snfrpmnq[.]org IP: 169[.]50[.]13[.]61 NS: https://t.co/JxUb8f0Cir https://t.co/RCTjQ7czQd. Most recent link (May 5, 2020): https://twitter.com/DGAFeedAlerts/statuses/1257784471450980354\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1588714161000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 2 sources: Bambenek Consulting C&C Blocklist, Recently Viewed Integrations Indicators. Observed between Mar 5, 2023, and Mar 8, 2023.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1695056485635,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recent C&C DNS Name\"",\""EvidenceString\"":\""1 sighting on 1 source: Bambenek Consulting C&C Blocklist.\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1695056485614,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,"snfrpmnq.org",,,,,,,,,,,,,,,,ThreatIntelligenceIndicator diff --git a/Sample Data/Custom/Recoreded Future/RecordedFutureDomainWorkbook_ThreatIntelligenceIndicator_IngestedLogs.csv b/Sample Data/Custom/Recoreded Future/RecordedFutureDomainWorkbook_ThreatIntelligenceIndicator_IngestedLogs.csv new file mode 100644 index 00000000000..ba53b2baa07 --- /dev/null +++ b/Sample Data/Custom/Recoreded Future/RecordedFutureDomainWorkbook_ThreatIntelligenceIndicator_IngestedLogs.csv @@ -0,0 +1,6 @@ +TenantId,"TimeGenerated [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",SourceSystem,Action,ActivityGroupNames,AdditionalInformation,ApplicationId,AzureTenantId,ConfidenceScore,Description,DiamondModel,ExternalIndicatorId,"ExpirationDateTime [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",IndicatorId,ThreatType,Active,KillChainActions,KillChainC2,KillChainDelivery,KillChainExploitation,KillChainReconnaissance,KillChainWeaponization,KnownFalsePositives,MalwareNames,PassiveOnly,ThreatSeverity,Tags,TrafficLightProtocolLevel,EmailEncoding,EmailLanguage,EmailRecipient,EmailSenderAddress,EmailSenderName,EmailSourceDomain,EmailSourceIpAddress,EmailSubject,EmailXMailer,"FileCompileDateTime [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]","FileCreatedDateTime [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",FileHashType,FileHashValue,FileMutexName,FileName,FilePacker,FilePath,FileSize,FileType,DomainName,NetworkIP,NetworkPort,NetworkDestinationAsn,NetworkDestinationCidrBlock,NetworkDestinationIP,NetworkCidrBlock,NetworkDestinationPort,NetworkProtocol,NetworkSourceAsn,NetworkSourceCidrBlock,NetworkSourceIP,NetworkSourcePort,Url,UserAgent,IndicatorProvider,Type,TenantId1,SourceSystem1,MG,ManagementGroupName,"TimeGenerated1 [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",Computer,RawData,"Action_s","Content_Type_s","Device_s","Domain_s","Response_s","Src_IPv4_s","URL_s",Type1,"_ResourceId",parts,tld,"DNS_TimeGenerated [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]" +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:08:06.351 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",92,"Recorded Future - Domains - Command and Control Activity",,"indicator--027005e3-dfe2-41d2-bd06-e8ac80b9aab8","9/19/2023, 7:07:32.983 PM",8BD4D42FFD595F366EA42C53950192F049B8D0F8E2BADF9A90272D0814364FB0,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged DNS Name\"",\""EvidenceString\"":\""1 sighting on 1 source: @DGAFeedAlerts. Most recent tweet: New unknownmalware Dom: snfrpmnq[.]org IP: 169[.]50[.]13[.]61 NS: https://t.co/JxUb8f0Cir https://t.co/RCTjQ7czQd. Most recent link (May 5, 2020): https://twitter.com/DGAFeedAlerts/statuses/1257784471450980354\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1588714161000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 2 sources: Bambenek Consulting C&C Blocklist, Recently Viewed Integrations Indicators. Observed between Mar 5, 2023, and Mar 8, 2023.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1695056485635,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recent C&C DNS Name\"",\""EvidenceString\"":\""1 sighting on 1 source: Bambenek Consulting C&C Blocklist.\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1695056485614,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,"snfrpmnq.org",,,,,,,,,,,,,,,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/19/2023, 5:08:45.466 PM",,,GET,"text/css","Squid_Proxy","snfrpmnq.org","TCP_MISS/200","10.1.4.174","http://snfrpmnq.org/xsqvmdw","Squid_Proxy_Domain_CL",,"[""snfrpmnq"",""org""]",org,"9/19/2023, 5:08:45.466 PM" +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:08:06.351 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",92,"Recorded Future - Domains - Command and Control Activity",,"indicator--027005e3-dfe2-41d2-bd06-e8ac80b9aab8","9/19/2023, 7:07:32.983 PM",8BD4D42FFD595F366EA42C53950192F049B8D0F8E2BADF9A90272D0814364FB0,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged DNS Name\"",\""EvidenceString\"":\""1 sighting on 1 source: @DGAFeedAlerts. Most recent tweet: New unknownmalware Dom: snfrpmnq[.]org IP: 169[.]50[.]13[.]61 NS: https://t.co/JxUb8f0Cir https://t.co/RCTjQ7czQd. Most recent link (May 5, 2020): https://twitter.com/DGAFeedAlerts/statuses/1257784471450980354\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1588714161000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 2 sources: Bambenek Consulting C&C Blocklist, Recently Viewed Integrations Indicators. Observed between Mar 5, 2023, and Mar 8, 2023.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1695056485635,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recent C&C DNS Name\"",\""EvidenceString\"":\""1 sighting on 1 source: Bambenek Consulting C&C Blocklist.\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1695056485614,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,"snfrpmnq.org",,,,,,,,,,,,,,,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/19/2023, 11:20:55.461 AM",,,GET,"text/css","Squid_Proxy","snfrpmnq.org","TCP_MISS/200","10.1.4.174","http://snfrpmnq.org/xsqvmdw","Squid_Proxy_Domain_CL",,"[""snfrpmnq"",""org""]",org,"9/19/2023, 11:20:55.461 AM" +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:08:06.117 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",92,"Recorded Future - Domains - Command and Control Activity",,"indicator--0fc20b4c-3c37-4321-b991-2eaafc2d744e","9/19/2023, 7:07:36.511 PM",95956A998E54BBE5EFCA1E68B6AE8DE2FF31FA3B286070A6931C18CD8FB19965,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported Botnet Domain\"",\""EvidenceString\"":\""9 sightings on 1 source: External Sensor Data Analysis. nihsxhvkfjwotm.bid is observed to be a botnet domain from which network attacks are launched. Attacks may include SPAM messages, DOS, SQL injections, proxy jacking, and other unsolicited contacts.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691544788241,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 2 sources: Bambenek Consulting C&C Blocklist, Recently Viewed Integrations Indicators. Observed between Mar 5, 2023, and Mar 8, 2023.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1695104194129,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recent C&C DNS Name\"",\""EvidenceString\"":\""1 sighting on 1 source: Bambenek Consulting C&C Blocklist.\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1695104194092,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,"nihsxhvkfjwotm.bid",,,,,,,,,,,,,,,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 4:05:12.176 PM",,,GET,"image/webp","Squid_Proxy","nihsxhvkfjwotm.bid","TCP_MISS/304","10.1.147.78","http://nihsxhvkfjwotm.bid/nkavfib","Squid_Proxy_Domain_CL",,"[""nihsxhvkfjwotm"",""bid""]",bid,"9/15/2023, 4:05:12.176 PM" +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:08:06.343 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",91,"Recorded Future - Domains - Command and Control Activity",,"indicator--78c75a0a-c236-4f67-907f-facde94f5c6d","9/19/2023, 7:07:32.698 PM",7E44E1F99140ED284EF6D4379ED8B40505BCA4A18FDDFECC3818DDA1ABB06581,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged DNS Name\"",\""EvidenceString\"":\""1 sighting on 1 source: Twitter. Most recent link (Jul 5, 2023): https://twitter.com/0xToxin/statuses/1676578018985123841\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1688562323000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recent C&C DNS Name\"",\""EvidenceString\"":\""1 sighting on 1 source: Bambenek Consulting C&C Blocklist.\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1695051741313,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,"csyeywqwyikqaiim.xyz",,,,,,,,,,,,,,,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/19/2023, 5:08:25.443 PM",,,GET,"text/css","Squid_Proxy","csyeywqwyikqaiim.xyz","TCP_MISS/304","10.1.203.27","http://csyeywqwyikqaiim.xyz/wixylmz","Squid_Proxy_Domain_CL",,"[""csyeywqwyikqaiim"",""xyz""]",xyz,"9/19/2023, 5:08:25.443 PM" +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:08:06.074 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",90,"Recorded Future - Domains - Command and Control Activity",,"indicator--b29ed22d-bc66-4ea3-9527-cb1f7d5996de","9/19/2023, 7:07:35.900 PM",4B5338C3FB62BE62671A9C63A9FB11D83CE2B9E9DC70D082C46256A054D65280,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Recent C&C DNS Name\"",\""EvidenceString\"":\""1 sighting on 1 source: Bambenek Consulting C&C Blocklist.\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1695057312382,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,"ikomoouessgqekmc.xyz",,,,,,,,,,,,,,,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/16/2023, 4:05:13.099 PM",,,GET,"text/javascript","Squid_Proxy","ikomoouessgqekmc.xyz","TCP_MISS/200","10.1.70.199","http://ikomoouessgqekmc.xyz/qgdaxsi","Squid_Proxy_Domain_CL",,"[""ikomoouessgqekmc"",""xyz""]",xyz,"9/16/2023, 4:05:13.099 PM" diff --git a/Sample Data/Custom/Recoreded Future/RecordedFutureHashWorkbook_ExampleHashFirewallLog_IngestedLogs.csv b/Sample Data/Custom/Recoreded Future/RecordedFutureHashWorkbook_ExampleHashFirewallLog_IngestedLogs.csv new file mode 100644 index 00000000000..f7ba211fb2a --- /dev/null +++ b/Sample Data/Custom/Recoreded Future/RecordedFutureHashWorkbook_ExampleHashFirewallLog_IngestedLogs.csv @@ -0,0 +1,7 @@ +TenantId,SourceSystem,MG,ManagementGroupName,"TimeGenerated [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",Computer,RawData,"HashType_s","Hash_s","Computer_Name_s","Detection_Name_s","Device_s","Downloaded_by_s","File_Path_s","Hash_g","Hash_Type_s","Src_IPv4_s",Type,"_ResourceId",TenantId1,"TimeGenerated1 [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",SourceSystem1,Action,ActivityGroupNames,AdditionalInformation,ApplicationId,AzureTenantId,ConfidenceScore,Description,DiamondModel,ExternalIndicatorId,"ExpirationDateTime [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",IndicatorId,ThreatType,Active,KillChainActions,KillChainC2,KillChainDelivery,KillChainExploitation,KillChainReconnaissance,KillChainWeaponization,KnownFalsePositives,MalwareNames,PassiveOnly,ThreatSeverity,Tags,TrafficLightProtocolLevel,EmailEncoding,EmailLanguage,EmailRecipient,EmailSenderAddress,EmailSenderName,EmailSourceDomain,EmailSourceIpAddress,EmailSubject,EmailXMailer,"FileCompileDateTime [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]","FileCreatedDateTime [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",FileHashType,FileHashValue,FileMutexName,FileName,FilePacker,FilePath,FileSize,FileType,DomainName,NetworkIP,NetworkPort,NetworkDestinationAsn,NetworkDestinationCidrBlock,NetworkDestinationIP,NetworkCidrBlock,NetworkDestinationPort,NetworkProtocol,NetworkSourceAsn,NetworkSourceCidrBlock,NetworkSourceIP,NetworkSourcePort,Url,UserAgent,IndicatorProvider,Type1 +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/12/2023, 9:09:01.011 AM",,,,237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d,vmhwhfcsfq,"Trojan.Gen.2",EndpointProtection,"c:/program files (x86)/ggggg/cccc/application/cccc.exe","C:\Users\user1\Downloads\XXXXXX Start Orb Changer.exe",,SHA2,"10.1.103.63","EndpointProtection_HASH_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","8/29/2023, 1:30:37.249 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",89,"Recorded Future - HASH - Observed in Underground Virus Testing Sites",,"indicator--b99735da-acc9-476b-99fa-516882ff25a8","8/30/2023, 1:30:28.501 PM",09DD8F81D936AD6704EF8449BED37AB8E5118A23E42A17FD1A02AD4B05CE4F7A,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Threat Researcher\"",\""EvidenceString\"":\""4 sightings on 0 sources: Most recent link (May 1, 2022): https://www.bleepingcomputer.com/forums/t/771489/norton-blocked-an-attack-by-system-infected-trojanbackdoor-activity-578/#entry5354492\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1651376951669,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 1 source: Recorded Future Analyst Community Trending Indicators. Observed between Jun 24, 2021, and Jul 2, 2021.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692878798728,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Linked to Attack Vector\"",\""EvidenceString\"":\""3 sightings on 1 source: Insikt Group. 9 related attack vectors including Powershell Attack, VBA Malware, Phishing, Cross site scripting, Web Application Exploitation.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1686347161530,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Linked to Vulnerability\"",\""EvidenceString\"":\""1 sighting on 0 sources: 11 related cyber vulnerabilities including CWE-20, CVE-2017-11882, CVE-2017-8759, CVE-2018-15982, CVE-2018-8174.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1593698472800,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Linked to Cyber Attack\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1686347161530,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Suspicious Behavior Detected\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Triage Malware Analysis. Malware sandbox report for 237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d on August 03, 2023. Triage score: 7 (Shows suspicious behavior). No malware detections. Contains: 3 ATT&CK behaviors, 0 command and control indicators, and 8 signatures. Most recent link (Aug 3, 2023): https://tria.ge/230803-11kf2she5s\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1691100579000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Referenced by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 1 report: Cheap and Flexible, AZORult Remains Viable Commodity Malware for Less-Experienced Threat Actors. Most recent link (Jul 02, 2020): https://app.recordedfuture.com/portal/analyst-note/doc:eZyfXH\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1559001600000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Positive Malware Verdict\"",\""EvidenceString\"":\""6 sightings on 4 sources: Recorded Future Triage Malware Analysis, PolySwarm PolyUnite, ReversingLabs, PolySwarm. Malware sandbox report for 237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d on August 23, 2023. Triage score: 10 (Known bad). No malware detections. Contains: 1 ATT&CK behavior, 0 command and control indicators, and 12 signatures. Most recent link (Aug 23, 2023): https://tria.ge/230823-wqncqsgb5y\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1692814271000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 1 report: Casbaneiro Banking Trojan Variant Distributed Via COVID-19 Lure, Shared on Twitter. Most recent link (Mar 25, 2020): https://app.recordedfuture.com/portal/analyst-note/doc:dUts77\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1686268800000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Observed in Underground Virus Testing Sites\"",\""EvidenceString\"":\""2 sightings on 1 source: d-lVCC.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1667765120000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,SHA256,237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d,,,,,,,,,,,,,,,,,,,,,,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/12/2023, 9:09:01.011 AM",,,,237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d,vmhwhfcsfq,"Trojan.Gen.2",EndpointProtection,"c:/program files (x86)/ggggg/cccc/application/cccc.exe","C:\Users\user1\Downloads\XXXXXX Start Orb Changer.exe",,SHA2,"10.1.103.63","EndpointProtection_HASH_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/2/2023, 1:30:52.683 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",89,"Recorded Future - HASH - Observed in Underground Virus Testing Sites",,"indicator--eb5dc02d-b6e4-48a4-a20c-772b0ac6e513","9/3/2023, 1:30:41.681 PM",09DD8F81D936AD6704EF8449BED37AB8E5118A23E42A17FD1A02AD4B05CE4F7A,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Threat Researcher\"",\""EvidenceString\"":\""4 sightings on 1 source: Bleepingcomputer Forums. Most recent link (May 1, 2022): https://www.bleepingcomputer.com/forums/t/771489/norton-blocked-an-attack-by-system-infected-trojanbackdoor-activity-578/#entry5354492\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1651376951669,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 1 source: Recorded Future Analyst Community Trending Indicators. Observed between Jun 24, 2021, and Jul 2, 2021.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693584861111,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Linked to Attack Vector\"",\""EvidenceString\"":\""7 sightings on 1 source: Insikt Group. 9 related attack vectors including Powershell Attack, VBA Malware, Phishing, Cross site scripting, Web Application Exploitation.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1686347161530,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Linked to Vulnerability\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 11 related cyber vulnerabilities including CWE-20, CVE-2017-11882, CVE-2017-8759, CVE-2018-15982, CVE-2018-8174.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1593698472800,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Linked to Cyber Attack\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1686347161530,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Suspicious Behavior Detected\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Triage Malware Analysis. Malware sandbox report for 237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d on August 03, 2023. Triage score: 7 (Shows suspicious behavior). No malware detections. Contains: 3 ATT&CK behaviors, 0 command and control indicators, and 8 signatures. Most recent link (Aug 3, 2023): https://tria.ge/230803-11kf2she5s\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1691100579000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Referenced by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 1 report: Cheap and Flexible, AZORult Remains Viable Commodity Malware for Less-Experienced Threat Actors. Most recent link (Jul 02, 2020): https://app.recordedfuture.com/portal/analyst-note/doc:eZyfXH\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1559001600000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Positive Malware Verdict\"",\""EvidenceString\"":\""6 sightings on 4 sources: Recorded Future Triage Malware Analysis, PolySwarm PolyUnite, ReversingLabs, PolySwarm. Malware sandbox report for 237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d on August 23, 2023. Triage score: 10 (Known bad). No malware detections. Contains: 1 ATT&CK behavior, 0 command and control indicators, and 12 signatures. Most recent link (Aug 23, 2023): https://tria.ge/230823-wqncqsgb5y\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1692814271000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 1 report: Casbaneiro Banking Trojan Variant Distributed Via COVID-19 Lure, Shared on Twitter. Most recent link (Mar 25, 2020): https://app.recordedfuture.com/portal/analyst-note/doc:dUts77\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1686268800000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Observed in Underground Virus Testing Sites\"",\""EvidenceString\"":\""2 sightings on 1 source: Special Collection Hashes.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1667765120000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,SHA256,237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d,,,,,,,,,,,,,,,,,,,,,,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/12/2023, 9:09:01.011 AM",,,,237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d,vmhwhfcsfq,"Trojan.Gen.2",EndpointProtection,"c:/program files (x86)/ggggg/cccc/application/cccc.exe","C:\Users\user1\Downloads\XXXXXX Start Orb Changer.exe",,SHA2,"10.1.103.63","EndpointProtection_HASH_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/1/2023, 1:30:28.339 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",89,"Recorded Future - HASH - Observed in Underground Virus Testing Sites",,"indicator--f89bc269-9025-4a2f-a7ab-891ce4d1f797","9/2/2023, 1:30:22.865 PM",09DD8F81D936AD6704EF8449BED37AB8E5118A23E42A17FD1A02AD4B05CE4F7A,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Threat Researcher\"",\""EvidenceString\"":\""4 sightings on 1 source: Bleepingcomputer Forums. Most recent link (May 1, 2022): https://www.bleepingcomputer.com/forums/t/771489/norton-blocked-an-attack-by-system-infected-trojanbackdoor-activity-578/#entry5354492\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1651376951669,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 1 source: Recorded Future Analyst Community Trending Indicators. Observed between Jun 24, 2021, and Jul 2, 2021.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693403523241,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Linked to Attack Vector\"",\""EvidenceString\"":\""3 sightings on 1 source: Insikt Group. 9 related attack vectors including Powershell Attack, VBA Malware, Phishing, Cross site scripting, Web Application Exploitation.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1686347161530,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Linked to Vulnerability\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 11 related cyber vulnerabilities including CWE-20, CVE-2017-11882, CVE-2017-8759, CVE-2018-15982, CVE-2018-8174.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1593698472800,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Linked to Cyber Attack\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1686347161530,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Suspicious Behavior Detected\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Triage Malware Analysis. Malware sandbox report for 237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d on August 03, 2023. Triage score: 7 (Shows suspicious behavior). No malware detections. Contains: 3 ATT&CK behaviors, 0 command and control indicators, and 8 signatures. Most recent link (Aug 3, 2023): https://tria.ge/230803-11kf2she5s\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1691100579000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Referenced by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 1 report: Cheap and Flexible, AZORult Remains Viable Commodity Malware for Less-Experienced Threat Actors. Most recent link (Jul 02, 2020): https://app.recordedfuture.com/portal/analyst-note/doc:eZyfXH\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1559001600000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Positive Malware Verdict\"",\""EvidenceString\"":\""6 sightings on 4 sources: Recorded Future Triage Malware Analysis, PolySwarm PolyUnite, ReversingLabs, PolySwarm. Malware sandbox report for 237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d on August 23, 2023. Triage score: 10 (Known bad). No malware detections. Contains: 1 ATT&CK behavior, 0 command and control indicators, and 12 signatures. Most recent link (Aug 23, 2023): https://tria.ge/230823-wqncqsgb5y\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1692814271000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 1 report: Casbaneiro Banking Trojan Variant Distributed Via COVID-19 Lure, Shared on Twitter. Most recent link (Mar 25, 2020): https://app.recordedfuture.com/portal/analyst-note/doc:dUts77\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1686268800000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Observed in Underground Virus Testing Sites\"",\""EvidenceString\"":\""2 sightings on 1 source: Special Collection Hashes.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1667765120000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,SHA256,237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d,,,,,,,,,,,,,,,,,,,,,,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/12/2023, 9:09:01.011 AM",,,,237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d,vmhwhfcsfq,"Trojan.Gen.2",EndpointProtection,"c:/program files (x86)/ggggg/cccc/application/cccc.exe","C:\Users\user1\Downloads\XXXXXX Start Orb Changer.exe",,SHA2,"10.1.103.63","EndpointProtection_HASH_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","8/28/2023, 11:48:38.666 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",89,"Recorded Future - HASH - Observed in Underground Virus Testing Sites",,"indicator--b2d008bc-14b0-41bb-9b22-1c4b170984bb","8/29/2023, 11:48:30.985 AM",09DD8F81D936AD6704EF8449BED37AB8E5118A23E42A17FD1A02AD4B05CE4F7A,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Threat Researcher\"",\""EvidenceString\"":\""4 sightings on 0 sources: Most recent link (May 1, 2022): https://www.bleepingcomputer.com/forums/t/771489/norton-blocked-an-attack-by-system-infected-trojanbackdoor-activity-578/#entry5354492\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1651376951669,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 1 source: Recorded Future Analyst Community Trending Indicators. Observed between Jun 24, 2021, and Jul 2, 2021.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692878798728,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Linked to Attack Vector\"",\""EvidenceString\"":\""3 sightings on 1 source: Insikt Group. 9 related attack vectors including Powershell Attack, VBA Malware, Phishing, Cross site scripting, Web Application Exploitation.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1686347161530,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Linked to Vulnerability\"",\""EvidenceString\"":\""1 sighting on 0 sources: 11 related cyber vulnerabilities including CWE-20, CVE-2017-11882, CVE-2017-8759, CVE-2018-15982, CVE-2018-8174.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1593698472800,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Linked to Cyber Attack\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1686347161530,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Suspicious Behavior Detected\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Triage Malware Analysis. Malware sandbox report for 237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d on August 03, 2023. Triage score: 7 (Shows suspicious behavior). No malware detections. Contains: 3 ATT&CK behaviors, 0 command and control indicators, and 8 signatures. Most recent link (Aug 3, 2023): https://tria.ge/230803-11kf2she5s\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1691100579000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Referenced by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 1 report: Cheap and Flexible, AZORult Remains Viable Commodity Malware for Less-Experienced Threat Actors. Most recent link (Jul 02, 2020): https://app.recordedfuture.com/portal/analyst-note/doc:eZyfXH\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1559001600000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Positive Malware Verdict\"",\""EvidenceString\"":\""6 sightings on 4 sources: Recorded Future Triage Malware Analysis, PolySwarm PolyUnite, ReversingLabs, PolySwarm. Malware sandbox report for 237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d on August 23, 2023. Triage score: 10 (Known bad). No malware detections. Contains: 1 ATT&CK behavior, 0 command and control indicators, and 12 signatures. Most recent link (Aug 23, 2023): https://tria.ge/230823-wqncqsgb5y\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1692814271000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 1 report: Casbaneiro Banking Trojan Variant Distributed Via COVID-19 Lure, Shared on Twitter. Most recent link (Mar 25, 2020): https://app.recordedfuture.com/portal/analyst-note/doc:dUts77\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1686268800000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Observed in Underground Virus Testing Sites\"",\""EvidenceString\"":\""2 sightings on 1 source: d-lVCC.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1667765120000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,SHA256,237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d,,,,,,,,,,,,,,,,,,,,,,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/12/2023, 9:09:01.011 AM",,,,237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d,vmhwhfcsfq,"Trojan.Gen.2",EndpointProtection,"c:/program files (x86)/ggggg/cccc/application/cccc.exe","C:\Users\user1\Downloads\XXXXXX Start Orb Changer.exe",,SHA2,"10.1.103.63","EndpointProtection_HASH_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","8/30/2023, 1:30:42.607 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",89,"Recorded Future - HASH - Observed in Underground Virus Testing Sites",,"indicator--0309b507-b602-4897-b50c-bc015630a0a1","8/31/2023, 1:30:26.336 PM",09DD8F81D936AD6704EF8449BED37AB8E5118A23E42A17FD1A02AD4B05CE4F7A,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Threat Researcher\"",\""EvidenceString\"":\""4 sightings on 1 source: Bleepingcomputer Forums. Most recent link (May 1, 2022): https://www.bleepingcomputer.com/forums/t/771489/norton-blocked-an-attack-by-system-infected-trojanbackdoor-activity-578/#entry5354492\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1651376951669,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 1 source: Recorded Future Analyst Community Trending Indicators. Observed between Jun 24, 2021, and Jul 2, 2021.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693317036271,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Linked to Attack Vector\"",\""EvidenceString\"":\""3 sightings on 1 source: Insikt Group. 9 related attack vectors including Powershell Attack, VBA Malware, Phishing, Cross site scripting, Web Application Exploitation.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1686347161530,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Linked to Vulnerability\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 11 related cyber vulnerabilities including CWE-20, CVE-2017-11882, CVE-2017-8759, CVE-2018-15982, CVE-2018-8174.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1593698472800,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Linked to Cyber Attack\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1686347161530,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Suspicious Behavior Detected\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Triage Malware Analysis. Malware sandbox report for 237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d on August 03, 2023. Triage score: 7 (Shows suspicious behavior). No malware detections. Contains: 3 ATT&CK behaviors, 0 command and control indicators, and 8 signatures. Most recent link (Aug 3, 2023): https://tria.ge/230803-11kf2she5s\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1691100579000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Referenced by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 1 report: Cheap and Flexible, AZORult Remains Viable Commodity Malware for Less-Experienced Threat Actors. Most recent link (Jul 02, 2020): https://app.recordedfuture.com/portal/analyst-note/doc:eZyfXH\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1559001600000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Positive Malware Verdict\"",\""EvidenceString\"":\""6 sightings on 4 sources: Recorded Future Triage Malware Analysis, PolySwarm PolyUnite, ReversingLabs, PolySwarm. Malware sandbox report for 237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d on August 23, 2023. Triage score: 10 (Known bad). No malware detections. Contains: 1 ATT&CK behavior, 0 command and control indicators, and 12 signatures. Most recent link (Aug 23, 2023): https://tria.ge/230823-wqncqsgb5y\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1692814271000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 1 report: Casbaneiro Banking Trojan Variant Distributed Via COVID-19 Lure, Shared on Twitter. Most recent link (Mar 25, 2020): https://app.recordedfuture.com/portal/analyst-note/doc:dUts77\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1686268800000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Observed in Underground Virus Testing Sites\"",\""EvidenceString\"":\""2 sightings on 1 source: Special Collection Hashes.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1667765120000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,SHA256,237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d,,,,,,,,,,,,,,,,,,,,,,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/12/2023, 9:09:01.011 AM",,,,237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d,vmhwhfcsfq,"Trojan.Gen.2",EndpointProtection,"c:/program files (x86)/ggggg/cccc/application/cccc.exe","C:\Users\user1\Downloads\XXXXXX Start Orb Changer.exe",,SHA2,"10.1.103.63","EndpointProtection_HASH_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","8/31/2023, 1:30:02.605 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",89,"Recorded Future - HASH - Observed in Underground Virus Testing Sites",,"indicator--85469c8b-633d-495c-8f4b-db7e4e6722ac","9/1/2023, 1:29:57.634 PM",09DD8F81D936AD6704EF8449BED37AB8E5118A23E42A17FD1A02AD4B05CE4F7A,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Threat Researcher\"",\""EvidenceString\"":\""4 sightings on 1 source: Bleepingcomputer Forums. Most recent link (May 1, 2022): https://www.bleepingcomputer.com/forums/t/771489/norton-blocked-an-attack-by-system-infected-trojanbackdoor-activity-578/#entry5354492\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1651376951669,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 1 source: Recorded Future Analyst Community Trending Indicators. Observed between Jun 24, 2021, and Jul 2, 2021.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693403523241,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Linked to Attack Vector\"",\""EvidenceString\"":\""3 sightings on 1 source: Insikt Group. 9 related attack vectors including Powershell Attack, VBA Malware, Phishing, Cross site scripting, Web Application Exploitation.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1686347161530,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Linked to Vulnerability\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 11 related cyber vulnerabilities including CWE-20, CVE-2017-11882, CVE-2017-8759, CVE-2018-15982, CVE-2018-8174.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1593698472800,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Linked to Cyber Attack\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1686347161530,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Suspicious Behavior Detected\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Triage Malware Analysis. Malware sandbox report for 237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d on August 03, 2023. Triage score: 7 (Shows suspicious behavior). No malware detections. Contains: 3 ATT&CK behaviors, 0 command and control indicators, and 8 signatures. Most recent link (Aug 3, 2023): https://tria.ge/230803-11kf2she5s\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1691100579000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Referenced by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 1 report: Cheap and Flexible, AZORult Remains Viable Commodity Malware for Less-Experienced Threat Actors. Most recent link (Jul 02, 2020): https://app.recordedfuture.com/portal/analyst-note/doc:eZyfXH\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1559001600000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Positive Malware Verdict\"",\""EvidenceString\"":\""6 sightings on 4 sources: Recorded Future Triage Malware Analysis, PolySwarm PolyUnite, ReversingLabs, PolySwarm. Malware sandbox report for 237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d on August 23, 2023. Triage score: 10 (Known bad). No malware detections. Contains: 1 ATT&CK behavior, 0 command and control indicators, and 12 signatures. Most recent link (Aug 23, 2023): https://tria.ge/230823-wqncqsgb5y\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1692814271000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 1 report: Casbaneiro Banking Trojan Variant Distributed Via COVID-19 Lure, Shared on Twitter. Most recent link (Mar 25, 2020): https://app.recordedfuture.com/portal/analyst-note/doc:dUts77\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1686268800000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Observed in Underground Virus Testing Sites\"",\""EvidenceString\"":\""2 sightings on 1 source: Special Collection Hashes.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1667765120000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,SHA256,237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d,,,,,,,,,,,,,,,,,,,,,,,ThreatIntelligenceIndicator diff --git a/Sample Data/Custom/Recoreded Future/RecordedFutureHashWorkbook_ThreatIntelligenceIndicator_IngestedLogs.csv b/Sample Data/Custom/Recoreded Future/RecordedFutureHashWorkbook_ThreatIntelligenceIndicator_IngestedLogs.csv new file mode 100644 index 00000000000..b3f0310f127 --- /dev/null +++ b/Sample Data/Custom/Recoreded Future/RecordedFutureHashWorkbook_ThreatIntelligenceIndicator_IngestedLogs.csv @@ -0,0 +1,5 @@ +TenantId,"TimeGenerated [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",SourceSystem,Action,ActivityGroupNames,AdditionalInformation,ApplicationId,AzureTenantId,ConfidenceScore,Description,DiamondModel,ExternalIndicatorId,"ExpirationDateTime [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",IndicatorId,ThreatType,Active,KillChainActions,KillChainC2,KillChainDelivery,KillChainExploitation,KillChainReconnaissance,KillChainWeaponization,KnownFalsePositives,MalwareNames,PassiveOnly,ThreatSeverity,Tags,TrafficLightProtocolLevel,EmailEncoding,EmailLanguage,EmailRecipient,EmailSenderAddress,EmailSenderName,EmailSourceDomain,EmailSourceIpAddress,EmailSubject,EmailXMailer,"FileCompileDateTime [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]","FileCreatedDateTime [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",FileHashType,FileHashValue,FileMutexName,FileName,FilePacker,FilePath,FileSize,FileType,DomainName,NetworkIP,NetworkPort,NetworkDestinationAsn,NetworkDestinationCidrBlock,NetworkDestinationIP,NetworkCidrBlock,NetworkDestinationPort,NetworkProtocol,NetworkSourceAsn,NetworkSourceCidrBlock,NetworkSourceIP,NetworkSourcePort,Url,UserAgent,IndicatorProvider,Type,TenantId1,SourceSystem1,MG,ManagementGroupName,"TimeGenerated1 [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",Computer,RawData,"HashType_s","Hash_s","Computer_Name_s","Detection_Name_s","Device_s","Downloaded_by_s","File_Path_s","Hash_g","Hash_Type_s","Src_IPv4_s",Type1,"_ResourceId" +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","8/28/2023, 11:48:38.666 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",89,"Recorded Future - HASH - Observed in Underground Virus Testing Sites",,"indicator--b2d008bc-14b0-41bb-9b22-1c4b170984bb","8/29/2023, 11:48:30.985 AM",09DD8F81D936AD6704EF8449BED37AB8E5118A23E42A17FD1A02AD4B05CE4F7A,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Threat Researcher\"",\""EvidenceString\"":\""4 sightings on 0 sources: Most recent link (May 1, 2022): https://www.bleepingcomputer.com/forums/t/771489/norton-blocked-an-attack-by-system-infected-trojanbackdoor-activity-578/#entry5354492\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1651376951669,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 1 source: Recorded Future Analyst Community Trending Indicators. Observed between Jun 24, 2021, and Jul 2, 2021.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692878798728,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Linked to Attack Vector\"",\""EvidenceString\"":\""3 sightings on 1 source: Insikt Group. 9 related attack vectors including Powershell Attack, VBA Malware, Phishing, Cross site scripting, Web Application Exploitation.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1686347161530,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Linked to Vulnerability\"",\""EvidenceString\"":\""1 sighting on 0 sources: 11 related cyber vulnerabilities including CWE-20, CVE-2017-11882, CVE-2017-8759, CVE-2018-15982, CVE-2018-8174.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1593698472800,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Linked to Cyber Attack\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1686347161530,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Suspicious Behavior Detected\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Triage Malware Analysis. Malware sandbox report for 237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d on August 03, 2023. Triage score: 7 (Shows suspicious behavior). No malware detections. Contains: 3 ATT&CK behaviors, 0 command and control indicators, and 8 signatures. Most recent link (Aug 3, 2023): https://tria.ge/230803-11kf2she5s\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1691100579000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Referenced by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 1 report: Cheap and Flexible, AZORult Remains Viable Commodity Malware for Less-Experienced Threat Actors. Most recent link (Jul 02, 2020): https://app.recordedfuture.com/portal/analyst-note/doc:eZyfXH\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1559001600000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Positive Malware Verdict\"",\""EvidenceString\"":\""6 sightings on 4 sources: Recorded Future Triage Malware Analysis, PolySwarm PolyUnite, ReversingLabs, PolySwarm. Malware sandbox report for 237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d on August 23, 2023. Triage score: 10 (Known bad). No malware detections. Contains: 1 ATT&CK behavior, 0 command and control indicators, and 12 signatures. Most recent link (Aug 23, 2023): https://tria.ge/230823-wqncqsgb5y\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1692814271000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 1 report: Casbaneiro Banking Trojan Variant Distributed Via COVID-19 Lure, Shared on Twitter. Most recent link (Mar 25, 2020): https://app.recordedfuture.com/portal/analyst-note/doc:dUts77\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1686268800000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Observed in Underground Virus Testing Sites\"",\""EvidenceString\"":\""2 sightings on 1 source: d-lVCC.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1667765120000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,SHA256,237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d,,,,,,,,,,,,,,,,,,,,,,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/12/2023, 10:09:03.118 PM",,,,237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d,vmhwhfcsfq,"Trojan.Gen.2",EndpointProtection,"c:/program files (x86)/ggggg/cccc/application/cccc.exe","C:\Users\user1\Downloads\XXXXXX Start Orb Changer.exe",,SHA2,"10.1.103.63","EndpointProtection_HASH_CL", +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","8/28/2023, 11:48:38.666 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",89,"Recorded Future - HASH - Observed in Underground Virus Testing Sites",,"indicator--b2d008bc-14b0-41bb-9b22-1c4b170984bb","8/29/2023, 11:48:30.985 AM",09DD8F81D936AD6704EF8449BED37AB8E5118A23E42A17FD1A02AD4B05CE4F7A,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Threat Researcher\"",\""EvidenceString\"":\""4 sightings on 0 sources: Most recent link (May 1, 2022): https://www.bleepingcomputer.com/forums/t/771489/norton-blocked-an-attack-by-system-infected-trojanbackdoor-activity-578/#entry5354492\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1651376951669,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 1 source: Recorded Future Analyst Community Trending Indicators. Observed between Jun 24, 2021, and Jul 2, 2021.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692878798728,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Linked to Attack Vector\"",\""EvidenceString\"":\""3 sightings on 1 source: Insikt Group. 9 related attack vectors including Powershell Attack, VBA Malware, Phishing, Cross site scripting, Web Application Exploitation.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1686347161530,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Linked to Vulnerability\"",\""EvidenceString\"":\""1 sighting on 0 sources: 11 related cyber vulnerabilities including CWE-20, CVE-2017-11882, CVE-2017-8759, CVE-2018-15982, CVE-2018-8174.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1593698472800,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Linked to Cyber Attack\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1686347161530,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Suspicious Behavior Detected\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Triage Malware Analysis. Malware sandbox report for 237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d on August 03, 2023. Triage score: 7 (Shows suspicious behavior). No malware detections. Contains: 3 ATT&CK behaviors, 0 command and control indicators, and 8 signatures. Most recent link (Aug 3, 2023): https://tria.ge/230803-11kf2she5s\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1691100579000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Referenced by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 1 report: Cheap and Flexible, AZORult Remains Viable Commodity Malware for Less-Experienced Threat Actors. Most recent link (Jul 02, 2020): https://app.recordedfuture.com/portal/analyst-note/doc:eZyfXH\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1559001600000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Positive Malware Verdict\"",\""EvidenceString\"":\""6 sightings on 4 sources: Recorded Future Triage Malware Analysis, PolySwarm PolyUnite, ReversingLabs, PolySwarm. Malware sandbox report for 237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d on August 23, 2023. Triage score: 10 (Known bad). No malware detections. Contains: 1 ATT&CK behavior, 0 command and control indicators, and 12 signatures. Most recent link (Aug 23, 2023): https://tria.ge/230823-wqncqsgb5y\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1692814271000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 1 report: Casbaneiro Banking Trojan Variant Distributed Via COVID-19 Lure, Shared on Twitter. Most recent link (Mar 25, 2020): https://app.recordedfuture.com/portal/analyst-note/doc:dUts77\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1686268800000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Observed in Underground Virus Testing Sites\"",\""EvidenceString\"":\""2 sightings on 1 source: d-lVCC.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1667765120000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,SHA256,237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d,,,,,,,,,,,,,,,,,,,,,,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/12/2023, 9:09:01.011 AM",,,,237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d,vmhwhfcsfq,"Trojan.Gen.2",EndpointProtection,"c:/program files (x86)/ggggg/cccc/application/cccc.exe","C:\Users\user1\Downloads\XXXXXX Start Orb Changer.exe",,SHA2,"10.1.103.63","EndpointProtection_HASH_CL", +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","8/28/2023, 11:48:38.666 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",89,"Recorded Future - HASH - Observed in Underground Virus Testing Sites",,"indicator--b2d008bc-14b0-41bb-9b22-1c4b170984bb","8/29/2023, 11:48:30.985 AM",09DD8F81D936AD6704EF8449BED37AB8E5118A23E42A17FD1A02AD4B05CE4F7A,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Threat Researcher\"",\""EvidenceString\"":\""4 sightings on 0 sources: Most recent link (May 1, 2022): https://www.bleepingcomputer.com/forums/t/771489/norton-blocked-an-attack-by-system-infected-trojanbackdoor-activity-578/#entry5354492\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1651376951669,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 1 source: Recorded Future Analyst Community Trending Indicators. Observed between Jun 24, 2021, and Jul 2, 2021.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692878798728,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Linked to Attack Vector\"",\""EvidenceString\"":\""3 sightings on 1 source: Insikt Group. 9 related attack vectors including Powershell Attack, VBA Malware, Phishing, Cross site scripting, Web Application Exploitation.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1686347161530,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Linked to Vulnerability\"",\""EvidenceString\"":\""1 sighting on 0 sources: 11 related cyber vulnerabilities including CWE-20, CVE-2017-11882, CVE-2017-8759, CVE-2018-15982, CVE-2018-8174.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1593698472800,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Linked to Cyber Attack\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1686347161530,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Suspicious Behavior Detected\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Triage Malware Analysis. Malware sandbox report for 237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d on August 03, 2023. Triage score: 7 (Shows suspicious behavior). No malware detections. Contains: 3 ATT&CK behaviors, 0 command and control indicators, and 8 signatures. Most recent link (Aug 3, 2023): https://tria.ge/230803-11kf2she5s\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1691100579000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Referenced by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 1 report: Cheap and Flexible, AZORult Remains Viable Commodity Malware for Less-Experienced Threat Actors. Most recent link (Jul 02, 2020): https://app.recordedfuture.com/portal/analyst-note/doc:eZyfXH\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1559001600000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Positive Malware Verdict\"",\""EvidenceString\"":\""6 sightings on 4 sources: Recorded Future Triage Malware Analysis, PolySwarm PolyUnite, ReversingLabs, PolySwarm. Malware sandbox report for 237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d on August 23, 2023. Triage score: 10 (Known bad). No malware detections. Contains: 1 ATT&CK behavior, 0 command and control indicators, and 12 signatures. Most recent link (Aug 23, 2023): https://tria.ge/230823-wqncqsgb5y\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1692814271000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 1 report: Casbaneiro Banking Trojan Variant Distributed Via COVID-19 Lure, Shared on Twitter. Most recent link (Mar 25, 2020): https://app.recordedfuture.com/portal/analyst-note/doc:dUts77\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1686268800000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Observed in Underground Virus Testing Sites\"",\""EvidenceString\"":\""2 sightings on 1 source: d-lVCC.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1667765120000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,SHA256,237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d,,,,,,,,,,,,,,,,,,,,,,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/12/2023, 7:09:01.215 AM",,,,237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d,vmhwhfcsfq,"Trojan.Gen.2",EndpointProtection,"c:/program files (x86)/ggggg/cccc/application/cccc.exe","C:\Users\user1\Downloads\XXXXXX Start Orb Changer.exe",,SHA2,"10.1.103.63","EndpointProtection_HASH_CL", +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","8/28/2023, 11:48:38.666 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",89,"Recorded Future - HASH - Observed in Underground Virus Testing Sites",,"indicator--b2d008bc-14b0-41bb-9b22-1c4b170984bb","8/29/2023, 11:48:30.985 AM",09DD8F81D936AD6704EF8449BED37AB8E5118A23E42A17FD1A02AD4B05CE4F7A,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Threat Researcher\"",\""EvidenceString\"":\""4 sightings on 0 sources: Most recent link (May 1, 2022): https://www.bleepingcomputer.com/forums/t/771489/norton-blocked-an-attack-by-system-infected-trojanbackdoor-activity-578/#entry5354492\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1651376951669,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 1 source: Recorded Future Analyst Community Trending Indicators. Observed between Jun 24, 2021, and Jul 2, 2021.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692878798728,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Linked to Attack Vector\"",\""EvidenceString\"":\""3 sightings on 1 source: Insikt Group. 9 related attack vectors including Powershell Attack, VBA Malware, Phishing, Cross site scripting, Web Application Exploitation.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1686347161530,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Linked to Vulnerability\"",\""EvidenceString\"":\""1 sighting on 0 sources: 11 related cyber vulnerabilities including CWE-20, CVE-2017-11882, CVE-2017-8759, CVE-2018-15982, CVE-2018-8174.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1593698472800,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Linked to Cyber Attack\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1686347161530,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Suspicious Behavior Detected\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Triage Malware Analysis. Malware sandbox report for 237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d on August 03, 2023. Triage score: 7 (Shows suspicious behavior). No malware detections. Contains: 3 ATT&CK behaviors, 0 command and control indicators, and 8 signatures. Most recent link (Aug 3, 2023): https://tria.ge/230803-11kf2she5s\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1691100579000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Referenced by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 1 report: Cheap and Flexible, AZORult Remains Viable Commodity Malware for Less-Experienced Threat Actors. Most recent link (Jul 02, 2020): https://app.recordedfuture.com/portal/analyst-note/doc:eZyfXH\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1559001600000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Positive Malware Verdict\"",\""EvidenceString\"":\""6 sightings on 4 sources: Recorded Future Triage Malware Analysis, PolySwarm PolyUnite, ReversingLabs, PolySwarm. Malware sandbox report for 237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d on August 23, 2023. Triage score: 10 (Known bad). No malware detections. Contains: 1 ATT&CK behavior, 0 command and control indicators, and 12 signatures. Most recent link (Aug 23, 2023): https://tria.ge/230823-wqncqsgb5y\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1692814271000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 1 report: Casbaneiro Banking Trojan Variant Distributed Via COVID-19 Lure, Shared on Twitter. Most recent link (Mar 25, 2020): https://app.recordedfuture.com/portal/analyst-note/doc:dUts77\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1686268800000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Observed in Underground Virus Testing Sites\"",\""EvidenceString\"":\""2 sightings on 1 source: d-lVCC.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1667765120000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,SHA256,237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d,,,,,,,,,,,,,,,,,,,,,,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/12/2023, 10:08:55.873 AM",,,,237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d,vmhwhfcsfq,"Trojan.Gen.2",EndpointProtection,"c:/program files (x86)/ggggg/cccc/application/cccc.exe","C:\Users\user1\Downloads\XXXXXX Start Orb Changer.exe",,SHA2,"10.1.103.63","EndpointProtection_HASH_CL", diff --git a/Sample Data/Custom/Recoreded Future/RecordedFutureIPWorkbook_ExampleIPFirewallLog_IngestedLogs.csv b/Sample Data/Custom/Recoreded Future/RecordedFutureIPWorkbook_ExampleIPFirewallLog_IngestedLogs.csv new file mode 100644 index 00000000000..97d5a490ddb --- /dev/null +++ b/Sample Data/Custom/Recoreded Future/RecordedFutureIPWorkbook_ExampleIPFirewallLog_IngestedLogs.csv @@ -0,0 +1,13 @@ +TenantId,SourceSystem,MG,ManagementGroupName,"TimeGenerated [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",Computer,RawData,"Action_s","Device_s","Dst_IPv4_s","Dst_Zone_s","Port_s","Protocol_s","Src_IPv4_s","Src_Zone_s",Type,"_ResourceId",TenantId1,"TimeGenerated1 [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",SourceSystem1,Action,ActivityGroupNames,AdditionalInformation,ApplicationId,AzureTenantId,ConfidenceScore,Description,DiamondModel,ExternalIndicatorId,"ExpirationDateTime [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",IndicatorId,ThreatType,Active,KillChainActions,KillChainC2,KillChainDelivery,KillChainExploitation,KillChainReconnaissance,KillChainWeaponization,KnownFalsePositives,MalwareNames,PassiveOnly,ThreatSeverity,Tags,TrafficLightProtocolLevel,EmailEncoding,EmailLanguage,EmailRecipient,EmailSenderAddress,EmailSenderName,EmailSourceDomain,EmailSourceIpAddress,EmailSubject,EmailXMailer,"FileCompileDateTime [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]","FileCreatedDateTime [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",FileHashType,FileHashValue,FileMutexName,FileName,FilePacker,FilePath,FileSize,FileType,DomainName,NetworkIP,NetworkPort,NetworkDestinationAsn,NetworkDestinationCidrBlock,NetworkDestinationIP,NetworkCidrBlock,NetworkDestinationPort,NetworkProtocol,NetworkSourceAsn,NetworkSourceCidrBlock,NetworkSourceIP,NetworkSourcePort,Url,UserAgent,IndicatorProvider,Type1 +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/18/2023, 10:49:51.966 AM",,,permit,NetScreen,"103.149.90.235",internet,443,TCP,"10.1.149.125",office,"NetScreen_Firewall_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:45:36.344 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",99,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--b7b8a4b8-14b4-4a11-ba4e-934d1e274af6","9/20/2023, 5:45:06.836 PM",28DABCF576DFEEB6D2AFFF0292A6B3F106FAC7A4E8CBA782FE5EF4B61E552419,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Vulnerable Host\"",\""EvidenceString\"":\""1 sighting on 1 source: Shodan: CVE-2014-0160 Heartbleed Vulnerable SSL Hosts.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1695127122344,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Observed in the Wild by Recorded Future Telemetry\"",\""EvidenceString\"":\""1 sighting on 1 source: Recently Viewed Integrations Indicators. Observed in the wild by Recorded Future Telemetry.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1695127122345,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 4 sources: Shodan: CVE-2014-0160 Heartbleed Vulnerable SSL Hosts, Recorded Future Analyst Community Trending Indicators, Recently Viewed Integrations Indicators, RAT Controller – Shodan / Recorded Future. Observed between Jun 26, 2023, and Aug 16, 2023.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1695127122392,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported C&C Server\"",\""EvidenceString\"":\""122 sightings on 1 source: Recorded Future Command & Control Reports. 103.149.90.235:443 was reported as a command and control server for Trochilus on Jul 18, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1689841315671,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Communicating Validated C&C Server\"",\""EvidenceString\"":\""39 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 103.118.3.13 on 27 ports including 57043 and 103.149.90.235 (validated Trochilus C2 Server) on port 443 on 2023-09-16 at 00:40 UTC. \"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694822400000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""722 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 103.149.90.235:443 as a command and control server for Trochilus on Sep 18, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1695036675487,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Reported C&C Server\"",\""EvidenceString\"":\""6 sightings on 2 sources: Recorded Future Command & Control Reports, RAT Controller – Shodan / Recorded Future. 103.149.90.235:443 was reported as a command and control server for Trochilus on Aug 12, 2023\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1695127122345,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""3 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 60.13.138.144 on port 36268 and 103.149.90.235 (validated Trochilus C2 Server) on port 443 on 2023-09-18 at 17:33 UTC. \"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694995200000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 103.149.90.235:443 as a command and control server for Trochilus on Sep 19, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1695119424469,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"103.149.90.235",,,,,,,,,,,,,,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/19/2023, 10:49:57.489 AM",,,permit,NetScreen,"101.43.183.39",internet,443,TCP,"10.1.0.14",office,"NetScreen_Firewall_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:45:36.351 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",99,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--00829322-e7c1-4cee-a0f6-e0a1a8f76f36","9/20/2023, 5:45:07.505 PM",1774E59DC3A04EA16392084FA510938EE69F821A05AD1D69A552F543E280A421,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Linked to Intrusion Method\"",\""EvidenceString\"":\""4 sightings on 3 sources: C2IntelFeeds IPC2s, Twitter, Recorded Future Command & Control List. 3 related intrusion methods: Cobalt Strike, Offensive Security Tools (OST), Cobalt Strike Beacon. Most recent link (Jun 12, 2023): https://twitter.com/drb_ra/statuses/1668292955633774595\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686587010000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C Server\"",\""EvidenceString\"":\""4 sightings on 2 sources: ThreatFox Infrastructure Analysis, Malware Patrol. ThreatFox identified 101.43.183.39:35535 as possible TA0011 (Command and Control) for CobaltStrike Beacon on August 05, 2023. Most recent link (Aug 5, 2023): https://threatfox.abuse.ch/ioc/1148839\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691270041000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Linked to Cyber Attack\"",\""EvidenceString\"":\""1 sighting on 1 source: C2IntelFeeds IPC2s. Most recent link (Mar 30, 2022): https://github.com/drb-ra/C2IntelFeeds/blob/master/feeds/IPC2s-30day.csv?q=101.43.183.39_20220330\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1648643432000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported as a Defanged IP\"",\""EvidenceString\"":\""2 sightings on 1 source: Twitter. Most recent link (Jun 12, 2023): https://twitter.com/drb_ra/statuses/1668292955633774595\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686587010000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 1 source: Recently Viewed Integrations Indicators. Observed between Sep 9, 2023, and Sep 16, 2023.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1695128041417,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported C&C Server\"",\""EvidenceString\"":\""33 sightings on 2 sources: Recorded Future Command & Control Reports, Recorded Future Command & Control List. 101.43.183.39:35538 was reported as a command and control server for Cobalt Strike on Jun 26, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1687854159331,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Communicating Validated C&C Server\"",\""EvidenceString\"":\""5 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 146.70.97.185 on 2 ports including 39389 and 101.43.183.39 (validated Cobalt Strike C2 Server) on port 35535 on 2023-09-16 at 21:03 UTC. \"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694822400000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""269 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 101.43.183.39:35538 as a command and control server for Cobalt Strike on Sep 18, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1695025840225,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 146.70.97.190 on 5 ports including 47223 and 101.43.183.39 (validated Cobalt Strike C2 Server) on port 35535 on 2023-09-18 at 14:51 UTC. \"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694995200000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 101.43.183.39:35535 as a command and control server for Cobalt Strike on Sep 19, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1695112270119,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"101.43.183.39",,,,,,,,,,,,,,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/19/2023, 11:26:23.687 AM",,,permit,NetScreen,"120.76.173.159",internet,80,TCP,"10.1.42.223",office,"NetScreen_Firewall_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:45:36.354 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",99,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--45ac5238-6f6b-4e37-8d3c-02e8df399185","9/20/2023, 5:45:07.767 PM",8F9AAD5C814D1F022CE005D3CC39C10FE5320F84FAC86EAEDB253422AE7E920D,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Linked to Intrusion Method\"",\""EvidenceString\"":\""2 sightings on 1 source: Twitter. 2 related intrusion methods: Cobalt Strike, Offensive Security Tools (OST). Most recent link (Jul 4, 2023): https://twitter.com/drb_ra/statuses/1676274392014233613\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1688489933000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C Server\"",\""EvidenceString\"":\""3 sightings on 2 sources: ThreatFox Infrastructure Analysis, Malware Patrol. ThreatFox identified 120.76.173.159:8091 as possible TA0011 (Command and Control) for CobaltStrike Beacon on August 05, 2023. Most recent link (Aug 5, 2023): https://threatfox.abuse.ch/ioc/1148829\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691259967000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""21 sightings on 1 source: DHS Automated Indicator Sharing. 21 reports including CCCS-IXR_2023_86526_1, from YummyBellPepper50 (Sep 1, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693569130028,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported as a Defanged IP\"",\""EvidenceString\"":\""2 sightings on 1 source: Twitter. Most recent link (Jul 4, 2023): https://twitter.com/drb_ra/statuses/1676274392014233613\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1688489933000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 1 source: RAT Controller – Shodan / Recorded Future. Observed between Aug 26, 2023, and Sep 10, 2023.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1695134453213,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported C&C Server\"",\""EvidenceString\"":\""44 sightings on 1 source: Recorded Future Command & Control Reports. 120.76.173.159:50050 was reported as a command and control server for Cobalt Strike on Aug 07, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1691482860547,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""29 sightings on 1 source: DHS Automated Indicator Sharing. 29 reports including CCCS-IXR_2023_87141_1, from TintedSponge57 (Sep 18, 2023).\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1695012730306,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Communicating Validated C&C Server\"",\""EvidenceString\"":\""3 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 37.120.144.231 on 4 ports including 59569 and 120.76.173.159 (validated Cobalt Strike C2 Server) on port 8092 on 2023-09-14 at 00:33 UTC. Domain(s) kobilica.synology.me recently resolved to the suspected victim IP. \"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694649600000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""421 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 120.76.173.159:8091 as a command and control server for Cobalt Strike on Sep 18, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1695025854875,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recent Phishing Host\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. 120.76.173.159 was identified as phishing in External Sensor data. Reported to Recorded Future on Jul 07, 2023.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1688769306625,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 37.120.144.231 on 5 ports including 41503 and 120.76.173.159 (validated Cobalt Strike C2 Server) on port 8092 on 2023-09-18 at 21:24 UTC. Domain(s) www.rjxh.cloud and rjxh.cloud recently resolved to the C2 IP.\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694995200000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 120.76.173.159:8091 as a command and control server for Cobalt Strike on Sep 19, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1695112268437,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"120.76.173.159",,,,,,,,,,,,,,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/18/2023, 12:49:52.373 PM",,,permit,NetScreen,"58.87.99.181",internet,80,TCP,"10.1.31.145",office,"NetScreen_Firewall_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:45:36.378 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",99,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--4f49f375-b177-4142-9955-ce366ac69347","9/20/2023, 5:45:07.881 PM",EE4AEAD133E2D384D04A74E60B44F48C977C571599A2A9E047B27A09C5B28793,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Linked to Intrusion Method\"",\""EvidenceString\"":\""2 sightings on 1 source: Twitter. 2 related intrusion methods: Cobalt Strike, Offensive Security Tools (OST). Most recent link (Aug 3, 2023): https://twitter.com/drb_ra/statuses/1687151980165152769\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691083352000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: Malware Control Server, from Silas Cutler Scanning ( OnlyScans.net ) (Jul 4, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1688433002721,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported as a Defanged IP\"",\""EvidenceString\"":\""2 sightings on 1 source: Twitter. Most recent link (Aug 3, 2023): https://twitter.com/drb_ra/statuses/1687151980165152769\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691083352000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Botnet Traffic\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. 58.87.99.181 was historically observed as botnets. No longer observed as of Nov 03, 2021.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1635912872826,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Open Proxies\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. 58.87.99.181 was historically observed as proxy. No longer observed as of Nov 01, 2021.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1635742241311,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Phishing Host\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. 58.87.99.181 was historically observed as phishing. No longer observed as of Nov 03, 2021.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1635912872795,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Spam Source\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Spam. 58.87.99.181 was identified as spam in External Sensor data. Reported to Recorded Future on Oct 04, 2022.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1664881124897,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported C&C Server\"",\""EvidenceString\"":\""42 sightings on 1 source: Recorded Future Command & Control Reports. 58.87.99.181:7777 was reported as a command and control server for Cobalt Strike on Aug 13, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1692001381048,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recent Suspected C&C Server\"",\""EvidenceString\"":\""4 sightings on 2 sources: ThreatFox Infrastructure Analysis, Malware Patrol. ThreatFox identified 58.87.99.181:7777 as possible TA0011 (Command and Control) for CobaltStrike Beacon on September 12, 2023. Most recent link (Sep 12, 2023): https://threatfox.abuse.ch/ioc/1162896\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694495940000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Communicating Validated C&C Server\"",\""EvidenceString\"":\""8 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 86.105.155.248 on 3 ports including 46073 and 58.87.99.181 (validated Cobalt Strike C2 Server) on port 6666 on 2023-09-16 at 09:50 UTC. \"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694822400000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""221 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 58.87.99.181:7777 as a command and control server for Cobalt Strike on Sep 18, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1695025878278,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Reported C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: RAT Controller – Shodan / Recorded Future.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1695134751267,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 86.105.155.248 on 4 ports including 53153 and 58.87.99.181 (validated Cobalt Strike C2 Server) on port 6666 on 2023-09-18 at 12:46 UTC. \"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694995200000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 58.87.99.181:7777 as a command and control server for Cobalt Strike on Sep 19, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1695112256636,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"58.87.99.181",,,,,,,,,,,,,,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/19/2023, 11:26:24.818 AM",,,permit,NetScreen,"146.56.42.196",internet,80,TCP,"10.1.142.153",office,"NetScreen_Firewall_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:45:36.397 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",99,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--5aedfafb-68ba-464c-8daf-a89f35cebff6","9/20/2023, 5:45:08.700 PM",AAB09D04CFB6BDB15FDA756B14715F3803345A59B0769DFC9BD22B225FB2BB5D,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Recently Reported as a Defanged IP\"",\""EvidenceString\"":\""1 sighting on 1 source: Twitter. Most recent link (Sep 15, 2023): https://twitter.com/drb_ra/statuses/1702724208420176104\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694796061000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported C&C Server\"",\""EvidenceString\"":\""24 sightings on 1 source: Recorded Future Command & Control Reports. 146.56.42.196:8001 was reported as a command and control server for Cobalt Strike on Sep 04, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1693815841533,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Linked to Intrusion Method\"",\""EvidenceString\"":\""1 sighting on 1 source: Twitter. 2 related intrusion methods: Cobalt Strike, Offensive Security Tools (OST). Most recent link (Sep 15, 2023): https://twitter.com/drb_ra/statuses/1702724208420176104\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694796061000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recent Suspected C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified 146.56.42.196:8001 as possible TA0011 (Command and Control) for CobaltStrike Beacon on September 12, 2023. Most recent link (Sep 12, 2023): https://threatfox.abuse.ch/ioc/1163265\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694546902000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Communicating Validated C&C Server\"",\""EvidenceString\"":\""3 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 217.138.192.221 on 2 ports including 49149 and 146.56.42.196 (validated Cobalt Strike C2 Server) on port 8001 on 2023-09-16 at 06:27 UTC. Domain(s) hu.budapest.private-internet-access.vilfoservers.com recently resolved to the suspected victim IP. \"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694822400000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""53 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 146.56.42.196:8001 as a command and control server for Cobalt Strike on Sep 18, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1695025814211,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Reported C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: RAT Controller – Shodan / Recorded Future.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1695127170227,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 217.138.192.220 on 2 ports including 60703 and 146.56.42.196 (validated Cobalt Strike C2 Server) on port 8001 on 2023-09-18 at 09:21 UTC. \"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694995200000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 146.56.42.196:8001 as a command and control server for Cobalt Strike on Sep 19, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1695112285603,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"146.56.42.196",,,,,,,,,,,,,,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/19/2023, 11:26:23.280 AM",,,permit,NetScreen,"120.78.156.73",internet,443,TCP,"10.1.86.92",office,"NetScreen_Firewall_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:45:35.050 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",98,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--ada32671-627f-4261-a620-b143395933d2","9/18/2023, 5:45:10.800 PM",956AB29E9C5DA4D9794261BD3F39CB00FF241F6C0A52D9A9129370D36BE75F13,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Linked to Intrusion Method\"",\""EvidenceString\"":\""1 sighting on 1 source: @drb_ra. 2 related intrusion methods: Cobalt Strike, Offensive Security Tools (OST). Most recent tweet: Cobalt Strike server found C2: HTTP @ 120[.]78[.]156[.]73:12345 C2 Server: 120[.]78[.]156[.]73,/fwlink Country: China (AS37963) ASN: ALIBABA-CN-NET Hangz... #C2 #cobaltstrike. Most recent link (May 29, 2023): https://twitter.com/drb_ra/statuses/1663220146251485186\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1685377558000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported as a Defanged IP\"",\""EvidenceString\"":\""1 sighting on 1 source: @drb_ra. Most recent tweet: Cobalt Strike server found C2: HTTP @ 120[.]78[.]156[.]73:12345 C2 Server: 120[.]78[.]156[.]73,/fwlink Country: China (AS37963) ASN: ALIBABA-CN-NET Hangz... #C2 #cobaltstrike. Most recent link (May 29, 2023): https://twitter.com/drb_ra/statuses/1663220146251485186\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1685377558000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported C&C Server\"",\""EvidenceString\"":\""26 sightings on 1 source: Recorded Future Command & Control Reports. 120.78.156.73:50050 was reported as a command and control server for Cobalt Strike on Jun 26, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1687854138266,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""4 sightings on 1 source: DHS Automated Indicator Sharing. 4 reports including CCCS-IXR_2023_87111_1, from FluorescentFiddlehead52 (Sep 17, 2023).\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694951530054,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""284 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 120.78.156.73:12345 as a command and control server for Cobalt Strike on Sep 16, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694853020605,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 146.70.54.115 on 2 ports including 52183 and 120.78.156.73 (validated Cobalt Strike C2 Server) on port 12345 on 2023-09-16 at 00:41 UTC. Domain(s) beg-288.totallyacdn.com, beg-288.staticnetcontent.com, beg-288.windscribe.com, and others recently resolved to the suspected victim IP. \"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694822400000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 120.78.156.73:12345 as a command and control server for Cobalt Strike on Sep 17, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694939421894,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"120.78.156.73",,,,,,,,,,,,,,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/19/2023, 4:49:59.029 AM",,,permit,NetScreen,"178.62.68.57",internet,80,TCP,"10.1.14.13",office,"NetScreen_Firewall_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:45:35.082 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",99,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--8ebb17b9-163f-4a0f-baf1-b9f9a32697bb","9/18/2023, 5:45:11.344 PM",EF356887F1D4E192D37846840DF2BCD0CC175C32068BFEB138C83D0F8F1E2FEC,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Recently Reported as a Defanged IP\"",\""EvidenceString\"":\""1 sighting on 1 source: Twitter. Most recent link (Sep 12, 2023): https://twitter.com/drb_ra/statuses/1701690137069998538\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694549519000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Linked to Intrusion Method\"",\""EvidenceString\"":\""2 sightings on 1 source: Twitter. 2 related intrusion methods: Cobalt Strike, Offensive Security Tools (OST). Most recent link (Sep 16, 2023): https://twitter.com/malpulse/statuses/1703075414044811487\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694879794000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recent Suspected C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified 178.62.68.57:443 as possible TA0011 (Command and Control) for CobaltStrike Beacon on September 16, 2023. Most recent link (Sep 16, 2023): https://threatfox.abuse.ch/ioc/1163301\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694879794000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Communicating Validated C&C Server\"",\""EvidenceString\"":\""10 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 194.127.199.100 on 8 ports including 51312 and 178.62.68.57 (validated Cobalt Strike C2 Server) on port 443 on 2023-09-15 at 00:08 UTC. \"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694736000000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""10 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 178.62.68.57:443 as a command and control server for Cobalt Strike on Sep 16, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694849403081,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Reported C&C Server\"",\""EvidenceString\"":\""18 sightings on 2 sources: Recorded Future Command & Control Reports, RAT Controller – Shodan / Recorded Future. 178.62.68.57:443 was reported as a command and control server for Cobalt Strike on Sep 17, 2023\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694956663002,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 216.131.110.3 on 2 ports including 37891 and 178.62.68.57 (validated Cobalt Strike C2 Server) on port 443 on 2023-09-16 at 17:29 UTC. Domain(s) elitelearning.online recently resolved to the C2 IP.\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694822400000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 178.62.68.57:443 as a command and control server for Cobalt Strike on Sep 17, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694935816587,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"178.62.68.57",,,,,,,,,,,,,,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/18/2023, 10:49:51.966 AM",,,permit,NetScreen,"103.149.90.235",internet,443,TCP,"10.1.149.125",office,"NetScreen_Firewall_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:45:35.089 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",99,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--ca8ca2ac-83d4-42c0-ae9a-036469f529b5","9/18/2023, 5:45:10.780 PM",28DABCF576DFEEB6D2AFFF0292A6B3F106FAC7A4E8CBA782FE5EF4B61E552419,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Vulnerable Host\"",\""EvidenceString\"":\""1 sighting on 1 source: Shodan: CVE-2014-0160 Heartbleed Vulnerable SSL Hosts.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694956426355,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Observed in the Wild by Recorded Future Telemetry\"",\""EvidenceString\"":\""1 sighting on 1 source: Recently Viewed Integrations Indicators. Observed in the wild by Recorded Future Telemetry.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694956426355,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 4 sources: Shodan: CVE-2014-0160 Heartbleed Vulnerable SSL Hosts, Recorded Future Analyst Community Trending Indicators, Recently Viewed Integrations Indicators, RAT Controller – Shodan / Recorded Future. Observed between Jun 26, 2023, and Aug 16, 2023.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694956426435,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported C&C Server\"",\""EvidenceString\"":\""122 sightings on 1 source: Recorded Future Command & Control Reports. 103.149.90.235:443 was reported as a command and control server for Trochilus on Jul 18, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1689841315671,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Communicating Validated C&C Server\"",\""EvidenceString\"":\""45 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 58.27.212.48 on 47 ports including 38253 and 103.149.90.235 (validated Trochilus C2 Server) on port 443 on 2023-09-15 at 00:20 UTC. \"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694736000000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""718 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 103.149.90.235:443 as a command and control server for Trochilus on Sep 16, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694863867825,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Reported C&C Server\"",\""EvidenceString\"":\""6 sightings on 2 sources: Recorded Future Command & Control Reports, RAT Controller – Shodan / Recorded Future. 103.149.90.235:443 was reported as a command and control server for Trochilus on Aug 12, 2023\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694956426356,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""3 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 103.118.3.13 on 27 ports including 57043 and 103.149.90.235 (validated Trochilus C2 Server) on port 443 on 2023-09-16 at 00:40 UTC. \"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694822400000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 103.149.90.235:443 as a command and control server for Trochilus on Sep 17, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694950289162,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"103.149.90.235",,,,,,,,,,,,,,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/18/2023, 12:49:52.373 PM",,,permit,NetScreen,"58.87.99.181",internet,80,TCP,"10.1.31.145",office,"NetScreen_Firewall_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:45:35.096 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",99,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--2a5bea34-87b0-407d-bb18-a95fbaa64bbd","9/18/2023, 5:45:10.797 PM",EE4AEAD133E2D384D04A74E60B44F48C977C571599A2A9E047B27A09C5B28793,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Linked to Intrusion Method\"",\""EvidenceString\"":\""2 sightings on 1 source: Twitter. 2 related intrusion methods: Cobalt Strike, Offensive Security Tools (OST). Most recent link (Aug 3, 2023): https://twitter.com/drb_ra/statuses/1687151980165152769\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691083352000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: Malware Control Server, from Silas Cutler Scanning ( OnlyScans.net ) (Jul 4, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1688433002721,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported as a Defanged IP\"",\""EvidenceString\"":\""2 sightings on 1 source: Twitter. Most recent link (Aug 3, 2023): https://twitter.com/drb_ra/statuses/1687151980165152769\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691083352000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Botnet Traffic\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. 58.87.99.181 was historically observed as botnets. No longer observed as of Nov 03, 2021.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1635912872826,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Open Proxies\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. 58.87.99.181 was historically observed as proxy. No longer observed as of Nov 01, 2021.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1635742241311,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Phishing Host\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. 58.87.99.181 was historically observed as phishing. No longer observed as of Nov 03, 2021.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1635912872795,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Spam Source\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Spam. 58.87.99.181 was identified as spam in External Sensor data. Reported to Recorded Future on Oct 04, 2022.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1664881124897,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported C&C Server\"",\""EvidenceString\"":\""42 sightings on 1 source: Recorded Future Command & Control Reports. 58.87.99.181:7777 was reported as a command and control server for Cobalt Strike on Aug 13, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1692001381048,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recent Suspected C&C Server\"",\""EvidenceString\"":\""4 sightings on 2 sources: ThreatFox Infrastructure Analysis, Malware Patrol. ThreatFox identified 58.87.99.181:7777 as possible TA0011 (Command and Control) for CobaltStrike Beacon on September 12, 2023. Most recent link (Sep 12, 2023): https://threatfox.abuse.ch/ioc/1162896\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694495940000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Communicating Validated C&C Server\"",\""EvidenceString\"":\""6 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 86.105.155.248 on 2 ports including 57049 and 58.87.99.181 (validated Cobalt Strike C2 Server) on port 6666 on 2023-09-14 at 00:43 UTC. \"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694649600000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""215 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 58.87.99.181:6666 as a command and control server for Cobalt Strike on Sep 16, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694853064834,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Reported C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: RAT Controller – Shodan / Recorded Future.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694946832854,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 86.105.155.248 on 3 ports including 46073 and 58.87.99.181 (validated Cobalt Strike C2 Server) on port 6666 on 2023-09-16 at 09:50 UTC. \"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694822400000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 58.87.99.181:6666 as a command and control server for Cobalt Strike on Sep 17, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694939469935,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"58.87.99.181",,,,,,,,,,,,,,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/19/2023, 10:49:57.489 AM",,,permit,NetScreen,"101.43.183.39",internet,443,TCP,"10.1.0.14",office,"NetScreen_Firewall_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:45:35.099 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",99,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--970037d7-00e8-4330-a50b-e6d28a7ce4d5","9/18/2023, 5:45:11.060 PM",1774E59DC3A04EA16392084FA510938EE69F821A05AD1D69A552F543E280A421,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Linked to Intrusion Method\"",\""EvidenceString\"":\""4 sightings on 3 sources: C2IntelFeeds IPC2s, Twitter, Recorded Future Command & Control List. 3 related intrusion methods: Cobalt Strike, Offensive Security Tools (OST), Cobalt Strike Beacon. Most recent link (Jun 12, 2023): https://twitter.com/drb_ra/statuses/1668292955633774595\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686587010000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C Server\"",\""EvidenceString\"":\""4 sightings on 2 sources: ThreatFox Infrastructure Analysis, Malware Patrol. ThreatFox identified 101.43.183.39:35535 as possible TA0011 (Command and Control) for CobaltStrike Beacon on August 05, 2023. Most recent link (Aug 5, 2023): https://threatfox.abuse.ch/ioc/1148839\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691270041000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Linked to Cyber Attack\"",\""EvidenceString\"":\""1 sighting on 1 source: C2IntelFeeds IPC2s. Most recent link (Mar 30, 2022): https://github.com/drb-ra/C2IntelFeeds/blob/master/feeds/IPC2s-30day.csv?q=101.43.183.39_20220330\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1648643432000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported as a Defanged IP\"",\""EvidenceString\"":\""2 sightings on 1 source: Twitter. Most recent link (Jun 12, 2023): https://twitter.com/drb_ra/statuses/1668292955633774595\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686587010000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 1 source: Recently Viewed Integrations Indicators. Observed between Sep 9, 2023, and Sep 16, 2023.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694962273702,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported C&C Server\"",\""EvidenceString\"":\""33 sightings on 2 sources: Recorded Future Command & Control Reports, Recorded Future Command & Control List. 101.43.183.39:35538 was reported as a command and control server for Cobalt Strike on Jun 26, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1687854159331,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Communicating Validated C&C Server\"",\""EvidenceString\"":\""4 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 146.70.97.187 on 2 ports including 47335 and 101.43.183.39 (validated Cobalt Strike C2 Server) on port 35535 on 2023-09-14 at 00:48 UTC. \"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694649600000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""263 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 101.43.183.39:35538 as a command and control server for Cobalt Strike on Sep 16, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694853067523,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 146.70.97.185 on 2 ports including 39389 and 101.43.183.39 (validated Cobalt Strike C2 Server) on port 35535 on 2023-09-16 at 21:03 UTC. \"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694822400000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 101.43.183.39:35538 as a command and control server for Cobalt Strike on Sep 17, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694939472557,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"101.43.183.39",,,,,,,,,,,,,,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/19/2023, 11:26:24.818 AM",,,permit,NetScreen,"146.56.42.196",internet,80,TCP,"10.1.142.153",office,"NetScreen_Firewall_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:45:35.112 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",99,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--dbebefaf-1733-4294-83e0-f73f11a81151","9/18/2023, 5:45:11.580 PM",AAB09D04CFB6BDB15FDA756B14715F3803345A59B0769DFC9BD22B225FB2BB5D,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Recently Reported as a Defanged IP\"",\""EvidenceString\"":\""1 sighting on 1 source: Twitter. Most recent link (Sep 15, 2023): https://twitter.com/drb_ra/statuses/1702724208420176104\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694796061000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported C&C Server\"",\""EvidenceString\"":\""22 sightings on 1 source: Recorded Future Command & Control Reports. 146.56.42.196:8001 was reported as a command and control server for Cobalt Strike on Sep 03, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1693729446236,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Linked to Intrusion Method\"",\""EvidenceString\"":\""1 sighting on 1 source: Twitter. 2 related intrusion methods: Cobalt Strike, Offensive Security Tools (OST). Most recent link (Sep 15, 2023): https://twitter.com/drb_ra/statuses/1702724208420176104\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694796061000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recent Suspected C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified 146.56.42.196:8001 as possible TA0011 (Command and Control) for CobaltStrike Beacon on September 12, 2023. Most recent link (Sep 12, 2023): https://threatfox.abuse.ch/ioc/1163265\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694546902000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Communicating Validated C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 86.106.74.117 on 3 ports including 53053 and 146.56.42.196 (validated Cobalt Strike C2 Server) on port 8001 on 2023-09-13 at 04:41 UTC. \"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694563200000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""48 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 146.56.42.196:8001 as a command and control server for Cobalt Strike on Sep 16, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694853034997,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Reported C&C Server\"",\""EvidenceString\"":\""4 sightings on 2 sources: Recorded Future Command & Control Reports, RAT Controller – Shodan / Recorded Future. 146.56.42.196:8001 was reported as a command and control server for Cobalt Strike on Sep 04, 2023\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694947729362,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 217.138.192.221 on 2 ports including 49149 and 146.56.42.196 (validated Cobalt Strike C2 Server) on port 8001 on 2023-09-16 at 06:27 UTC. Domain(s) hu.budapest.private-internet-access.vilfoservers.com recently resolved to the suspected victim IP. \"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694822400000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""3 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 146.56.42.196:8001 as a command and control server for Cobalt Strike on Sep 17, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694939437099,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"146.56.42.196",,,,,,,,,,,,,,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/19/2023, 10:49:57.674 AM",,,permit,NetScreen,"143.198.46.29",internet,443,TCP,"10.1.15.109",office,"NetScreen_Firewall_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:45:35.116 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",99,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--0e7c0dd3-c8be-4d49-a98b-f09cc90f513e","9/18/2023, 5:45:11.702 PM",28A37CA91979C4084FB90A47A6B2EA425C5C2483ECDE292EB99896E74F1B8140,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Recently Reported as a Defanged IP\"",\""EvidenceString\"":\""1 sighting on 1 source: Twitter. Most recent link (Sep 13, 2023): https://twitter.com/drb_ra/statuses/1701775882677780886\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694569962000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 1 source: CINS: CI Army List. Observed between Jun 8, 2023, and Jun 8, 2023.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694962871531,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recent Suspected C&C Server\"",\""EvidenceString\"":\""4 sightings on 2 sources: ThreatFox Infrastructure Analysis, Malware Patrol. ThreatFox identified 143.198.46.29:5060 as possible TA0011 (Command and Control) for BianLian on September 13, 2023. Most recent link (Sep 13, 2023): https://threatfox.abuse.ch/ioc/1163394\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694587669000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Communicating Validated C&C Server\"",\""EvidenceString\"":\""5 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 198.98.15.206 on port 24264 and 143.198.46.29 (validated BianLian C2 Server) on port 5060 on 2023-09-15 at 06:08 UTC. \"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694736000000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""5 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 143.198.46.29:5060 as a command and control server for BianLian on Sep 16, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694863826737,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Reported C&C Server\"",\""EvidenceString\"":\""4 sightings on 1 source: Recorded Future Command & Control Reports. 143.198.46.29:5060 was reported as a command and control server for BianLian on Sep 14, 2023\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694766147073,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 198.98.15.208 on port 26688 and 143.198.46.29 (validated BianLian C2 Server) on port 5060 on 2023-09-16 at 06:34 UTC. \"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694822400000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 143.198.46.29:5060 as a command and control server for BianLian on Sep 17, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694950233599,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"143.198.46.29",,,,,,,,,,,,,,,ThreatIntelligenceIndicator diff --git a/Sample Data/Custom/Recoreded Future/RecordedFutureIPWorkbook_ThreatIntelligenceIndicator_IngestedLogs.csv b/Sample Data/Custom/Recoreded Future/RecordedFutureIPWorkbook_ThreatIntelligenceIndicator_IngestedLogs.csv new file mode 100644 index 00000000000..d47ad4d2b1e --- /dev/null +++ b/Sample Data/Custom/Recoreded Future/RecordedFutureIPWorkbook_ThreatIntelligenceIndicator_IngestedLogs.csv @@ -0,0 +1,19 @@ +TenantId,"TimeGenerated [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",SourceSystem,Action,ActivityGroupNames,AdditionalInformation,ApplicationId,AzureTenantId,ConfidenceScore,Description,DiamondModel,ExternalIndicatorId,"ExpirationDateTime [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",IndicatorId,ThreatType,Active,KillChainActions,KillChainC2,KillChainDelivery,KillChainExploitation,KillChainReconnaissance,KillChainWeaponization,KnownFalsePositives,MalwareNames,PassiveOnly,ThreatSeverity,Tags,TrafficLightProtocolLevel,EmailEncoding,EmailLanguage,EmailRecipient,EmailSenderAddress,EmailSenderName,EmailSourceDomain,EmailSourceIpAddress,EmailSubject,EmailXMailer,"FileCompileDateTime [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]","FileCreatedDateTime [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",FileHashType,FileHashValue,FileMutexName,FileName,FilePacker,FilePath,FileSize,FileType,DomainName,NetworkIP,NetworkPort,NetworkDestinationAsn,NetworkDestinationCidrBlock,NetworkDestinationIP,NetworkCidrBlock,NetworkDestinationPort,NetworkProtocol,NetworkSourceAsn,NetworkSourceCidrBlock,NetworkSourceIP,NetworkSourcePort,Url,UserAgent,IndicatorProvider,Type,TenantId1,SourceSystem1,MG,ManagementGroupName,"TimeGenerated1 [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",Computer,RawData,"Action_s","Device_s","Dst_IPv4_s","Dst_Zone_s","Port_s","Protocol_s","Src_IPv4_s","Src_Zone_s",Type1,"_ResourceId" +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:45:35.089 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",99,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--ca8ca2ac-83d4-42c0-ae9a-036469f529b5","9/18/2023, 5:45:10.780 PM",28DABCF576DFEEB6D2AFFF0292A6B3F106FAC7A4E8CBA782FE5EF4B61E552419,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Vulnerable Host\"",\""EvidenceString\"":\""1 sighting on 1 source: Shodan: CVE-2014-0160 Heartbleed Vulnerable SSL Hosts.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694956426355,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Observed in the Wild by Recorded Future Telemetry\"",\""EvidenceString\"":\""1 sighting on 1 source: Recently Viewed Integrations Indicators. Observed in the wild by Recorded Future Telemetry.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694956426355,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 4 sources: Shodan: CVE-2014-0160 Heartbleed Vulnerable SSL Hosts, Recorded Future Analyst Community Trending Indicators, Recently Viewed Integrations Indicators, RAT Controller – Shodan / Recorded Future. Observed between Jun 26, 2023, and Aug 16, 2023.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694956426435,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported C&C Server\"",\""EvidenceString\"":\""122 sightings on 1 source: Recorded Future Command & Control Reports. 103.149.90.235:443 was reported as a command and control server for Trochilus on Jul 18, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1689841315671,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Communicating Validated C&C Server\"",\""EvidenceString\"":\""45 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 58.27.212.48 on 47 ports including 38253 and 103.149.90.235 (validated Trochilus C2 Server) on port 443 on 2023-09-15 at 00:20 UTC. \"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694736000000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""718 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 103.149.90.235:443 as a command and control server for Trochilus on Sep 16, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694863867825,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Reported C&C Server\"",\""EvidenceString\"":\""6 sightings on 2 sources: Recorded Future Command & Control Reports, RAT Controller – Shodan / Recorded Future. 103.149.90.235:443 was reported as a command and control server for Trochilus on Aug 12, 2023\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694956426356,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""3 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 103.118.3.13 on 27 ports including 57043 and 103.149.90.235 (validated Trochilus C2 Server) on port 443 on 2023-09-16 at 00:40 UTC. \"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694822400000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 103.149.90.235:443 as a command and control server for Trochilus on Sep 17, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694950289162,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"103.149.90.235",,,,,,,,,,,,,,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/18/2023, 10:49:51.966 AM",,,permit,NetScreen,"103.149.90.235",internet,443,TCP,"10.1.149.125",office,"NetScreen_Firewall_CL", +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:45:35.089 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",99,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--ca8ca2ac-83d4-42c0-ae9a-036469f529b5","9/18/2023, 5:45:10.780 PM",28DABCF576DFEEB6D2AFFF0292A6B3F106FAC7A4E8CBA782FE5EF4B61E552419,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Vulnerable Host\"",\""EvidenceString\"":\""1 sighting on 1 source: Shodan: CVE-2014-0160 Heartbleed Vulnerable SSL Hosts.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694956426355,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Observed in the Wild by Recorded Future Telemetry\"",\""EvidenceString\"":\""1 sighting on 1 source: Recently Viewed Integrations Indicators. Observed in the wild by Recorded Future Telemetry.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694956426355,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 4 sources: Shodan: CVE-2014-0160 Heartbleed Vulnerable SSL Hosts, Recorded Future Analyst Community Trending Indicators, Recently Viewed Integrations Indicators, RAT Controller – Shodan / Recorded Future. Observed between Jun 26, 2023, and Aug 16, 2023.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694956426435,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported C&C Server\"",\""EvidenceString\"":\""122 sightings on 1 source: Recorded Future Command & Control Reports. 103.149.90.235:443 was reported as a command and control server for Trochilus on Jul 18, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1689841315671,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Communicating Validated C&C Server\"",\""EvidenceString\"":\""45 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 58.27.212.48 on 47 ports including 38253 and 103.149.90.235 (validated Trochilus C2 Server) on port 443 on 2023-09-15 at 00:20 UTC. \"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694736000000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""718 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 103.149.90.235:443 as a command and control server for Trochilus on Sep 16, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694863867825,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Reported C&C Server\"",\""EvidenceString\"":\""6 sightings on 2 sources: Recorded Future Command & Control Reports, RAT Controller – Shodan / Recorded Future. 103.149.90.235:443 was reported as a command and control server for Trochilus on Aug 12, 2023\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694956426356,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""3 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 103.118.3.13 on 27 ports including 57043 and 103.149.90.235 (validated Trochilus C2 Server) on port 443 on 2023-09-16 at 00:40 UTC. \"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694822400000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 103.149.90.235:443 as a command and control server for Trochilus on Sep 17, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694950289162,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"103.149.90.235",,,,,,,,,,,,,,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/18/2023, 11:49:51.450 AM",,,permit,NetScreen,"103.149.90.235",internet,80,TCP,"10.1.149.125",office,"NetScreen_Firewall_CL", +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:45:35.096 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",99,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--2a5bea34-87b0-407d-bb18-a95fbaa64bbd","9/18/2023, 5:45:10.797 PM",EE4AEAD133E2D384D04A74E60B44F48C977C571599A2A9E047B27A09C5B28793,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Linked to Intrusion Method\"",\""EvidenceString\"":\""2 sightings on 1 source: Twitter. 2 related intrusion methods: Cobalt Strike, Offensive Security Tools (OST). Most recent link (Aug 3, 2023): https://twitter.com/drb_ra/statuses/1687151980165152769\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691083352000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: Malware Control Server, from Silas Cutler Scanning ( OnlyScans.net ) (Jul 4, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1688433002721,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported as a Defanged IP\"",\""EvidenceString\"":\""2 sightings on 1 source: Twitter. Most recent link (Aug 3, 2023): https://twitter.com/drb_ra/statuses/1687151980165152769\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691083352000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Botnet Traffic\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. 58.87.99.181 was historically observed as botnets. No longer observed as of Nov 03, 2021.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1635912872826,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Open Proxies\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. 58.87.99.181 was historically observed as proxy. No longer observed as of Nov 01, 2021.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1635742241311,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Phishing Host\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. 58.87.99.181 was historically observed as phishing. No longer observed as of Nov 03, 2021.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1635912872795,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Spam Source\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Spam. 58.87.99.181 was identified as spam in External Sensor data. Reported to Recorded Future on Oct 04, 2022.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1664881124897,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported C&C Server\"",\""EvidenceString\"":\""42 sightings on 1 source: Recorded Future Command & Control Reports. 58.87.99.181:7777 was reported as a command and control server for Cobalt Strike on Aug 13, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1692001381048,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recent Suspected C&C Server\"",\""EvidenceString\"":\""4 sightings on 2 sources: ThreatFox Infrastructure Analysis, Malware Patrol. ThreatFox identified 58.87.99.181:7777 as possible TA0011 (Command and Control) for CobaltStrike Beacon on September 12, 2023. Most recent link (Sep 12, 2023): https://threatfox.abuse.ch/ioc/1162896\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694495940000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Communicating Validated C&C Server\"",\""EvidenceString\"":\""6 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 86.105.155.248 on 2 ports including 57049 and 58.87.99.181 (validated Cobalt Strike C2 Server) on port 6666 on 2023-09-14 at 00:43 UTC. \"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694649600000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""215 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 58.87.99.181:6666 as a command and control server for Cobalt Strike on Sep 16, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694853064834,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Reported C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: RAT Controller – Shodan / Recorded Future.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694946832854,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 86.105.155.248 on 3 ports including 46073 and 58.87.99.181 (validated Cobalt Strike C2 Server) on port 6666 on 2023-09-16 at 09:50 UTC. \"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694822400000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 58.87.99.181:6666 as a command and control server for Cobalt Strike on Sep 17, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694939469935,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"58.87.99.181",,,,,,,,,,,,,,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/18/2023, 12:49:52.373 PM",,,permit,NetScreen,"58.87.99.181",internet,80,TCP,"10.1.31.145",office,"NetScreen_Firewall_CL", +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:45:35.089 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",99,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--ca8ca2ac-83d4-42c0-ae9a-036469f529b5","9/18/2023, 5:45:10.780 PM",28DABCF576DFEEB6D2AFFF0292A6B3F106FAC7A4E8CBA782FE5EF4B61E552419,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Vulnerable Host\"",\""EvidenceString\"":\""1 sighting on 1 source: Shodan: CVE-2014-0160 Heartbleed Vulnerable SSL Hosts.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694956426355,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Observed in the Wild by Recorded Future Telemetry\"",\""EvidenceString\"":\""1 sighting on 1 source: Recently Viewed Integrations Indicators. Observed in the wild by Recorded Future Telemetry.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694956426355,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 4 sources: Shodan: CVE-2014-0160 Heartbleed Vulnerable SSL Hosts, Recorded Future Analyst Community Trending Indicators, Recently Viewed Integrations Indicators, RAT Controller – Shodan / Recorded Future. Observed between Jun 26, 2023, and Aug 16, 2023.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694956426435,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported C&C Server\"",\""EvidenceString\"":\""122 sightings on 1 source: Recorded Future Command & Control Reports. 103.149.90.235:443 was reported as a command and control server for Trochilus on Jul 18, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1689841315671,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Communicating Validated C&C Server\"",\""EvidenceString\"":\""45 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 58.27.212.48 on 47 ports including 38253 and 103.149.90.235 (validated Trochilus C2 Server) on port 443 on 2023-09-15 at 00:20 UTC. \"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694736000000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""718 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 103.149.90.235:443 as a command and control server for Trochilus on Sep 16, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694863867825,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Reported C&C Server\"",\""EvidenceString\"":\""6 sightings on 2 sources: Recorded Future Command & Control Reports, RAT Controller – Shodan / Recorded Future. 103.149.90.235:443 was reported as a command and control server for Trochilus on Aug 12, 2023\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694956426356,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""3 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 103.118.3.13 on 27 ports including 57043 and 103.149.90.235 (validated Trochilus C2 Server) on port 443 on 2023-09-16 at 00:40 UTC. \"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694822400000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 103.149.90.235:443 as a command and control server for Trochilus on Sep 17, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694950289162,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"103.149.90.235",,,,,,,,,,,,,,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/18/2023, 7:49:51.362 AM",,,permit,NetScreen,"103.149.90.235",internet,443,TCP,"10.1.149.125",office,"NetScreen_Firewall_CL", +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:45:35.089 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",99,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--ca8ca2ac-83d4-42c0-ae9a-036469f529b5","9/18/2023, 5:45:10.780 PM",28DABCF576DFEEB6D2AFFF0292A6B3F106FAC7A4E8CBA782FE5EF4B61E552419,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Vulnerable Host\"",\""EvidenceString\"":\""1 sighting on 1 source: Shodan: CVE-2014-0160 Heartbleed Vulnerable SSL Hosts.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694956426355,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Observed in the Wild by Recorded Future Telemetry\"",\""EvidenceString\"":\""1 sighting on 1 source: Recently Viewed Integrations Indicators. Observed in the wild by Recorded Future Telemetry.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694956426355,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 4 sources: Shodan: CVE-2014-0160 Heartbleed Vulnerable SSL Hosts, Recorded Future Analyst Community Trending Indicators, Recently Viewed Integrations Indicators, RAT Controller – Shodan / Recorded Future. Observed between Jun 26, 2023, and Aug 16, 2023.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694956426435,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported C&C Server\"",\""EvidenceString\"":\""122 sightings on 1 source: Recorded Future Command & Control Reports. 103.149.90.235:443 was reported as a command and control server for Trochilus on Jul 18, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1689841315671,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Communicating Validated C&C Server\"",\""EvidenceString\"":\""45 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 58.27.212.48 on 47 ports including 38253 and 103.149.90.235 (validated Trochilus C2 Server) on port 443 on 2023-09-15 at 00:20 UTC. \"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694736000000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""718 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 103.149.90.235:443 as a command and control server for Trochilus on Sep 16, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694863867825,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Reported C&C Server\"",\""EvidenceString\"":\""6 sightings on 2 sources: Recorded Future Command & Control Reports, RAT Controller – Shodan / Recorded Future. 103.149.90.235:443 was reported as a command and control server for Trochilus on Aug 12, 2023\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694956426356,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""3 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 103.118.3.13 on 27 ports including 57043 and 103.149.90.235 (validated Trochilus C2 Server) on port 443 on 2023-09-16 at 00:40 UTC. \"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694822400000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 103.149.90.235:443 as a command and control server for Trochilus on Sep 17, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694950289162,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"103.149.90.235",,,,,,,,,,,,,,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/18/2023, 2:49:48.374 AM",,,permit,NetScreen,"103.149.90.235",internet,443,TCP,"10.1.149.125",office,"NetScreen_Firewall_CL", +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:45:35.089 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",99,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--ca8ca2ac-83d4-42c0-ae9a-036469f529b5","9/18/2023, 5:45:10.780 PM",28DABCF576DFEEB6D2AFFF0292A6B3F106FAC7A4E8CBA782FE5EF4B61E552419,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Vulnerable Host\"",\""EvidenceString\"":\""1 sighting on 1 source: Shodan: CVE-2014-0160 Heartbleed Vulnerable SSL Hosts.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694956426355,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Observed in the Wild by Recorded Future Telemetry\"",\""EvidenceString\"":\""1 sighting on 1 source: Recently Viewed Integrations Indicators. Observed in the wild by Recorded Future Telemetry.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694956426355,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 4 sources: Shodan: CVE-2014-0160 Heartbleed Vulnerable SSL Hosts, Recorded Future Analyst Community Trending Indicators, Recently Viewed Integrations Indicators, RAT Controller – Shodan / Recorded Future. Observed between Jun 26, 2023, and Aug 16, 2023.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694956426435,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported C&C Server\"",\""EvidenceString\"":\""122 sightings on 1 source: Recorded Future Command & Control Reports. 103.149.90.235:443 was reported as a command and control server for Trochilus on Jul 18, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1689841315671,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Communicating Validated C&C Server\"",\""EvidenceString\"":\""45 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 58.27.212.48 on 47 ports including 38253 and 103.149.90.235 (validated Trochilus C2 Server) on port 443 on 2023-09-15 at 00:20 UTC. \"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694736000000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""718 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 103.149.90.235:443 as a command and control server for Trochilus on Sep 16, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694863867825,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Reported C&C Server\"",\""EvidenceString\"":\""6 sightings on 2 sources: Recorded Future Command & Control Reports, RAT Controller – Shodan / Recorded Future. 103.149.90.235:443 was reported as a command and control server for Trochilus on Aug 12, 2023\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694956426356,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""3 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 103.118.3.13 on 27 ports including 57043 and 103.149.90.235 (validated Trochilus C2 Server) on port 443 on 2023-09-16 at 00:40 UTC. \"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694822400000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 103.149.90.235:443 as a command and control server for Trochilus on Sep 17, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694950289162,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"103.149.90.235",,,,,,,,,,,,,,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/18/2023, 5:49:51.463 AM",,,permit,NetScreen,"103.149.90.235",internet,443,TCP,"10.1.149.125",office,"NetScreen_Firewall_CL", +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:45:35.089 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",99,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--ca8ca2ac-83d4-42c0-ae9a-036469f529b5","9/18/2023, 5:45:10.780 PM",28DABCF576DFEEB6D2AFFF0292A6B3F106FAC7A4E8CBA782FE5EF4B61E552419,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Vulnerable Host\"",\""EvidenceString\"":\""1 sighting on 1 source: Shodan: CVE-2014-0160 Heartbleed Vulnerable SSL Hosts.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694956426355,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Observed in the Wild by Recorded Future Telemetry\"",\""EvidenceString\"":\""1 sighting on 1 source: Recently Viewed Integrations Indicators. Observed in the wild by Recorded Future Telemetry.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694956426355,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 4 sources: Shodan: CVE-2014-0160 Heartbleed Vulnerable SSL Hosts, Recorded Future Analyst Community Trending Indicators, Recently Viewed Integrations Indicators, RAT Controller – Shodan / Recorded Future. Observed between Jun 26, 2023, and Aug 16, 2023.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694956426435,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported C&C Server\"",\""EvidenceString\"":\""122 sightings on 1 source: Recorded Future Command & Control Reports. 103.149.90.235:443 was reported as a command and control server for Trochilus on Jul 18, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1689841315671,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Communicating Validated C&C Server\"",\""EvidenceString\"":\""45 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 58.27.212.48 on 47 ports including 38253 and 103.149.90.235 (validated Trochilus C2 Server) on port 443 on 2023-09-15 at 00:20 UTC. \"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694736000000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""718 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 103.149.90.235:443 as a command and control server for Trochilus on Sep 16, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694863867825,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Reported C&C Server\"",\""EvidenceString\"":\""6 sightings on 2 sources: Recorded Future Command & Control Reports, RAT Controller – Shodan / Recorded Future. 103.149.90.235:443 was reported as a command and control server for Trochilus on Aug 12, 2023\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694956426356,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""3 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 103.118.3.13 on 27 ports including 57043 and 103.149.90.235 (validated Trochilus C2 Server) on port 443 on 2023-09-16 at 00:40 UTC. \"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694822400000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 103.149.90.235:443 as a command and control server for Trochilus on Sep 17, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694950289162,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"103.149.90.235",,,,,,,,,,,,,,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/18/2023, 6:49:52.577 AM",,,permit,NetScreen,"103.149.90.235",internet,443,TCP,"10.1.149.125",office,"NetScreen_Firewall_CL", +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:45:35.089 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",99,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--ca8ca2ac-83d4-42c0-ae9a-036469f529b5","9/18/2023, 5:45:10.780 PM",28DABCF576DFEEB6D2AFFF0292A6B3F106FAC7A4E8CBA782FE5EF4B61E552419,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Vulnerable Host\"",\""EvidenceString\"":\""1 sighting on 1 source: Shodan: CVE-2014-0160 Heartbleed Vulnerable SSL Hosts.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694956426355,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Observed in the Wild by Recorded Future Telemetry\"",\""EvidenceString\"":\""1 sighting on 1 source: Recently Viewed Integrations Indicators. Observed in the wild by Recorded Future Telemetry.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694956426355,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 4 sources: Shodan: CVE-2014-0160 Heartbleed Vulnerable SSL Hosts, Recorded Future Analyst Community Trending Indicators, Recently Viewed Integrations Indicators, RAT Controller – Shodan / Recorded Future. Observed between Jun 26, 2023, and Aug 16, 2023.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694956426435,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported C&C Server\"",\""EvidenceString\"":\""122 sightings on 1 source: Recorded Future Command & Control Reports. 103.149.90.235:443 was reported as a command and control server for Trochilus on Jul 18, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1689841315671,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Communicating Validated C&C Server\"",\""EvidenceString\"":\""45 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 58.27.212.48 on 47 ports including 38253 and 103.149.90.235 (validated Trochilus C2 Server) on port 443 on 2023-09-15 at 00:20 UTC. \"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694736000000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""718 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 103.149.90.235:443 as a command and control server for Trochilus on Sep 16, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694863867825,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Reported C&C Server\"",\""EvidenceString\"":\""6 sightings on 2 sources: Recorded Future Command & Control Reports, RAT Controller – Shodan / Recorded Future. 103.149.90.235:443 was reported as a command and control server for Trochilus on Aug 12, 2023\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694956426356,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""3 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 103.118.3.13 on 27 ports including 57043 and 103.149.90.235 (validated Trochilus C2 Server) on port 443 on 2023-09-16 at 00:40 UTC. \"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694822400000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 103.149.90.235:443 as a command and control server for Trochilus on Sep 17, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694950289162,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"103.149.90.235",,,,,,,,,,,,,,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/18/2023, 9:49:49.988 AM",,,permit,NetScreen,"103.149.90.235",internet,80,TCP,"10.1.149.125",office,"NetScreen_Firewall_CL", +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:45:35.096 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",99,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--2a5bea34-87b0-407d-bb18-a95fbaa64bbd","9/18/2023, 5:45:10.797 PM",EE4AEAD133E2D384D04A74E60B44F48C977C571599A2A9E047B27A09C5B28793,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Linked to Intrusion Method\"",\""EvidenceString\"":\""2 sightings on 1 source: Twitter. 2 related intrusion methods: Cobalt Strike, Offensive Security Tools (OST). Most recent link (Aug 3, 2023): https://twitter.com/drb_ra/statuses/1687151980165152769\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691083352000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: Malware Control Server, from Silas Cutler Scanning ( OnlyScans.net ) (Jul 4, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1688433002721,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported as a Defanged IP\"",\""EvidenceString\"":\""2 sightings on 1 source: Twitter. Most recent link (Aug 3, 2023): https://twitter.com/drb_ra/statuses/1687151980165152769\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691083352000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Botnet Traffic\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. 58.87.99.181 was historically observed as botnets. No longer observed as of Nov 03, 2021.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1635912872826,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Open Proxies\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. 58.87.99.181 was historically observed as proxy. No longer observed as of Nov 01, 2021.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1635742241311,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Phishing Host\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. 58.87.99.181 was historically observed as phishing. No longer observed as of Nov 03, 2021.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1635912872795,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Spam Source\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Spam. 58.87.99.181 was identified as spam in External Sensor data. Reported to Recorded Future on Oct 04, 2022.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1664881124897,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported C&C Server\"",\""EvidenceString\"":\""42 sightings on 1 source: Recorded Future Command & Control Reports. 58.87.99.181:7777 was reported as a command and control server for Cobalt Strike on Aug 13, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1692001381048,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recent Suspected C&C Server\"",\""EvidenceString\"":\""4 sightings on 2 sources: ThreatFox Infrastructure Analysis, Malware Patrol. ThreatFox identified 58.87.99.181:7777 as possible TA0011 (Command and Control) for CobaltStrike Beacon on September 12, 2023. Most recent link (Sep 12, 2023): https://threatfox.abuse.ch/ioc/1162896\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694495940000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Communicating Validated C&C Server\"",\""EvidenceString\"":\""6 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 86.105.155.248 on 2 ports including 57049 and 58.87.99.181 (validated Cobalt Strike C2 Server) on port 6666 on 2023-09-14 at 00:43 UTC. \"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694649600000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""215 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 58.87.99.181:6666 as a command and control server for Cobalt Strike on Sep 16, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694853064834,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Reported C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: RAT Controller – Shodan / Recorded Future.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694946832854,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 86.105.155.248 on 3 ports including 46073 and 58.87.99.181 (validated Cobalt Strike C2 Server) on port 6666 on 2023-09-16 at 09:50 UTC. \"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694822400000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 58.87.99.181:6666 as a command and control server for Cobalt Strike on Sep 17, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694939469935,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"58.87.99.181",,,,,,,,,,,,,,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/18/2023, 1:49:52.170 PM",,,permit,NetScreen,"58.87.99.181",internet,80,TCP,"10.1.31.145",office,"NetScreen_Firewall_CL", +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:45:35.082 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",99,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--8ebb17b9-163f-4a0f-baf1-b9f9a32697bb","9/18/2023, 5:45:11.344 PM",EF356887F1D4E192D37846840DF2BCD0CC175C32068BFEB138C83D0F8F1E2FEC,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Recently Reported as a Defanged IP\"",\""EvidenceString\"":\""1 sighting on 1 source: Twitter. Most recent link (Sep 12, 2023): https://twitter.com/drb_ra/statuses/1701690137069998538\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694549519000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Linked to Intrusion Method\"",\""EvidenceString\"":\""2 sightings on 1 source: Twitter. 2 related intrusion methods: Cobalt Strike, Offensive Security Tools (OST). Most recent link (Sep 16, 2023): https://twitter.com/malpulse/statuses/1703075414044811487\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694879794000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recent Suspected C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified 178.62.68.57:443 as possible TA0011 (Command and Control) for CobaltStrike Beacon on September 16, 2023. Most recent link (Sep 16, 2023): https://threatfox.abuse.ch/ioc/1163301\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694879794000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Communicating Validated C&C Server\"",\""EvidenceString\"":\""10 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 194.127.199.100 on 8 ports including 51312 and 178.62.68.57 (validated Cobalt Strike C2 Server) on port 443 on 2023-09-15 at 00:08 UTC. \"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694736000000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""10 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 178.62.68.57:443 as a command and control server for Cobalt Strike on Sep 16, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694849403081,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Reported C&C Server\"",\""EvidenceString\"":\""18 sightings on 2 sources: Recorded Future Command & Control Reports, RAT Controller – Shodan / Recorded Future. 178.62.68.57:443 was reported as a command and control server for Cobalt Strike on Sep 17, 2023\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694956663002,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 216.131.110.3 on 2 ports including 37891 and 178.62.68.57 (validated Cobalt Strike C2 Server) on port 443 on 2023-09-16 at 17:29 UTC. Domain(s) elitelearning.online recently resolved to the C2 IP.\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694822400000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 178.62.68.57:443 as a command and control server for Cobalt Strike on Sep 17, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694935816587,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"178.62.68.57",,,,,,,,,,,,,,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/19/2023, 4:49:59.029 AM",,,permit,NetScreen,"178.62.68.57",internet,80,TCP,"10.1.14.13",office,"NetScreen_Firewall_CL", +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:45:35.082 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",99,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--8ebb17b9-163f-4a0f-baf1-b9f9a32697bb","9/18/2023, 5:45:11.344 PM",EF356887F1D4E192D37846840DF2BCD0CC175C32068BFEB138C83D0F8F1E2FEC,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Recently Reported as a Defanged IP\"",\""EvidenceString\"":\""1 sighting on 1 source: Twitter. Most recent link (Sep 12, 2023): https://twitter.com/drb_ra/statuses/1701690137069998538\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694549519000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Linked to Intrusion Method\"",\""EvidenceString\"":\""2 sightings on 1 source: Twitter. 2 related intrusion methods: Cobalt Strike, Offensive Security Tools (OST). Most recent link (Sep 16, 2023): https://twitter.com/malpulse/statuses/1703075414044811487\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694879794000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recent Suspected C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified 178.62.68.57:443 as possible TA0011 (Command and Control) for CobaltStrike Beacon on September 16, 2023. Most recent link (Sep 16, 2023): https://threatfox.abuse.ch/ioc/1163301\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694879794000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Communicating Validated C&C Server\"",\""EvidenceString\"":\""10 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 194.127.199.100 on 8 ports including 51312 and 178.62.68.57 (validated Cobalt Strike C2 Server) on port 443 on 2023-09-15 at 00:08 UTC. \"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694736000000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""10 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 178.62.68.57:443 as a command and control server for Cobalt Strike on Sep 16, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694849403081,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Reported C&C Server\"",\""EvidenceString\"":\""18 sightings on 2 sources: Recorded Future Command & Control Reports, RAT Controller – Shodan / Recorded Future. 178.62.68.57:443 was reported as a command and control server for Cobalt Strike on Sep 17, 2023\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694956663002,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 216.131.110.3 on 2 ports including 37891 and 178.62.68.57 (validated Cobalt Strike C2 Server) on port 443 on 2023-09-16 at 17:29 UTC. Domain(s) elitelearning.online recently resolved to the C2 IP.\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694822400000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 178.62.68.57:443 as a command and control server for Cobalt Strike on Sep 17, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694935816587,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"178.62.68.57",,,,,,,,,,,,,,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/19/2023, 5:49:56.711 AM",,,permit,NetScreen,"178.62.68.57",internet,443,TCP,"10.1.14.13",office,"NetScreen_Firewall_CL", +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:45:36.354 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",99,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--45ac5238-6f6b-4e37-8d3c-02e8df399185","9/20/2023, 5:45:07.767 PM",8F9AAD5C814D1F022CE005D3CC39C10FE5320F84FAC86EAEDB253422AE7E920D,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Linked to Intrusion Method\"",\""EvidenceString\"":\""2 sightings on 1 source: Twitter. 2 related intrusion methods: Cobalt Strike, Offensive Security Tools (OST). Most recent link (Jul 4, 2023): https://twitter.com/drb_ra/statuses/1676274392014233613\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1688489933000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C Server\"",\""EvidenceString\"":\""3 sightings on 2 sources: ThreatFox Infrastructure Analysis, Malware Patrol. ThreatFox identified 120.76.173.159:8091 as possible TA0011 (Command and Control) for CobaltStrike Beacon on August 05, 2023. Most recent link (Aug 5, 2023): https://threatfox.abuse.ch/ioc/1148829\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691259967000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""21 sightings on 1 source: DHS Automated Indicator Sharing. 21 reports including CCCS-IXR_2023_86526_1, from YummyBellPepper50 (Sep 1, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693569130028,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported as a Defanged IP\"",\""EvidenceString\"":\""2 sightings on 1 source: Twitter. Most recent link (Jul 4, 2023): https://twitter.com/drb_ra/statuses/1676274392014233613\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1688489933000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 1 source: RAT Controller – Shodan / Recorded Future. Observed between Aug 26, 2023, and Sep 10, 2023.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1695134453213,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported C&C Server\"",\""EvidenceString\"":\""44 sightings on 1 source: Recorded Future Command & Control Reports. 120.76.173.159:50050 was reported as a command and control server for Cobalt Strike on Aug 07, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1691482860547,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""29 sightings on 1 source: DHS Automated Indicator Sharing. 29 reports including CCCS-IXR_2023_87141_1, from TintedSponge57 (Sep 18, 2023).\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1695012730306,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Communicating Validated C&C Server\"",\""EvidenceString\"":\""3 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 37.120.144.231 on 4 ports including 59569 and 120.76.173.159 (validated Cobalt Strike C2 Server) on port 8092 on 2023-09-14 at 00:33 UTC. Domain(s) kobilica.synology.me recently resolved to the suspected victim IP. \"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694649600000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""421 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 120.76.173.159:8091 as a command and control server for Cobalt Strike on Sep 18, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1695025854875,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recent Phishing Host\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. 120.76.173.159 was identified as phishing in External Sensor data. Reported to Recorded Future on Jul 07, 2023.\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1688769306625,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 37.120.144.231 on 5 ports including 41503 and 120.76.173.159 (validated Cobalt Strike C2 Server) on port 8092 on 2023-09-18 at 21:24 UTC. Domain(s) www.rjxh.cloud and rjxh.cloud recently resolved to the C2 IP.\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694995200000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 120.76.173.159:8091 as a command and control server for Cobalt Strike on Sep 19, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1695112268437,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"120.76.173.159",,,,,,,,,,,,,,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/19/2023, 11:26:23.687 AM",,,permit,NetScreen,"120.76.173.159",internet,80,TCP,"10.1.42.223",office,"NetScreen_Firewall_CL", +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:45:35.082 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",99,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--8ebb17b9-163f-4a0f-baf1-b9f9a32697bb","9/18/2023, 5:45:11.344 PM",EF356887F1D4E192D37846840DF2BCD0CC175C32068BFEB138C83D0F8F1E2FEC,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Recently Reported as a Defanged IP\"",\""EvidenceString\"":\""1 sighting on 1 source: Twitter. Most recent link (Sep 12, 2023): https://twitter.com/drb_ra/statuses/1701690137069998538\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694549519000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Linked to Intrusion Method\"",\""EvidenceString\"":\""2 sightings on 1 source: Twitter. 2 related intrusion methods: Cobalt Strike, Offensive Security Tools (OST). Most recent link (Sep 16, 2023): https://twitter.com/malpulse/statuses/1703075414044811487\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694879794000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recent Suspected C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified 178.62.68.57:443 as possible TA0011 (Command and Control) for CobaltStrike Beacon on September 16, 2023. Most recent link (Sep 16, 2023): https://threatfox.abuse.ch/ioc/1163301\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694879794000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Communicating Validated C&C Server\"",\""EvidenceString\"":\""10 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 194.127.199.100 on 8 ports including 51312 and 178.62.68.57 (validated Cobalt Strike C2 Server) on port 443 on 2023-09-15 at 00:08 UTC. \"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694736000000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""10 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 178.62.68.57:443 as a command and control server for Cobalt Strike on Sep 16, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694849403081,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Reported C&C Server\"",\""EvidenceString\"":\""18 sightings on 2 sources: Recorded Future Command & Control Reports, RAT Controller – Shodan / Recorded Future. 178.62.68.57:443 was reported as a command and control server for Cobalt Strike on Sep 17, 2023\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694956663002,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 216.131.110.3 on 2 ports including 37891 and 178.62.68.57 (validated Cobalt Strike C2 Server) on port 443 on 2023-09-16 at 17:29 UTC. Domain(s) elitelearning.online recently resolved to the C2 IP.\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694822400000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 178.62.68.57:443 as a command and control server for Cobalt Strike on Sep 17, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694935816587,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"178.62.68.57",,,,,,,,,,,,,,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/19/2023, 3:49:59.037 AM",,,permit,NetScreen,"178.62.68.57",internet,80,TCP,"10.1.14.13",office,"NetScreen_Firewall_CL", +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:45:35.116 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",99,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--0e7c0dd3-c8be-4d49-a98b-f09cc90f513e","9/18/2023, 5:45:11.702 PM",28A37CA91979C4084FB90A47A6B2EA425C5C2483ECDE292EB99896E74F1B8140,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Recently Reported as a Defanged IP\"",\""EvidenceString\"":\""1 sighting on 1 source: Twitter. Most recent link (Sep 13, 2023): https://twitter.com/drb_ra/statuses/1701775882677780886\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694569962000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 1 source: CINS: CI Army List. Observed between Jun 8, 2023, and Jun 8, 2023.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694962871531,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recent Suspected C&C Server\"",\""EvidenceString\"":\""4 sightings on 2 sources: ThreatFox Infrastructure Analysis, Malware Patrol. ThreatFox identified 143.198.46.29:5060 as possible TA0011 (Command and Control) for BianLian on September 13, 2023. Most recent link (Sep 13, 2023): https://threatfox.abuse.ch/ioc/1163394\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694587669000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Communicating Validated C&C Server\"",\""EvidenceString\"":\""5 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 198.98.15.206 on port 24264 and 143.198.46.29 (validated BianLian C2 Server) on port 5060 on 2023-09-15 at 06:08 UTC. \"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694736000000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""5 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 143.198.46.29:5060 as a command and control server for BianLian on Sep 16, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694863826737,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Reported C&C Server\"",\""EvidenceString\"":\""4 sightings on 1 source: Recorded Future Command & Control Reports. 143.198.46.29:5060 was reported as a command and control server for BianLian on Sep 14, 2023\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694766147073,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 198.98.15.208 on port 26688 and 143.198.46.29 (validated BianLian C2 Server) on port 5060 on 2023-09-16 at 06:34 UTC. \"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694822400000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 143.198.46.29:5060 as a command and control server for BianLian on Sep 17, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694950233599,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"143.198.46.29",,,,,,,,,,,,,,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/19/2023, 10:49:57.674 AM",,,permit,NetScreen,"143.198.46.29",internet,443,TCP,"10.1.15.109",office,"NetScreen_Firewall_CL", +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:45:35.082 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",99,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--8ebb17b9-163f-4a0f-baf1-b9f9a32697bb","9/18/2023, 5:45:11.344 PM",EF356887F1D4E192D37846840DF2BCD0CC175C32068BFEB138C83D0F8F1E2FEC,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Recently Reported as a Defanged IP\"",\""EvidenceString\"":\""1 sighting on 1 source: Twitter. Most recent link (Sep 12, 2023): https://twitter.com/drb_ra/statuses/1701690137069998538\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694549519000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Linked to Intrusion Method\"",\""EvidenceString\"":\""2 sightings on 1 source: Twitter. 2 related intrusion methods: Cobalt Strike, Offensive Security Tools (OST). Most recent link (Sep 16, 2023): https://twitter.com/malpulse/statuses/1703075414044811487\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694879794000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recent Suspected C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified 178.62.68.57:443 as possible TA0011 (Command and Control) for CobaltStrike Beacon on September 16, 2023. Most recent link (Sep 16, 2023): https://threatfox.abuse.ch/ioc/1163301\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694879794000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Communicating Validated C&C Server\"",\""EvidenceString\"":\""10 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 194.127.199.100 on 8 ports including 51312 and 178.62.68.57 (validated Cobalt Strike C2 Server) on port 443 on 2023-09-15 at 00:08 UTC. \"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694736000000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""10 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 178.62.68.57:443 as a command and control server for Cobalt Strike on Sep 16, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694849403081,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Reported C&C Server\"",\""EvidenceString\"":\""18 sightings on 2 sources: Recorded Future Command & Control Reports, RAT Controller – Shodan / Recorded Future. 178.62.68.57:443 was reported as a command and control server for Cobalt Strike on Sep 17, 2023\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694956663002,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 216.131.110.3 on 2 ports including 37891 and 178.62.68.57 (validated Cobalt Strike C2 Server) on port 443 on 2023-09-16 at 17:29 UTC. Domain(s) elitelearning.online recently resolved to the C2 IP.\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694822400000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 178.62.68.57:443 as a command and control server for Cobalt Strike on Sep 17, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694935816587,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"178.62.68.57",,,,,,,,,,,,,,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/19/2023, 1:26:16.009 PM",,,permit,NetScreen,"178.62.68.57",internet,443,TCP,"10.1.14.13",office,"NetScreen_Firewall_CL", +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:45:35.099 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",99,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--970037d7-00e8-4330-a50b-e6d28a7ce4d5","9/18/2023, 5:45:11.060 PM",1774E59DC3A04EA16392084FA510938EE69F821A05AD1D69A552F543E280A421,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Linked to Intrusion Method\"",\""EvidenceString\"":\""4 sightings on 3 sources: C2IntelFeeds IPC2s, Twitter, Recorded Future Command & Control List. 3 related intrusion methods: Cobalt Strike, Offensive Security Tools (OST), Cobalt Strike Beacon. Most recent link (Jun 12, 2023): https://twitter.com/drb_ra/statuses/1668292955633774595\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686587010000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C Server\"",\""EvidenceString\"":\""4 sightings on 2 sources: ThreatFox Infrastructure Analysis, Malware Patrol. ThreatFox identified 101.43.183.39:35535 as possible TA0011 (Command and Control) for CobaltStrike Beacon on August 05, 2023. Most recent link (Aug 5, 2023): https://threatfox.abuse.ch/ioc/1148839\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691270041000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Linked to Cyber Attack\"",\""EvidenceString\"":\""1 sighting on 1 source: C2IntelFeeds IPC2s. Most recent link (Mar 30, 2022): https://github.com/drb-ra/C2IntelFeeds/blob/master/feeds/IPC2s-30day.csv?q=101.43.183.39_20220330\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1648643432000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported as a Defanged IP\"",\""EvidenceString\"":\""2 sightings on 1 source: Twitter. Most recent link (Jun 12, 2023): https://twitter.com/drb_ra/statuses/1668292955633774595\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686587010000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported in Threat List\"",\""EvidenceString\"":\""Previous sightings on 1 source: Recently Viewed Integrations Indicators. Observed between Sep 9, 2023, and Sep 16, 2023.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694962273702,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported C&C Server\"",\""EvidenceString\"":\""33 sightings on 2 sources: Recorded Future Command & Control Reports, Recorded Future Command & Control List. 101.43.183.39:35538 was reported as a command and control server for Cobalt Strike on Jun 26, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1687854159331,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Communicating Validated C&C Server\"",\""EvidenceString\"":\""4 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 146.70.97.187 on 2 ports including 47335 and 101.43.183.39 (validated Cobalt Strike C2 Server) on port 35535 on 2023-09-14 at 00:48 UTC. \"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694649600000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""263 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 101.43.183.39:35538 as a command and control server for Cobalt Strike on Sep 16, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694853067523,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 146.70.97.185 on 2 ports including 39389 and 101.43.183.39 (validated Cobalt Strike C2 Server) on port 35535 on 2023-09-16 at 21:03 UTC. \"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694822400000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 101.43.183.39:35538 as a command and control server for Cobalt Strike on Sep 17, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694939472557,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"101.43.183.39",,,,,,,,,,,,,,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/19/2023, 10:49:57.489 AM",,,permit,NetScreen,"101.43.183.39",internet,443,TCP,"10.1.0.14",office,"NetScreen_Firewall_CL", +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:45:35.050 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",98,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--ada32671-627f-4261-a620-b143395933d2","9/18/2023, 5:45:10.800 PM",956AB29E9C5DA4D9794261BD3F39CB00FF241F6C0A52D9A9129370D36BE75F13,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Linked to Intrusion Method\"",\""EvidenceString\"":\""1 sighting on 1 source: @drb_ra. 2 related intrusion methods: Cobalt Strike, Offensive Security Tools (OST). Most recent tweet: Cobalt Strike server found C2: HTTP @ 120[.]78[.]156[.]73:12345 C2 Server: 120[.]78[.]156[.]73,/fwlink Country: China (AS37963) ASN: ALIBABA-CN-NET Hangz... #C2 #cobaltstrike. Most recent link (May 29, 2023): https://twitter.com/drb_ra/statuses/1663220146251485186\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1685377558000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported as a Defanged IP\"",\""EvidenceString\"":\""1 sighting on 1 source: @drb_ra. Most recent tweet: Cobalt Strike server found C2: HTTP @ 120[.]78[.]156[.]73:12345 C2 Server: 120[.]78[.]156[.]73,/fwlink Country: China (AS37963) ASN: ALIBABA-CN-NET Hangz... #C2 #cobaltstrike. Most recent link (May 29, 2023): https://twitter.com/drb_ra/statuses/1663220146251485186\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1685377558000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported C&C Server\"",\""EvidenceString\"":\""26 sightings on 1 source: Recorded Future Command & Control Reports. 120.78.156.73:50050 was reported as a command and control server for Cobalt Strike on Jun 26, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1687854138266,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""4 sightings on 1 source: DHS Automated Indicator Sharing. 4 reports including CCCS-IXR_2023_87111_1, from FluorescentFiddlehead52 (Sep 17, 2023).\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694951530054,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""284 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 120.78.156.73:12345 as a command and control server for Cobalt Strike on Sep 16, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694853020605,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 146.70.54.115 on 2 ports including 52183 and 120.78.156.73 (validated Cobalt Strike C2 Server) on port 12345 on 2023-09-16 at 00:41 UTC. Domain(s) beg-288.totallyacdn.com, beg-288.staticnetcontent.com, beg-288.windscribe.com, and others recently resolved to the suspected victim IP. \"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694822400000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 120.78.156.73:12345 as a command and control server for Cobalt Strike on Sep 17, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694939421894,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"120.78.156.73",,,,,,,,,,,,,,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/19/2023, 11:26:23.280 AM",,,permit,NetScreen,"120.78.156.73",internet,443,TCP,"10.1.86.92",office,"NetScreen_Firewall_CL", +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:45:35.112 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",99,"Recorded Future - IP - Actively Communicating C&C Server",,"indicator--dbebefaf-1733-4294-83e0-f73f11a81151","9/18/2023, 5:45:11.580 PM",AAB09D04CFB6BDB15FDA756B14715F3803345A59B0769DFC9BD22B225FB2BB5D,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Recently Reported as a Defanged IP\"",\""EvidenceString\"":\""1 sighting on 1 source: Twitter. Most recent link (Sep 15, 2023): https://twitter.com/drb_ra/statuses/1702724208420176104\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694796061000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported C&C Server\"",\""EvidenceString\"":\""22 sightings on 1 source: Recorded Future Command & Control Reports. 146.56.42.196:8001 was reported as a command and control server for Cobalt Strike on Sep 03, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1693729446236,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Linked to Intrusion Method\"",\""EvidenceString\"":\""1 sighting on 1 source: Twitter. 2 related intrusion methods: Cobalt Strike, Offensive Security Tools (OST). Most recent link (Sep 15, 2023): https://twitter.com/drb_ra/statuses/1702724208420176104\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694796061000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recent Suspected C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified 146.56.42.196:8001 as possible TA0011 (Command and Control) for CobaltStrike Beacon on September 12, 2023. Most recent link (Sep 12, 2023): https://threatfox.abuse.ch/ioc/1163265\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694546902000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Communicating Validated C&C Server\"",\""EvidenceString\"":\""1 sighting on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 86.106.74.117 on 3 ports including 53053 and 146.56.42.196 (validated Cobalt Strike C2 Server) on port 8001 on 2023-09-13 at 04:41 UTC. \"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694563200000,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Previously Validated C&C Server\"",\""EvidenceString\"":\""48 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 146.56.42.196:8001 as a command and control server for Cobalt Strike on Sep 16, 2023\"",\""CriticalityLabel\"":\""Suspicious\"",\""Timestamp\"":1694853034997,\""MitigationString\"":\""\"",\""Criticality\"":2},{\""Rule\"":\""Recently Reported C&C Server\"",\""EvidenceString\"":\""4 sightings on 2 sources: Recorded Future Command & Control Reports, RAT Controller – Shodan / Recorded Future. 146.56.42.196:8001 was reported as a command and control server for Cobalt Strike on Sep 04, 2023\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694947729362,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Actively Communicating Validated C&C Server\"",\""EvidenceString\"":\""2 sightings on 1 source: Recorded Future Network Intelligence. Multiple communications observed between 217.138.192.221 on 2 ports including 49149 and 146.56.42.196 (validated Cobalt Strike C2 Server) on port 8001 on 2023-09-16 at 06:27 UTC. Domain(s) hu.budapest.private-internet-access.vilfoservers.com recently resolved to the suspected victim IP. \"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694822400000,\""MitigationString\"":\""\"",\""Criticality\"":4},{\""Rule\"":\""Validated C&C Server\"",\""EvidenceString\"":\""3 sightings on 1 source: Recorded Future Command & Control Validation. Recorded Future analysis validated 146.56.42.196:8001 as a command and control server for Cobalt Strike on Sep 17, 2023\"",\""CriticalityLabel\"":\""Very Malicious\"",\""Timestamp\"":1694939437099,\""MitigationString\"":\""\"",\""Criticality\"":4}]""]",unknown,,,,,,,,,,,,,,,,,,,,,"146.56.42.196",,,,,,,,,,,,,,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/19/2023, 11:26:24.818 AM",,,permit,NetScreen,"146.56.42.196",internet,80,TCP,"10.1.142.153",office,"NetScreen_Firewall_CL", diff --git a/Solutions/Recorded Future/Sample Data/RecordedFutureRisklist_IngestedLogs.csv b/Sample Data/Custom/Recoreded Future/RecordedFutureRisklist_IngestedLogs.csv similarity index 100% rename from Solutions/Recorded Future/Sample Data/RecordedFutureRisklist_IngestedLogs.csv rename to Sample Data/Custom/Recoreded Future/RecordedFutureRisklist_IngestedLogs.csv diff --git a/Solutions/Recorded Future/Sample Data/RecordedFutureRisklist_RawLogs.json b/Sample Data/Custom/Recoreded Future/RecordedFutureRisklist_RawLogs.json similarity index 100% rename from Solutions/Recorded Future/Sample Data/RecordedFutureRisklist_RawLogs.json rename to Sample Data/Custom/Recoreded Future/RecordedFutureRisklist_RawLogs.json diff --git a/Sample Data/Custom/Recoreded Future/RecordedFutureUrlWorkbook_ExampleUrlProxyLog_IngestedLogs.csv b/Sample Data/Custom/Recoreded Future/RecordedFutureUrlWorkbook_ExampleUrlProxyLog_IngestedLogs.csv new file mode 100644 index 00000000000..aa51d85dd1b --- /dev/null +++ b/Sample Data/Custom/Recoreded Future/RecordedFutureUrlWorkbook_ExampleUrlProxyLog_IngestedLogs.csv @@ -0,0 +1,744 @@ +TenantId,SourceSystem,MG,ManagementGroupName,"TimeGenerated [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",Computer,RawData,"Action_s","Content_Type_s","Device_s","Domain_s","Response_s","Src_IPv4_s","URL_s",Type,"_ResourceId",TenantId1,"TimeGenerated1 [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",SourceSystem1,Action,ActivityGroupNames,AdditionalInformation,ApplicationId,AzureTenantId,ConfidenceScore,Description,DiamondModel,ExternalIndicatorId,"ExpirationDateTime [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",IndicatorId,ThreatType,Active,KillChainActions,KillChainC2,KillChainDelivery,KillChainExploitation,KillChainReconnaissance,KillChainWeaponization,KnownFalsePositives,MalwareNames,PassiveOnly,ThreatSeverity,Tags,TrafficLightProtocolLevel,EmailEncoding,EmailLanguage,EmailRecipient,EmailSenderAddress,EmailSenderName,EmailSourceDomain,EmailSourceIpAddress,EmailSubject,EmailXMailer,"FileCompileDateTime [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]","FileCreatedDateTime [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",FileHashType,FileHashValue,FileMutexName,FileName,FilePacker,FilePath,FileSize,FileType,DomainName,NetworkIP,NetworkPort,NetworkDestinationAsn,NetworkDestinationCidrBlock,NetworkDestinationIP,NetworkCidrBlock,NetworkDestinationPort,NetworkProtocol,NetworkSourceAsn,NetworkSourceCidrBlock,NetworkSourceIP,NetworkSourcePort,Url,UserAgent,IndicatorProvider,Type1 +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 3:58:57.906 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--3cf01705-9adb-4406-a149-dbfc568951cc","9/8/2023, 3:08:34.483 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",false,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 4:45:45.619 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--998f5603-ee14-4ca8-a393-68a8de04cd0f","9/8/2023, 3:08:24.883 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",false,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 4:52:23.054 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--998f5603-ee14-4ca8-a393-68a8de04cd0f","9/8/2023, 3:08:24.883 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",false,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 5:36:38.010 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--9f3dcc51-29c6-4181-98a3-28b9c39eb02a","9/8/2023, 9:08:23.707 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",false,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/9/2023, 11:45:23.429 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--4261dfe6-0916-4337-8ad3-b515cc61f232","9/10/2023, 11:45:08.831 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/9/2023, 11:45:23.440 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c45a51de-1ed9-4f6f-900e-bbbeab678cd1","9/10/2023, 11:45:09.316 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/9/2023, 11:45:29.337 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--387ffa39-6350-4c28-88cf-2c26f3b7af6e","9/10/2023, 11:45:18.367 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/9/2023, 11:45:38.542 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--631ff8f1-60a3-47da-8988-e76369ed3091","9/10/2023, 11:45:28.777 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/9/2023, 11:45:38.632 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--e18e1ed4-2985-4c2b-b767-29a63ca6dd95","9/10/2023, 11:45:29.308 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/12/2023, 11:45:23.111 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c14a74be-53e2-4edf-98a2-b303c6a1034b","9/13/2023, 11:45:08.991 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/12/2023, 11:45:23.311 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--58d16d22-7ad7-4ba3-8188-d99a8ee60738","9/13/2023, 11:45:12.052 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/12/2023, 11:45:29.360 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--f6dff631-1ca9-41d6-87f9-91a12154d783","9/13/2023, 11:45:13.674 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/12/2023, 11:45:29.429 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--9ccf92ba-e9f0-49cd-ab8c-7213e35b66d0","9/13/2023, 11:45:13.454 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/12/2023, 11:52:28.875 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--28a1d0a1-6b87-47e4-b57c-23cdea373657","9/13/2023, 11:45:31.556 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","8/29/2023, 11:45:41.968 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ec0c90c3-5210-41ad-9937-a4ab7f0358e3","8/30/2023, 11:45:22.249 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","8/29/2023, 11:45:42.527 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--63756c29-fb16-41a4-b0b2-03cec7e4b378","8/30/2023, 11:45:21.359 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""5 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692247301339,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","8/28/2023, 11:45:37.436 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--0868128c-2a51-4514-880c-a207eee6a4c0","8/29/2023, 11:45:14.917 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""6 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686567620800,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","8/28/2023, 11:45:43.068 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--f8f7a1ae-0690-4423-a1f1-8f9ecdd02db6","8/29/2023, 11:45:18.632 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""15 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""3 sightings on 1 source: DHS Automated Indicator Sharing. 3 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","8/28/2023, 11:46:02.129 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--24da7ca1-a933-4fa0-8398-c5f0132f7d69","8/29/2023, 11:45:38.488 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","8/28/2023, 11:46:07.552 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--15ab8d31-a93c-496b-b42c-4147bed2cd0a","8/29/2023, 11:45:39.066 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""5 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692247301339,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","8/28/2023, 11:46:27.026 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--10edc673-06e7-4d0b-98cd-a35f7d1e3263","8/29/2023, 11:45:57.423 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/3/2023, 11:45:27.878 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--6358278c-c011-415a-ac3e-03e221a4ace4","9/4/2023, 11:45:10.522 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/3/2023, 11:45:37.217 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--8fd4a260-daa2-4b68-bfac-ab3162115b2c","9/4/2023, 11:45:14.702 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686567620800,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/3/2023, 11:45:37.985 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c7c7adce-adfd-4a40-94b3-ef2e4a169ff3","9/4/2023, 11:45:19.364 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/3/2023, 11:45:48.337 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--b88e4053-823e-4463-91e7-c0aea8ae6faf","9/4/2023, 11:45:23.037 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/3/2023, 11:55:17.716 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--738a44c8-32d0-48b0-846f-72a4645baa41","9/4/2023, 11:45:43.912 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/2/2023, 11:45:24.198 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--412cbdf0-aebe-481a-8b0d-286c2c003b72","9/3/2023, 11:45:05.037 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/2/2023, 11:45:43.032 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--12b028ed-6c81-41c3-a54e-54a2be90a55e","9/3/2023, 11:45:18.225 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""15 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/2/2023, 11:45:43.213 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--94738acc-835b-487b-bac1-2b772beee4ce","9/3/2023, 11:45:16.655 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""6 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686567620800,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/2/2023, 11:45:52.591 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--7d20f173-9409-46dd-8561-d60690fd5ab8","9/3/2023, 11:45:28.993 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/2/2023, 11:54:32.675 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--df8b460f-76ff-4c03-8f4e-d310bee4317e","9/3/2023, 11:45:22.754 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/10/2023, 11:45:23.478 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--78b17a6e-8fa5-437c-b4b7-349e7e3b087d","9/11/2023, 11:45:10.277 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/10/2023, 11:45:23.497 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--6898f7ac-cbf9-4171-b3e7-ba151c8847a9","9/11/2023, 11:45:08.739 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/10/2023, 11:45:27.936 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--fd92c253-be9e-497f-b338-2d658183fb19","9/11/2023, 11:45:16.411 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/10/2023, 11:45:33.000 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--5866a8d3-f7ae-44c8-a5b2-d153858cbb36","9/11/2023, 11:45:20.766 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/10/2023, 11:50:52.961 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--97854d8b-740e-4967-ad97-7b986c6013dc","9/11/2023, 11:45:34.094 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 5:08:16.520 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ff37d457-2854-400a-8714-9a8267fb8a46","9/16/2023, 7:08:05.445 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 5:08:16.662 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d66e2735-d1cd-494d-a2d4-a85dce35534c","9/16/2023, 7:08:02.698 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 5:08:20.262 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a44744ac-4897-4ed9-b40b-4c66c5a20878","9/16/2023, 7:08:06.893 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 5:08:40.791 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--109eec66-ecfa-4d69-a2f2-fa3d4c762c3c","9/16/2023, 7:08:20.352 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 5:08:40.829 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--0fba9232-ad9d-486a-b5a2-a56836d84f95","9/16/2023, 7:08:20.962 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 7:08:16.245 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--6d705784-3b3e-46cc-a70e-7df5c4c1d987","9/16/2023, 9:07:59.956 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""2 sightings on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 7:08:30.740 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--bc29b080-b595-47ca-82d0-25541dbadac0","9/16/2023, 9:08:04.454 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 7:08:35.419 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--13b867c2-5207-4f96-b411-413249c28ef5","9/16/2023, 9:08:18.706 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 7:08:35.474 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--39a10dc3-b6ef-4fee-a11b-723d3654da97","9/16/2023, 9:08:17.589 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 7:08:40.382 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--1821e8b5-abd8-4ac3-b702-6683fb5f7a3d","9/16/2023, 9:08:20.662 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 9:08:26.286 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--44a0a44d-2d5f-42f9-be34-3392ed8144d9","9/16/2023, 11:08:02.329 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 9:08:27.816 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--03c584f0-2907-43a6-a769-79e100f3b58a","9/16/2023, 11:08:04.683 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 9:08:40.795 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--699c5359-49cd-4219-86c4-e15251e1ce42","9/16/2023, 11:08:13.671 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 9:09:04.429 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--03c584f0-2907-43a6-a769-79e100f3b58a","9/16/2023, 11:08:04.683 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 9:09:04.682 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--59868f1c-a303-44a2-835e-c5d740520c90","9/16/2023, 11:08:23.132 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""2 sightings on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 9:11:55.839 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--0adba859-888c-403e-bbdc-eea31a2ffde0","9/16/2023, 11:08:21.932 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 11:08:10.644 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--906fde2e-8dd5-4f23-b4e4-172aa993f45f","9/16/2023, 1:08:01.438 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 11:08:19.652 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a4f3d3f1-af5d-4513-8492-ec35645c5def","9/16/2023, 1:08:06.577 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 11:08:20.225 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--0d42fd59-e35d-47b9-883c-fe649f8ed123","9/16/2023, 1:08:04.459 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 11:08:29.693 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c067aac1-a604-4de2-9c50-25d894ae5c4c","9/16/2023, 1:08:22.560 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 11:08:29.729 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d6fcbf4b-3556-495c-aa88-0acd255044c9","9/16/2023, 1:08:23.485 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""2 sightings on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 11:45:37.196 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--7bee95cd-e324-486b-9117-41300f09b262","9/17/2023, 11:45:16.023 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 11:45:37.208 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--63ee3a9d-3cf4-4d2e-b22b-1271449e2cc5","9/17/2023, 11:45:16.688 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 11:45:43.048 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a9c78653-9487-4d89-8b67-608928bd917a","9/17/2023, 11:45:20.556 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 11:45:53.978 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--2af1d1cb-e7ad-4b16-b468-73907fcb06a1","9/17/2023, 11:45:33.575 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 11:55:38.461 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--826f2365-1d60-4766-a0d9-6e23d71eaa54","9/17/2023, 11:45:33.976 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""2 sightings on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 1:08:17.104 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d0726261-7e12-4661-87d5-97a065b37617","9/16/2023, 3:08:01.999 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""2 sightings on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 1:08:21.903 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c7223660-e7c4-4c5a-9cec-41f6906bce77","9/16/2023, 3:08:05.946 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 1:08:29.869 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--59e7a941-8779-46b6-8d36-73e6242c86c6","9/16/2023, 3:08:03.342 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 1:08:34.944 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a074809f-57d3-4fa9-87da-f04486d3d526","9/16/2023, 3:08:20.134 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 1:11:40.681 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--727a3fe8-a151-4d2a-9f92-6fc8385c3d30","9/16/2023, 3:08:21.447 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 3:08:36.163 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--98ed521f-2599-4319-a58d-cc8817ad062c","9/16/2023, 5:08:06.299 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 3:08:55.209 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d36c6237-6b5c-4ad0-a0f2-9a3ec3fcc650","9/16/2023, 5:08:19.031 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 3:08:55.281 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--4b1341aa-5506-432a-83f2-b48c4e993deb","9/16/2023, 5:08:13.460 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 3:08:55.845 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--08e671c6-7a05-4105-a128-d4e846b62f51","9/16/2023, 5:08:19.423 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""2 sightings on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 3:09:15.273 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--7cca7d95-1898-4218-bc97-76303a8fb6ba","9/16/2023, 5:08:03.586 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 5:08:45.411 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--8d25369a-bb6e-4aa5-8813-537080fd7352","9/16/2023, 7:08:31.163 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 5:08:45.930 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--897a8a7b-633c-424a-8ce3-7c688ce0e856","9/16/2023, 7:08:29.020 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""2 sightings on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 5:08:46.115 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a2c0b170-6f99-4a25-8be5-1c3f493833d9","9/16/2023, 7:08:33.693 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 5:08:51.001 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--afd13915-4eb8-4189-abd2-185f9bf9a3ef","9/16/2023, 7:08:40.153 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 5:08:57.308 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--9aaf0a9d-5446-495d-87af-bfe2efea5607","9/16/2023, 7:08:46.873 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 7:08:15.679 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--e5d6fd74-72aa-4d81-ac96-f0b2364fa269","9/16/2023, 9:08:02.306 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""2 sightings on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 7:08:15.728 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a8285ac3-8d43-4f0b-87d6-ab91004b8170","9/16/2023, 9:08:02.951 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 7:08:20.923 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--85a0d062-0628-4adc-b045-502c55ac2eb2","9/16/2023, 9:08:06.498 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 7:08:26.010 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--7e3f2d34-e666-4651-a1ff-271f4b4e8d1e","9/16/2023, 9:08:17.134 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 7:11:51.585 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--e24c92d2-1a46-4671-b92d-01d73c473131","9/16/2023, 9:08:19.447 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 9:08:06.301 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--997a6852-d265-4f58-8ac9-bd7e72c67650","9/16/2023, 11:08:00.790 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 9:08:15.179 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ea2d23e3-9fd3-47c6-b3ae-76878b72b662","9/16/2023, 11:08:06.415 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 9:08:20.340 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--7a19aeae-c52f-4c7c-8031-b106532d6f4d","9/16/2023, 11:08:14.842 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 9:08:35.380 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c884a120-d72c-4535-9f15-713bd1aa6efd","9/16/2023, 11:08:21.187 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 9:11:55.876 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--dff53a65-93d4-498c-a057-ac5afce09b0f","9/16/2023, 11:08:25.567 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""2 sightings on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 11:08:57.493 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--08478444-8d5f-4208-ab3a-0cb12a9bf07f","9/17/2023, 1:08:21.134 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""2 sightings on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 11:08:57.848 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--17532b11-4f26-4be0-b622-41a03297a1ae","9/17/2023, 1:08:17.661 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 11:09:00.585 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--32ef9451-0210-40f2-a336-9e583337e35c","9/17/2023, 1:08:24.505 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 11:09:01.148 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--b96eec3a-fd4d-48b5-8619-b62e35c4dcc1","9/17/2023, 1:08:27.086 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 11:11:55.839 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--f997ee53-0055-4c99-b29a-a6921e60556e","9/17/2023, 1:08:44.756 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 1:08:25.848 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--f9bea367-1bc8-4a84-8bdf-f24cbddd16fe","9/17/2023, 3:08:00.851 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 1:08:30.675 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--e537e690-c403-4ebe-b10f-d30bdd2247b4","9/17/2023, 3:08:05.079 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 1:08:30.713 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--8185af3e-567f-44e0-9603-b63bbe63ba36","9/17/2023, 3:08:06.418 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 1:08:30.828 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--48eb7bd8-aa44-4497-ae29-10ee8d440906","9/17/2023, 3:08:04.273 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""2 sightings on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 1:08:35.297 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--070780e3-46d5-46da-917f-ac70c12c1b15","9/17/2023, 3:08:10.720 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 9:08:35.586 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d7129dd9-0689-4c04-ba37-d540e791ccd5","9/17/2023, 11:08:01.975 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 9:08:40.989 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--4a88d374-5fab-49ac-814c-ab2512d8b84d","9/17/2023, 11:08:07.936 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 9:08:41.511 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--36292b9b-c990-487b-a248-2e48bd931bfb","9/17/2023, 11:08:07.372 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""2 sightings on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 9:08:41.547 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--fc6279d4-dff0-4df3-9284-898c7fcd9c7d","9/17/2023, 11:08:10.318 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 9:12:40.441 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--4481d3fb-6a10-4be8-ac2b-42890a41b69a","9/17/2023, 11:08:22.480 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 3:08:07.579 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--bcce22b5-8ab9-424b-bfef-5adf76382b70","9/17/2023, 5:08:01.745 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 3:08:15.503 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--0b3a3374-7c53-4b8c-9c4f-8df4148cf300","9/17/2023, 5:08:07.758 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 3:08:15.644 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--598dcf10-d6c7-45aa-bd16-86a0e2ed6832","9/17/2023, 5:08:11.090 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 3:08:35.369 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--b2dddac7-f103-4c30-851e-0225df291ffd","9/17/2023, 5:08:20.660 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 3:12:05.942 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--e23a5030-d8ad-4a42-b646-d492a6ba63ea","9/17/2023, 5:08:22.051 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""2 sightings on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:08:36.298 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--f4401aea-1513-4c1a-99f9-b1874dbe04e1","9/17/2023, 7:08:01.575 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:08:36.409 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ee25b9c8-82a1-4107-95cf-5b55eec45776","9/17/2023, 7:08:05.377 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""2 sightings on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:08:40.142 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--badadd53-3070-4dfa-a2d2-7b7ea3429c5f","9/17/2023, 7:08:07.018 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:08:41.052 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--08c73732-370a-424b-8392-6e0d042a7320","9/17/2023, 7:08:11.273 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:08:41.494 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--1facf7ea-f39d-48a2-8c6d-39a6cd48cd5e","9/17/2023, 7:08:11.324 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 7:08:06.234 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--e7ef1ec4-a850-4328-8e64-adffc33022bb","9/17/2023, 9:08:00.585 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 7:08:16.958 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--5cd83102-6753-4289-b53f-70b995380a66","9/17/2023, 9:08:09.944 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""2 sightings on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 7:08:16.992 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--9d78a97e-2e6a-4f37-a71b-e5dcdfd490f4","9/17/2023, 9:08:11.119 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 7:08:17.311 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--3e9cc5e7-00a4-4b2a-a380-23ccf91e2668","9/17/2023, 9:08:12.549 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 7:08:20.245 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--5f745c58-1d64-4c4f-8e22-c049e331fee3","9/17/2023, 9:08:16.700 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 9:08:36.170 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--35d737ee-1de6-4034-8718-cd62c309db75","9/17/2023, 11:08:02.032 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 9:08:37.322 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--1067229f-47b0-4887-a27a-8d9baa9ff186","9/17/2023, 11:08:05.549 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""2 sightings on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 9:08:37.329 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d0188ac3-f91b-4bc9-9eeb-9bb49d62b281","9/17/2023, 11:08:06.069 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 9:08:40.334 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--1232506b-88b5-4f29-97eb-e60e7b4e9134","9/17/2023, 11:08:06.328 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 9:12:15.955 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ea47ae45-35e5-4483-8c6c-f7930b193276","9/17/2023, 11:08:22.608 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 11:08:36.267 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--71ca8c34-1a88-43f4-afbb-07b2d243d4c3","9/17/2023, 1:08:01.478 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""2 sightings on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 11:08:36.889 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--09b5431e-c66f-491e-be3e-5d1dc3b6f770","9/17/2023, 1:08:02.926 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 11:08:40.220 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--98c9ac66-bdac-442a-be90-586e48035f2a","9/17/2023, 1:08:07.351 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 11:08:46.766 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--71b78f26-a7a4-46c0-9a90-ade983fb8f48","9/17/2023, 1:08:35.274 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 11:08:46.771 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--85349c40-f695-4c2b-9841-2e330dbf0844","9/17/2023, 1:08:35.562 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 11:45:24.219 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--bfd19ab5-ce7c-4019-a7f1-464ea242bdd8","9/18/2023, 11:45:12.365 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""2 sightings on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 11:45:24.235 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--8bf0e8c8-29d5-443b-bb75-29f9ee18ae55","9/18/2023, 11:45:13.112 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 11:45:25.649 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--121b12c6-2c66-42cc-86bd-465615ff4e36","9/18/2023, 11:45:21.105 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 11:45:53.432 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--26877643-d7ae-4e6d-b393-bfad90b4bb23","9/18/2023, 11:45:38.254 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 11:45:53.442 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--bfb652dc-8be0-4d91-bf14-08633386ef9b","9/18/2023, 11:45:38.809 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 1:08:41.234 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--4cc646c9-8183-4d55-86b0-f29a12a8f496","9/17/2023, 3:08:35.800 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""2 sightings on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 1:08:46.535 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--7ccfa0f1-a6e8-4d00-93f1-88815300b82d","9/17/2023, 3:08:36.445 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 1:08:47.458 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--9e4c6bf6-addf-4287-97d1-e19d06f1b43d","9/17/2023, 3:08:30.511 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 1:09:05.771 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ee8091bf-e01f-4bef-9e9e-fec7e6019d74","9/17/2023, 3:08:50.607 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 1:09:05.801 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--7242417d-6608-4474-b71a-3c99beab08f5","9/17/2023, 3:08:50.939 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 3:08:19.772 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--409aa10d-03e2-40bf-875f-5a4e9d7bd113","9/17/2023, 5:08:07.201 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 3:08:19.971 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d3ad68b8-e403-4713-bfc4-70abb564be53","9/17/2023, 5:08:10.259 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 3:08:20.110 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a081028f-c1c5-4501-aff2-2f958f790879","9/17/2023, 5:08:09.690 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 3:08:25.303 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--52c77e79-7dc5-4f4e-a6d7-4c141d5c58b6","9/17/2023, 5:08:05.871 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""2 sightings on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 3:08:42.407 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--14202087-0bbc-4279-8d5d-88ab05357a55","9/17/2023, 5:08:39.313 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:08:26.230 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--90a46bf7-7013-4cc0-8086-7e852e3e1775","9/17/2023, 7:08:03.439 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:08:27.295 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--6367c5b9-685b-42d7-a293-59c3a542a1c3","9/17/2023, 7:08:05.759 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""2 sightings on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:08:27.326 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--aa7edb1d-62c9-4cd4-87e2-ff980b662861","9/17/2023, 7:08:07.388 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:08:31.364 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--298df983-0ee0-4b7e-b906-58d8d54c0f05","9/17/2023, 7:08:10.503 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 5:08:36.173 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--e9119bb6-c2a2-438c-8140-c23a0d0d7a29","9/17/2023, 7:08:23.782 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 7:08:35.065 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--188e383b-15ec-45bb-8d31-60f3295933e2","9/17/2023, 9:08:02.800 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 7:08:36.012 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--74124284-ae35-4d11-b116-a5a3deef6a26","9/17/2023, 9:08:04.869 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""2 sightings on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 7:08:41.400 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--b9d17e02-4f48-4d1e-b4b6-00f67e98f32f","9/17/2023, 9:08:09.742 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 7:08:46.322 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--3d964976-8313-49c3-bfca-b6e34a9af11f","9/17/2023, 9:08:06.146 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 7:08:50.966 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a34c0b9d-aa2a-4ea3-a167-27b7ddde58ee","9/17/2023, 9:08:23.502 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 3:20:22.800 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d97bf35c-4199-4659-b645-6c83505238bc","9/8/2023, 1:07:47.630 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",false,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 3:30:14.409 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d97bf35c-4199-4659-b645-6c83505238bc","9/8/2023, 1:07:47.630 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",false,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 4:19:53.646 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--3b6701a1-11f4-4b79-83cb-08a09c9c2903","9/8/2023, 5:07:34.020 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 4:22:56.327 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--9ac70d21-1550-4280-ad30-95d3e4deaa91","9/8/2023, 1:07:23.608 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",false,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 4:40:36.304 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--38de68d2-f8bf-47cf-a96c-ad5264907c0c","9/8/2023, 3:07:24.670 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",false,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 5:07:45.743 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--bd6a74ea-372a-4860-a816-18316991a719","9/8/2023, 7:07:27.174 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 5:48:50.978 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a8b90276-de99-414f-a153-2f9a4f8969c2","9/8/2023, 7:07:23.803 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 5:48:54.517 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ce9c9b42-e010-459f-b642-b683eabad8b2","9/8/2023, 7:07:33.497 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 6:19:39.684 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--485767f0-2ea1-4a9f-99c2-38abca126ac9","9/8/2023, 5:07:54.870 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",false,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 11:45:23.313 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--893441bd-2394-42f3-90f5-c3ed88d7d7f5","9/9/2023, 11:45:10.229 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 11:45:23.326 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c0559336-987b-4453-ac12-7a850df5763b","9/9/2023, 11:45:10.669 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 11:45:23.522 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--307935bd-059a-4669-8ad9-8dc6e8085d9a","9/9/2023, 11:45:07.493 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 11:51:56.298 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--bd6a74ea-372a-4860-a816-18316991a719","9/8/2023, 7:07:27.174 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",false,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 11:55:08.970 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--eb787288-43c3-4eda-a1e8-df49612485ad","9/8/2023, 9:08:09.648 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",false,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 12:11:47.637 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--bd6a74ea-372a-4860-a816-18316991a719","9/8/2023, 7:07:27.174 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",false,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 12:47:20.542 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c8de5703-7eda-4d5f-a24e-111e86ac431b","9/8/2023, 7:07:47.674 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",false,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 12:47:23.454 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--19e7dad9-3189-4451-9717-aaaf1d282318","9/8/2023, 5:07:35.634 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",false,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 12:49:50.401 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--21c84f7e-5f6b-489a-98c2-8a99300f23a4","9/9/2023, 11:45:33.294 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 12:49:50.408 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c354b7eb-3858-47f5-a3b9-be838d542abc","9/9/2023, 11:45:33.396 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 1:05:34.596 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--57599bcf-de5a-410f-b557-6af559f4ec3e","9/8/2023, 7:07:26.377 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",false,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 1:08:35.381 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--6de6cf19-6932-4519-916b-8d70bc0944c3","9/8/2023, 3:08:12.263 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 1:08:45.996 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--528070cb-73c8-4a59-b1b0-9283368e4e1c","9/8/2023, 3:08:24.642 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 1:08:51.791 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--1094883a-d708-49b8-821e-05faa7414ce4","9/8/2023, 3:08:37.003 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 1:14:24.123 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--eaeda867-9870-43fc-8380-50a2248f9f04","9/8/2023, 11:08:40.439 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",false,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 1:08:15.179 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--9a4a9b27-09f9-4c7f-9758-f5f0a9c058d5","9/19/2023, 3:08:08.717 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""23 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""4 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 1:08:20.943 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--1b0371f0-59c6-435f-99f1-8518770fa8a2","9/19/2023, 3:08:15.581 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 1:08:25.510 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--7d11115d-7898-49dc-a65d-d6a5d14d22ca","9/19/2023, 3:08:19.687 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky SecureList and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 1:08:25.531 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--61688cb7-a2cf-42d4-99a8-9f9aaaa587dd","9/19/2023, 3:08:21.024 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 1:08:25.533 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--e7bf2a06-e4e2-413d-bdeb-77586bce43b3","9/19/2023, 3:08:20.566 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 3:08:36.239 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ba253edc-5380-4c00-ab4a-8558ca6146bf","9/19/2023, 5:08:10.495 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 3:08:38.347 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--6b79df96-91c5-4223-94c9-6e41f6eef288","9/19/2023, 5:08:13.182 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""23 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""4 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 3:08:41.406 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--03ba2c8a-89ec-441f-9416-f07bf1346b4b","9/19/2023, 5:08:16.061 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 3:08:45.961 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--00680bc3-14a3-4c19-8eed-1a32767c0c97","9/19/2023, 5:08:19.989 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky SecureList and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 3:08:52.202 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--92a77d8a-4c1b-48d1-b206-dbf03a8f7a6f","9/19/2023, 5:08:34.822 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:09:05.604 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--f03683b6-47eb-4a46-a8bd-ccdd40e154e8","9/19/2023, 7:08:33.350 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:09:10.669 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--2e76d0aa-6b03-4659-bb92-04af0a487c7d","9/19/2023, 7:08:38.932 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:09:10.676 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ba69d238-66eb-4a55-afef-6ceae0622f7b","9/19/2023, 7:08:39.563 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""23 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""4 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:09:20.180 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--2d38d324-f505-492f-8cce-96870835641a","9/19/2023, 7:08:55.410 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky SecureList and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:09:20.182 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--51066a4f-70ef-4eda-8b69-a0e622a4fa2e","9/19/2023, 7:08:55.494 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 7:08:36.776 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--28717638-9236-47cb-8e06-d154051d563e","9/19/2023, 9:08:09.407 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 7:08:40.898 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--2b8f213a-29c4-4cda-b0a5-8ac99fdf4e21","9/19/2023, 9:08:18.151 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 7:08:46.603 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--0556b49b-abb7-4c39-960f-7bb223a03db3","9/19/2023, 9:08:20.250 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""23 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""4 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 7:08:46.661 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--872c8ff8-a3a6-4159-9246-992c9cef1b1c","9/19/2023, 9:08:21.169 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky SecureList and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 7:08:50.566 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--1c5c94e0-90be-4a90-8f79-16f14f2f90c4","9/19/2023, 9:08:37.495 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 9:08:40.743 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--57399e5a-3c22-4cc5-87c0-c575f651b5bd","9/19/2023, 11:08:13.862 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""23 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""4 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 9:08:40.888 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--80fa883a-bdda-4f54-9d5c-5026c0390711","9/19/2023, 11:08:15.382 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 9:08:41.564 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d3e9bae4-49e9-4e49-9d71-06d565e336e0","9/19/2023, 11:08:15.784 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky SecureList and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 9:08:46.639 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--9d842811-d837-4c85-ae4a-bc89dcd4dc6d","9/19/2023, 11:08:22.866 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 9:08:50.379 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--dadf21bf-e72b-49b2-814d-1f7f1419394d","9/19/2023, 11:08:35.684 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 11:08:41.128 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--7db90c38-ec58-4bdf-83db-bbec46c10e62","9/19/2023, 1:08:18.444 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""23 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""4 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 11:08:41.344 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--1ff50fc0-ea5b-445f-a893-a54ebe80ab04","9/19/2023, 1:08:15.802 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 11:08:41.476 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--b5783b25-6d44-4a70-ac52-b2b6c5bdc8d2","9/19/2023, 1:08:10.659 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 11:08:45.408 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--62d30968-0058-4c4b-a90b-3d92202be982","9/19/2023, 1:08:24.026 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 11:08:51.316 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--fccc65c0-3b0a-4ff7-9759-6350d78f163d","9/19/2023, 1:08:38.065 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky SecureList and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 11:45:22.928 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--36cb0776-e25f-491a-a527-4a71dcd4fb34","9/20/2023, 11:45:12.794 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 11:45:28.888 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a390bb63-9970-4192-8c5d-0a3e6ecef4db","9/20/2023, 11:45:16.092 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 11:45:33.474 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--0095ce90-8fe1-4bc0-802e-dc6fec766e39","9/20/2023, 11:45:17.919 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""23 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""4 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 11:45:37.588 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ef564bc2-bea6-4e61-983d-d5245444af8a","9/20/2023, 11:45:23.584 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 11:52:27.281 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--8b11e8e9-f36d-47d4-b355-35ccdc23bf77","9/20/2023, 11:45:41.059 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky SecureList and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 1:08:25.975 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--9dbd1490-67ce-4cc6-a513-c567f010ed21","9/19/2023, 3:08:15.447 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 1:08:26.171 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--718fd6df-79e3-4e20-8c1a-2f481a03ef91","9/19/2023, 3:08:18.166 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""23 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""4 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 1:08:30.485 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--566e100a-ab35-441e-911a-cf7cf7d2b5a1","9/19/2023, 3:08:20.580 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 1:08:30.544 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--635c9d35-c499-4c77-953c-d5f588430a95","9/19/2023, 3:08:19.781 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 1:08:40.980 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--5e162abe-0369-4ff8-91a2-d29baa640ed5","9/19/2023, 3:08:34.474 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky SecureList and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 3:08:15.321 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--bd0e9361-c575-44dd-9ba5-b043ef4fb8e3","9/19/2023, 5:08:09.365 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 3:08:20.535 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--f2971233-3546-480d-836e-97bdd054bdbf","9/19/2023, 5:08:16.432 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 3:08:20.722 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--aeb0307f-2262-43cd-b953-506257e8fa34","9/19/2023, 5:08:14.541 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""23 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""4 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 3:08:26.372 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--7cf3f7b1-529c-4a3c-b34e-a6e58f90f282","9/19/2023, 5:08:18.928 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky SecureList and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 3:08:26.787 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--99dee17f-4834-4795-a747-b9434eca68bd","9/19/2023, 5:08:22.196 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:08:20.763 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c5fbfd91-2c54-4602-bfd2-730abe3b5ac6","9/19/2023, 7:08:13.031 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""23 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""4 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:08:24.757 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--bf3eec45-7676-4a5a-86bc-973d86b0ed45","9/19/2023, 7:08:18.363 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:08:30.567 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c2c6ad4a-fdc3-4951-bbb8-2ff9b2833afa","9/19/2023, 7:08:25.054 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:08:30.988 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--3fec7701-4ab7-465d-8141-2849db6d2111","9/19/2023, 7:08:24.379 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky SecureList and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 5:09:05.682 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--6b2dc331-8cc9-4b55-9ec9-ee2e241ec263","9/19/2023, 7:08:55.118 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 7:09:06.058 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--463ff200-f6f0-421b-b2da-c07a4ec324b1","9/19/2023, 9:08:49.499 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 7:09:06.068 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--419764c2-0f94-4ef2-a9be-c1f1aa493d45","9/19/2023, 9:08:54.043 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""23 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""4 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 7:09:10.598 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--327f416c-7445-42b6-b9c2-0fd61da74fb0","9/19/2023, 9:08:56.907 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 7:09:20.449 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--5cf3c360-59bf-46ea-a991-887fb929b62e","9/19/2023, 9:09:11.129 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/19/2023, 7:09:20.478 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--f696f5f5-bc62-4e07-b94f-de74c5c71b06","9/19/2023, 9:09:12.400 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky SecureList and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 11:08:55.415 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--6125e71d-3fdb-4b7f-80bf-11331196cb27","9/18/2023, 1:08:47.576 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""2 sightings on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 11:08:55.648 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a2afc016-243c-481c-8b4a-4542d6b55e13","9/18/2023, 1:08:49.816 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 11:09:00.191 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c652a2e5-809d-461a-b5c6-1e9276a40133","9/18/2023, 1:08:57.617 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 11:09:00.647 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--69a3df96-fb49-4967-9eff-35e808f23fd8","9/18/2023, 1:08:55.257 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 11:12:46.885 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--1f5ac907-6b5b-4a1e-bdc5-72ab7f1215c1","9/18/2023, 1:09:11.665 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 1:08:35.987 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--8b8e460c-65ce-4808-89d7-b5e0211a0113","9/18/2023, 3:08:02.505 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""2 sightings on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 1:08:41.888 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--f4e75b7f-8f4c-455f-9410-b67a48e311f4","9/18/2023, 3:08:06.706 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 1:08:41.909 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--717aaf2a-82c4-49bf-94d3-1f3a6f4d2ad5","9/18/2023, 3:08:07.917 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 1:08:49.888 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--04304128-6380-4c4d-9d9a-a60f7f21e2b7","9/18/2023, 3:08:25.105 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 1:12:50.233 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--6bc73687-7476-4854-9aeb-488133b95f58","9/18/2023, 3:08:27.032 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 3:09:05.063 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--98fddd53-14ec-40c6-ad04-37df97e63876","9/18/2023, 5:08:31.809 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 3:09:11.147 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--e0625903-457c-4d30-b458-4e469c6fc37c","9/18/2023, 5:08:33.957 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""2 sightings on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 3:09:11.279 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--0fc01585-6c9b-4958-b72c-5c03c54101f5","9/18/2023, 5:08:35.473 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 3:09:11.295 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--65e11d53-4145-4019-8d65-1aa72d149883","9/18/2023, 5:08:35.616 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 3:09:20.763 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--b6df2215-cbf1-40ac-9692-4bca5deae4c5","9/18/2023, 5:08:53.266 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 5:08:15.270 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c248c920-4e53-4c4e-8fb5-65f2d97394fa","9/18/2023, 7:08:09.559 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 5:08:15.302 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--434e98e9-e122-49b1-9986-c67b98fe9af1","9/18/2023, 7:08:10.440 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""23 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""4 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 5:08:20.449 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--9ed65827-850b-48fc-8de2-77a6ebe16ef0","9/18/2023, 7:08:14.204 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 5:08:25.796 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--624453e4-2568-459e-b3ad-ea600b37942e","9/18/2023, 7:08:17.427 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 5:13:00.073 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--289c3733-9077-4623-96a1-7d2286057307","9/18/2023, 7:08:42.576 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 7:08:12.301 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--87e33f12-1e66-43d1-9296-dd504e9df042","9/18/2023, 9:08:06.495 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""23 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""4 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 7:08:15.793 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--199260bc-b896-47a0-9951-676bb9a84a71","9/18/2023, 9:08:06.847 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 7:08:17.047 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--082d0f96-6a35-41e0-8aac-3ce43d2e1235","9/18/2023, 9:08:13.273 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky SecureList and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 7:08:21.052 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--98623e0b-689f-4468-97a6-4fd736f5a7a8","9/18/2023, 9:08:14.702 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 7:08:21.421 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--e19c0cc1-fb76-453b-b294-6d10a170304a","9/18/2023, 9:08:15.250 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 9:09:20.321 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--01f2ff3e-dac8-4169-926d-ab826694abb5","9/18/2023, 11:08:46.313 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 9:09:20.826 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--27067593-4e58-4a26-b372-4ce3b2f60e39","9/18/2023, 11:08:50.838 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""23 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""4 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 9:09:26.136 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c7192309-901a-4145-81f0-ed94f187cd31","9/18/2023, 11:08:56.156 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 9:09:26.804 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--4accdeb3-e09b-42ec-ab89-9fb1e4fea36f","9/18/2023, 11:08:55.148 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky SecureList and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 9:09:36.625 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--01f6ac4e-cb34-4e13-86e4-8d8143f58b7f","9/18/2023, 11:09:12.415 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 11:08:36.307 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ccf9ca0b-b745-4310-ade2-b0f58a9773c4","9/18/2023, 1:08:04.963 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""23 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""4 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 11:08:36.316 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--2ccac31b-ff38-4e2b-9bdb-f9723c1f3dbc","9/18/2023, 1:08:08.741 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 11:08:41.648 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--37432d7a-4a67-4598-8c90-b314fcbebf7c","9/18/2023, 1:08:13.452 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 11:08:42.151 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--8949fcd9-890e-4ada-ae05-2bd62c170f7b","9/18/2023, 1:08:17.819 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 11:08:51.483 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d5c08de1-0ca2-42bd-a89a-554af0fc5210","9/18/2023, 1:08:32.869 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky SecureList and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 11:45:23.421 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--0485d0bc-d077-4249-b00f-5dbbfd7f97af","9/19/2023, 11:45:10.113 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""23 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""4 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 11:45:28.157 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--31a65f3f-19a3-420e-aa42-1de74570eed3","9/19/2023, 11:45:13.472 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 11:45:28.319 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--591ce82e-ed1b-45dd-a285-387646c93e95","9/19/2023, 11:45:17.485 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 11:45:37.880 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--1ec22163-07f8-47a3-8ed2-5aa24256dd9c","9/19/2023, 11:45:27.425 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 11:45:57.907 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--21ab12b4-3d26-44ca-93b2-cf748eebbced","9/19/2023, 11:45:39.868 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky SecureList and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 1:08:37.761 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--31a560b5-66b6-4ae1-9ee6-bbf40e14bc14","9/18/2023, 3:08:07.828 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""23 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""4 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 1:08:45.586 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d82ef420-e25a-40e7-b1d7-b20e434401d3","9/18/2023, 3:08:13.237 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 1:08:45.613 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--94034a97-d2ec-42d8-b19a-63db7a662aff","9/18/2023, 3:08:15.059 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky SecureList and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 1:08:45.776 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--6cd1e3c7-4bd6-4ab5-adc1-7f9d94defb3e","9/18/2023, 3:08:16.582 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 1:08:45.801 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--1804dd37-01f0-429e-a767-b6d0b0b40fae","9/18/2023, 3:08:18.326 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 3:08:15.423 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--3d81534b-9b08-45c2-91c6-02f7aa52d083","9/18/2023, 5:08:12.039 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""23 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""4 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 3:08:20.539 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--dc83bec0-2ecd-4c72-bde2-3976d9217208","9/18/2023, 5:08:12.598 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 3:08:20.936 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--e40b6c74-5a2f-4f8c-b166-2649ae22ab78","9/18/2023, 5:08:17.391 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky SecureList and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 3:08:35.796 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--fff85ee7-bfd2-456f-af24-53aaa3112023","9/18/2023, 5:08:28.851 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 3:08:44.609 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--644c2254-5beb-4dc3-ac1a-ae278ff24a42","9/18/2023, 5:08:39.170 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 5:08:37.228 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--570785f6-8027-487a-86aa-d30d5c9abcbc","9/18/2023, 7:08:06.756 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""23 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""4 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 5:08:37.279 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--aa0e13a7-4484-4dfd-910d-bdf63d546490","9/18/2023, 7:08:13.005 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 5:08:42.908 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--b96d7668-c57a-4752-be78-19af05cdb53b","9/18/2023, 7:08:17.654 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky SecureList and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 5:08:45.777 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--17361014-20be-466f-8232-c67445d912a3","9/18/2023, 7:08:22.006 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 5:08:50.696 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--2cc782fd-2321-47de-b7ea-e887a44633f2","9/18/2023, 7:08:45.150 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 5:15:30.273 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--570785f6-8027-487a-86aa-d30d5c9abcbc","9/18/2023, 7:08:06.756 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""23 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""4 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 5:19:35.651 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--570785f6-8027-487a-86aa-d30d5c9abcbc","9/18/2023, 7:08:06.756 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""23 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""4 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 7:08:35.808 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--85b308bb-d1cd-4364-8b0a-cf79f08a1c8f","9/18/2023, 9:08:10.227 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""23 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""4 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 7:08:35.840 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--8559901e-538e-4759-bda3-aa0a4bd62a52","9/18/2023, 9:08:11.187 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 7:08:42.371 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--4aef1056-d8c5-4153-bdfa-8e0a944fbacf","9/18/2023, 9:08:20.000 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 7:09:05.084 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--4a7148fc-5c0a-4f5b-936f-f9e275d46829","9/18/2023, 9:08:47.284 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 7:09:05.097 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--41048f2e-d967-475d-b5dc-1f0953746b5e","9/18/2023, 9:08:48.033 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky SecureList and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 9:08:35.194 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c301d98e-a0cb-4ebe-9efa-f06b4858cfa8","9/18/2023, 11:08:10.824 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""23 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""4 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 9:08:40.246 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--5b364ebf-9fd4-45ff-94ee-9ea261b10ac4","9/18/2023, 11:08:11.641 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 9:08:40.281 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--5423cbab-37d4-4a1f-9de1-c91448ed0320","9/18/2023, 11:08:15.125 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 9:08:45.966 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--406a6028-be22-4cfb-aa7e-0568fae67cbc","9/18/2023, 11:08:20.595 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 9:08:50.711 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ac1a4556-925d-4d95-9a2f-0d5874d6da21","9/18/2023, 11:08:46.401 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky SecureList and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 11:08:40.696 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--48468012-0870-4a62-947a-039a2d94e57d","9/19/2023, 1:08:12.464 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 11:08:42.358 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--dfb18fa7-4170-485c-b331-e7d80eb549c6","9/19/2023, 1:08:10.788 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""23 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""4 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 11:08:45.689 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ddce8005-e9ab-48f1-a9f1-1aa58d8d3a03","9/19/2023, 1:08:15.525 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 11:08:46.158 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--5afc27d2-96d1-48b5-b9aa-6cd9e5154b4c","9/19/2023, 1:08:19.540 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/18/2023, 11:08:49.848 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--8d14deb0-db4c-42bf-8ac7-e619d5082b11","9/19/2023, 1:08:30.060 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky SecureList and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/11/2023, 11:45:32.354 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--b087305c-60da-4091-89c0-24cea4437438","9/12/2023, 11:45:14.453 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/11/2023, 11:45:38.605 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--1a08f47c-fd0d-4f0b-9b8d-fa50bd322bd1","9/12/2023, 11:45:17.519 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/11/2023, 11:45:47.973 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a19bf28c-f51e-4283-a152-f64c8b40a00c","9/12/2023, 11:45:22.661 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/11/2023, 11:45:54.180 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--0738a9cb-3be4-45a5-87b6-d1baaacd3e54","9/12/2023, 11:45:40.149 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/11/2023, 11:45:54.195 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--5e90e377-be7a-4b9e-8b3c-c210291d1f75","9/12/2023, 11:45:39.811 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 11:45:23.346 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d5ee9223-035e-47f0-a0e5-816fa8732103","9/5/2023, 11:45:05.567 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 11:45:29.238 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--728da831-6812-48d6-b6eb-a363ced36875","9/5/2023, 11:45:10.016 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686567620800,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 11:45:38.708 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--76800644-c596-48b9-9597-6426e4dd6dda","9/5/2023, 11:45:17.915 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 11:45:42.493 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--09d8f629-19bf-468e-888e-a1661bcf9fbf","9/5/2023, 11:45:23.908 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 11:45:42.813 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--fdb1f09c-09ae-4a77-a2be-d5d645b2adc8","9/5/2023, 11:45:25.533 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 3:07:27.011 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--32aa91d8-2e83-4fad-ba68-e0726a10f354","9/4/2023, 5:07:14.125 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686567620800,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 3:07:30.352 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--fd8869f7-5d5c-4944-a699-e2814fb77abf","9/4/2023, 5:07:18.364 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 3:07:30.433 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--353fae35-3de1-4cb3-b55b-0596fa71c597","9/4/2023, 5:07:20.301 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 3:07:36.469 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d8349e15-f063-4c17-91c2-0b8b360bce13","9/4/2023, 5:07:33.170 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 3:07:41.738 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--966b8f98-92a4-40f5-a7e6-64cd5de62959","9/4/2023, 5:07:34.340 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 5:07:20.562 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--3b509b76-c8a2-4ab3-a9ed-c8990c023aa0","9/5/2023, 7:07:16.993 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 5:07:20.640 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--7ac8a634-85a2-4d04-aeb2-cf38b74decf7","9/5/2023, 7:07:16.609 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 5:07:31.530 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--7c7b93bc-ff94-4ae0-b9f2-a91e862cc66e","9/5/2023, 7:07:26.914 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686567620800,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 5:07:36.640 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d69cca53-b393-49ec-bbb8-49d01dc61d54","9/5/2023, 7:07:31.514 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 5:07:45.637 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--17a9d2bf-5077-42aa-8903-3fb32382ccb1","9/5/2023, 7:07:38.561 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 7:07:21.369 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--4b73b403-3350-4c7e-bdd6-e607411e6a80","9/5/2023, 9:07:15.352 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 7:07:25.888 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--07c217b0-e837-4ec1-ac87-d6e5b17a7bdc","9/5/2023, 9:07:18.473 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 7:07:31.306 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--66deb504-8125-492f-8bec-53a72a05772d","9/5/2023, 9:07:22.823 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 7:07:35.831 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--fd23550a-e752-4cc4-9939-2b91f4c165d7","9/5/2023, 9:07:30.050 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 7:07:40.770 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--42987eed-2029-4427-be4f-f827e5727b4d","9/5/2023, 9:07:36.278 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 9:07:26.125 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--5e2827f1-c5af-4cb3-9980-e6822f5395bc","9/5/2023, 11:07:16.725 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 9:07:36.534 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--504a1712-548c-4236-a7ee-83aa40c9f3ce","9/5/2023, 11:07:23.866 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 9:07:37.242 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a9c74d2b-fd5c-4d7e-8ace-d69de0e88240","9/5/2023, 11:07:27.366 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 9:07:46.564 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--8c9850a7-7205-4e02-ab2b-ad434dae60a1","9/5/2023, 11:07:40.209 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 9:07:46.568 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a29805ed-29cb-4b04-9806-1e047cee03c6","9/5/2023, 11:07:40.305 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 11:07:26.178 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--8a9f0bf1-aaec-44ce-8943-53b3c102684b","9/6/2023, 1:07:17.051 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 11:07:30.778 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--f6b4c876-ebe2-4481-b3da-2bc15934eda0","9/6/2023, 1:07:19.787 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 11:07:31.254 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--2116325b-9b6d-4ee4-8a9e-e1aac1962d12","9/6/2023, 1:07:21.356 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 11:07:42.039 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d4d4e9dc-2a9d-4161-873c-83d80ecdc194","9/6/2023, 1:07:32.525 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 11:07:50.133 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a0c8048e-3c20-4c94-875f-874e1ee76f63","9/6/2023, 1:07:40.906 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 1:07:25.773 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--4d7c684c-7880-4f30-878c-b0a869d8362b","9/6/2023, 3:07:15.652 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 1:07:31.454 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d93c757d-fbb6-424d-a96f-a54462f88f3f","9/6/2023, 3:07:19.914 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 1:07:36.650 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--38bccc2e-a746-4a3b-a72e-f6d49f6fb46b","9/6/2023, 3:07:22.150 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 1:07:41.396 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--38936a8e-d40d-4495-8bba-88bb4e603b7d","9/6/2023, 3:07:30.842 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 1:07:41.729 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--6e2e47bf-4631-4b86-b22a-41f123efe60f","9/6/2023, 3:07:29.863 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 3:07:31.149 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--7b273e6f-f50f-4a40-9fd9-48471873b9e1","9/6/2023, 5:07:16.133 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 3:07:36.074 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--cfef7946-5a3d-4443-8bd7-5d36055a9629","9/6/2023, 5:07:19.879 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 3:07:45.004 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ada7d27f-c1c8-432b-afd6-b250ace62f21","9/6/2023, 5:07:26.923 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 3:07:56.690 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--9f746e14-1b3b-4769-a057-83dfb17ac2d1","9/6/2023, 5:07:41.948 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 3:07:56.695 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a446a8b4-5d27-45ac-ba4b-6420d134fdac","9/6/2023, 5:07:41.966 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 5:07:25.796 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--0f1ef799-fb3b-49be-8600-839f3007846f","9/6/2023, 7:07:18.375 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 5:07:35.427 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--0868de98-3232-40c9-896a-7a11345f2cb3","9/6/2023, 7:07:24.863 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 5:07:36.332 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--b64bdcd1-2cc4-48ca-93f8-bdd0797b2374","9/6/2023, 7:07:28.626 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 5:07:50.789 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ea3caa70-e3ea-4885-a27e-1883bf5abf5e","9/6/2023, 7:07:43.991 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 5:07:57.386 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--2576c690-0639-4f3e-b0b9-951ea8971393","9/6/2023, 7:07:42.592 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 7:07:25.558 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--3787eae6-080e-4091-a9da-f4f0109402a4","9/6/2023, 9:07:16.221 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 7:07:34.847 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--8939f72c-66cd-4280-bbc1-a790b4a30b8f","9/6/2023, 9:07:20.843 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 7:07:41.098 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--26d7beed-7231-47cf-9297-13a8de5b1ec0","9/6/2023, 9:07:27.540 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 7:07:51.317 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--70b30161-e26c-409d-9e15-0835a13dc46c","9/6/2023, 9:07:37.669 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 7:07:51.459 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--2b90c2bf-28f1-4f2c-81e6-475e77b4d580","9/6/2023, 9:07:39.557 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 9:07:26.456 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d8d3c3fb-574e-44c1-94bc-82760aaa6a21","9/6/2023, 11:07:16.565 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 9:07:34.726 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a3ec1027-394a-47aa-99de-0164a55af0ac","9/6/2023, 11:07:21.279 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 9:07:35.508 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--bbd3462c-6970-4049-bd17-c768b788f641","9/6/2023, 11:07:24.058 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 9:07:46.573 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--afd04ad5-513c-4a2b-b521-f0703c0b0cc0","9/6/2023, 11:07:38.986 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 9:07:49.848 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--07fa8150-83a6-4ff0-a5d1-03b811903d12","9/6/2023, 11:07:42.621 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 11:07:25.211 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--b064d0f8-b597-4ed6-82ee-80456610e87a","9/6/2023, 1:07:18.208 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 11:07:34.918 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--eaa475aa-208d-452b-a495-f82192a8e053","9/6/2023, 1:07:22.577 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 11:07:39.631 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--fe99feb3-f5ca-4f25-85fd-3ce3b7400b64","9/6/2023, 1:07:26.935 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 11:07:51.825 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--9a8cae3d-29eb-45d8-94c2-dde450b34543","9/6/2023, 1:07:37.070 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 11:08:01.125 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--6ce10354-e748-4bd7-a480-11743f7de0f2","9/6/2023, 1:07:54.824 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 11:45:22.965 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--0de0b631-35b7-4000-b658-2d50cc34ac45","9/7/2023, 11:45:07.453 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 11:45:27.979 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--33bcd8db-b224-47a3-9a27-120dfe830115","9/7/2023, 11:45:16.980 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 11:45:28.074 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ee6e1df0-1178-4a02-ad26-fc799eca1ea5","9/7/2023, 11:45:12.550 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 11:45:32.881 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--aad38262-dc08-4120-9568-f98f52d42f40","9/7/2023, 11:45:27.272 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 11:45:32.885 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c895f834-2355-4b72-a749-94723290904a","9/7/2023, 11:45:23.377 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 1:07:30.745 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--fcac8dd3-7149-4cc9-9112-d1714bc7042c","9/6/2023, 3:07:20.996 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 1:07:30.783 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--9dd11f15-22db-490f-95f5-14a95e5c749d","9/6/2023, 3:07:21.126 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 1:07:35.503 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--997194ea-b3c0-41a9-88c3-959128d42f5f","9/6/2023, 3:07:24.573 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 1:07:45.966 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--8cd64efa-7a0d-44a1-b6be-248b7439d7c9","9/6/2023, 3:07:32.213 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 1:07:56.846 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ff0936f4-3f57-431f-b8de-bcd29f98f63a","9/6/2023, 3:07:51.976 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/1/2023, 11:45:23.438 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--b8e33a9e-745f-4e0e-b90b-2028faae4c37","9/2/2023, 11:45:05.932 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/1/2023, 11:45:28.156 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--66581aca-eb17-4d3f-894d-4f64b82a63ae","9/2/2023, 11:45:10.405 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""6 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686567620800,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/1/2023, 11:45:33.052 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--5e1bf5f3-fdd8-4712-8b6e-dcdda845e8ac","9/2/2023, 11:45:22.291 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""5 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692247301339,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/1/2023, 11:45:52.491 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--344a0f7f-5be6-4755-af10-360dea2c251b","9/2/2023, 11:45:45.845 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""15 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""3 sightings on 1 source: DHS Automated Indicator Sharing. 3 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/1/2023, 11:45:52.611 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--96f7d9a1-b944-4dec-b68e-60efd75fa56b","9/2/2023, 11:45:46.724 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 7:08:15.474 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--63f58a39-8ad0-43c3-aa52-e4dad18b581e","9/15/2023, 9:07:53.456 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 7:08:15.834 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--b4131cb2-5a07-4d96-acb0-35c90ce23da7","9/15/2023, 9:07:59.412 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 7:08:15.924 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--1972edc6-4a2c-42a6-8694-29b8b4f7def7","9/15/2023, 9:08:00.644 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 7:08:25.253 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ffdc3c9e-d47c-4b8d-94de-705103c0e414","9/15/2023, 9:08:12.061 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 7:08:30.438 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--cfe88178-421b-438b-bd0c-a90df2604155","9/15/2023, 9:08:16.997 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 9:10:11.409 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--de79b290-5e16-473d-9d5e-e92cd4e3fec6","9/15/2023, 11:09:21.551 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 9:10:27.488 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ebdcbaf7-1398-4c44-b404-97f05b0b9359","9/15/2023, 11:09:28.026 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 9:10:35.455 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--aa2e51ba-564f-4ed1-b3e5-965463155a58","9/15/2023, 11:09:40.176 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 9:10:41.194 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--7a374743-00a4-4e8f-854b-19abb792d88a","9/15/2023, 11:09:44.371 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 9:10:41.767 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--91d14ed3-5310-4b72-ba23-c96f8f7b31a4","9/15/2023, 11:09:19.481 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 9:12:54.439 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--7a374743-00a4-4e8f-854b-19abb792d88a","9/15/2023, 11:09:44.371 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 11:08:28.170 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--f0422e61-1493-454f-a950-84b8db4d21d8","9/15/2023, 1:07:54.733 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 11:08:31.875 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--67403531-6b94-48ac-bff1-ad3df3d96d80","9/15/2023, 1:07:57.598 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 11:08:41.188 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--3d275648-8c6f-404b-a13f-148ad7df34f4","9/15/2023, 1:08:05.810 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 11:09:05.168 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--f315a880-2d35-49b0-9e71-06d66f68a4bf","9/15/2023, 1:08:22.786 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 11:09:05.773 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--1f49c367-0e1d-4a26-ab6b-4ee75ce545d4","9/15/2023, 1:08:26.671 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 11:45:28.942 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--6e8bab8f-d598-4af0-ae7f-3f4d88234543","9/16/2023, 11:45:10.709 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 11:45:33.634 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a9339ea8-2e72-4728-a697-d50c6ec944cd","9/16/2023, 11:45:12.985 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 11:45:47.219 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a8cc06fa-f0b3-439f-8d99-45befb1bc72b","9/16/2023, 11:45:33.040 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 11:45:52.491 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--baad8853-824f-4bba-bc47-b1a789791c7d","9/16/2023, 11:45:37.178 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 12:04:43.249 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--0b2050bf-4e66-4c53-9605-f10ad878c5a7","9/16/2023, 11:45:19.804 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 1:08:25.941 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--7b45458f-e7b2-4bd2-b5eb-674ea91d7e58","9/15/2023, 3:08:02.763 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 1:08:25.949 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a4dc4053-6ce8-4c01-89c1-e689f0d32bce","9/15/2023, 3:08:03.316 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 1:08:35.526 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--add76e7f-8a08-4e71-93fb-1406e8e91b98","9/15/2023, 3:08:14.366 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 1:08:40.824 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--48c02544-3a17-446c-8756-6167221a2406","9/15/2023, 3:08:22.092 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 1:10:50.713 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--243dea3a-ef3c-4c4b-b29c-b2d386759f73","9/15/2023, 3:08:24.687 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 3:08:50.369 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--13e55d73-4a42-4d5c-be2c-f394102aba6e","9/15/2023, 5:08:12.426 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 3:08:56.559 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--6e1beff3-d515-47e0-b603-1e295d64ef51","9/15/2023, 5:08:13.093 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 3:09:00.437 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--437e13bb-b1d6-49c2-93bb-3cf5dfb3e20a","9/15/2023, 5:08:15.295 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 3:09:26.600 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--6c3d207c-9d3d-4583-8a23-8d2958026a12","9/15/2023, 5:08:34.140 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 3:09:35.651 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--bc6e07dd-89bc-4b96-a583-ae1a65520a21","9/15/2023, 5:08:36.918 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 3:12:48.502 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--bc6e07dd-89bc-4b96-a583-ae1a65520a21","9/15/2023, 5:08:36.918 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 5:08:05.629 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--fac4c210-caad-4f33-b1d9-55d9d83bde0a","9/15/2023, 7:07:53.865 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 5:08:10.939 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--8d794c74-e1f6-44b9-96cb-f70cc2b2d15c","9/15/2023, 7:07:59.238 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 5:08:16.758 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--0c4a8410-73af-4028-a86d-06e9de5ac7f8","9/15/2023, 7:08:04.119 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 5:08:26.526 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--23313353-23dc-424e-9541-039c2508d5ef","9/15/2023, 7:08:16.099 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 5:11:00.793 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--2d4d4f90-4b97-446f-81d3-baa81100c5a9","9/15/2023, 7:08:19.306 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 7:08:58.282 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--54e0bb5b-ab56-404f-850c-03878c690f8a","9/15/2023, 9:08:16.952 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 7:09:11.827 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--eafee012-31d4-4042-8e3e-c69408f64a86","9/15/2023, 9:08:24.335 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 7:09:26.351 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--b206e6d2-b714-49a5-bccd-b3b3d003e9bf","9/15/2023, 9:08:34.708 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 7:09:26.352 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c4a0ca23-2e34-4297-9d17-000f8779e6e0","9/15/2023, 9:08:34.722 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 7:09:35.025 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--f00b01fe-325b-44cc-92af-bc220fad068e","9/15/2023, 9:08:44.280 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 9:08:15.756 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--130c1f09-7613-4dca-a6e2-b7d7b7aa4337","9/15/2023, 11:08:01.154 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 9:08:20.659 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--269c89ba-5cf8-4e87-acc0-e105388b25f5","9/15/2023, 11:08:07.518 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 9:08:25.716 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--1f0553da-c39d-4fa7-80e0-ed526a120693","9/15/2023, 11:08:09.623 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 9:08:30.304 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--7d509716-fc49-4b56-bcb3-837837a2df76","9/15/2023, 11:08:18.534 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 9:08:35.363 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--31b76793-1fb2-4bf2-a564-21310f93475b","9/15/2023, 11:08:20.911 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 11:08:11.428 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a1aaac36-3cd5-4f60-810c-df8ff0da8a18","9/16/2023, 1:07:57.962 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 11:08:15.780 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--94281c10-70ba-4606-aff3-a2f5815d39c0","9/16/2023, 1:08:04.662 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 11:08:20.777 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--14075afb-04a1-4957-905b-b5e3bbf8872d","9/16/2023, 1:08:02.691 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 11:08:25.842 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--7d3db047-6660-489c-8ca3-5885de839745","9/16/2023, 1:08:06.744 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 11:08:35.975 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--1a2aae41-4e93-44b4-aa05-ae9acb37b623","9/16/2023, 1:08:23.778 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 1:08:10.763 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c4684267-f980-4fb1-80ca-7f1f7bae6379","9/16/2023, 3:07:58.708 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 1:08:21.718 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ae389ad5-3d7f-4355-af8c-d92939d26894","9/16/2023, 3:08:04.120 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 1:08:26.408 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d0b7f2d0-0379-464c-967f-d7175ce8d022","9/16/2023, 3:08:07.223 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 1:08:35.174 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--4b563084-398e-47ba-a046-413d7510a1f0","9/16/2023, 3:08:12.154 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 1:08:40.511 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--da6548fb-47e5-4ab8-a7f2-457e8c4e4a28","9/16/2023, 3:08:26.245 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 3:08:11.371 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c5fe5710-66e5-4d73-ae46-275d1dbe80b5","9/16/2023, 5:07:59.652 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 3:08:20.709 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--0f17ecba-9ea3-4219-9f5e-ea0dbd9017aa","9/16/2023, 5:08:03.095 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 3:08:20.791 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--38005e85-1d53-4abb-8dbb-c3be4f91a328","9/16/2023, 5:08:04.525 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 3:08:35.403 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--6b7793b0-f3d6-4223-9c55-4036e7a1d981","9/16/2023, 5:08:23.063 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/16/2023, 3:11:15.428 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--75bb8b79-89a0-42ae-8893-e927482c18f5","9/16/2023, 5:08:21.434 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","8/30/2023, 11:45:23.110 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--cc425f68-6874-405d-800a-89b2e73991a1","8/31/2023, 11:45:08.839 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","8/30/2023, 11:45:29.086 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--cd4baef5-50eb-4b9a-ad1a-964a95f756fe","8/31/2023, 11:45:16.944 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""6 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686567620800,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","8/30/2023, 11:45:32.689 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--7acdc054-0295-444d-a664-6f5a82afb165","8/31/2023, 11:45:19.233 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""15 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""3 sightings on 1 source: DHS Automated Indicator Sharing. 3 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","8/30/2023, 11:45:32.720 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--8da7e428-4760-425e-aac6-fe976f957172","8/31/2023, 11:45:21.566 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""5 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692247301339,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 1:07:31.496 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d29072c0-9386-4879-8c6b-5bfa72ef172b","9/7/2023, 3:07:22.638 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 1:07:36.601 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--322d71aa-d34e-4d95-bb75-858aa8f20fa9","9/7/2023, 3:07:25.276 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 1:07:50.875 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--76487970-82eb-4636-a751-363101b587fa","9/7/2023, 3:07:32.529 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 1:07:51.108 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--7b51486c-0179-4f49-b9b9-ed010a2d3509","9/7/2023, 3:07:34.428 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 1:07:56.616 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--318d54d4-2d75-44a2-b9e8-e3512cce0288","9/7/2023, 3:07:45.346 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 3:07:26.128 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--fd5ea7c7-dda4-471e-beb4-00dd960635dd","9/7/2023, 5:07:22.215 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 3:07:30.913 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--e0d1c312-387f-4d00-81bc-7ae97445e9f8","9/7/2023, 5:07:22.030 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 3:07:37.201 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--b0ab4619-0577-4127-afe2-d95a5d11bc75","9/7/2023, 5:07:33.778 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 3:07:51.366 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--fa05ac38-dcdd-43c9-a898-e9a795689eb3","9/7/2023, 5:07:47.229 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 3:07:56.085 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ef28cdab-be67-4bc9-9b56-18f07d8cb3af","9/7/2023, 5:07:46.889 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 5:07:45.687 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--47bee001-e846-4a6a-938e-6e5fbbda8c49","9/7/2023, 7:07:23.121 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 5:07:46.022 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--72aab46a-7531-4b23-8d14-aff5a03120d6","9/7/2023, 7:07:25.819 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 5:07:51.029 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--f4432a09-afce-4ae9-bea1-ed7e35a62e43","9/7/2023, 7:07:27.635 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 5:08:00.594 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--3caaff8e-4299-465f-8328-63efe8ae73f7","9/7/2023, 7:07:47.467 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 5:08:06.210 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--fa43199b-6569-4764-987f-45bcd2aeba2d","9/7/2023, 7:07:36.895 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 7:07:50.508 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--f63ce06b-3e4a-413a-a778-fe55d45cd62b","9/7/2023, 9:07:25.374 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 7:07:50.521 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--1f59e25e-07bd-4ae8-93de-1a2989029b73","9/7/2023, 9:07:26.009 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 7:07:50.661 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--9faf4bb2-2c8e-4fcb-af3c-f8f7073a41c2","9/7/2023, 9:07:22.561 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 7:07:56.744 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--b40cb0f1-bbd8-465f-96fb-be078c7717e7","9/7/2023, 9:07:27.993 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 7:08:16.079 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ed156d01-27b0-4efb-b07f-1132b3e2d0fa","9/7/2023, 9:07:44.260 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 9:08:35.965 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--68da597f-be57-4da8-92a9-ad4047508dc0","9/8/2023, 11:08:12.148 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 9:08:40.720 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--679f36ee-3816-4aa5-acaa-4d9648c51ca6","9/8/2023, 11:08:14.944 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 9:08:41.236 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--56855af0-414f-452e-9c8b-cfcc3424b6b7","9/8/2023, 11:08:17.557 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 9:08:55.421 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--6a253df8-a260-44cd-98f1-d8607637a61e","9/8/2023, 11:08:28.080 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 5:07:21.134 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c226ddb1-03f3-4658-949f-5795d1287619","9/4/2023, 7:07:12.327 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 5:07:21.806 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--3f7a8e3b-f030-4b07-a974-3198f89a205a","9/4/2023, 7:07:17.389 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 5:07:21.891 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--abc79038-8d6c-476f-a014-b2dae104b424","9/4/2023, 7:07:14.810 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686567620800,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 5:07:30.872 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--596b6f46-48d4-4472-a2f4-ef850a72911c","9/4/2023, 7:07:27.535 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 5:07:36.094 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--671f5ea8-31d8-4db3-a335-07f7bfd8c012","9/4/2023, 7:07:31.632 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 7:07:20.502 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--4986b434-8066-48a8-836f-519080ba1c41","9/4/2023, 9:07:11.269 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 7:07:25.830 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--9442e831-0470-4064-81f3-cfdaa9065174","9/4/2023, 9:07:15.072 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686567620800,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 7:07:29.047 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--b6736063-65c0-46ec-83fd-ecf582fb57bb","9/4/2023, 9:07:18.503 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 7:07:37.243 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--518253f5-5bbc-4978-bd1f-54e45d45f2e2","9/4/2023, 9:07:32.423 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 7:07:37.833 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--432ca638-682b-4ff9-9e4e-ed520728aa9c","9/4/2023, 9:07:27.901 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 9:07:40.562 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--3364c2dc-86b1-4b0d-8197-d18b61624131","9/4/2023, 11:07:33.739 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686567620800,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 9:07:40.582 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--21061758-32c4-4c2f-8a68-af6d89914c6f","9/4/2023, 11:07:30.216 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 9:07:50.937 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--cf17c272-6ce2-4223-892a-5f4abfcd6e44","9/4/2023, 11:07:39.215 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 9:07:55.449 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--5f35004c-e91e-46ed-bf5a-fce370350486","9/4/2023, 11:07:49.584 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 9:08:04.660 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c891d554-5ce2-4915-991b-b0ca20b60a42","9/4/2023, 11:07:50.727 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 11:07:21.762 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--41f607b1-9e71-43b5-86a5-779c8399124a","9/5/2023, 1:07:11.541 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 11:07:24.836 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--cd848bce-5e97-45a6-a20b-87baf38d65ff","9/5/2023, 1:07:11.875 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 11:07:25.645 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--e2d8f97f-d2d2-4e34-aa98-2251839f042b","9/5/2023, 1:07:14.656 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686567620800,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 11:07:36.113 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--9f962517-7f07-47af-af90-980c8804fa83","9/5/2023, 1:07:29.947 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/4/2023, 11:07:45.484 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--03429a56-4f4c-4449-b387-013003abbd65","9/5/2023, 1:07:38.336 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 1:07:26.829 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--124845e8-7b63-445c-a058-5f47d09ceb2c","9/5/2023, 3:07:13.141 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 1:07:30.108 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--6a2449fe-980e-4dd2-855b-77733c7f3b3e","9/5/2023, 3:07:17.554 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686567620800,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 1:07:35.752 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--13c64bf9-b65a-438b-aebf-029b991ecc54","9/5/2023, 3:07:21.711 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 1:07:45.916 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--258810b6-33cd-4b74-a1ef-95950b76b852","9/5/2023, 3:07:36.730 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 1:07:46.241 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--da11013a-d24d-4a1f-b6ae-43b2363298eb","9/5/2023, 3:07:37.494 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 3:08:06.358 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--45269453-6771-4889-9264-df97559508b8","9/5/2023, 5:07:34.293 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 3:08:06.521 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--b891cd79-213d-4dbd-9ffe-b0052ae61911","9/5/2023, 5:07:36.203 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 3:08:06.802 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--13565e39-320d-4e8e-a4e4-2429f02baa90","9/5/2023, 5:07:31.897 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686567620800,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 3:08:11.725 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--4397367d-d158-41b5-aa02-05cc61663ab5","9/5/2023, 5:07:43.361 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 3:08:16.058 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--f1a271eb-b403-4b33-9ad4-8cebd5364178","9/5/2023, 5:07:50.366 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 5:09:06.003 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--0e9c021a-9f16-4c1d-ae19-faaf10aea1d5","9/5/2023, 7:08:56.662 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 5:09:16.412 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ac19d3b2-152c-4b89-ad04-cd86979be91e","9/5/2023, 7:09:00.852 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686567620800,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 5:09:21.381 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--af5a80c1-79eb-4a77-95cb-6c59e2ab963f","9/5/2023, 7:09:06.138 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 5:09:25.964 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--06e7f262-e9ac-4055-ae37-47eaaab231ea","9/5/2023, 7:09:16.074 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 5:09:27.939 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--62845440-c183-4a69-8ba7-ca2a4b704852","9/5/2023, 7:09:16.950 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 5:14:07.819 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--0e9c021a-9f16-4c1d-ae19-faaf10aea1d5","9/5/2023, 7:08:56.662 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 7:07:22.096 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--02c799db-d535-47cf-acd2-34c2f0dcef8b","9/5/2023, 9:07:18.227 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686567620800,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 7:07:25.868 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--55144e47-1ca5-4c2c-8caf-1dd97357a465","9/5/2023, 9:07:22.703 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 7:07:35.305 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--42773071-cc72-483d-bc0c-2d24ea845ac3","9/5/2023, 9:07:28.652 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 7:07:40.931 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--e7e5c7eb-0244-4aae-af75-6044c96d08cc","9/5/2023, 9:07:37.821 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 7:07:45.548 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--1d17b9fa-8c83-4ddf-9326-48913d4a91f2","9/5/2023, 9:07:39.286 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 9:07:19.917 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--57b8ec1c-16ed-48a5-b307-e575cfa45696","9/5/2023, 11:07:13.659 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 9:07:20.364 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--f7da2362-305b-4d6e-9d90-deb734494049","9/5/2023, 11:07:17.365 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686567620800,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 9:07:30.363 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--1254bd84-a742-4727-a88a-5b080b9aafb2","9/5/2023, 11:07:23.700 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 9:07:36.302 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--1818028f-0d4f-4130-b7ed-cc82cfa6e454","9/5/2023, 11:07:32.114 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 9:07:41.778 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c48f53d1-f813-4ed6-ae27-f0b29d051def","9/5/2023, 11:07:37.130 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 11:07:26.769 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a45e8359-a4de-45a1-9ef3-7612f0ca8b60","9/5/2023, 1:07:15.843 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 11:07:35.172 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--32a44164-b099-4aa3-b7ba-8fcb3afffd7e","9/5/2023, 1:07:23.212 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 11:07:41.096 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--4098c698-54fb-4dc2-9b08-f97bff24564d","9/5/2023, 1:07:27.424 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686567620800,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 11:07:47.148 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--af954681-8e66-4929-a4c5-675cb0deeaf7","9/5/2023, 1:07:38.967 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 11:07:47.318 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ebd7b233-e514-485a-89a9-ba4a068bfb01","9/5/2023, 1:07:38.208 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 11:45:25.182 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--9abdf5c0-5410-4527-a728-731967d89468","9/6/2023, 11:45:06.843 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 11:45:32.739 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--8d0d4740-2f99-4909-9a48-eec920480f89","9/6/2023, 11:45:12.458 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 11:45:42.662 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--f57caaa1-893d-43e6-ba47-466c40d7ff4a","9/6/2023, 11:45:27.854 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 11:45:42.667 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--3f94cf57-39cc-4ea0-a4bc-d4d2a072c52e","9/6/2023, 11:45:29.556 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 11:45:43.620 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--508e3bb7-b475-41ef-9ead-02a942746f0f","9/6/2023, 11:45:17.166 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686567620800,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 1:07:30.831 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--01c38d5b-976f-4926-98ff-91c312b3909f","9/5/2023, 3:07:15.140 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 1:07:36.656 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--e5b776c9-3ad2-4271-a6ee-4958c8f7502e","9/5/2023, 3:07:16.819 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 1:07:41.972 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d52b1814-36b4-4542-8dfd-f67984e8a4cf","9/5/2023, 3:07:23.068 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686567620800,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 1:07:42.747 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--092abfa4-43ef-4464-8d17-751a56206d33","9/5/2023, 3:07:28.647 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 1:07:45.788 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--fa7d9d5b-44b9-45eb-bda3-b1061812e4f5","9/5/2023, 3:07:30.148 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 3:07:35.611 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--61e924e4-1c21-4048-b8ac-da9566819f8e","9/5/2023, 5:07:19.407 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 3:07:36.022 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--938f0865-4612-44a7-8584-cf0213e052be","9/5/2023, 5:07:22.304 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 3:07:41.122 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--31fbbea8-2e67-4054-85c6-846574a00ab8","9/5/2023, 5:07:25.116 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686567620800,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 3:07:45.681 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--529a4de9-ef60-4756-9f43-e69979d0c912","9/5/2023, 5:07:36.790 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/5/2023, 3:07:50.769 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--2c58047a-fd20-4135-88a8-73b94419439b","9/5/2023, 5:07:43.818 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","8/31/2023, 11:45:28.344 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--0ff19d85-b055-4cd1-ba1a-d306d9e9fa21","9/1/2023, 11:45:08.939 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""6 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686567620800,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","8/31/2023, 11:45:33.703 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--3adab4d3-e0b9-4d5b-a818-ab2c9bdd9503","9/1/2023, 11:45:14.850 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""5 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692247301339,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","8/31/2023, 11:45:37.292 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--9bc98fd9-561a-420c-a235-f8197eb9927f","9/1/2023, 11:45:19.014 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","8/31/2023, 11:45:37.306 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--859987f2-7c82-4fe4-970c-3aeaddb488f0","9/1/2023, 11:45:17.313 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""15 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""3 sightings on 1 source: DHS Automated Indicator Sharing. 3 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 3:07:55.478 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d9641cdf-b756-4d9d-84d6-dbc8bad16a72","9/6/2023, 5:07:22.496 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 3:07:55.759 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--98684f27-baca-475a-a081-638c848a0351","9/6/2023, 5:07:23.249 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 3:07:55.984 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d678dce9-d1fe-454e-afad-178387bd385a","9/6/2023, 5:07:26.349 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 3:08:20.743 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--b7a15e07-88a5-47ae-9910-b6b82f974e5e","9/6/2023, 5:07:37.783 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 3:08:30.149 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--60030ffa-a379-434c-904b-5603b5c8bbbe","9/6/2023, 5:07:43.223 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 5:07:36.011 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--06dbdab3-92f9-489c-ae2d-5c709b4b43d6","9/6/2023, 7:07:22.188 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 5:07:36.404 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--b7e6120b-f981-4851-a389-4f309bb5901d","9/6/2023, 7:07:22.799 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 5:07:36.840 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--fcac6e25-ffac-421e-9b5e-4222eb18475b","9/6/2023, 7:07:24.085 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 5:07:56.078 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--5a4c8b7c-00a1-4ef6-bfc7-51edab44f466","9/6/2023, 7:07:48.436 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 5:07:56.914 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--fd47baa6-3203-4f6b-8ab9-fb77cae3772b","9/6/2023, 7:07:46.669 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 7:07:34.396 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--8f2a2fe1-7f36-480c-8d55-61859c48d438","9/6/2023, 9:07:27.076 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 7:07:40.631 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--372615ee-6da5-4039-9ee9-a3ae8e56d1ee","9/6/2023, 9:07:31.466 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 7:07:40.730 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--1f6b9783-6dc7-475c-94d5-598841a1d737","9/6/2023, 9:07:35.399 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 7:07:56.631 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--b85906f0-251f-40c7-9664-69bec256deeb","9/6/2023, 9:07:48.286 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 7:07:57.987 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--8e579335-6aa9-4f5c-b4a2-0fd5be2f9c43","9/6/2023, 9:07:49.538 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 9:07:35.890 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--da03723e-2db8-477b-910a-6236a6a1cd5d","9/6/2023, 11:07:22.316 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 9:07:36.231 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--9ef6ca57-5eb3-48bc-a5e0-040ab95f1be6","9/6/2023, 11:07:21.115 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 9:07:36.415 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--7f58d127-778b-4d28-a1f7-b03fc5523db0","9/6/2023, 11:07:19.797 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 9:07:52.147 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--f602db84-f192-44db-84c7-29be4559cc26","9/6/2023, 11:07:36.413 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 9:08:00.533 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--0f79dc57-e775-4260-bd89-1745a4f7f922","9/6/2023, 11:07:44.304 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 11:07:31.112 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c3ccdf57-35e3-4296-98c4-56a2cb41aa3a","9/7/2023, 1:07:20.207 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 11:07:35.169 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--b93f177b-18fd-4812-afbb-c7fd151ee782","9/7/2023, 1:07:22.915 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 11:07:40.857 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--f7c68aaa-c0c7-4ea3-898d-90bee394515f","9/7/2023, 1:07:24.616 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 11:07:41.028 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--f0acfafc-90db-4188-be76-669d236670aa","9/7/2023, 1:07:25.023 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/6/2023, 11:07:57.540 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d1e105f7-141f-4cd4-a99f-bd4c3638fba7","9/7/2023, 1:07:43.649 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 1:07:30.891 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ecf46d2f-5f18-4f2b-bdeb-f5cb49d81d8d","9/7/2023, 3:07:19.756 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 1:07:31.900 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--875f1613-ea11-4dd8-b688-2971e304998a","9/7/2023, 3:07:21.420 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 1:07:50.672 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--417f7c9b-dc48-4286-bafa-6bac007a4cf8","9/7/2023, 3:07:32.564 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 1:07:50.727 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--8550da1f-3d70-43ac-9299-818baa67db9f","9/7/2023, 3:07:33.256 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 1:08:00.044 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--fb5d98fc-ad61-4ffb-a542-1b4aa42e5303","9/7/2023, 3:07:47.041 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 3:07:40.699 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--41bd7516-f7e4-47a7-afc3-bda25753b4b6","9/7/2023, 5:07:29.579 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 3:07:40.869 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c28ecd80-e947-4c44-8ba5-afdf7b3d4a19","9/7/2023, 5:07:28.067 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 3:07:45.657 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--9f229c5b-7479-48ba-8933-56457d911b92","9/7/2023, 5:07:33.958 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 3:07:50.803 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--bb53b503-db79-4a45-84db-e545e7c5fe2f","9/7/2023, 5:07:39.408 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 3:08:05.635 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--3f883d5d-6a5f-49d0-86a1-ac3b32767d51","9/7/2023, 5:07:55.375 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 5:07:55.638 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--45f45ac7-52d7-476c-80bb-b56f77ecb67e","9/7/2023, 7:07:32.670 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 5:08:01.152 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ebf37e0e-a425-401f-bcd5-8f804dcde2e6","9/7/2023, 7:07:36.891 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 5:08:06.448 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--28a11b92-b8e1-4d18-8773-df1edde61f4f","9/7/2023, 7:07:42.718 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 5:08:16.875 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--eed08f19-0181-42a4-aa17-881fb01ab668","9/7/2023, 7:07:49.749 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 5:08:21.280 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--03c266a0-b671-44c1-b319-63f05483b323","9/7/2023, 7:08:00.061 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 7:07:30.958 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--77b06c36-972e-42a2-a90a-8c066d0f98dd","9/7/2023, 9:07:21.920 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 7:07:35.549 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--3ecbe356-5d1b-47cc-adef-aee5a2d23c7f","9/7/2023, 9:07:24.700 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 7:07:35.664 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--04a86ebf-5bd1-416b-8672-d971f436788d","9/7/2023, 9:07:23.703 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 7:07:44.934 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--cff35864-bd11-488c-b448-5a2b623cc50b","9/7/2023, 9:07:34.750 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""18 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 7:07:55.639 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--0f6d7603-244e-4ced-a999-cc5e252b2aba","9/7/2023, 9:07:43.397 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 9:07:31.126 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--3b0f6460-15fd-40c1-a46c-1575af29e497","9/7/2023, 11:07:23.572 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 9:07:31.899 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--1ef9e580-227b-48e2-8ea8-625bb1b3173c","9/7/2023, 11:07:21.804 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 9:07:36.483 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--fa7aacb6-ebde-4aba-b415-1cbcd08f46d1","9/7/2023, 11:07:24.725 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 9:07:51.494 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--33ff3d30-706e-4e6a-91e6-b184707cf382","9/7/2023, 11:07:34.084 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 9:07:55.742 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--7577cf17-ba6f-4ee9-810c-a16be3bafe42","9/7/2023, 11:07:51.571 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 11:07:31.925 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--5bc1fb45-170e-40b4-a46e-cc42f2541ab2","9/7/2023, 1:07:22.585 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 11:07:35.539 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--23392de3-3b17-4df8-943d-7a6b3e68c2fb","9/7/2023, 1:07:24.158 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 11:07:45.503 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d9d91fc4-2617-4678-bc02-d58ed41bd64f","9/7/2023, 1:07:30.896 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 11:07:50.791 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--145bb6a7-99fb-4ddc-9203-fbe7dce9d7d0","9/7/2023, 1:07:44.497 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 11:07:56.115 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--96d7f02f-4366-4be8-86bf-1a70d7ef446e","9/7/2023, 1:07:49.768 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 11:45:23.310 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--bdbfa234-273d-4e60-941b-f7e18436ff32","9/8/2023, 11:45:08.224 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 11:45:28.463 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--b3725f8c-408c-4633-a74c-e03131404b51","9/8/2023, 11:45:09.967 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 11:45:32.899 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c7c0cb9a-3c34-4938-9d40-fb481b0bcc16","9/8/2023, 11:45:16.918 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 11:45:37.866 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--599cda6d-d768-4d8d-95bd-fda9623e3688","9/8/2023, 11:45:26.836 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 11:45:42.331 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--4bd4597a-0d8d-41e2-ae9e-ad3a10b6b092","9/8/2023, 11:45:30.350 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 9:15:26.228 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--363d1fb1-53fd-41e4-91df-1eb8ded13c92","9/7/2023, 11:07:24.976 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 9:29:03.782 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ae012fde-7856-49ca-aabd-28fdb9633617","9/7/2023, 11:07:33.578 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 9:46:58.179 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ce85fe96-3ae1-4eb5-928a-183ef8776f81","9/7/2023, 11:07:43.346 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 9:46:58.216 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--f6ebb0f2-b58c-4830-a518-7bb4207c1003","9/7/2023, 11:07:44.592 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 9:51:38.808 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--1ae2b11f-acda-4828-9e15-06d9eab57217","9/7/2023, 11:07:33.120 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 11:07:40.729 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--96bb6716-451a-48b1-9ab6-2f79894963a4","9/8/2023, 1:07:28.859 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 11:07:41.185 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--808c3640-bfc3-4141-a80f-88d243aa6275","9/8/2023, 1:07:27.375 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/7/2023, 11:07:41.239 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--777441d5-25bb-4af6-ad2c-215dfc4c5c6f","9/8/2023, 1:07:28.491 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 6:38:34.688 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--f0a5bd3d-1837-4c0b-9bab-59147842eb8c","9/8/2023, 5:07:32.654 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",false,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 7:08:26.552 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--2e943c19-84eb-4b92-8fae-150409e77fdf","9/8/2023, 9:08:07.541 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 7:08:50.614 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--51caa893-ea6d-4159-ba4f-d401156c7b79","9/8/2023, 9:08:35.254 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 7:08:50.618 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--14564931-c1eb-4ffe-9e8d-b82107734397","9/8/2023, 9:08:35.762 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 1:07:50.998 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--34996512-f309-473d-b8de-5a1b50425da0","9/8/2023, 3:07:22.219 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 1:08:24.616 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d4316cab-ebc9-469d-8dfd-78e66fc707fd","9/8/2023, 3:07:43.117 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 1:22:26.999 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--efcaa7f2-3ffc-489e-9080-e206e2d93d8d","9/8/2023, 3:07:43.654 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 2:22:23.555 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--197864cf-2f2d-432f-999a-d9a8b3575707","9/8/2023, 3:07:23.550 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 2:23:34.946 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--197864cf-2f2d-432f-999a-d9a8b3575707","9/8/2023, 3:07:23.550 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 2:23:47.118 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--197864cf-2f2d-432f-999a-d9a8b3575707","9/8/2023, 3:07:23.550 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 3:08:02.691 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--f11aca0e-dd2d-450a-986f-5a65bfdf9e91","9/8/2023, 5:07:31.657 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 11:07:51.682 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--bfe8fb60-bf6f-46e8-8d3c-08e7857d8609","9/8/2023, 1:07:25.237 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 11:07:52.621 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--abb9db07-56fc-4132-ad68-82bddd719228","9/8/2023, 1:07:27.674 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 11:07:52.625 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--7964dabe-258e-4b1f-96b9-6792e0384341","9/8/2023, 1:07:27.957 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 11:08:21.419 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--131275ac-8593-4c48-8338-b9ea0dbf1b99","9/8/2023, 1:07:57.412 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""31 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, unsafe.sh. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 11:08:23.895 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--23debd76-f9d4-4cf2-8164-89938885410e","9/8/2023, 1:07:56.471 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/8/2023, 11:16:14.392 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--bfe8fb60-bf6f-46e8-8d3c-08e7857d8609","9/8/2023, 1:07:25.237 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 9:08:25.687 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--7e0d3b09-54f4-43a1-872d-ae2d03b200b3","9/14/2023, 11:07:54.827 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 9:08:25.694 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--27b48f67-f765-4bf9-a12a-ce9d4fa6314b","9/14/2023, 11:07:54.394 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 9:08:36.260 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--bfeae2a7-4698-440b-a64c-8b23d89f65a4","9/14/2023, 11:08:06.757 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 9:08:36.275 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d162bfa1-b19e-4f30-9750-abdbe728cab3","9/14/2023, 11:08:14.787 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 9:09:49.575 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--df5c436a-23f2-4310-869c-3c21214060e0","9/14/2023, 11:08:16.465 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 11:08:01.558 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--77d56653-f3d6-4939-bf3a-d72cbd9e5da4","9/14/2023, 1:07:53.807 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 11:08:05.750 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--e34e6f9e-7219-4d1e-9ce1-b4dd6fc1c559","9/14/2023, 1:07:57.341 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 11:08:11.593 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--acd690a5-4434-468a-b0da-c7b8074462dd","9/14/2023, 1:08:06.017 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 11:08:21.636 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--31db7f78-a377-4906-87bb-20d8aa7baac0","9/14/2023, 1:08:15.841 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 11:09:51.246 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--30641f69-1d5a-4e76-afdc-cecf26916da1","9/14/2023, 1:08:20.554 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 11:45:29.433 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--3b40bf69-06e8-45f8-8f46-cdd865c95a33","9/15/2023, 11:45:12.918 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 11:45:32.604 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--3958d6cf-fc79-4405-bf1d-3eb8e542e2dd","9/15/2023, 11:45:16.331 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 11:45:49.309 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--8e8065b2-1476-49cc-8287-0b52db4fe42e","9/15/2023, 11:45:23.318 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 11:45:58.424 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d2ed9733-cb48-4630-a31b-8762aef721be","9/15/2023, 11:45:34.211 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 11:54:03.497 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--b5f32674-cfe0-4ac5-8671-639dfc1b172c","9/15/2023, 11:45:31.892 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 1:07:56.305 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a6a0f5ef-53bb-445e-8376-153559cc089a","9/14/2023, 3:07:50.850 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 1:08:01.145 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a8e909a4-e987-460a-b253-d64f2fa27c1b","9/14/2023, 3:07:52.693 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 1:08:06.452 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--63e65fe5-80ad-40a6-9798-8179827fa617","9/14/2023, 3:07:55.084 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 1:08:06.920 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--1fa42a0e-cd8e-4719-8238-b371160662f8","9/14/2023, 3:07:56.913 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 1:09:55.920 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--85f500b0-9ad5-4603-9f3e-50547c6c08cc","9/14/2023, 3:08:20.022 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 3:08:15.953 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--15350ff9-d80f-4403-93b6-456e722f54c2","9/14/2023, 5:08:00.076 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 3:08:25.622 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--b64896cd-e4c7-44c9-9022-ecafa5e1141d","9/14/2023, 5:08:09.800 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 3:08:41.550 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--1fec2184-67fa-4aa7-90dc-b65cecd6267b","9/14/2023, 5:08:36.121 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 3:09:16.822 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--e7c3d7f4-4294-4a3d-8dd9-4ca92ba8c1cd","9/14/2023, 5:08:51.070 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 3:09:20.569 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--3a45eaa7-81d0-4d74-af17-05c55459baec","9/14/2023, 5:08:57.836 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 5:08:26.652 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--fa4fb3d5-a494-4f08-919c-1fc70c533b24","9/14/2023, 7:07:59.238 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 5:08:35.652 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--861a4318-a3ee-4337-8874-fadd60aecc15","9/14/2023, 7:08:02.796 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 5:08:40.857 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ad0e2d14-6b67-40d9-a0e9-a41f3c12f5b4","9/14/2023, 7:08:10.841 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 5:09:00.347 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--1e1b37c2-370a-42a8-833c-568aea265abd","9/14/2023, 7:08:27.010 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 5:09:05.374 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--31afae3e-5ad6-4c8d-a09d-670ea31c57d7","9/14/2023, 7:08:28.172 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 7:08:22.427 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d1cf6a11-584a-4ed6-b188-7bc922a5a144","9/14/2023, 9:07:57.156 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 7:08:30.524 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--e20a2b15-9def-476d-8102-3482414a83c8","9/14/2023, 9:08:07.327 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 7:08:35.371 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c608a60b-71ad-40f8-a00c-79765d4bb6b2","9/14/2023, 9:08:08.688 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 7:08:35.683 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a76e638d-e43e-409e-8f54-d841d8cf4140","9/14/2023, 9:08:23.195 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 7:10:10.855 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--642a82ba-58d8-45fe-af18-7f4ffeb161a8","9/14/2023, 9:08:24.631 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 9:08:16.162 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--074133f8-5918-4b6f-b8aa-29945b12cd42","9/14/2023, 11:07:55.930 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 9:08:21.285 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--438b8874-bc19-44c8-9422-46b33e8ae74e","9/14/2023, 11:07:56.443 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 9:08:31.429 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c49d28ad-39d9-4cb8-821c-5abf48f690e2","9/14/2023, 11:08:05.409 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 9:08:40.520 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--cd365926-ccf7-48fc-b4e1-3d78b04b128c","9/14/2023, 11:08:14.725 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 9:08:40.700 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--18a6006c-c89d-4338-89d2-93d52844f8df","9/14/2023, 11:08:16.451 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 11:08:55.986 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--3cf51c32-b33f-4083-8f8f-108cfa857dc8","9/15/2023, 1:08:17.518 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 11:09:00.752 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a7b6e1ef-7e24-416f-8c7f-50abcc16c0a9","9/15/2023, 1:08:21.653 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 11:09:07.625 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--0e0ea676-6582-4426-8f3a-40b1acbb56b7","9/15/2023, 1:08:24.677 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 11:09:11.674 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--5476b219-32ce-4518-9893-d7607a8b6754","9/15/2023, 1:08:25.882 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 11:09:25.661 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--bf220549-12ed-44df-a4e0-1758857ecbef","9/15/2023, 1:08:44.910 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 1:09:56.609 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--f8c3550f-7338-4057-8db8-ae7de09786bb","9/15/2023, 3:09:15.283 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 1:10:01.782 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--587832c8-4e6c-4fc7-9db6-7dd3cb08faa4","9/15/2023, 3:09:19.155 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 1:10:05.918 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ac0c5cf6-b2a1-4189-ad12-0f267ba8b5d7","9/15/2023, 3:09:21.065 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 1:10:26.250 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--3a9c3f54-4aae-4b5a-986b-d47743a03258","9/15/2023, 3:09:37.399 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 1:10:35.121 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--837c33a3-1d16-4d19-aca3-126b99ec992d","9/15/2023, 3:09:41.340 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 3:08:15.221 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--649a5bec-654d-4c18-9e2f-d79c414fc346","9/15/2023, 5:07:55.960 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 3:08:15.247 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--aa8940a4-f69b-40f3-aa7f-d7013102ee7d","9/15/2023, 5:07:57.637 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 3:08:21.225 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--385ac63c-23d0-47bb-b577-861e95ebf4a4","9/15/2023, 5:07:58.845 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 3:08:27.165 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--45169a49-d5b9-437e-96da-122ec384483d","9/15/2023, 5:08:06.694 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 3:08:35.208 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--f3327724-9573-4047-9112-284aa860eff3","9/15/2023, 5:08:17.729 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 5:08:26.168 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--e53d4ff5-20b7-4859-9072-fd781a49633a","9/15/2023, 7:08:10.806 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 5:08:26.599 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d35dac52-da36-4505-8e62-e2f3e74b1d34","9/15/2023, 7:08:08.325 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 5:08:40.734 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c8da906f-4d69-451f-be69-86e9fbf7c516","9/15/2023, 7:08:22.234 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 5:08:40.797 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--4940f3c3-00b0-426d-a806-ba8f9659e240","9/15/2023, 7:08:22.247 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/15/2023, 5:08:50.981 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--382ae4c0-e370-432e-b6c9-c5f339a449cb","9/15/2023, 7:08:29.769 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 11:45:28.308 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--be6a7b75-4b58-4b00-aef8-340f72340857","9/14/2023, 11:45:14.925 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 11:45:28.324 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--060ccba8-4fbe-4e96-bb83-4e76a6965138","9/14/2023, 11:45:15.366 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 11:45:32.570 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--f4cc8dce-5c07-41de-b418-85b2e37e79e3","9/14/2023, 11:45:23.632 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 11:45:38.833 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--be234f74-7d0f-4017-820c-688b1cb73341","9/14/2023, 11:45:28.573 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 11:45:39.787 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--8db96f06-6359-4d6e-aaba-925a84de25ae","9/14/2023, 11:45:31.777 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 1:08:01.288 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--5e27c3b6-f329-425b-8690-c1f68cb7e572","9/13/2023, 3:07:49.450 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 1:08:05.481 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--07b3b9de-ba03-47ff-aa25-5af717ac1d00","9/13/2023, 3:07:51.826 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 1:08:11.425 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--512f8871-0187-4be9-ad16-856a47a08138","9/13/2023, 3:08:07.197 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 1:08:12.403 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--e6ad714e-42bf-453e-bc32-6a8d94571201","9/13/2023, 3:07:59.594 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 1:09:10.237 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a4ff9751-6c4c-41a7-a11e-54df5051ac6e","9/13/2023, 3:08:09.793 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 3:07:52.320 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--bf8429dd-930c-45b6-a59d-e5f6a4b55253","9/13/2023, 5:07:44.305 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 3:07:55.410 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--7bb799d8-c211-4863-9b83-7ee793eb3ab0","9/13/2023, 5:07:51.215 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 3:07:55.573 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--4cbee811-dd9b-4ab5-8af6-60360c5617fd","9/13/2023, 5:07:49.597 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 3:08:11.304 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--dc34aac7-dd1e-408d-936f-5056e675c19d","9/13/2023, 5:08:02.668 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 3:08:15.891 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--36c865e9-ffde-4b7e-a8a8-79c5675585ac","9/13/2023, 5:08:09.491 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 5:07:50.357 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--dac9f2be-fc6b-4238-bf7d-25f1960b5552","9/13/2023, 7:07:46.003 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 5:07:55.814 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a6c10d71-77c1-49f1-9f5a-04dfda9c617a","9/13/2023, 7:07:49.037 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 5:07:55.990 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--18d3c1d8-411c-4a5f-a8da-373bad287b49","9/13/2023, 7:07:50.249 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 5:08:07.002 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--0923776f-9be1-49dd-b7c0-fbd7a7469488","9/13/2023, 7:08:00.959 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 5:08:21.026 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--806be070-5fbb-4bbe-af78-658f0c8853cb","9/13/2023, 7:08:09.048 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 7:09:06.166 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--33cdfdd2-e32a-4fd4-b169-ac7df2224c65","9/13/2023, 9:08:30.135 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 7:09:11.621 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--9e543e32-68ac-446f-9c7b-0dff944a311d","9/13/2023, 9:08:34.003 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 7:09:11.624 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--43c620fb-4173-4a24-a9b1-0c19f2e6ae30","9/13/2023, 9:08:34.174 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 7:09:20.616 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--e5156a3b-994e-426c-a42c-40a25aa26ef0","9/13/2023, 9:08:48.193 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 7:09:21.515 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--8e7ef9c9-18e8-4946-9a8b-118c24ee394e","9/13/2023, 9:08:58.476 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 9:08:24.915 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--53015a09-f0ee-4341-b6dc-bb14d52c6b66","9/13/2023, 11:07:49.674 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 9:08:25.180 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--ca07beae-1262-450a-9c21-19f606d650a2","9/13/2023, 11:07:52.340 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 9:08:32.046 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--4607f6f5-c1eb-463b-be6c-f9d21618bb03","9/13/2023, 11:08:00.984 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 9:08:35.157 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--9e570e31-efe8-4189-92a8-521be7a700c0","9/13/2023, 11:08:07.727 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 9:09:24.648 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--75133179-7c98-46ce-ab52-25dab4392749","9/13/2023, 11:08:12.728 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 11:08:21.321 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--135d7ce6-67d7-4941-ae3d-de573bcac4af","9/14/2023, 1:07:47.773 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 11:08:26.021 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--381e40cc-bac3-4587-b34c-e9569a8dd0ce","9/14/2023, 1:07:51.860 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 11:08:26.147 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--9541b48e-53fe-4d3c-b831-005d66c8e127","9/14/2023, 1:07:51.625 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 11:08:34.824 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--1a6fe549-2e5b-4aa4-ad5b-943eabfc8b6b","9/14/2023, 1:08:01.330 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/13/2023, 11:09:25.382 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--2b9d0059-9fe8-4499-8263-b8fbeff02f30","9/14/2023, 1:08:11.893 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 1:08:45.450 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a1e9f443-4c36-4425-95ab-bc9280555e4f","9/14/2023, 3:08:05.118 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 1:08:50.229 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--2bf931d8-ee89-42bc-aac0-71ab46843a4e","9/14/2023, 3:08:09.620 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 1:08:50.611 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--105dad15-303e-4314-bf68-90846c357cdd","9/14/2023, 3:08:08.918 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 1:08:56.241 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--fee484f7-baec-41b5-b16d-8caf45388f87","9/14/2023, 3:08:21.583 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 1:09:29.727 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--60eec802-5cf0-451f-bf15-37d869cd75ab","9/14/2023, 3:08:26.978 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 3:08:26.020 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--a545308b-7560-4579-b5e3-b139eb85e8f7","9/14/2023, 5:07:53.767 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 3:08:26.255 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--3e6cc431-9819-43fa-9de3-8bc70576f66a","9/14/2023, 5:07:50.763 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 3:08:26.593 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--e5909119-8052-4d45-bc27-f08aa93d3c79","9/14/2023, 5:07:53.926 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 3:08:36.342 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--db240044-8913-4267-8a9a-9dc09c862b45","9/14/2023, 5:08:01.114 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 3:08:42.268 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--e5a719ad-1948-40ff-8679-24dbf06ba57f","9/14/2023, 5:08:17.847 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 5:08:51.247 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--5daa67dc-b751-4964-92e5-762ad43f7a5e","9/14/2023, 7:08:20.046 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 5:08:55.832 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c55c42e4-038d-4687-a919-a8be22a21509","9/14/2023, 7:08:23.990 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 5:08:55.845 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--c4c2ddac-e081-463e-b117-8fba71839c0a","9/14/2023, 7:08:23.242 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 5:09:05.888 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--6fb0173a-2e48-4634-a0b0-2f65e054b386","9/14/2023, 7:08:41.091 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 5:09:05.998 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--6725e3ab-ee3f-49c0-af0e-c88fd1106313","9/14/2023, 7:08:41.606 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 7:08:25.684 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--402844a5-11cf-4905-a846-2615274df075","9/14/2023, 9:07:52.357 AM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""1 sighting on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 7:08:26.386 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--0e95224f-8b87-4c46-8296-6719241e7b6c","9/14/2023, 9:07:55.484 AM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 7:08:29.906 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--3dca6811-6f49-4dda-9099-30a874ae334c","9/14/2023, 9:07:56.762 AM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 7:08:51.899 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",80,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--515156fc-68e5-4f5c-9f28-2f6f4b57157c","9/14/2023, 9:08:08.018 AM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1693329672336,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator +"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/14/2023, 7:09:46.049 AM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--4b197e88-d43d-4844-acd9-454f8533276d","9/14/2023, 9:08:12.066 AM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator diff --git a/Sample Data/Custom/Recoreded Future/RecordedFutureUrlWorkbook_ThreatIntelligenceIndicator_IngestedLogs.csv b/Sample Data/Custom/Recoreded Future/RecordedFutureUrlWorkbook_ThreatIntelligenceIndicator_IngestedLogs.csv new file mode 100644 index 00000000000..30b95bf3d73 --- /dev/null +++ b/Sample Data/Custom/Recoreded Future/RecordedFutureUrlWorkbook_ThreatIntelligenceIndicator_IngestedLogs.csv @@ -0,0 +1,6 @@ +TenantId,"TimeGenerated [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",SourceSystem,Action,ActivityGroupNames,AdditionalInformation,ApplicationId,AzureTenantId,ConfidenceScore,Description,DiamondModel,ExternalIndicatorId,"ExpirationDateTime [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",IndicatorId,ThreatType,Active,KillChainActions,KillChainC2,KillChainDelivery,KillChainExploitation,KillChainReconnaissance,KillChainWeaponization,KnownFalsePositives,MalwareNames,PassiveOnly,ThreatSeverity,Tags,TrafficLightProtocolLevel,EmailEncoding,EmailLanguage,EmailRecipient,EmailSenderAddress,EmailSenderName,EmailSourceDomain,EmailSourceIpAddress,EmailSubject,EmailXMailer,"FileCompileDateTime [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]","FileCreatedDateTime [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",FileHashType,FileHashValue,FileMutexName,FileName,FilePacker,FilePath,FileSize,FileType,DomainName,NetworkIP,NetworkPort,NetworkDestinationAsn,NetworkDestinationCidrBlock,NetworkDestinationIP,NetworkCidrBlock,NetworkDestinationPort,NetworkProtocol,NetworkSourceAsn,NetworkSourceCidrBlock,NetworkSourceIP,NetworkSourcePort,Url,UserAgent,IndicatorProvider,Type,TenantId1,SourceSystem1,MG,ManagementGroupName,"TimeGenerated1 [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]",Computer,RawData,"Action_s","Content_Type_s","Device_s","Domain_s","Response_s","Src_IPv4_s","URL_s",Type1,"_ResourceId","IP_TimeGenerated [Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna]" +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 9:08:41.547 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--fc6279d4-dff0-4df3-9284-898c7fcd9c7d","9/17/2023, 11:08:10.318 PM",222A2962DA75618542D41BF1C27068A91CAEBA4AD4C9E0CA3E62515B35DFDA59,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. https://azuredeploystore.com/cloud/services is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1680178676798,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://azuredeploystore.com/cloud/services",,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/30/2023, 1:03:23.582 PM",,,GET,"image/x-icon","Squid_Proxy","azuredeploystore.com","TCP_MISS/304","10.1.207.199","https://azuredeploystore.com/cloud/services","Squid_Proxy_URL_CL",,"8/30/2023, 1:03:23.582 PM" +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 9:08:35.586 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",79,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--d7129dd9-0689-4c04-ba37-d540e791ccd5","9/17/2023, 11:08:01.975 PM",2C011E0DE727B28C2F51B520D3F1CD0FCEDE621B25CB21AF90427828059CF8A8,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""36 sightings on 13 sources including: Malware Analysis News and Indicators Latest Posts, Palo Alto Networks, ASEC Blog Japan, CloudSEK, FreeBufCOM. Most recent link (Apr 12, 2023): https://asec.ahnlab.com/jp/51060/\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1681284451000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""6 sightings on 1 source: External Sensor Data Analysis. https://glcloudservice.com/v1/console is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1692930527787,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""2 sightings on 1 source: Insikt Group. 2 reports including Trojanized 3CXDesktopApp Binary Files Deployed in Supply Chain Attack. Most recent link (Apr 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:qsTw3m\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1680652800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://glcloudservice.com/v1/console",,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/5/2023, 1:03:26.577 PM",,,GET,"image/jpeg","Squid_Proxy","glcloudservice.com","TCP_MISS/304","10.1.3.187","https://glcloudservice.com/v1/console","Squid_Proxy_URL_CL",,"9/5/2023, 1:03:26.577 PM" +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 9:08:40.989 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",73,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--4a88d374-5fab-49ac-814c-ab2512d8b84d","9/17/2023, 11:08:07.936 PM",AA24EB448BFDC4B590CBF2A4AA3A1AF7E45C69A07CE64E912DC168FB3B8EAFC3,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""38 sightings on 7 sources including: thesecmaster.com, XSS (ex DamageLab) Forum, unsafe.sh, Kaspersky Securelist and Lab, Malware Analysis News and Indicators Latest Posts. Most recent link (Jul 19, 2023): https://Probiv%20Forum%20(Obfuscated)/threads/prilozhenija-s-sjurprizom-novoe-semejstvo-podpisochnyx-trojancev-v-google-play.136347/post-1127080\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689787888000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""2 sightings on 1 source: External Sensor Data Analysis. http://f6.beautycam.xyz is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1691893608192,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: New Fleckpe Android Subscription Trojan Advertised Legitimate Applications on Google Play Store. Most recent link (May 05, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:rHX4Vo\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1683244800000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://f6.beautycam.xyz",,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"8/26/2023, 1:03:23.114 PM",,,GET,"text/javascript","Squid_Proxy","f6.beautycam.xyz - DIRECT","TCP_MISS/304","10.1.141.80","http://f6.beautycam.xyz","Squid_Proxy_URL_CL",,"8/26/2023, 1:03:23.114 PM" +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 9:08:41.511 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",83,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--36292b9b-c990-487b-a248-2e48bd931bfb","9/17/2023, 11:08:07.372 PM",5B6CEF1AFB9C8FE2AF133864AA9A126C12A9E4C20CE52030048486A804CC23B5,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""19 sightings on 6 sources including: cisa.gov, FBI | IC3 Industry Alerts, CISA Cybersecurity Advisories, rb.gy, EU Cert feed. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 2 sources: External Sensor Data Analysis, Bitdefender. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686096000000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported as a Defanged URL\"",\""EvidenceString\"":\""2 sightings on 1 source: cisa.gov. Most recent link (Sep 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-158a-stopransomware-cl0p-ransomware-gang-exploits-moveit-vulnerability_8.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694467954193,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Reported by DHS AIS\"",\""EvidenceString\"":\""1 sighting on 1 source: DHS Automated Indicator Sharing. 1 report: AA23-158A StopRansomware CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability (Jun 9, 2023).\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1686306198000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified http://qweastradoc.com/gate.php as possible TA0011 (Command and Control) for Unknown malware on February 11, 2023. Most recent link (Feb 11, 2023): https://threatfox.abuse.ch/ioc/1079449\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1676103783000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Detected Malware Distribution\"",\""EvidenceString\"":\""1 sighting on 1 source: External Sensor Data Analysis. http://qweastradoc.com/gate.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1694440866462,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"http://qweastradoc.com/gate.php",,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/3/2023, 1:03:25.820 PM",,,GET,"application/msword","Squid_Proxy","qweastradoc.com","TCP_MISS/200","10.1.128.138","http://qweastradoc.com/gate.php","Squid_Proxy_URL_CL",,"9/3/2023, 1:03:25.820 PM" +"f233a343-df06-4d9a-8a18-5b3eb8942c7f","9/17/2023, 9:12:40.441 PM","Recorded Future",alert,,,,"ce7c0437-29b2-4139-8c26-0babf2d3738c",76,"Recorded Future - URL - Recently Reported by Insikt Group",,"indicator--4481d3fb-6a10-4be8-ac2b-42890a41b69a","9/17/2023, 11:08:22.480 PM",ED8A7E4D00F2DC4EADA634BB814BD89A0DD591B708D3D6C08AAAF3E8AC802D5E,"malicious-activity",true,,,,,,,,,,,"[""[{\""Rule\"":\""Historically Reported as a Defanged URL\"",\""EvidenceString\"":\""7 sightings on 4 sources: cisa.gov, FBI | IC3 Industry Alerts, EU Cert feed, Security Alerts USCert. Most recent link (Jul 11, 2023): https://www.cisa.gov/sites/default/files/2023-07/aa23-187a-increased-truebot-activity-infects-us-and-canada-based-networks_0.pdf\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1689074563170,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historically Detected Malware Distribution\"",\""EvidenceString\"":\""3 sightings on 1 source: External Sensor Data Analysis. https://dremmfyttrred.com/dns.php is observed to be a malware site URL that navigates to malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, or code.\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1694110926208,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Historical Suspected C&C URL\"",\""EvidenceString\"":\""1 sighting on 1 source: ThreatFox Infrastructure Analysis. ThreatFox identified https://dremmfyttrred.com/dns.php as possible TA0011 (Command and Control) for Silence on May 06, 2023. Most recent link (May 6, 2023): https://threatfox.abuse.ch/ioc/1112788\"",\""CriticalityLabel\"":\""Unusual\"",\""Timestamp\"":1683351916000,\""MitigationString\"":\""\"",\""Criticality\"":1},{\""Rule\"":\""Recently Reported by DHS AIS\"",\""EvidenceString\"":\""2 sightings on 1 source: DHS Automated Indicator Sharing. 2 reports including AA23-187A Increased Truebot Activity Infects U.S. and Canada Based Networks at Scale (Jul 21, 2023).\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1689937516000,\""MitigationString\"":\""\"",\""Criticality\"":3},{\""Rule\"":\""Recently Reported by Insikt Group\"",\""EvidenceString\"":\""1 sighting on 1 source: Insikt Group. 1 report: CISA’s Joint Cybersecurity Advisory About the New Truebot Variants’ Infection Chain and Tools. Most recent link (Jul 10, 2023): https://app.recordedfuture.com/portal/analyst-note/doc:r8OwJZ\"",\""CriticalityLabel\"":\""Malicious\"",\""Timestamp\"":1688947200000,\""MitigationString\"":\""\"",\""Criticality\"":3}]""]",unknown,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"https://dremmfyttrred.com/dns.php",,,ThreatIntelligenceIndicator,"f233a343-df06-4d9a-8a18-5b3eb8942c7f",RestAPI,,,"9/15/2023, 1:03:31.973 PM",,,GET,"text/plain","Squid_Proxy","dremmfyttrred.com","TCP_MISS/304","10.1.150.146","https://dremmfyttrred.com/dns.php","Squid_Proxy_URL_CL",,"9/15/2023, 1:03:31.973 PM" diff --git a/Sample Data/ThreatIntelligence/GreyNoiseThreatIntelligence.json b/Sample Data/ThreatIntelligence/GreyNoiseThreatIntelligence.json new file mode 100644 index 00000000000..eed85cdc041 --- /dev/null +++ b/Sample Data/ThreatIntelligence/GreyNoiseThreatIntelligence.json @@ -0,0 +1 @@ +[{"type": "indicator", "spec_version": "2.1", "id": "indicator--849a9eaf-1b0f-556d-ab18-7b6a1d1978f6", "created_by_ref": "identity--90a30b13-e3e2-45e1-be2b-48a8b977ecbc", "created": "2023-09-11T17:54:10.07195Z", "modified": "2023-09-11T17:54:10.07195Z", "name": "GreyNoise Internet Scanner IOC", "description": "GreyNoise Indicator", "indicator_types": ["unknown"], "pattern": "[ipv4-addr:value = '1.1.1.2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2023-09-11T00:00:00Z", "valid_until": "2023-09-12T17:54:03.846064Z", "confidence": 90}, {"type": "indicator", "spec_version": "2.1", "id": "indicator--20d96100-01cf-5753-8f5b-5ed2aa08f921", "created_by_ref": "identity--90a30b13-e3e2-45e1-be2b-48a8b977ecbc", "created": "2023-09-11T17:54:10.135856Z", "modified": "2023-09-11T17:54:10.135856Z", "name": "GreyNoise Internet Scanner IOC", "description": "GreyNoise Indicator", "indicator_types": ["unknown"], "pattern": "[ipv4-addr:value = '1.1.1.3']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2023-02-24T00:00:00Z", "valid_until": "2023-09-12T17:54:03.846064Z", "confidence": 100}, {"type": "indicator", "spec_version": "2.1", "id": "indicator--3d63ab74-3949-57f7-bf40-0a7c4f149a77", "created_by_ref": "identity--90a30b13-e3e2-45e1-be2b-48a8b977ecbc", "created": "2023-09-11T17:54:10.144328Z", "modified": "2023-09-11T17:54:10.144328Z", "name": "GreyNoise Internet Scanner IOC", "description": "GreyNoise Indicator", "indicator_types": ["unknown"], "pattern": "[ipv4-addr:value = '1.1.1.4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2023-09-01T00:00:00Z", "valid_until": "2023-09-12T17:54:03.846064Z", "confidence": 100}, {"type": "indicator", "spec_version": "2.1", "id": "indicator--0c70e00d-e0a8-5144-8424-cd0fa3ecd5e3", "created_by_ref": "identity--90a30b13-e3e2-45e1-be2b-48a8b977ecbc", "created": "2023-09-11T17:54:10.150941Z", "modified": "2023-09-11T17:54:10.150941Z", "name": "GreyNoise Internet Scanner IOC", "description": "GreyNoise Indicator", "indicator_types": ["malicious"], "pattern": "[ipv4-addr:value = '1.1.1.5']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2023-09-08T00:00:00Z", "valid_until": "2023-09-12T17:54:03.846064Z", "labels": ["Mirai"], "confidence": 100}, {"type": "indicator", "spec_version": "2.1", "id": "indicator--b8dfd523-5156-5319-9375-53add8183ea4", "created_by_ref": "identity--90a30b13-e3e2-45e1-be2b-48a8b977ecbc", "created": "2023-09-11T17:54:10.157199Z", "modified": "2023-09-11T17:54:10.157199Z", "name": "GreyNoise Internet Scanner IOC", "description": "GreyNoise Indicator", "indicator_types": ["unknown"], "pattern": "[ipv4-addr:value = '1.1.1.1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-12-23T00:00:00Z", "valid_until": "2023-09-12T17:54:03.846064Z", "labels": ["SMBv1 Crawler"], "confidence": 100}] \ No newline at end of file diff --git a/Solutions/Azure Active Directory/Analytic Rules/SigninBruteForce-AzurePortal.yaml b/Solutions/Azure Active Directory/Analytic Rules/SigninBruteForce-AzurePortal.yaml index 5df587c2d5b..279e861fa75 100644 --- a/Solutions/Azure Active Directory/Analytic Rules/SigninBruteForce-AzurePortal.yaml +++ b/Solutions/Azure Active Directory/Analytic Rules/SigninBruteForce-AzurePortal.yaml @@ -1,9 +1,8 @@ id: 28b42356-45af-40a6-a0b4-a554cdfd5d8a name: Brute force attack against Azure Portal -description: | - 'Identifies evidence of brute force activity against Azure Portal by highlighting multiple authentication failures and by a successful authentication within a given time window. - Default Failure count is 10 and default Time Window is 20 minutes. - References: https://docs.microsoft.com/azure/active-directory/reports-monitoring/reference-sign-ins-error-codes.' +description: > + Detects Azure Portal brute force attacks by monitoring for multiple authentication failures and a successful login within a 20-minute window. Default settings: 10 failures, 25 deviations. + Ref: https://docs.microsoft.com/azure/active-directory/reports-monitoring/reference-sign-ins-error-codes. severity: Medium requiredDataConnectors: - connectorId: AzureActiveDirectory @@ -13,7 +12,7 @@ requiredDataConnectors: dataTypes: - AADNonInteractiveUserSignInLogs queryFrequency: 1d -queryPeriod: 1d +queryPeriod: 7d triggerOperator: gt triggerThreshold: 0 status: Available @@ -22,48 +21,64 @@ tactics: relevantTechniques: - T1110 query: | - let timeRange = 24h; - let failureCountThreshold = 10; - let authenticationWindow = 20m; - let aadFunc = (tableName:string){ - table(tableName) - | where AppDisplayName has "Azure Portal" - | extend - DeviceDetail = todynamic(DeviceDetail), - //Status = todynamic(Status), - LocationDetails = todynamic(LocationDetails) - | extend - OS = tostring(DeviceDetail.operatingSystem), - Browser = tostring(DeviceDetail.browser), - //StatusCode = tostring(Status.errorCode), - //StatusDetails = tostring(Status.additionalDetails), - State = tostring(LocationDetails.state), - City = tostring(LocationDetails.city), - Region = tostring(LocationDetails.countryOrRegion) - // Split out failure versus non-failure types - | extend FailureOrSuccess = iff(ResultType in ("0", "50125", "50140", "70043", "70044"), "Success", "Failure") - // sort for sessionizing - by UserPrincipalName and time of the authentication outcome - | sort by UserPrincipalName asc, TimeGenerated asc - // sessionize into failure groupings until either the account changes or there is a success - | extend SessionStartedUtc = row_window_session(TimeGenerated, timeRange, authenticationWindow, UserPrincipalName != prev(UserPrincipalName) or prev(FailureOrSuccess) == "Success") - // bin outcomes based on authenticationWindow - | summarize FailureOrSuccessCount = count() by FailureOrSuccess, UserId, UserDisplayName, AppDisplayName, IPAddress, Browser, OS, State, City, Region, Type, CorrelationId, bin(TimeGenerated, authenticationWindow), ResultType, UserPrincipalName,SessionStartedUtc - // count the failures in each session - | summarize FailureCountBeforeSuccess=sumif(FailureOrSuccessCount, FailureOrSuccess == "Failure"), StartTime=min(TimeGenerated), EndTime=max(TimeGenerated), makelist(FailureOrSuccess), IPAddress = make_set(IPAddress,15), make_set(Browser,15), make_set(City,15), make_set(State,15), make_set(Region,15), make_set(ResultType,15) by SessionStartedUtc, UserPrincipalName, CorrelationId, AppDisplayName, UserId, Type - // the session must not start with a success, and must end with one - | where array_index_of(list_FailureOrSuccess, "Success") != 0 - | where array_index_of(list_FailureOrSuccess, "Success") == array_length(list_FailureOrSuccess) - 1 - | project-away SessionStartedUtc, list_FailureOrSuccess - // where the number of failures before the success is above the threshold - | where FailureCountBeforeSuccess >= failureCountThreshold - // expand out ip for entity assignment - | mv-expand IPAddress - | extend IPAddress = tostring(IPAddress) - | extend timestamp = StartTime - }; + // Set threshold value for deviation + let threshold = 25; + // Set the time range for the query + let timeRange = 24h; + // Set the authentication window duration + let authenticationWindow = 20m; + // Define a reusable function 'aadFunc' that takes a table name as input + let aadFunc = (tableName: string) { + // Query the specified table + table(tableName) + // Filter data within the last 24 hours + | where TimeGenerated > ago(1d) + // Filter records related to "Azure Portal" applications + | where AppDisplayName has "Azure Portal" + // Extract and transform some fields + | extend + DeviceDetail = todynamic(DeviceDetail), + LocationDetails = todynamic(LocationDetails) + | extend + OS = tostring(DeviceDetail.operatingSystem), + Browser = tostring(DeviceDetail.browser), + State = tostring(LocationDetails.state), + City = tostring(LocationDetails.city), + Region = tostring(LocationDetails.countryOrRegion) + // Categorize records as Success or Failure based on ResultType + | extend FailureOrSuccess = iff(ResultType in ("0", "50125", "50140", "70043", "70044"), "Success", "Failure") + // Sort and identify sessions + | sort by UserPrincipalName asc, TimeGenerated asc + | extend SessionStartedUtc = row_window_session(TimeGenerated, timeRange, authenticationWindow, UserPrincipalName != prev(UserPrincipalName) or prev(FailureOrSuccess) == "Success") + // Summarize data + | summarize FailureOrSuccessCount = count() by FailureOrSuccess, UserId, UserDisplayName, AppDisplayName, IPAddress, Browser, OS, State, City, Region, Type, CorrelationId, bin(TimeGenerated, authenticationWindow), ResultType, UserPrincipalName, SessionStartedUtc + | summarize FailureCountBeforeSuccess = sumif(FailureOrSuccessCount, FailureOrSuccess == "Failure"), StartTime = min(TimeGenerated), EndTime = max(TimeGenerated), makelist(FailureOrSuccess), IPAddress = make_set(IPAddress, 15), make_set(Browser, 15), make_set(City, 15), make_set(State, 15), make_set(Region, 15), make_set(ResultType, 15) by SessionStartedUtc, UserPrincipalName, CorrelationId, AppDisplayName, UserId, Type + // Filter records where "Success" occurs in the middle of a session + | where array_index_of(list_FailureOrSuccess, "Success") != 0 + | where array_index_of(list_FailureOrSuccess, "Success") == array_length(list_FailureOrSuccess) - 1 + // Remove unnecessary columns from the output + | project-away SessionStartedUtc, list_FailureOrSuccess + // Join with another table and calculate deviation + | join kind=inner ( + table(tableName) + | where TimeGenerated > ago(7d) + | where AppDisplayName has "Azure Portal" + | extend FailureOrSuccess = iff(ResultType in ("0", "50125", "50140", "70043", "70044"), "Success", "Failure") + | summarize avgFailures = avg(todouble(FailureOrSuccess == "Failure")) by UserPrincipalName + ) on UserPrincipalName + | extend Deviation = abs(FailureCountBeforeSuccess - avgFailures) / avgFailures + // Filter records based on deviation and failure count criteria + | where Deviation > threshold and FailureCountBeforeSuccess >= 10 + // Expand the IPAddress array + | mv-expand IPAddress + | extend IPAddress = tostring(IPAddress) + | extend timestamp = StartTime + }; + // Call 'aadFunc' with different table names and union the results let aadSignin = aadFunc("SigninLogs"); let aadNonInt = aadFunc("AADNonInteractiveUserSignInLogs"); union isfuzzy=true aadSignin, aadNonInt + // Additional transformation: Split UserPrincipalName | extend Name = tostring(split(UserPrincipalName,'@',0)[0]), UPNSuffix = tostring(split(UserPrincipalName,'@',1)[0]) entityMappings: - entityType: Account @@ -72,9 +87,11 @@ entityMappings: columnName: Name - identifier: UPNSuffix columnName: UPNSuffix + - identifier: AadUserId + columnName: UserId - entityType: IP fieldMappings: - identifier: Address columnName: IPAddress -version: 2.1.1 +version: 2.1.2 kind: Scheduled diff --git a/Solutions/GreyNoiseThreatIntelligence/Analytic Rules/GreyNoise_IPEntity_CustomSecurityLog.yaml b/Solutions/GreyNoiseThreatIntelligence/Analytic Rules/GreyNoise_IPEntity_CustomSecurityLog.yaml new file mode 100644 index 00000000000..179da6a427e --- /dev/null +++ b/Solutions/GreyNoiseThreatIntelligence/Analytic Rules/GreyNoise_IPEntity_CustomSecurityLog.yaml @@ -0,0 +1,61 @@ +id: e50657d7-8bca-43ff-a647-d407fae440d6 +name: GreyNoise TI Map IP Entity to CommonSecurityLog +description: | + This query maps GreyNoise IP indicators of compromise (IOCs) from threat intelligence (TI), by searching for matches in CommonSecurityLog. +severity: Medium +requiredDataConnectors: + - connectorId: ThreatIntelligence + dataTypes: + - ThreatIntelligenceIndicator + - connectorId: CEF + dataTypes: + - CommonSecurityLog + - connectorId: GreyNoise2SentinelAPI + dataTypes: + - ThreatIntelligenceIndicator +queryFrequency: 4h +queryPeriod: 14d +triggerOperator: gt +triggerThreshold: 0 +tactics: + - Impact +query: | + let IPRegex = '[0-9]{1,3}\\.[0-9]{1,3}\\.[0-9]{1,3}\\.[0-9]{1,3}'; + let dt_lookBack = 1h; // Look back 1 hour for CommonSecurityLog events + let ioc_lookBack = 14d; // Look back 14 days for threat intelligence indicators + // Fetch threat intelligence indicators related to IP addresses + let IP_Indicators = ThreatIntelligenceIndicator + | where TimeGenerated >= ago(ioc_lookBack) + | summarize LatestIndicatorTime = arg_max(TimeGenerated, *) by IndicatorId + | where Active == true and ExpirationDateTime > now() + | where SourceSystem == 'GreyNoise' + | where isnotempty(NetworkIP) or isnotempty(EmailSourceIpAddress) or isnotempty(NetworkDestinationIP) or isnotempty(NetworkSourceIP) + | extend TI_ipEntity = iff(isnotempty(NetworkIP), NetworkIP, NetworkDestinationIP) + | extend TI_ipEntity = iff(isempty(TI_ipEntity) and isnotempty(NetworkSourceIP), NetworkSourceIP, TI_ipEntity) + | extend TI_ipEntity = iff(isempty(TI_ipEntity) and isnotempty(EmailSourceIpAddress), EmailSourceIpAddress, TI_ipEntity) + | where ipv4_is_private(TI_ipEntity) == false and TI_ipEntity !startswith "fe80" and TI_ipEntity !startswith "::" and TI_ipEntity !startswith "127."; + // Perform a join between IP indicators and CommonSecurityLog events + IP_Indicators + // Use innerunique to keep performance fast and result set low, as we only need one match to indicate potential malicious activity that needs investigation + | join kind=innerunique ( + CommonSecurityLog + | where TimeGenerated >= ago(dt_lookBack) + | extend MessageIP = extract(IPRegex, 0, Message) + | extend CS_ipEntity = iff(isnotempty(SourceIP), SourceIP, DestinationIP) + | extend CS_ipEntity = iff(isempty(CS_ipEntity) and isnotempty(MessageIP), MessageIP, CS_ipEntity) + | extend CommonSecurityLog_TimeGenerated = TimeGenerated + ) + on $left.TI_ipEntity == $right.CS_ipEntity + // Filter out logs that occurred after the expiration of the corresponding indicator + | where CommonSecurityLog_TimeGenerated < ExpirationDateTime + // Group the results by IndicatorId and CS_ipEntity, and keep the log entry with the latest timestamp + | summarize CommonSecurityLog_TimeGenerated = arg_max(CommonSecurityLog_TimeGenerated, *) by IndicatorId, CS_ipEntity + // Select the desired output fields + | project timestamp = CommonSecurityLog_TimeGenerated, SourceIP, DestinationIP, MessageIP, Message, DeviceVendor, DeviceProduct, IndicatorId, ThreatType, ExpirationDateTime, ConfidenceScore, TI_ipEntity, CS_ipEntity, LogSeverity, DeviceAction, Type +entityMappings: + - entityType: IP + fieldMappings: + - identifier: Address + columnName: CS_ipEntity +version: 1.0.0 +kind: Scheduled diff --git a/Solutions/GreyNoiseThreatIntelligence/Analytic Rules/GreyNoise_IPEntity_DnsEvents.yaml b/Solutions/GreyNoiseThreatIntelligence/Analytic Rules/GreyNoise_IPEntity_DnsEvents.yaml new file mode 100644 index 00000000000..9ed4f9b2f32 --- /dev/null +++ b/Solutions/GreyNoiseThreatIntelligence/Analytic Rules/GreyNoise_IPEntity_DnsEvents.yaml @@ -0,0 +1,74 @@ +id: ddf47b6f-870c-5712-a296-1383acb13c82 +name: GreyNoise TI Map IP Entity to DnsEvents +version: 1.0.0 +kind: Scheduled +description: | + This query maps any IP indicators of compromise (IOCs) from GreyNoise Threat Intelligence (TI), by searching for matches in DnsEvents. +severity: Medium +requiredDataConnectors: + - connectorId: ThreatIntelligence + dataTypes: + - ThreatIntelligenceIndicator + - connectorId: ThreatIntelligenceTaxii + dataTypes: + - ThreatIntelligenceIndicator + - connectorId: DNS + dataTypes: + - DnsEvents + - connectorId: GreyNoise2SentinelAPI + dataTypes: + - ThreatIntelligenceIndicator +queryFrequency: 1h +queryPeriod: 14d +triggerOperator: gt +triggerThreshold: 0 +tactics: + - Impact +query: | + let dt_lookBack = 1h; // Look back 1 hour for DNS events + let ioc_lookBack = 14d; // Look back 14 days for threat intelligence indicators + // Fetch threat intelligence indicators related to IP addresses + let IP_Indicators = ThreatIntelligenceIndicator + | where TimeGenerated >= ago(ioc_lookBack) + | summarize LatestIndicatorTime = arg_max(TimeGenerated, *) by IndicatorId + | where Active == true and ExpirationDateTime > now() + | where SourceSystem == 'GreyNoise' + | where isnotempty(NetworkIP) or isnotempty(EmailSourceIpAddress) or isnotempty(NetworkDestinationIP) or isnotempty(NetworkSourceIP) + | extend TI_ipEntity = iff(isnotempty(NetworkIP), NetworkIP, NetworkDestinationIP) + | extend TI_ipEntity = iff(isempty(TI_ipEntity) and isnotempty(NetworkSourceIP), NetworkSourceIP, TI_ipEntity) + | extend TI_ipEntity = iff(isempty(TI_ipEntity) and isnotempty(EmailSourceIpAddress), EmailSourceIpAddress, TI_ipEntity) + | where ipv4_is_private(TI_ipEntity) == false and TI_ipEntity !startswith "fe80" and TI_ipEntity !startswith "::" and TI_ipEntity !startswith "127."; + // Perform a join between IP indicators and DNS events + IP_Indicators + // Use innerunique to keep performance fast and result set low, as we only need one match to indicate potential malicious activity that needs investigation + | join kind=innerunique ( + DnsEvents + | where TimeGenerated >= ago(dt_lookBack) + | where SubType =~ "LookupQuery" and isnotempty(IPAddresses) + | mv-expand SingleIP = split(IPAddresses, ", ") to typeof(string) + | extend DNS_TimeGenerated = TimeGenerated + ) + on $left.TI_ipEntity == $right.SingleIP + // Filter out DNS events that occurred after the expiration of the corresponding indicator + | where DNS_TimeGenerated < ExpirationDateTime + // Group the results by IndicatorId and SingleIP, and keep the DNS event with the latest timestamp + | summarize DNS_TimeGenerated = arg_max(DNS_TimeGenerated, *) by IndicatorId, SingleIP + // Select the desired output fields + | project DNS_TimeGenerated, Description, ActivityGroupNames, IndicatorId, ThreatType, Url, DomainName, ExpirationDateTime, ConfidenceScore, + TI_ipEntity, Computer, EventId, SubType, ClientIP, Name, IPAddresses, NetworkIP, NetworkDestinationIP, NetworkSourceIP, EmailSourceIpAddress, Type + | extend timestamp = DNS_TimeGenerated, HostName = tostring(split(Computer, '.', 0)[0]), DnsDomain = tostring(strcat_array(array_slice(split(Computer, '.'), 1, -1), '.')) +entityMappings: + - entityType: Host + fieldMappings: + - identifier: HostName + columnName: HostName + - identifier: DnsDomain + columnName: DnsDomain + - entityType: IP + fieldMappings: + - identifier: Address + columnName: ClientIP + - entityType: URL + fieldMappings: + - identifier: Url + columnName: Url diff --git a/Solutions/GreyNoiseThreatIntelligence/Analytic Rules/GreyNoise_IPEntity_OfficeActivity.yaml b/Solutions/GreyNoiseThreatIntelligence/Analytic Rules/GreyNoise_IPEntity_OfficeActivity.yaml new file mode 100644 index 00000000000..1b9bbce2918 --- /dev/null +++ b/Solutions/GreyNoiseThreatIntelligence/Analytic Rules/GreyNoise_IPEntity_OfficeActivity.yaml @@ -0,0 +1,78 @@ +id: c51628fe-999c-5150-9fd7-660fc4f58ed2 +name: GreyNoise TI map IP entity to OfficeActivity +version: 1.0.0 +kind: Scheduled +description: | + This query maps any GreyNoise IP indicators of compromise (IOCs) from threat intelligence (TI), by searching for matches in OfficeActivity. +severity: Medium +requiredDataConnectors: + - connectorId: ThreatIntelligence + dataTypes: + - ThreatIntelligenceIndicator + - connectorId: ThreatIntelligenceTaxii + dataTypes: + - ThreatIntelligenceIndicator + - connectorId: MicrosoftDefenderThreatIntelligence + dataTypes: + - ThreatIntelligenceIndicator + - connectorId: Office365 + dataTypes: + - OfficeActivity + - connectorId: GreyNoise2SentinelAPI + dataTypes: + - ThreatIntelligenceIndicator +queryFrequency: 1h +queryPeriod: 14d +triggerOperator: gt +triggerThreshold: 0 +tactics: + - Impact +query: | + let dt_lookBack = 1h; // Look back 1 hour for OfficeActivity events + let ioc_lookBack = 14d; // Look back 14 days for threat intelligence indicators + // Fetch threat intelligence indicators related to IP addresses + let IP_Indicators = ThreatIntelligenceIndicator + | where TimeGenerated >= ago(ioc_lookBack) + | summarize LatestIndicatorTime = arg_max(TimeGenerated, *) by IndicatorId + | where Active == true and ExpirationDateTime > now() + | where SourceSystem == 'GreyNoise' + | where isnotempty(NetworkIP) or isnotempty(EmailSourceIpAddress) or isnotempty(NetworkDestinationIP) or isnotempty(NetworkSourceIP) + | extend TI_ipEntity = iff(isnotempty(NetworkIP), NetworkIP, NetworkDestinationIP) + | extend TI_ipEntity = iff(isempty(TI_ipEntity) and isnotempty(NetworkSourceIP), NetworkSourceIP, TI_ipEntity) + | extend TI_ipEntity = iff(isempty(TI_ipEntity) and isnotempty(EmailSourceIpAddress), EmailSourceIpAddress, TI_ipEntity) + | where ipv4_is_private(TI_ipEntity) == false and TI_ipEntity !startswith "fe80" and TI_ipEntity !startswith "::" and TI_ipEntity !startswith "127."; + // Perform a join between IP indicators and OfficeActivity events + IP_Indicators + // Use innerunique to keep performance fast and result set low, as we only need one match to indicate potential malicious activity that needs investigation + | join kind=innerunique ( + OfficeActivity + | where TimeGenerated >= ago(dt_lookBack) + | where isnotempty(ClientIP) + | extend ClientIPValues = extract_all(@'\[?(::ffff:)?(?P(\d+\.\d+\.\d+\.\d+)|[^\]%]+)(%\d+)?\]?([-:](?P\d+))?', dynamic(["IPAddress", "Port"]), ClientIP)[0] + | extend IPAddress = iff(array_length(ClientIPValues) > 0, tostring(ClientIPValues[0]), '') + | extend OfficeActivity_TimeGenerated = TimeGenerated + ) + on $left.TI_ipEntity == $right.IPAddress + // Filter out OfficeActivity events that occurred after the expiration of the corresponding indicator + | where OfficeActivity_TimeGenerated < ExpirationDateTime + // Group the results by IndicatorId and keep the OfficeActivity event with the latest timestamp + | summarize OfficeActivity_TimeGenerated = arg_max(OfficeActivity_TimeGenerated, *) by IndicatorId + // Select the desired output fields + | project OfficeActivity_TimeGenerated, Description, ActivityGroupNames, IndicatorId, ThreatType, Url, ExpirationDateTime, ConfidenceScore, + TI_ipEntity, ClientIP, UserId, Operation, ResultStatus, RecordType, OfficeObjectId, NetworkIP, NetworkDestinationIP, NetworkSourceIP, EmailSourceIpAddress, Type + | extend timestamp = OfficeActivity_TimeGenerated, Name = tostring(split(UserId, '@', 0)[0]), UPNSuffix = tostring(split(UserId, '@', 1)[0]) +entityMappings: + - entityType: Account + fieldMappings: + - identifier: Name + columnName: Name + - identifier: UPNSuffix + columnName: UPNSuffix + - entityType: IP + fieldMappings: + - identifier: Address + columnName: TI_ipEntity + - entityType: URL + fieldMappings: + - identifier: Url + columnName: Url diff --git a/Solutions/GreyNoiseThreatIntelligence/Analytic Rules/GreyNoise_IPEntity_SigninLogs.yaml b/Solutions/GreyNoiseThreatIntelligence/Analytic Rules/GreyNoise_IPEntity_SigninLogs.yaml new file mode 100644 index 00000000000..0ce394037cf --- /dev/null +++ b/Solutions/GreyNoiseThreatIntelligence/Analytic Rules/GreyNoise_IPEntity_SigninLogs.yaml @@ -0,0 +1,82 @@ +id: f6c76cc9-218c-5b76-9b82-8607f09ea1b4 +name: GreyNoise TI Map IP Entity to SigninLogs +version: 1.0.0 +kind: Scheduled +description: | + 'This query maps any GreyNoise IP indicators of compromise (IOCs) from threat intelligence (TI), by searching for matches in SigninLogs.' +severity: Medium +requiredDataConnectors: + - connectorId: ThreatIntelligence + dataTypes: + - ThreatIntelligenceIndicator + - connectorId: ThreatIntelligenceTaxii + dataTypes: + - ThreatIntelligenceIndicator + - connectorId: AzureActiveDirectory + dataTypes: + - SigninLogs + - connectorId: AzureActiveDirectory + dataTypes: + - AADNonInteractiveUserSignInLogs + - connectorId: MicrosoftDefenderThreatIntelligence + dataTypes: + - ThreatIntelligenceIndicator + - connectorId: GreyNoise2SentinelAPI + dataTypes: + - ThreatIntelligenceIndicator +queryFrequency: 1h +queryPeriod: 14d +triggerOperator: gt +triggerThreshold: 0 +tactics: + - Impact +query: | + let dt_lookBack = 1h; + let ioc_lookBack = 14d; + let aadFunc = (tableName:string){ + ThreatIntelligenceIndicator + | where TimeGenerated >= ago(ioc_lookBack) + | summarize LatestIndicatorTime = arg_max(TimeGenerated, *) by IndicatorId + | where Active == true and ExpirationDateTime > now() + | where SourceSystem == 'GreyNoise' + // Picking up only IOC's that contain the entities we want + | where isnotempty(NetworkIP) or isnotempty(EmailSourceIpAddress) or isnotempty(NetworkDestinationIP) or isnotempty(NetworkSourceIP) + // As there is potentially more than 1 indicator type for matching IP, taking NetworkIP first, then others if that is empty. + // Taking the first non-empty value based on potential IOC match availability + | extend TI_ipEntity = iff(isnotempty(NetworkIP), NetworkIP, NetworkDestinationIP) + | extend TI_ipEntity = iff(isempty(TI_ipEntity) and isnotempty(NetworkSourceIP), NetworkSourceIP, TI_ipEntity) + | extend TI_ipEntity = iff(isempty(TI_ipEntity) and isnotempty(EmailSourceIpAddress), EmailSourceIpAddress, TI_ipEntity) + // using innerunique to keep perf fast and result set low, we only need one match to indicate potential malicious activity that needs to be investigated + | join kind=innerunique ( + table(tableName) | where TimeGenerated >= ago(dt_lookBack) + | extend Status = todynamic(Status), LocationDetails = todynamic(LocationDetails) + | extend StatusCode = tostring(Status.errorCode), StatusDetails = tostring(Status.additionalDetails), StatusReason = tostring(Status.failureReason) + | extend State = tostring(LocationDetails.state), City = tostring(LocationDetails.city), Region = tostring(LocationDetails.countryOrRegion) + // renaming time column so it is clear the log this came from + | extend SigninLogs_TimeGenerated = TimeGenerated, Type = Type + ) + on $left.TI_ipEntity == $right.IPAddress + | where SigninLogs_TimeGenerated < ExpirationDateTime + | summarize SigninLogs_TimeGenerated = arg_max(SigninLogs_TimeGenerated, *) by IndicatorId, IPAddress + | project SigninLogs_TimeGenerated, Description, ActivityGroupNames, IndicatorId, ThreatType, Url, ExpirationDateTime, ConfidenceScore, + TI_ipEntity, IPAddress, UserPrincipalName, AppDisplayName, StatusCode, StatusDetails, StatusReason, NetworkIP, NetworkDestinationIP, NetworkSourceIP, EmailSourceIpAddress, Type + | extend timestamp = SigninLogs_TimeGenerated, Name = tostring(split(UserPrincipalName, '@', 0)[0]), UPNSuffix = tostring(split(UserPrincipalName, '@', 1)[0]) + }; + let aadSignin = aadFunc("SigninLogs"); + let aadNonInt = aadFunc("AADNonInteractiveUserSignInLogs"); + union isfuzzy=true aadSignin, aadNonInt +entityMappings: + - entityType: Account + fieldMappings: + - identifier: Name + columnName: Name + - identifier: UPNSuffix + columnName: UPNSuffix + - entityType: IP + fieldMappings: + - identifier: Address + columnName: IPAddress + - entityType: URL + fieldMappings: + - identifier: Url + columnName: Url diff --git a/Solutions/GreyNoiseThreatIntelligence/Analytic Rules/GreyNoise_IPEntity_imNetworkSession.yaml b/Solutions/GreyNoiseThreatIntelligence/Analytic Rules/GreyNoise_IPEntity_imNetworkSession.yaml new file mode 100644 index 00000000000..6bfcffeae72 --- /dev/null +++ b/Solutions/GreyNoiseThreatIntelligence/Analytic Rules/GreyNoise_IPEntity_imNetworkSession.yaml @@ -0,0 +1,126 @@ +id: 536e8e5c-ce0e-575e-bcc9-aba8e7bf9316 +name: GreyNoise TI map IP entity to Network Session Events (ASIM Network Session schema) +version: 1.0.0 +kind: Scheduled +description: | + 'This rule identifies a match Network Sessions for which the source or destination IP address is a known GreyNoise IoC.

+ This analytic rule uses [ASIM](https://aka.ms/AboutASIM) and supports any built-in or custom source that supports the ASIM NetworkSession schema' +severity: Medium +status: Available +requiredDataConnectors: + - connectorId: AWSS3 + dataTypes: + - AWSVPCFlow + - connectorId: MicrosoftThreatProtection + dataTypes: + - DeviceNetworkEvents + - connectorId: SecurityEvents + dataTypes: + - SecurityEvent + - connectorId: WindowsForwardedEvents + dataTypes: + - WindowsEvent + - connectorId: Zscaler + dataTypes: + - CommonSecurityLog + - connectorId: MicrosoftSysmonForLinux + dataTypes: + - Syslog + - connectorId: PaloAltoNetworks + dataTypes: + - CommonSecurityLog + - connectorId: AzureMonitor(VMInsights) + dataTypes: + - VMConnection + - connectorId: AzureFirewall + dataTypes: + - AzureDiagnostics + - connectorId: AzureNSG + dataTypes: + - AzureDiagnostics + - connectorId: CiscoASA + dataTypes: + - CommonSecurityLog + - connectorId: Corelight + dataTypes: + - Corelight_CL + - connectorId: AIVectraStream + dataTypes: + - VectraStream + - connectorId: CheckPoint + dataTypes: + - CommonSecurityLog + - connectorId: Fortinet + dataTypes: + - CommonSecurityLog + - connectorId: MicrosoftDefenderThreatIntelligence + dataTypes: + - ThreatIntelligenceIndicator + - connectorId: CiscoMeraki + dataTypes: + - Syslog + - CiscoMerakiNativePoller + - connectorId: GreyNoise2SentinelAPI + dataTypes: + - ThreatIntelligenceIndicator + +queryFrequency: 1h +queryPeriod: 14d +triggerOperator: gt +triggerThreshold: 0 +tactics: + - Impact +query: | + let dt_lookBack = 1h; + let ioc_lookBack = 14d; + let IP_TI = materialize ( + ThreatIntelligenceIndicator + | where TimeGenerated >= ago(ioc_lookBack) + | summarize LatestIndicatorTime = arg_max(TimeGenerated, *) by IndicatorId + | where Active == true and ExpirationDateTime > now() + | where SourceSystem == 'GreyNoise' + | extend TI_ipEntity = coalesce(NetworkIP, NetworkDestinationIP, NetworkSourceIP,EmailSourceIpAddress,"NO_IP") + | where TI_ipEntity != "NO_IP" + ); + IP_TI + // using innerunique to keep perf fast and result set low, we only need one match to indicate potential malicious activity that needs to be investigated + | join kind=innerunique + ( + _Im_NetworkSession (starttime=ago(dt_lookBack)) + | where isnotempty(SrcIpAddr) + | summarize imNWS_mintime=min(TimeGenerated), imNWS_maxtime=max(TimeGenerated) by SrcIpAddr, DstIpAddr, Dvc, EventProduct, EventVendor + | lookup (IP_TI | project TI_ipEntity, Active) on $left.SrcIpAddr == $right.TI_ipEntity + | project-rename SrcMatch = Active + | lookup (IP_TI | project TI_ipEntity, Active) on $left.DstIpAddr == $right.TI_ipEntity + | project-rename DstMatch = Active + | where SrcMatch or DstMatch + | extend + IoCIP = iff(SrcMatch, SrcIpAddr, DstIpAddr), + IoCDirection = iff(SrcMatch, "Source", "Destination") + )on $left.TI_ipEntity == $right.IoCIP + | where imNWS_mintime < ExpirationDateTime + | project imNWS_mintime, imNWS_maxtime, Description, ActivityGroupNames, IndicatorId, ThreatType, ExpirationDateTime, ConfidenceScore, SrcIpAddr, DstIpAddr, IoCDirection, IoCIP, Dvc, EventVendor, EventProduct +entityMappings: + - entityType: IP + fieldMappings: + - identifier: Address + columnName: IoCIP + +customDetails: + EventStartTime: imNWS_mintime + EventEndTime: imNWS_maxtime + IoCDescription: Description + ActivityGroupNames: ActivityGroupNames + IndicatorId: IndicatorId + ThreatType: ThreatType + IoCExpirationTime: ExpirationDateTime + IoCConfidenceScore: ConfidenceScore + IoCIPDirection: IoCDirection + +alertDetailsOverride: + alertDisplayNameFormat: A network session {{IoCDirection}} address {{IoCIP}} matched an IoC. + alertDescriptionFormat: The {{IoCDirection}} address {{IoCIP}} of a network session matched a known indicator of compromise of {{ThreatType}}. Consult the threat intelligence blead for more information on the indicator. + +tags: + - Schema: ASIMNetworkSession + SchemaVersion: 0.2.4 diff --git a/Solutions/GreyNoiseThreatIntelligence/Data Connectors/.gitignore b/Solutions/GreyNoiseThreatIntelligence/Data Connectors/.gitignore new file mode 100644 index 00000000000..7685fc4ac83 --- /dev/null +++ b/Solutions/GreyNoiseThreatIntelligence/Data Connectors/.gitignore @@ -0,0 +1,135 @@ +# Byte-compiled / optimized / DLL files +__pycache__/ +*.py[cod] +*$py.class + +# C extensions +*.so + +# Distribution / packaging +.Python +build/ +develop-eggs/ +dist/ +downloads/ +eggs/ +.eggs/ +lib/ +lib64/ +parts/ +sdist/ +var/ +wheels/ +pip-wheel-metadata/ +share/python-wheels/ +*.egg-info/ +.installed.cfg +*.egg +MANIFEST + +# PyInstaller +# Usually these files are written by a python script from a template +# before PyInstaller builds the exe, so as to inject date/other infos into it. +*.manifest +*.spec + +# Installer logs +pip-log.txt +pip-delete-this-directory.txt + +# Unit test / coverage reports +htmlcov/ +.tox/ +.nox/ +.coverage +.coverage.* +.cache +nosetests.xml +coverage.xml +*.cover +.hypothesis/ +.pytest_cache/ + +# Translations +*.mo +*.pot + +# Django stuff: +*.log +local_settings.py +db.sqlite3 + +# Flask stuff: +instance/ +.webassets-cache + +# Scrapy stuff: +.scrapy + +# Sphinx documentation +docs/_build/ + +# PyBuilder +target/ + +# Jupyter Notebook +.ipynb_checkpoints + +# IPython +profile_default/ +ipython_config.py + +# pyenv +.python-version + +# pipenv +# According to pypa/pipenv#598, it is recommended to include Pipfile.lock in version control. +# However, in case of collaboration, if having platform-specific dependencies or dependencies +# having no cross-platform support, pipenv may install dependencies that don’t work, or not +# install all needed dependencies. +#Pipfile.lock + +# celery beat schedule file +celerybeat-schedule + +# SageMath parsed files +*.sage.py + +# Environments +.env +.venv +env/ +venv/ +ENV/ +env.bak/ +venv.bak/ + +# Spyder project settings +.spyderproject +.spyproject + +# Rope project settings +.ropeproject + +# mkdocs documentation +/site + +# mypy +.mypy_cache/ +.dmypy.json +dmypy.json + +# Pyre type checker +.pyre/ + +# Azure Functions artifacts +bin +obj +appsettings.json +local.settings.json + +# Azurite artifacts +__blobstorage__ +__queuestorage__ +__azurite_db*__.json +.python_packages \ No newline at end of file diff --git a/Solutions/GreyNoiseThreatIntelligence/Data Connectors/GreyNoiseAPISentinelConn.zip b/Solutions/GreyNoiseThreatIntelligence/Data Connectors/GreyNoiseAPISentinelConn.zip index 3b1cd87e9e1..46cdc1b1578 100644 Binary files a/Solutions/GreyNoiseThreatIntelligence/Data Connectors/GreyNoiseAPISentinelConn.zip and b/Solutions/GreyNoiseThreatIntelligence/Data Connectors/GreyNoiseAPISentinelConn.zip differ diff --git a/Solutions/GreyNoiseThreatIntelligence/Data Connectors/GreyNoiseAPISentinelConnector/function.json b/Solutions/GreyNoiseThreatIntelligence/Data Connectors/GreyNoiseAPISentinelConnector/function.json new file mode 100644 index 00000000000..4944e0385a6 --- /dev/null +++ b/Solutions/GreyNoiseThreatIntelligence/Data Connectors/GreyNoiseAPISentinelConnector/function.json @@ -0,0 +1,11 @@ +{ + "scriptFile": "main.py", + "bindings": [ + { + "name": "mytimer", + "type": "timerTrigger", + "direction": "in", + "schedule": "0 0 0 */0 * *" + } + ] +} diff --git a/Solutions/GreyNoiseThreatIntelligence/Data Connectors/GreyNoiseAPISentinelConnector/main.py b/Solutions/GreyNoiseThreatIntelligence/Data Connectors/GreyNoiseAPISentinelConnector/main.py new file mode 100644 index 00000000000..773a30e1d41 --- /dev/null +++ b/Solutions/GreyNoiseThreatIntelligence/Data Connectors/GreyNoiseAPISentinelConnector/main.py @@ -0,0 +1,407 @@ +import datetime +import json +import logging +import os +import sys +import time +from collections import namedtuple + +import azure.functions as func +import msal +import requests +from greynoise import GreyNoise +from requests.adapters import HTTPAdapter +from requests_ratelimiter import LimiterSession +from urllib3.util import Retry + +from .stixGen import GreyNoiseStixGenerator + +REQUIRED_ENVIRONMENT_VARIABLES = [ + "GREYNOISE_KEY", + "GREYNOISE_LIMIT", + "CLIENT_ID", + "CLIENT_SECRET", + "TENANT_ID", + "WORKSPACE_ID", + ] + +GreyNoiseSetup = namedtuple("GreyNoiseSetup", ["api_key", "query", "tries", "size"]) +MSALSetup = namedtuple("MSALSetup", ["tenant_id", "client_id", "client_secret", "workspace_id"]) +class GreuNoiseSentinelUpdater(object): + """Simple wrapper class to handle consuming IPs""" + + def __init__(self, greynoise_setup: GreyNoiseSetup, + msal_setup: MSALSetup): + super(GreuNoiseSentinelUpdater, self).__init__() + + self.greynoise_query = greynoise_setup.query + self.greynoise_size = greynoise_setup.size + self.greynoise_tries = greynoise_setup.tries + self.msal_tenant_id = msal_setup.tenant_id + self.msal_client_id = msal_setup.client_id + self.msal_client_secret = msal_setup.client_secret + self.msal_workspace_id = msal_setup.workspace_id + + # Setup RateLimiter and Retry Adapter + self.limiter_session = LimiterSession( + per_minute=90, + limit_statuses=[429, 503], + ) + retry_strategy = Retry( + total=3, + backoff_factor=1, + status_forcelist=[429, 503], + allowed_methods={'POST'}, + ) + self.limiter_session.mount("https://", HTTPAdapter(max_retries=retry_strategy)) + + # Setup GreyNoise Session + self.session = GreyNoise( + api_key=greynoise_setup.api_key, + integration_name="azuresentinel-consumer-v1.0", + ) + self.gn_stix_generator = GreyNoiseStixGenerator() + + + def get_token(self): + """Gets an access token to access office service. + Args: + tenant_id (str): the tenant id + client_id (str): the client id + client_secret (str): the secret id for the client + Returns: + A token access key. + """ + logging.info("Getting token for tenant: {0}".format(self.msal_tenant_id)) + try: + context = msal.ConfidentialClientApplication(self.msal_client_id, + authority='https://login.microsofto' + 'nline.com/' + self.msal_tenant_id, + client_credential=self.msal_client_secret) + token, token_ttl = self.acquire_token(context) + # Set expiry of MSAL token to 55 minutes to avoid token expiry during upload + msal_token_expiry = datetime.datetime.now() + datetime.timedelta(seconds=token_ttl - 300) + return token, msal_token_expiry + except requests.exceptions.RequestException as e: + logging.info("Error getting token for tenant: {0}".format(self.msal_tenant_id)) + raise e + + + def acquire_token(self, context): + """Gets an access token to access ms graph TI Upload service. + Args: + context: the authentication context + Returns: + A token access key. + """ + scope = "https://management.azure.com/.default" + + try: + result = context.acquire_token_silent([scope], + account=None) + if not result: + result = context.acquire_token_for_client(scopes=[ + scope]) + + if 'access_token' in result: + bearer_token = result['access_token'] + token_expiry_seconds = result['expires_in'] + return bearer_token, token_expiry_seconds + else: + error_code = result.get("error") + error_message = result.get("error_description") + logging.info("Error acquiring token for tenant with code: {0}".format(error_code)) + logging.info(error_message) + raise ValueError(error_message) + + except requests.exceptions.RequestException as e: + logging.info("Error acquiring token for tenant.") + raise e + + def upload_indicators_to_sentinel(self, token: str, indicators: list): + """Uploads a list of indicators to Azure Sentinel Threat Intelligence + Endpoint Docs: # https://learn.microsoft.com/en-us/azure/sentinel/upload-indicators-api#request-body + + API Limits are 100 indicators per request and 100 requests per minute. + Args: + token (str): the access token + indicators (list): the list of indicators to upload + Returns: + A response object.""" + status_retry = 0 + url = "https://sentinelus.azure-api.net/{0}/threatintelligence:upload-indicators".format(self.msal_workspace_id) + headers = { + 'Content-Type': 'application/json', + 'Authorization': 'Bearer {0}'.format(token) + } + params = { + 'api-version': '2022-07-01' + } + payload = { + 'SourceSystem': 'GreyNoise', + 'Value': indicators + } + + try: + response = self.limiter_session.request("POST", url, + headers=headers, + params=params, + json=payload, + timeout=5, + ) + response.raise_for_status() + except requests.HTTPError as e: + status_retry += 1 + if e.response.status_code == (429 or 503): + logging.error("HTTP: " + int(e.response.status_code)) + if status_retry > 3: + logging.error("Too many upload indicators API retries, exiting.") + sys.exit(1) + sleep_for = int(e.response.message.split()[7]) + 5 if e.response.message else 60 + logging.info("API Rate limit exceeded (HTTP 429) or Server Error (HTTP 503), waiting {0} seconds...".format(sleep_for)) + time.sleep(sleep_for) + logging.info("Retrying upload...") + self.upload_indicators_to_sentinel(token, indicators) + elif e.response.status_code == 401: + logging.error("HTTP: " + int(e.response.status_code)) + logging.error('Did you add the Azure Sentinel Contributor role to your service principal?') + logging.error('More info here: https://learn.microsoft.com/en-us/azure/sentinel/upload-indicators-api#acquire-an-access-token') + logging.error(e.response.text) + elif e.response.status_code: + logging.error("HTTP: " + int(e.response.status_code)) + logging.error(e.response.text) + logging.error('Cannot upload indicators to Azure Sentinel, exiting.') + sys.exit(1) + + # Check for submission errors + if response.json().get('errors') != []: + logging.warning('Nonfatal error in submitting indicator. While a field failed, \n' \ + 'the rest of the indicator failed and we can continue.') + logging.warning('Error: ' + json.loads(response.json()).get('error')) + + return response.json() + + def chunks(self, l: list, chunk_size: int): + """Yield successive n-sized chunks from list.""" + for i in range(0, len(l), chunk_size): + yield l[i:i + chunk_size] + + + def consume_ips(self): + logging.info( + "Starting consumption of GreyNoise indicators with query %s" + % (self.greynoise_query) + ) + total_addresses = 0 # counter for total IPs consumed + payload_size = None # total IPs available from query + tries = int(self.greynoise_tries) + scroll = "" # scroll token for pagination + complete = False + + # MS Graph TI Upload API limits are 100 indicators per request and 100 requests per minute. + # Get MSAL token + token, msal_expiry_time = self.get_token() + if token: + logging.info("MSAL token obtained") + + while not complete: + if datetime.datetime.now() > msal_expiry_time: + logging.info("MSAL token expiring soon, getting new token") + token, msal_expiry_time = self.get_token() + if token: + logging.info("MSAL token obtained") + try: + if self.greynoise_size != 0 and self.greynoise_size<= 2000: + payload = self.session.query( + query=self.greynoise_query, + size=self.greynoise_size, + scroll=scroll, + ) + else: + payload = self.session.query( + query=self.greynoise_query, + scroll=scroll, + size=2000 + ) + + # this protects from bad / invalid queries + # and exits out before proceeding + if payload["count"] == 0: + logging.info("GreyNoise Query return no results, exiting") + sys.exit(1) + + # Capture the total number of indicators available + elif payload["count"] and payload_size is None: + payload_size = int(payload["count"]) + logging.info("Total Indicators found: %s results" % payload_size) + + # Loop to generate STIX objects and upload to Sentinel + stix_objects = [] + counter = 0 + chunk_size = 100 # MS Graph TI Upload API limits are 100 indicators per request and 100 requests per minute. + for batch in self.chunks(payload["data"], chunk_size): + for gn_object in batch: + stix_object = self.gn_stix_generator.generate_indicator(gn_object) + expected_chunk_size = len(batch) + stix_objects.append(stix_object) + counter += 1 + if counter == expected_chunk_size: + # send batch to sentinel + self.upload_indicators_to_sentinel(token, stix_objects) + # reset counter and stix_objects + counter = 0 + stix_objects = [] + # logging.info("Sent 100 GreyNoise indicators to Sentinel" ) + + # the scroll is for pagination but does not always exist because + # we have consumed all the IPs + scroll = payload.get("scroll") + complete = payload["complete"] + + addresses = len(payload["data"]) + total_addresses += addresses + + logging.info( + "Sent %s GreyNoise indicators to Sentinel for a total of %s addresses" + % (addresses, total_addresses) + ) + + # this is a hacky workaround to deal with an edge case on the API where if + # you limit the results on a query, the complete flag doesn't flip to + # true correctly + if ( + self.greynoise_size == 0 + # and self.greynoise_size < int(payload["count"]) # noqa: W503 + and total_addresses >= payload_size # noqa: W503 + ): + break + elif ( + self.greynoise_size != 0 + and self.greynoise_size < int(payload["count"]) # noqa: W503 + and self.greynoise_size <= total_addresses # noqa: W503 + ): + break + + except Exception as reqErr: + logging.error("Uploading IPs failed: %s" % str(reqErr)) + if tries != 0: + tries -= 1 + logging.error("Trying again in 10 seconds using same scroll...") + time.sleep(10) + else: + logging.error( + "Exiting program. Max tries met. With time str%s and last scroll: %s" + % (str(time), scroll) + ) + sys.exit(3) + + logging.info( + "Ingest process completed. Inserted %s Indicators into Microsoft Sentinel Threat Intelligence." + % total_addresses + ) + + +def checkEnvironmentVariables(env): + # the following checks will ensure required environment variables are set + # and any others will have some type of defaulting + unset_environment_variables = [] + + for env_var in REQUIRED_ENVIRONMENT_VARIABLES: + if not env.get(env_var, False): + unset_environment_variables.append(env_var) + + if unset_environment_variables: + logging.error( + "The following required environment variables are unset: %s" + % str(unset_environment_variables) + ) + sys.exit(2) + +def build_query_string(env): + classifications = env.get("GREYNOISE_CLASSIFICATIONS", "malicious") + logging.info("Building query string for %s" % classifications) + + # a user can accidentally set the environment to an empty string + if len(classifications) == 0: + return '(classification:malicious)' + + classifications = classifications.split(",") + length_of_classifications = len(classifications) + + classification_string = "(" + for item in classifications: + length_of_classifications -= 1 + classification_string += "classification:" + item + if length_of_classifications > 0: + classification_string += " OR " + + classification_string += ")" + return classification_string + + +def main(mytimer: func.TimerRequest) -> None: + utc_timestamp = datetime.datetime.utcnow().replace( + tzinfo=datetime.timezone.utc).isoformat() + + if mytimer.past_due: + logging.info('The timer is past due!') + + env = os.environ.copy() + + checkEnvironmentVariables(env) + + # SET VARS + query_time = "1" + size = int(env.get("GREYNOISE_LIMIT", 0)) + + # our classifications are formatted for greynoise + classifications = build_query_string(env) + + + # obtain our query for greynoise + try: + query_time = int(query_time) + if query_time > 90 or query_time < 1: + logging.error("Time input is not a valid integer between 1 and 90") + sys.exit(1) + else: + if query_time == 1: + logging.info("Using default query time of 1 day") + else: + logging.info("Using custom query time of %s day(s)" % str(query_time)) + query_time = "last_seen:%sd" % query_time + except ValueError: + logging.error("Input for time is not valid") + sys.exit(1) + + # build our query + query = classifications + " " + query_time + + if size != "": + logging.info("Querying GreyNoise API") + try: + size = int(size) + if size == 0: + logging.info("No size limit provided, returning all indicators available") + elif size <= 1: + logging.info("Limiting results to %s" % str(size)) + + except ValueError: + logging.error("Input for size is not valid") + sys.exit(1) + else: + size = 0 + logging.info("No size limited provided, returning all indicators available") + + # set up everything required to pass into the updater + greynoise_setup = GreyNoiseSetup( + env.get("GREYNOISE_KEY"), query, env.get("GREYNOISE_MAX_TRIES", 3), size + ) + msal_setup = MSALSetup( + env.get("TENANT_ID"), env.get("CLIENT_ID"), env.get("CLIENT_SECRET"), env.get("WORKSPACE_ID") + ) + + g = GreuNoiseSentinelUpdater(greynoise_setup, msal_setup) + g.consume_ips() + + logging.info('Python timer trigger function ran at %s', utc_timestamp) diff --git a/Solutions/GreyNoiseThreatIntelligence/Data Connectors/GreyNoiseAPISentinelConnector/readme.md b/Solutions/GreyNoiseThreatIntelligence/Data Connectors/GreyNoiseAPISentinelConnector/readme.md new file mode 100644 index 00000000000..e8b7e887365 --- /dev/null +++ b/Solutions/GreyNoiseThreatIntelligence/Data Connectors/GreyNoiseAPISentinelConnector/readme.md @@ -0,0 +1,11 @@ +# TimerTrigger - Python + +The `TimerTrigger` makes it incredibly easy to have your functions executed on a schedule. This sample demonstrates a simple use case of calling your function every 5 minutes. + +## How it works + +For a `TimerTrigger` to work, you provide a schedule in the form of a [cron expression](https://en.wikipedia.org/wiki/Cron#CRON_expression)(See the link for full details). A cron expression is a string with 6 separate expressions which represent a given schedule via patterns. The pattern we use to represent every 5 minutes is `0 */5 * * * *`. This, in plain text, means: "When seconds is equal to 0, minutes is divisible by 5, for any hour, day of the month, month, day of the week, or year". + +## Learn more + + Documentation diff --git a/Solutions/GreyNoiseThreatIntelligence/Data Connectors/GreyNoiseAPISentinelConnector/stixGen.py b/Solutions/GreyNoiseThreatIntelligence/Data Connectors/GreyNoiseAPISentinelConnector/stixGen.py new file mode 100644 index 00000000000..66f8771f4b1 --- /dev/null +++ b/Solutions/GreyNoiseThreatIntelligence/Data Connectors/GreyNoiseAPISentinelConnector/stixGen.py @@ -0,0 +1,49 @@ +import datetime +import json +import uuid + +from stix2 import Indicator + +# https://stix2.readthedocs.io/en/latest/guide/custom.html#ID-Contributing-Properties-for-Custom-Cyber-Observables +# OASIS recommended Namespace for UUIDs +NAMESPACE_UUID = uuid.UUID('00abedb4-aa42-466c-9c01-fed23315a9b7') + +class GreyNoiseStixGenerator: + def __init__(self): + self.stix_version = "2.1" + self.pattern_type = "stix" + self.name = "GreyNoise Internet Scanner IOC" + self.valid_until = (datetime.datetime.utcnow() + datetime.timedelta(hours=24)).isoformat() + "Z" + self.created_by_ref = "identity--90a30b13-e3e2-45e1-be2b-48a8b977ecbc" + self.namespace_uuid = NAMESPACE_UUID + + @staticmethod + def generate_id_for_ioc_value(ioc_value: str) -> str: + """Generate a stix 2.1 id for an IOC value.""" + ioc_uuid = str(uuid.uuid5(namespace=NAMESPACE_UUID, name=ioc_value.lower())) + return f'indicator--{ioc_uuid}' + + def generate_indicator(self, gnIndicator: dict): + # Set confidence to 90 if spoofable, 100 if not + if gnIndicator.get('spoofable') == True and gnIndicator.get('classification') != "benign": + confidence = 90 + else: + confidence = 100 + indicator = Indicator( + id=self.generate_id_for_ioc_value(gnIndicator.get('ip')), + type="indicator", + spec_version=self.stix_version, + name=self.name, + description="GreyNoise Indicator", + indicator_types=[gnIndicator.get('classification')], + pattern="[ipv4-addr:value = '{}']".format(gnIndicator.get('ip')), + pattern_type=self.pattern_type, + valid_from=datetime.datetime.strptime(gnIndicator.get('first_seen'), "%Y-%m-%d").isoformat()+'Z', + valid_until=self.valid_until, + created_by_ref=self.created_by_ref, + labels=gnIndicator.get('tags'), + confidence=confidence, + ) + + # Convert to dict from Stix Incident Object + return json.loads(indicator.serialize()) diff --git a/Solutions/GreyNoiseThreatIntelligence/Data Connectors/GreyNoiseConnector_UploadIndicatorsAPI.json b/Solutions/GreyNoiseThreatIntelligence/Data Connectors/GreyNoiseConnector_UploadIndicatorsAPI.json new file mode 100644 index 00000000000..1e48a77f05f --- /dev/null +++ b/Solutions/GreyNoiseThreatIntelligence/Data Connectors/GreyNoiseConnector_UploadIndicatorsAPI.json @@ -0,0 +1,133 @@ +{ + "id": "GreyNoise2SentinelAPI", + "title": "GreyNoise Threat Intelligence (Using Azure Functions)", + "publisher": "GreyNoise, Inc. and BlueCycle LLC", + "descriptionMarkdown": "This Data Connector installs an Azure Function app to download GreyNoise indicators once per day and inserts them into the ThreatIntelligenceIndicator table in Microsoft Sentinel.", + "graphQueries": [ + { + "metricName": "Total indicators received", + "legend": "Connection Events", + "baseQuery": "ThreatIntelligenceIndicator | where SourceSystem == 'GreyNoise'" + } + ], + "sampleQueries": [ + { + "description": "All Threat Intelligence APIs Indicators", + "query": "ThreatIntelligenceIndicator | where SourceSystem == 'GreyNoise'| sort by TimeGenerated desc" + } + ], + "dataTypes": [ + { + "name": "ThreatIntelligenceIndicator", + "lastDataReceivedQuery": "ThreatIntelligenceIndicator| where isnotempty(TimeGenerated) and SourceSystem == 'GreyNoise' | summarize Time = max(TimeGenerated)" + } + ], + "connectivityCriterias": [ + { + "type": "IsConnectedQuery", + "value": [ + "ThreatIntelligenceIndicator| where SourceSystem == 'GreyNoise' | summarize LastLogReceived = max(TimeGenerated) | project IsConnected = LastLogReceived > ago(30d)" + ] + } + ], + "availability": { + "status": 1, + "isPreview": true + }, + "permissions": { + "resourceProvider": [ + { + "provider": "Microsoft.SecurityInsights/threatintelligence/write", + "permissionsDisplayText": "write permissions are required.", + "providerDisplayName": "Workspace", + "scope": "Workspace", + "requiredPermissions": { + "write": true, + "read": true, + "delete": true + } + },{ + "provider": "Microsoft.OperationalInsights/workspaces", + "permissionsDisplayText": "read and write permissions on the workspace are required.", + "providerDisplayName": "Workspace", + "scope": "Workspace", + "requiredPermissions": { + "write": true, + "read": true, + "delete": true + } + } + ],"customs": [ + { + "name": "Microsoft.Web/sites permissions", + "description": "Read and write permissions to Azure Functions to create a Function App is required. [See the documentation to learn more about Azure Functions](https://docs.microsoft.com/azure/azure-functions/)." + }, + { + "name": "GreyNoise API Key", + "description": "Retreive your GreyNoise API Key [here](https://viz.greynoise.io/account/api-key)." + } + ] + }, + "instructionSteps": [ + { + "title": "You can connect GreyNoise Threat Intelligence to Microsoft Sentinel by following the below steps: ", + "description": "\n> The following steps create an Azure AAD application, retrieves a GreyNoise API key, and saves the values in an Azure Function App Configuration." + }, + { + "title": "1. Retrieve API Key from GreyNoise Portal.", + "description": "Generate an API key from GreyNoise Portal https://docs.greynoise.io/docs/using-the-greynoise-api" + }, + { + "title": "2. In your Azure AD tenant, create an Azure Active Directory (AAD) application and acquire Tenant ID, Client ID and (note: hold off generating a Client Secret until Step 5).Also get the Log Analytics Workspace ID associated with your Microsoft Sentinel instance should be below.", + "description": "Follow the instructions here to create your Azure AAD app and save your Client ID and Tenant ID: https://learn.microsoft.com/en-us/azure/sentinel/connect-threat-intelligence-upload-api#instructions\n NOTE: Wait until step 5 to generate your client secret.", + "instructions":[ + { + "parameters": { + "fillWith": [ + "WorkspaceId" + ], + "label": "Workspace ID" + }, + "type": "CopyableLabel" + } + ] + }, + { + "title": "3. Assign the AAD application the Microsoft Sentinel Contributor Role.", + "description": "Follow the instructions here to add the Microsoft Sentinel Contributor Role: https://learn.microsoft.com/en-us/azure/sentinel/connect-threat-intelligence-upload-api#assign-a-role-to-the-application" + }, + { + "title": "4. Specify the AAD permissions to enable MS Graph API access to the upload-indicators API.", + "description": "Follow this section here to add **'ThreatIndicators.ReadWrite.OwnedBy'** permission to the AAD App: https://learn.microsoft.com/en-us/azure/sentinel/connect-threat-intelligence-tip#specify-the-permissions-required-by-the-application. \n Back in your AAD App, ensure you grant admin consent for the permissions you just added. \n Finally, in the 'Tokens and APIs' section, generate a client secret and save it. You will need it in Step 6. " + },{ + "title": "5. Deploy the Threat Intellegence (Preview) Solution which includes the Threat Intelligence Upload Indicators API (Preview)", + "description": "See Microsoft Sentinel Content Hub for this Solution, and install it this Microsoft Sentinel instance." + }, + { + "title": "6. Deploy the Azure Function", + "description": "Click the Deploy to Azure button.\n\n [![Deploy To Azure](https://aka.ms/deploytoazurebutton)](https://aka.ms/sentinel-GreyNoise-azuredeploy)\n\n Fill in the appropriate values for each parameter. **Be aware** that the only valid values for the **GREYNOISE_CLASSIFICATIONS** parameter are **malicious** and/or **unknown**, which must be comma separated. Do not bring in **benign**, as this will bring in millions of IPs which are known good and will likely cause many unwanted alerts." + }, + { + "title": "7. Send indicators to Sentinel", + "description": "The function app installed in Step 6 queries the GreyNoise GNQL API once per day, and submits each indicator found in STIX 2.1 format to the [Microsoft Upload Threat Intelligence Indicators API](https://learn.microsoft.com/en-us/azure/sentinel/upload-indicators-api). \n Each indicator expires in ~24 hours from creation unless it's found on the next day's query, in which case the TI Indicator's **Valid Until** time is extended for another 24 hours, which keeps it active in Microsoft Sentinel. \n\n For more information on the GreyNoise API and the GreyNoise Query Language (GNQL) [click here](https://developer.greynoise.io/docs/using-the-greynoise-api)." + } + ], + "metadata": { + "id": "27dc60cc-758b-566e-93ce-932560a6ff81", + "version": "1.0.0", + "kind": "dataConnector", + "source": { + "kind": "solution", + "name": "GreyNoise Intelligence Solution for Microsoft Sentinel" + }, + "author": { + "name": "Blue Cycle LLC | GreyNoise, Inc." + }, + "support": { + "tier": "developer", + "name": "Support Team", + "email": "support@greynoise.io", + "link":"https://www.greynoise.io/contact/sales" + } + } +} diff --git a/Solutions/GreyNoiseThreatIntelligence/Data Connectors/azuredeploy_Connector_GreyNoiseAPISentinel_AzureFunction.json b/Solutions/GreyNoiseThreatIntelligence/Data Connectors/azuredeploy_Connector_GreyNoiseAPISentinel_AzureFunction.json index d1d6c9fc23e..7cd8b55e840 100644 --- a/Solutions/GreyNoiseThreatIntelligence/Data Connectors/azuredeploy_Connector_GreyNoiseAPISentinel_AzureFunction.json +++ b/Solutions/GreyNoiseThreatIntelligence/Data Connectors/azuredeploy_Connector_GreyNoiseAPISentinel_AzureFunction.json @@ -30,7 +30,7 @@ }, "GREYNOISE_CLASSIFICATIONS": { "type": "string", - "defaultValue": "malicious,unknown" + "defaultValue": "malicious" } }, "variables": { @@ -91,16 +91,17 @@ "name": "[variables('FunctionName')]", "location": "[resourceGroup().location]", "sku": { - "name": "Y1", - "tier": "Dynamic" + "name": "EP2", + "tier": "ElasticPremium", + "family": "EP" }, - "kind": "functionapp,linux", + "kind": "elastic", "properties": { "name": "[variables('FunctionName')]", - "workerSize": "0", - "workerSizeId": "0", - "numberOfWorkers": "1", + "targetWorkerCount": 1, + "targetWorkerSizeId": 3, "reserved": true, + "maximumElasticWorkerCount": 20, "siteConfig": { "linuxFxVersion": "Python|3.10" } @@ -192,7 +193,8 @@ "CLIENT_ID": "[parameters('CLIENT_ID')]", "CLIENT_SECRET": "[parameters('CLIENT_SECRET')]", "GREYNOISE_CLASSIFICATIONS": "[parameters('GREYNOISE_CLASSIFICATIONS')]", - "WEBSITE_RUN_FROM_PACKAGE": "https://github.com/Azure/Azure-Sentinel/raw/db458a54839b084eac0e70bbe6e2a41f34f37e2b/Solutions/GreyNoiseThreatIntelligence/Data%20Connectors/GreyNoiseAPISentinelConn.zip" + "GREYNOISE_LIMIT": "0", + "WEBSITE_RUN_FROM_PACKAGE": "https://aka.ms/sentinel-GreyNoise-functionapp" } } ] diff --git a/Solutions/GreyNoiseThreatIntelligence/Data Connectors/host.json b/Solutions/GreyNoiseThreatIntelligence/Data Connectors/host.json new file mode 100644 index 00000000000..70d9075f634 --- /dev/null +++ b/Solutions/GreyNoiseThreatIntelligence/Data Connectors/host.json @@ -0,0 +1,16 @@ +{ + "version": "2.0", + "functionTimeout": "02:00:00", + "logging": { + "applicationInsights": { + "samplingSettings": { + "isEnabled": true, + "excludedTypes": "Request" + } + } + }, + "extensionBundle": { + "id": "Microsoft.Azure.Functions.ExtensionBundle", + "version": "[3.*, 4.0.0)" + } +} diff --git a/Solutions/GreyNoiseThreatIntelligence/Data Connectors/requirements.txt b/Solutions/GreyNoiseThreatIntelligence/Data Connectors/requirements.txt new file mode 100644 index 00000000000..007caca994a --- /dev/null +++ b/Solutions/GreyNoiseThreatIntelligence/Data Connectors/requirements.txt @@ -0,0 +1,13 @@ +# DO NOT include azure-functions-worker in this file +# The Python Worker is managed by Azure Functions platform +# Manually managing azure-functions-worker may cause unexpected issues + +# from ./Data Connectors folder +# pip install -r requirements.txt --target .python_packages/lib/site-packages/ + +azure-functions +certifi>=2022.12.07 +greynoise==2.0.1 +msal==1.23.0 +stix2>=3.0.1 +requests-ratelimiter>=0.4.0 diff --git a/Solutions/GreyNoiseThreatIntelligence/Data/Solution_GreyNoise.json b/Solutions/GreyNoiseThreatIntelligence/Data/Solution_GreyNoise.json new file mode 100644 index 00000000000..9ed14ca8a4f --- /dev/null +++ b/Solutions/GreyNoiseThreatIntelligence/Data/Solution_GreyNoise.json @@ -0,0 +1,33 @@ + { + "Name": "GreyNoiseThreatIntelligence", + "Author": "JP Bourget jp@bluecycle.net", + "Logo": "", + "Description": "The [GreyNoise Threat Intelligence](https://www.greynoise.io/) solution for Microsoft Sentinel provides context to IP addresses seen in your environment by querying the GreyNoise API.

GreyNoise collects, analyzes, and labels data on IPs that scan the internet and saturate security tools with noise. We provides near real time, actionable threat intelligence from our proprietary network of over 3,100 sensors running worldwide. This unique perspective helps analysts spend less time on irrelevant or harmless activity, and more time on targeted and emerging threats. \n Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/GreyNoiseThreatIntelligence/ReleaseNotes.md)\r \n [Learn More about GreyNoise Threat Intelligence](https://www.greynoise.io/) | [GreyNoise Docs](https://docs.greynoise.io)", + "WorkbookDescription": [], + "Workbooks": ["Solutions/GreyNoiseThreatIntelligence/Workbooks/GreyNoiseOverview.json"], + "WorkbookBladeDescription": "", + "AnalyticalRuleBladeDescription": "This solution installs the following analytic rule templates. After installing the solution, create and enable analytic rules in Manage solution view.", + "HuntingQueryBladeDescription": "", + "PlaybooksBladeDescription": "", + "Analytic Rules": [ + "Solutions/GreyNoiseThreatIntelligence/Analytic Rules/GreyNoise_IPEntity_DnsEvents.yaml", + "Solutions/GreyNoiseThreatIntelligence/Analytic Rules/GreyNoise_IPEntity_CustomSecurityLog.yaml", + "Solutions/GreyNoiseThreatIntelligence/Analytic Rules/GreyNoise_IPEntity_imNetworkSession.yaml", + "Solutions/GreyNoiseThreatIntelligence/Analytic Rules/GreyNoise_IPEntity_OfficeActivity.yaml", + "Solutions/GreyNoiseThreatIntelligence/Analytic Rules/GreyNoise_IPEntity_SigninLogs.yaml" + ], + "Playbooks": [], + "PlaybookDescription": [], + "Parsers": [], + "SavedSearches": [], + "Hunting Queries": [], + "Data Connectors": ["Solutions/GreyNoiseThreatIntelligence/Data Connectors/GreyNoiseConnector_UploadIndicatorsAPI.json"], + "Watchlists": [], + "WatchlistDescription": [], + "BasePath": "/Users/punkrokk/repos/azureSentinelDev/Azure-Sentinel", + "Version": "3.0.0", + "Metadata": "SolutionMetadata.json", + "TemplateSpec": true, + "Is1PConnector": false + } + \ No newline at end of file diff --git a/Solutions/GreyNoiseThreatIntelligence/Package/3.0.0.zip b/Solutions/GreyNoiseThreatIntelligence/Package/3.0.0.zip new file mode 100644 index 00000000000..2a5bd71bbbd Binary files /dev/null and b/Solutions/GreyNoiseThreatIntelligence/Package/3.0.0.zip differ diff --git a/Solutions/GreyNoiseThreatIntelligence/Package/createUiDefinition.json b/Solutions/GreyNoiseThreatIntelligence/Package/createUiDefinition.json new file mode 100644 index 00000000000..d425de5e505 --- /dev/null +++ b/Solutions/GreyNoiseThreatIntelligence/Package/createUiDefinition.json @@ -0,0 +1,225 @@ +{ + "$schema": "https://schema.management.azure.com/schemas/0.1.2-preview/CreateUIDefinition.MultiVm.json#", + "handler": "Microsoft.Azure.CreateUIDef", + "version": "0.1.2-preview", + "parameters": { + "config": { + "isWizard": false, + "basics": { + "description": "\n\n**Note:** Please refer to the following before installing the solution: \r \n • Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/GreyNoiseThreatIntelligence/ReleaseNotes.md)\r \n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing._\n\nThe [GreyNoise Threat Intelligence](https://www.greynoise.io/) solution for Microsoft Sentinel provides context to IP addresses seen in your environment by querying the GreyNoise API.

GreyNoise collects, analyzes, and labels data on IPs that scan the internet and saturate security tools with noise. We provides near real time, actionable threat intelligence from our proprietary network of over 3,100 sensors running worldwide. This unique perspective helps analysts spend less time on irrelevant or harmless activity, and more time on targeted and emerging threats. \n Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/GreyNoiseThreatIntelligence/ReleaseNotes.md)\r \n [Learn More about GreyNoise Threat Intelligence](https://www.greynoise.io/) | [GreyNoise Docs](https://docs.greynoise.io)\n\n**Data Connectors:** 1, **Workbooks:** 1, **Analytic Rules:** 5\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)", + "subscription": { + "resourceProviders": [ + "Microsoft.OperationsManagement/solutions", + "Microsoft.OperationalInsights/workspaces/providers/alertRules", + "Microsoft.Insights/workbooks", + "Microsoft.Logic/workflows" + ] + }, + "location": { + "metadata": { + "hidden": "Hiding location, we get it from the log analytics workspace" + }, + "visible": false + }, + "resourceGroup": { + "allowExisting": true + } + } + }, + "basics": [ + { + "name": "getLAWorkspace", + "type": "Microsoft.Solutions.ArmApiControl", + "toolTip": "This filters by workspaces that exist in the Resource Group selected", + "condition": "[greater(length(resourceGroup().name),0)]", + "request": { + "method": "GET", + "path": "[concat(subscription().id,'/providers/Microsoft.OperationalInsights/workspaces?api-version=2020-08-01')]" + } + }, + { + "name": "workspace", + "type": "Microsoft.Common.DropDown", + "label": "Workspace", + "placeholder": "Select a workspace", + "toolTip": "This dropdown will list only workspace that exists in the Resource Group selected", + "constraints": { + "allowedValues": "[map(filter(basics('getLAWorkspace').value, (filter) => contains(toLower(filter.id), toLower(resourceGroup().name))), (item) => parse(concat('{\"label\":\"', item.name, '\",\"value\":\"', item.name, '\"}')))]", + "required": true + }, + "visible": true + } + ], + "steps": [ + { + "name": "dataconnectors", + "label": "Data Connectors", + "bladeTitle": "Data Connectors", + "elements": [ + { + "name": "dataconnectors1-text", + "type": "Microsoft.Common.TextBlock", + "options": { + "text": "This Solution installs the data connector for GreyNoiseThreatIntelligence. You can get GreyNoiseThreatIntelligence custom log data in your Microsoft Sentinel workspace. After installing the solution, configure and enable this data connector by following guidance in Manage solution view." + } + }, + { + "name": "dataconnectors-link2", + "type": "Microsoft.Common.TextBlock", + "options": { + "link": { + "label": "Learn more about connecting data sources", + "uri": "https://docs.microsoft.com/azure/sentinel/connect-data-sources" + } + } + } + ] + }, + { + "name": "workbooks", + "label": "Workbooks", + "subLabel": { + "preValidation": "Configure the workbooks", + "postValidation": "Done" + }, + "bladeTitle": "Workbooks", + "elements": [ + { + "name": "workbooks-text", + "type": "Microsoft.Common.TextBlock", + "options": { + "text": "This solution installs workbook(s) to help you gain insights into the telemetry collected in Microsoft Sentinel. After installing the solution, start using the workbook in Manage solution view." + } + }, + { + "name": "workbooks-link", + "type": "Microsoft.Common.TextBlock", + "options": { + "link": { + "label": "Learn more", + "uri": "https://docs.microsoft.com/azure/sentinel/tutorial-monitor-your-data" + } + } + }, + { + "name": "workbook1", + "type": "Microsoft.Common.Section", + "label": "GreyNoise Intelligence Threat Indicators", + "elements": [ + { + "name": "workbook1-text", + "type": "Microsoft.Common.TextBlock", + "options": { + "text": "This workbook provides visualization of GreyNoise Intelligence threat indicators which are ingested in the Microsoft Sentinel Threat intelligence." + } + } + ] + } + ] + }, + { + "name": "analytics", + "label": "Analytics", + "subLabel": { + "preValidation": "Configure the analytics", + "postValidation": "Done" + }, + "bladeTitle": "Analytics", + "elements": [ + { + "name": "analytics-text", + "type": "Microsoft.Common.TextBlock", + "options": { + "text": "This solution installs the following analytic rule templates. After installing the solution, create and enable analytic rules in Manage solution view." + } + }, + { + "name": "analytics-link", + "type": "Microsoft.Common.TextBlock", + "options": { + "link": { + "label": "Learn more", + "uri": "https://docs.microsoft.com/azure/sentinel/tutorial-detect-threats-custom?WT.mc_id=Portal-Microsoft_Azure_CreateUIDef" + } + } + }, + { + "name": "analytic1", + "type": "Microsoft.Common.Section", + "label": "GreyNoise TI Map IP Entity to DnsEvents", + "elements": [ + { + "name": "analytic1-text", + "type": "Microsoft.Common.TextBlock", + "options": { + "text": "This query maps any IP indicators of compromise (IOCs) from GreyNoise Threat Intelligence (TI), by searching for matches in DnsEvents." + } + } + ] + }, + { + "name": "analytic2", + "type": "Microsoft.Common.Section", + "label": "GreyNoise TI Map IP Entity to CommonSecurityLog", + "elements": [ + { + "name": "analytic2-text", + "type": "Microsoft.Common.TextBlock", + "options": { + "text": "This query maps GreyNoise IP indicators of compromise (IOCs) from threat intelligence (TI), by searching for matches in CommonSecurityLog." + } + } + ] + }, + { + "name": "analytic3", + "type": "Microsoft.Common.Section", + "label": "GreyNoise TI map IP entity to Network Session Events (ASIM Network Session schema)", + "elements": [ + { + "name": "analytic3-text", + "type": "Microsoft.Common.TextBlock", + "options": { + "text": "This rule identifies a match Network Sessions for which the source or destination IP address is a known GreyNoise IoC.

\nThis analytic rule uses [ASIM](https://aka.ms/AboutASIM) and supports any built-in or custom source that supports the ASIM NetworkSession schema" + } + } + ] + }, + { + "name": "analytic4", + "type": "Microsoft.Common.Section", + "label": "GreyNoise TI map IP entity to OfficeActivity", + "elements": [ + { + "name": "analytic4-text", + "type": "Microsoft.Common.TextBlock", + "options": { + "text": "This query maps any GreyNoise IP indicators of compromise (IOCs) from threat intelligence (TI), by searching for matches in OfficeActivity." + } + } + ] + }, + { + "name": "analytic5", + "type": "Microsoft.Common.Section", + "label": "GreyNoise TI Map IP Entity to SigninLogs", + "elements": [ + { + "name": "analytic5-text", + "type": "Microsoft.Common.TextBlock", + "options": { + "text": "This query maps any GreyNoise IP indicators of compromise (IOCs) from threat intelligence (TI), by searching for matches in SigninLogs." + } + } + ] + } + ] + } + ], + "outputs": { + "workspace-location": "[first(map(filter(basics('getLAWorkspace').value, (filter) => and(contains(toLower(filter.id), toLower(resourceGroup().name)),equals(filter.name,basics('workspace')))), (item) => item.location))]", + "location": "[location()]", + "workspace": "[basics('workspace')]" + } + } +} diff --git a/Solutions/GreyNoiseThreatIntelligence/Package/mainTemplate.json b/Solutions/GreyNoiseThreatIntelligence/Package/mainTemplate.json new file mode 100755 index 00000000000..4aac212b801 --- /dev/null +++ b/Solutions/GreyNoiseThreatIntelligence/Package/mainTemplate.json @@ -0,0 +1,1392 @@ +{ + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "1.0.0.0", + "metadata": { + "author": "JP Bourget jp@bluecycle.net", + "comments": "Solution template for GreyNoiseThreatIntelligence" + }, + "parameters": { + "location": { + "type": "string", + "minLength": 1, + "defaultValue": "[resourceGroup().location]", + "metadata": { + "description": "Not used, but needed to pass arm-ttk test `Location-Should-Not-Be-Hardcoded`. We instead use the `workspace-location` which is derived from the LA workspace" + } + }, + "workspace-location": { + "type": "string", + "defaultValue": "", + "metadata": { + "description": "[concat('Region to deploy solution resources -- separate from location selection',parameters('location'))]" + } + }, + "workspace": { + "defaultValue": "", + "type": "string", + "metadata": { + "description": "Workspace name for Log Analytics where Microsoft Sentinel is setup" + } + }, + "workbook1-name": { + "type": "string", + "defaultValue": "GreyNoise Intelligence Threat Indicators", + "minLength": 1, + "metadata": { + "description": "Name for the workbook" + } + } + }, + "variables": { + "_solutionName": "GreyNoiseThreatIntelligence", + "_solutionVersion": "3.0.0", + "solutionId": "greynoiseintelligenceinc1681236078693.microsoft-sentinel-byol-greynoise", + "_solutionId": "[variables('solutionId')]", + "workbookVersion1": "1.0", + "workbookContentId1": "GreyNoiseIntellegenceOverviewWorkbook", + "workbookId1": "[resourceId('Microsoft.Insights/workbooks', variables('workbookContentId1'))]", + "workbookTemplateSpecName1": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId1'))))]", + "_workbookContentId1": "[variables('workbookContentId1')]", + "workspaceResourceId": "[resourceId('microsoft.OperationalInsights/Workspaces', parameters('workspace'))]", + "_workbookcontentProductId1": "[concat(take(variables('_solutionId'),50),'-','wb','-', uniqueString(concat(variables('_solutionId'),'-','Workbook','-',variables('_workbookContentId1'),'-', variables('workbookVersion1'))))]", + "analyticRuleVersion1": "1.0.0", + "analyticRulecontentId1": "ddf47b6f-870c-5712-a296-1383acb13c82", + "_analyticRulecontentId1": "[variables('analyticRulecontentId1')]", + "analyticRuleId1": "[resourceId('Microsoft.SecurityInsights/AlertRuleTemplates', variables('analyticRulecontentId1'))]", + "analyticRuleTemplateSpecName1": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-ar-',uniquestring(variables('_analyticRulecontentId1'))))]", + "_analyticRulecontentProductId1": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-',variables('_analyticRulecontentId1'),'-', variables('analyticRuleVersion1'))))]", + "analyticRuleVersion2": "1.0.0", + "analyticRulecontentId2": "e50657d7-8bca-43ff-a647-d407fae440d6", + "_analyticRulecontentId2": "[variables('analyticRulecontentId2')]", + "analyticRuleId2": "[resourceId('Microsoft.SecurityInsights/AlertRuleTemplates', variables('analyticRulecontentId2'))]", + "analyticRuleTemplateSpecName2": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-ar-',uniquestring(variables('_analyticRulecontentId2'))))]", + "_analyticRulecontentProductId2": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-',variables('_analyticRulecontentId2'),'-', variables('analyticRuleVersion2'))))]", + "analyticRuleVersion3": "1.0.0", + "analyticRulecontentId3": "536e8e5c-ce0e-575e-bcc9-aba8e7bf9316", + "_analyticRulecontentId3": "[variables('analyticRulecontentId3')]", + "analyticRuleId3": "[resourceId('Microsoft.SecurityInsights/AlertRuleTemplates', variables('analyticRulecontentId3'))]", + "analyticRuleTemplateSpecName3": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-ar-',uniquestring(variables('_analyticRulecontentId3'))))]", + "_analyticRulecontentProductId3": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-',variables('_analyticRulecontentId3'),'-', variables('analyticRuleVersion3'))))]", + "analyticRuleVersion4": "1.0.0", + "analyticRulecontentId4": "c51628fe-999c-5150-9fd7-660fc4f58ed2", + "_analyticRulecontentId4": "[variables('analyticRulecontentId4')]", + "analyticRuleId4": "[resourceId('Microsoft.SecurityInsights/AlertRuleTemplates', variables('analyticRulecontentId4'))]", + "analyticRuleTemplateSpecName4": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-ar-',uniquestring(variables('_analyticRulecontentId4'))))]", + "_analyticRulecontentProductId4": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-',variables('_analyticRulecontentId4'),'-', variables('analyticRuleVersion4'))))]", + "analyticRuleVersion5": "1.0.0", + "analyticRulecontentId5": "f6c76cc9-218c-5b76-9b82-8607f09ea1b4", + "_analyticRulecontentId5": "[variables('analyticRulecontentId5')]", + "analyticRuleId5": "[resourceId('Microsoft.SecurityInsights/AlertRuleTemplates', variables('analyticRulecontentId5'))]", + "analyticRuleTemplateSpecName5": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-ar-',uniquestring(variables('_analyticRulecontentId5'))))]", + "_analyticRulecontentProductId5": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-',variables('_analyticRulecontentId5'),'-', variables('analyticRuleVersion5'))))]", + "uiConfigId1": "GreyNoise2SentinelAPI", + "_uiConfigId1": "[variables('uiConfigId1')]", + "dataConnectorContentId1": "GreyNoise2SentinelAPI", + "_dataConnectorContentId1": "[variables('dataConnectorContentId1')]", + "dataConnectorId1": "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/dataConnectors', variables('_dataConnectorContentId1'))]", + "_dataConnectorId1": "[variables('dataConnectorId1')]", + "dataConnectorTemplateSpecName1": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-dc-',uniquestring(variables('_dataConnectorContentId1'))))]", + "dataConnectorVersion1": "1.0.0", + "_dataConnectorcontentProductId1": "[concat(take(variables('_solutionId'),50),'-','dc','-', uniqueString(concat(variables('_solutionId'),'-','DataConnector','-',variables('_dataConnectorContentId1'),'-', variables('dataConnectorVersion1'))))]", + "_solutioncontentProductId": "[concat(take(variables('_solutionId'),50),'-','sl','-', uniqueString(concat(variables('_solutionId'),'-','Solution','-',variables('_solutionId'),'-', variables('_solutionVersion'))))]" + }, + "resources": [ + { + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", + "name": "[variables('workbookTemplateSpecName1')]", + "location": "[parameters('workspace-location')]", + "dependsOn": [ + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" + ], + "properties": { + "description": "GreyNoiseOverviewWorkbook Workbook with template version 3.0.0", + "mainTemplate": { + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "[variables('workbookVersion1')]", + "parameters": {}, + "variables": {}, + "resources": [ + { + "type": "Microsoft.Insights/workbooks", + "name": "[variables('workbookContentId1')]", + "location": "[parameters('workspace-location')]", + "kind": "shared", + "apiVersion": "2021-08-01", + "metadata": { + "description": "This workbook provides visualization of GreyNoise Intelligence threat indicators which are ingested in the Microsoft Sentinel Threat intelligence." + }, + "properties": { + "displayName": "[parameters('workbook1-name')]", + "serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"a4b4e975-fa7c-46a3-b669-850aacc88134\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Help\",\"label\":\"Guide\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"showDefault\":false},\"jsonData\":\"[\\r\\n {\\\"value\\\": \\\"Yes\\\", \\\"label\\\": \\\"Yes\\\", \\\"selected\\\":true},\\r\\n {\\\"value\\\": \\\"No\\\", \\\"label\\\": \\\"No\\\"}\\r\\n]\"},{\"version\":\"KqlParameterItem/1.0\",\"name\":\"DefaultSubscription_Internal\",\"type\":1,\"isRequired\":true,\"query\":\"where type =~ 'microsoft.operationalinsights/workspaces'\\r\\n| take 1\\r\\n| project subscriptionId\",\"crossComponentResources\":[\"value::selected\"],\"isHiddenWhenLocked\":true,\"queryType\":1,\"resourceType\":\"microsoft.resourcegraph/resources\",\"id\":\"314d02bf-4691-43fa-af59-d67073c8b8fa\"},{\"id\":\"e6ded9a1-a83c-4762-938d-5bf8ff3d3d38\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Subscription\",\"type\":6,\"isRequired\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"query\":\"summarize by subscriptionId\\r\\n| project value = strcat(\\\"/subscriptions/\\\", subscriptionId), label = subscriptionId, selected = iff(subscriptionId =~ '{DefaultSubscription_Internal}', true, false)\",\"crossComponentResources\":[\"value::all\"],\"typeSettings\":{\"additionalResourceOptions\":[\"value::all\"],\"showDefault\":false},\"queryType\":1,\"resourceType\":\"microsoft.resourcegraph/resources\",\"value\":[\"value::all\"]},{\"id\":\"e3225ed0-6210-40a1-b2d0-66e42ffa71d6\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Workspace\",\"type\":5,\"isRequired\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"query\":\"resources\\r\\n| where type =~ 'microsoft.operationalinsights/workspaces'\\r\\n| order by name asc\\r\\n| summarize Selected = makelist(id, 10), All = makelist(id, 1000)\\r\\n| mvexpand All limit 100\\r\\n| project value = tostring(All), label = tostring(All), selected = iff(Selected contains All, true, false)\",\"crossComponentResources\":[\"{Subscription}\"],\"typeSettings\":{\"additionalResourceOptions\":[\"value::all\"],\"showDefault\":false},\"queryType\":1,\"resourceType\":\"microsoft.resourcegraph/resources\",\"value\":[\"value::all\"]},{\"id\":\"15b2c181-7397-43c1-900a-28e175ae8a6f\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"TimeRange\",\"type\":4,\"isRequired\":true,\"value\":{\"durationMs\":604800000},\"typeSettings\":{\"selectableValues\":[{\"durationMs\":86400000},{\"durationMs\":172800000},{\"durationMs\":604800000}],\"allowCustom\":true},\"timeContextFromParameter\":\"TimeRange\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"Parameter Selectors\"},{\"type\":1,\"content\":{\"json\":\"# [GreyNoise Threat Intelligence](https://www.greynoise.io/)\\n---\\nGreyNoise collects, analyzes, and labels data on IPs that scan the internet and saturate security tools with noise. We provides near real time, actionable threat intelligence from our proprietary network of over 3,100 sensors running worldwide. This unique perspective helps analysts spend less time on irrelevant or harmless activity, and more time on targeted and emerging threats.
\\n\\nTired of dealing with brute force attempts, web crawlers, and other scanners filling up your logs and trying to break into your infrastructure? With GreyNoise’s Malicious, Benign and Unknown Indicators, you can prevent noisy scanners from hitting your perimeter, effectively shutting them out, and giving yourself time to patch when there is an emerging exploit. Find out more at https://www.greynoise.io/solutions/maximize-soc-efficiency\\n\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"customWidth\":\"79\",\"name\":\"Workbook Overview\"},{\"type\":1,\"content\":{\"json\":\"![Image Name](https://raw.githubusercontent.com/Azure/Azure-Sentinel/111713a2f762af4196d8ca4794b4f689bc95af73/Logos/greynoise_logomark_black.svg) \"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"customWidth\":\"20\",\"name\":\"GreyNoise Logo\"},{\"type\":11,\"content\":{\"version\":\"LinkItem/1.0\",\"style\":\"tabs\",\"links\":[{\"id\":\"18c690d7-7cbd-46c1-b677-1f72692d40cd\",\"cellValue\":\"TAB\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Indicators Ingestion\",\"subTarget\":\"Indicators\",\"preText\":\"Alert rules\",\"style\":\"link\"},{\"id\":\"f88dcf47-af98-4684-9de3-1ee5f48f68fc\",\"cellValue\":\"TAB\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Indicators Search\",\"subTarget\":\"Observed\",\"style\":\"link\"}]},\"name\":\"Tabs link\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ThreatIntelligenceIndicator\\r\\n| where SourceSystem == 'GreyNoise'\\r\\n// Select all indicators from the table\\r\\n// Create a new column to identify the type of indicator, IP, Domain, URL, File, or Other\\r\\n| extend IndicatorType = iif(isnotempty(EmailSourceIpAddress) or isnotempty(NetworkDestinationIP) or isnotempty(NetworkIP) or isnotempty(NetworkSourceIP) or isnotempty(NetworkCidrBlock), \\\"IP\\\",\\r\\n iff(isnotempty(Url), \\\"URL\\\",\\r\\n iff(isnotempty(EmailRecipient) or isnotempty(EmailSenderAddress), \\\"Email\\\",\\r\\n iff(isnotempty(FileHashValue), \\\"File\\\",\\r\\n iff(isnotempty(DomainName) or isnotempty(EmailSourceDomain), \\\"Domain\\\",\\r\\n \\\"Other\\\")))))\\r\\n// Summarize and order the data, then render the chart\\r\\n| summarize CountOfIndicators = count() by IndicatorType, bin(TimeGenerated, 24h)\\r\\n| order by CountOfIndicators desc \\r\\n| render barchart kind=stacked \",\"size\":0,\"showAnalytics\":true,\"title\":\"Total GreyNoise Indicators Imported into Sentinel by Date\",\"timeContextFromParameter\":\"TimeRange\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"crossComponentResources\":[\"{Workspace}\"]},\"customWidth\":\"50\",\"name\":\"query - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ThreatIntelligenceIndicator\\r\\n| where SourceSystem == 'GreyNoise'\\r\\n// Select all indicators from the table\\r\\n| where TimeGenerated < now()\\r\\n// Select only indicators that have not expired\\r\\n and ExpirationDateTime > now()\\r\\n// Select only indicators that are marked active\\r\\n and Active == true\\r\\n// Select all indicators from the table\\r\\n// Summarize and order the data, then render the chart\\r\\n| summarize CountOfIndicators = count() by translate(\\\"[]\\\\\\\"\\\", \\\"\\\", Tags) \\r\\n| render barchart kind=stacked\",\"size\":0,\"showAnalytics\":true,\"title\":\"Active GreyNoise Indicators Imported into Sentinel by Tag\",\"timeContextFromParameter\":\"TimeRange\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"crossComponentResources\":[\"{Workspace}\"]},\"customWidth\":\"50\",\"name\":\"query - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ThreatIntelligenceIndicator\\r\\n// Select all indicators from the table\\r\\n| where TimeGenerated < now()\\r\\n// Select only indicators that have not expired\\r\\n and ExpirationDateTime > now()\\r\\n// Select only indicators that are marked active\\r\\n and Active == true\\r\\n// Select only the most recently ingested copy of an indicator\\r\\n| summarize arg_max(TimeGenerated, *) by IndicatorId\\r\\n// Create a new column to identify the type of indicator, IP, Domain, URL, File, or Other\\r\\n| extend IndicatorType = iif(isnotempty(EmailSourceIpAddress) or isnotempty(NetworkDestinationIP) or isnotempty(NetworkIP) or isnotempty(NetworkSourceIP) or isnotempty(NetworkCidrBlock), \\\"IP\\\",\\r\\n iff(isnotempty(Url), \\\"URL\\\",\\r\\n iff(isnotempty(EmailRecipient) or isnotempty(EmailSenderAddress), \\\"Email\\\",\\r\\n iff(isnotempty(FileHashValue), \\\"File\\\",\\r\\n iff(isnotempty(DomainName) or isnotempty(EmailSourceDomain), \\\"Domain\\\",\\r\\n \\\"Other\\\")))))\\r\\n// Summarize and order the data, then render the chart\\r\\n| summarize CountOfIndicators = count() by IndicatorType\\r\\n| order by CountOfIndicators desc \\r\\n| render barchart kind=unstacked\",\"size\":0,\"showAnalytics\":true,\"title\":\"Active Indicators by Indicator Type\",\"timeContextFromParameter\":\"TimeRange\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"crossComponentResources\":[\"{Workspace}\"]},\"customWidth\":\"50\",\"name\":\"query - 5\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ThreatIntelligenceIndicator\\r\\n| where SourceSystem == 'GreyNoise'\\r\\n// Select all indicators from the table\\r\\n| where TimeGenerated < now()\\r\\n// Select only indicators that have not expired\\r\\n and ExpirationDateTime > now()\\r\\n// Select only indicators that are marked active\\r\\n and Active == true\\r\\n// Select only the most recently ingested copy of an indicator\\r\\n| summarize arg_max(TimeGenerated, *) by IndicatorId\\r\\n// Summarize and order the data, then render the chart\\r\\n| summarize CountOfIndicators = count() by ThreatType\\r\\n| order by CountOfIndicators desc \\r\\n| render barchart kind=unstacked\",\"size\":0,\"showAnalytics\":true,\"title\":\"Active GreyNoise Indicators by Classification\",\"timeContextFromParameter\":\"TimeRange\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"crossComponentResources\":[\"{Workspace}\"]},\"customWidth\":\"50\",\"name\":\"query - 7\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ThreatIntelligenceIndicator\\r\\n// Select all indicators from the table\\r\\n| where TimeGenerated < now()\\r\\n// Select only indicators that have not expired\\r\\n and ExpirationDateTime > now()\\r\\n// Select only indicators that are marked active\\r\\n and Active == true\\r\\n// Select only the most recently ingested copy of an indicator\\r\\n| summarize arg_max(TimeGenerated, *) by IndicatorId\\r\\n// Summarize and order the data, then render the chart\\r\\n| summarize CountOfIndicators = count() by tostring(ConfidenceScore)\\r\\n| order by CountOfIndicators desc \\r\\n| render piechart\",\"size\":0,\"showAnalytics\":true,\"title\":\"Active Indicators by Confidence Score\",\"timeContextFromParameter\":\"TimeRange\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"crossComponentResources\":[\"{Workspace}\"]},\"customWidth\":\"50\",\"name\":\"query - 10\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let DomainQuery=view() { \\r\\nThreatIntelligenceIndicator\\r\\n| summarize arg_max(TimeGenerated, *) by IndicatorId\\r\\n| where isnotempty(DomainName)\\r\\n| summarize SourceSystemArray=make_set(SourceSystem) by DomainName\\r\\n| summarize count() by tostring(SourceSystemArray)\\r\\n| project SourceSystemArray, count_, EntryType=\\\"DomainEntry\\\"\\r\\n};\\r\\nlet UrlQuery=view(){\\r\\nThreatIntelligenceIndicator\\r\\n| summarize arg_max(TimeGenerated, *) by IndicatorId\\r\\n| where isnotempty(Url)\\r\\n| summarize SourceSystemArray=make_set(SourceSystem) by Url\\r\\n| summarize count() by tostring(SourceSystemArray)\\r\\n| project SourceSystemArray, count_, EntryType=\\\"UrlEntry\\\"\\r\\n};\\r\\nlet FileHashQuery=view(){\\r\\nThreatIntelligenceIndicator\\r\\n| summarize arg_max(TimeGenerated, *) by IndicatorId\\r\\n| where isnotempty(FileHashValue)\\r\\n| summarize SourceSystemArray=make_set(SourceSystem) by FileHashValue\\r\\n| summarize count() by tostring(SourceSystemArray)\\r\\n| project SourceSystemArray, count_, EntryType=\\\"FileHashEntry\\\"\\r\\n};\\r\\nlet IPQuery=view(){\\r\\nThreatIntelligenceIndicator\\r\\n| summarize arg_max(TimeGenerated, *) by IndicatorId\\r\\n| where isnotempty(NetworkIP) or isnotempty(NetworkSourceIP)\\r\\n| summarize SourceSystemArray=make_set(SourceSystem) by NetworkIP, NetworkSourceIP\\r\\n| summarize count() by tostring(SourceSystemArray)\\r\\n| project SourceSystemArray, count_, EntryType=\\\"IPEntry\\\"\\r\\n};\\r\\nlet EmailAddressQuery=view(){\\r\\nThreatIntelligenceIndicator\\r\\n| summarize arg_max(TimeGenerated, *) by IndicatorId\\r\\n| where isnotempty(EmailSenderAddress)\\r\\n| summarize SourceSystemArray=make_set(SourceSystem) by EmailSenderAddress\\r\\n| summarize count() by tostring(SourceSystemArray)\\r\\n| project SourceSystemArray, count_, EntryType=\\\"EmailAddressEntry\\\"\\r\\n};\\r\\nlet EmailMessageQuery=view(){\\r\\nThreatIntelligenceIndicator\\r\\n| summarize arg_max(TimeGenerated, *) by IndicatorId\\r\\n| where isnotempty(EmailSubject)\\r\\n| summarize SourceSystemArray=make_set(SourceSystem) by EmailSubject\\r\\n| summarize count() by tostring(SourceSystemArray)\\r\\n| project SourceSystemArray, count_, EntryType=\\\"EmailMessageEntry\\\"\\r\\n};\\r\\nlet SingleSourceIndicators=view(){\\r\\n DomainQuery\\r\\n | union UrlQuery\\r\\n | union FileHashQuery\\r\\n | union IPQuery\\r\\n | union EmailAddressQuery\\r\\n | union EmailMessageQuery\\r\\n | where array_length(todynamic(SourceSystemArray))==1\\r\\n | summarize sum(count_) by SourceSystemArray\\r\\n | extend counter=1 \\r\\n};\\r\\nlet MultipleSourceIndicators=view(){\\r\\n DomainQuery\\r\\n | union UrlQuery\\r\\n | union FileHashQuery\\r\\n | union IPQuery\\r\\n | union EmailAddressQuery\\r\\n | union EmailMessageQuery\\r\\n | where array_length(todynamic(SourceSystemArray))!=1\\r\\n | summarize sum(count_) by SourceSystemArray\\r\\n | extend counter=1\\r\\n};\\r\\nlet CountOfActiveIndicatorsBySource=view(){\\r\\n ThreatIntelligenceIndicator\\r\\n\\t| summarize arg_max(TimeGenerated, *) by IndicatorId\\r\\n | where ExpirationDateTime > now() and Active == true\\r\\n | summarize count() by SourceSystem\\r\\n | project SourceSystem, count_\\r\\n};\\r\\nSingleSourceIndicators\\r\\n| join kind=fullouter MultipleSourceIndicators on counter \\r\\n| where SourceSystemArray contains todynamic(SourceSystemArray)[0] \\r\\n| order by SourceSystemArray\\r\\n| extend solitary_count=sum_count_\\r\\n| summarize shared_count = sum(sum_count_1) by SourceSystemArray, solitary_count\\r\\n| extend total_count = shared_count + solitary_count\\r\\n| extend unique_percentage = round(toreal(solitary_count)/toreal(total_count)*100, 1)\\r\\n| extend IndicatorSource = tostring(todynamic(SourceSystemArray)[0])\\r\\n| join kind=inner CountOfActiveIndicatorsBySource on $left.IndicatorSource == $right.SourceSystem\\r\\n| order by unique_percentage desc\\r\\n| project Source=IndicatorSource, UniquenessPercentage=unique_percentage, ActiveIndicators = count_\\r\\n\\r\\n\",\"size\":0,\"showAnalytics\":true,\"title\":\"Uniqueness of Threat Intelligence Sources\",\"timeContextFromParameter\":\"TimeRange\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"crossComponentResources\":[\"{Workspace}\"],\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Source\",\"formatter\":18,\"formatOptions\":{\"thresholdsOptions\":\"icons\",\"thresholdsGrid\":[{\"operator\":\"Default\",\"thresholdValue\":\"\",\"representation\":\"View\",\"text\":\"{0}{1}\"}]}},{\"columnMatch\":\"ActiveIndicators\",\"formatter\":4,\"formatOptions\":{\"palette\":\"blue\"}}],\"filter\":true}},\"customWidth\":\"50\",\"name\":\"query - 12\"}]},\"conditionalVisibility\":{\"parameterName\":\"TAB\",\"comparison\":\"isEqualTo\",\"value\":\"Indicators\"},\"name\":\"Indicators Ingestion\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"9aec751b-07bd-43ba-80b9-f711887dce45\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Indicator\",\"label\":\"Search Indicator in Events\",\"type\":1,\"value\":\"\",\"timeContext\":{\"durationMs\":7776000000},\"timeContextFromParameter\":\"TimeRange\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"customWidth\":\"50\",\"name\":\"Threat Research Parameters\"},{\"type\":1,\"content\":{\"json\":\"\"},\"customWidth\":\"50\",\"name\":\"text - 9\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"//Add additional lines for desired data columns\\r\\nunion withsource= Table_Name *\\r\\n| where SourceSystem == \\\"GreyNoise\\\"\\r\\n| where column_ifexists('CallerIpAddress', '') has \\\"{Indicator}\\\"\\r\\nor column_ifexists('DestinationIP', '') has \\\"{Indicator}\\\"\\r\\nor column_ifexists('IpAddress', '') has \\\"{Indicator}\\\"\\r\\nor column_ifexists('IPAddresses', '') has \\\"{Indicator}\\\"\\r\\nor column_ifexists('IPAddress', '') has \\\"{Indicator}\\\"\\r\\nor column_ifexists('RemoteIP', '') has \\\"{Indicator}\\\"\\r\\nor column_ifexists('SourceIP', '') has \\\"{Indicator}\\\"\\r\\nor column_ifexists('SrcIpAddr', '') has \\\"{Indicator}\\\"\\r\\nor column_ifexists('DstIpAddr', '') has \\\"{Indicator}\\\"\\r\\nor column_ifexists('NetworkSourceIP', '') has \\\"{Indicator}\\\"\\r\\nor column_ifexists('NetworkIP', '') has \\\"{Indicator}\\\"\\r\\nor column_ifexists('NetworkDestinationIP', '') has \\\"{Indicator}\\\"\\r\\nor column_ifexists('EmailSourceIpAddress', '') has \\\"{Indicator}\\\"\\r\\n| summarize count() by Table_Name \\r\\n| project-rename ['Data Table']=Table_Name, ['Logs Count']=count_\\r\\n| sort by ['Logs Count'] desc\",\"size\":0,\"showAnalytics\":true,\"title\":\"Indicators Observed\",\"noDataMessage\":\"No indicators observed within these thresholds\",\"timeContextFromParameter\":\"TimeRange\",\"exportFieldName\":\"Type\",\"exportParameterName\":\"Type\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"crossComponentResources\":[\"{Workspace}\"],\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Data Table\",\"formatter\":18,\"formatOptions\":{\"thresholdsOptions\":\"icons\",\"thresholdsGrid\":[{\"operator\":\"Default\",\"thresholdValue\":\"\",\"representation\":\"Log\",\"text\":\"{0}{1}\"}]}},{\"columnMatch\":\"Logs Count\",\"formatter\":4,\"formatOptions\":{\"palette\":\"blue\"}}],\"filter\":true}},\"customWidth\":\"50\",\"name\":\"query - 4\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"//Add additional lines for desired data columns\\r\\nunion withsource= Table_Name *\\r\\n| where SourceSystem == \\\"GreyNoise\\\"\\r\\n| where column_ifexists('CallerIpAddress', '') has \\\"{Indicator}\\\"\\r\\nor column_ifexists('DestinationIP', '') has \\\"{Indicator}\\\"\\r\\nor column_ifexists('IpAddress', '') has \\\"{Indicator}\\\"\\r\\nor column_ifexists('IPAddresses', '') has \\\"{Indicator}\\\"\\r\\nor column_ifexists('IPAddress', '') has \\\"{Indicator}\\\"\\r\\nor column_ifexists('RemoteIP', '') has \\\"{Indicator}\\\"\\r\\nor column_ifexists('SourceIP', '') has \\\"{Indicator}\\\"\\r\\nor column_ifexists('SrcIpAddr', '') has \\\"{Indicator}\\\"\\r\\nor column_ifexists('DstIpAddr', '') has \\\"{Indicator}\\\"\\r\\nor column_ifexists('NetworkSourceIP', '') has \\\"{Indicator}\\\"\\r\\nor column_ifexists('NetworkIP', '') has \\\"{Indicator}\\\"\\r\\nor column_ifexists('NetworkDestinationIP', '') has \\\"{Indicator}\\\"\\r\\n| make-series count() default=0 on TimeGenerated from {TimeRange:start} to {TimeRange:end} step 1d by Type\\r\\n| render areachart\",\"size\":0,\"showAnalytics\":true,\"title\":\"Indicators Observed over Time\",\"noDataMessage\":\"No indicators observed within these thresholds\",\"timeContextFromParameter\":\"TimeRange\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"crossComponentResources\":[\"{Workspace}\"],\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Data Table\",\"formatter\":18,\"formatOptions\":{\"thresholdsOptions\":\"icons\",\"thresholdsGrid\":[{\"operator\":\"Default\",\"thresholdValue\":\"\",\"representation\":\"Log\",\"text\":\"{0}{1}\"}]}},{\"columnMatch\":\"Logs Count\",\"formatter\":4,\"formatOptions\":{\"palette\":\"redBright\"}}],\"filter\":true}},\"customWidth\":\"50\",\"name\":\"query - 4 - Copy\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let tiObservables = ThreatIntelligenceIndicator\\r\\n | where SourceSystem == \\\"GreyNoise\\\"\\r\\n | where TimeGenerated < now()\\r\\n | project IndicatorId, ThreatType, Description, Active, IndicatorTime = TimeGenerated, Indicator = strcat(NetworkSourceIP, NetworkIP, NetworkDestinationIP, Url, FileHashValue, EmailSourceIpAddress, EmailSenderAddress, DomainName), SourceSystem;\\r\\nlet alertEntity = SecurityAlert \\r\\n | project parse_json(Entities), SystemAlertId , AlertTime = TimeGenerated\\r\\n | mvexpand(Entities)\\r\\n | extend entity = iif(isnotempty(Entities.Address), Entities.Address,\\r\\n iif(isnotempty(Entities.HostName),strcat(Entities.HostName, \\\".\\\", Entities.DnsDomain),\\r\\n iif(isnotempty(Entities.Url), Entities.Url,\\r\\n iif(isnotempty(Entities.Value), Entities.Value,\\r\\n iif(Entities.Type == \\\"account\\\", strcat(Entities.Name,\\\"@\\\",Entities.UPNSuffix),\\\"\\\")))))\\r\\n | where isnotempty(entity) \\r\\n | project entity, SystemAlertId, AlertTime;\\r\\nlet IncidentAlerts = SecurityIncident\\r\\n | project IncidentTime = TimeGenerated, IncidentNumber, Title, parse_json(AlertIds)\\r\\n | mv-expand AlertIds\\r\\n | project IncidentTime, IncidentNumber, Title, tostring(AlertIds);\\r\\nlet AlertsWithTiObservables = alertEntity\\r\\n | join kind=inner tiObservables on $left.entity == $right.Indicator;\\r\\nlet IncidentsWithAlertsWithTiObservables = AlertsWithTiObservables\\r\\n | join kind=inner IncidentAlerts on $left.SystemAlertId == $right.AlertIds;\\r\\nIncidentsWithAlertsWithTiObservables\\r\\n| where Indicator contains '{Indicator}' or Indicator == \\\"*\\\"\\r\\n| summarize Incidents=dcount(IncidentNumber), Alerts=dcount(SystemAlertId) by Indicator, ThreatType, Source = SourceSystem, Description\\r\\n| sort by Incidents, Alerts desc\",\"size\":0,\"showAnalytics\":true,\"title\":\"Threat Intelligence Alerts\",\"noDataMessage\":\"No indicators observed within these thresholds\",\"timeContextFromParameter\":\"TimeRange\",\"showExportToExcel\":true,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"crossComponentResources\":[\"{Workspace}\"],\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"ThreatType\",\"formatter\":18,\"formatOptions\":{\"thresholdsOptions\":\"icons\",\"thresholdsGrid\":[{\"operator\":\"==\",\"thresholdValue\":\"Botnet\",\"representation\":\"Command and Control\",\"text\":\"{0}{1}\"},{\"operator\":\"==\",\"thresholdValue\":\"MaliciousUrl\",\"representation\":\"Initial_Access\",\"text\":\"{0}{1}\"},{\"operator\":\"==\",\"thresholdValue\":\"Malware\",\"representation\":\"Execution\",\"text\":\"{0}{1}\"},{\"operator\":\"==\",\"thresholdValue\":\"Phishing\",\"representation\":\"Exfiltration\",\"text\":\"{0}{1}\"},{\"operator\":\"Default\",\"thresholdValue\":\"\",\"representation\":\"Pre attack\",\"text\":\"{0}{1}\"}]}},{\"columnMatch\":\"Source\",\"formatter\":18,\"formatOptions\":{\"thresholdsOptions\":\"icons\",\"thresholdsGrid\":[{\"operator\":\"Default\",\"thresholdValue\":\"\",\"representation\":\"success\",\"text\":\"{0}{1}\"}]}},{\"columnMatch\":\"Incidents\",\"formatter\":4,\"formatOptions\":{\"palette\":\"redBright\"}},{\"columnMatch\":\"Alerts\",\"formatter\":4,\"formatOptions\":{\"palette\":\"orange\"}}],\"filter\":true}},\"name\":\"query - 5\"}]},\"conditionalVisibility\":{\"parameterName\":\"TAB\",\"comparison\":\"isEqualTo\",\"value\":\"Observed\"},\"name\":\"Indicators Observed\"}],\"fromTemplateId\":\"sentinel-GreyNoiseOverview\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\n", + "version": "1.0", + "sourceId": "[variables('workspaceResourceId')]", + "category": "sentinel" + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", + "apiVersion": "2022-01-01-preview", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Workbook-', last(split(variables('workbookId1'),'/'))))]", + "properties": { + "description": "@{workbookKey=GreyNoiseIntellegenceOverviewWorkbook; logoFileName=greynoise_logomark_black.svg; description=This workbook provides visualization of GreyNoise Intelligence threat indicators which are ingested in the Microsoft Sentinel Threat intelligence.; dataTypesDependencies=System.Object[]; dataConnectorsDependencies=System.Object[]; previewImagesFileNames=System.Object[]; version=1.0; title=GreyNoise Intelligence Threat Indicators; templateRelativePath=GreyNoiseOverview.json; subtitle=; provider=GreyNoise Intelligence, Inc.}.description", + "parentId": "[variables('workbookId1')]", + "contentId": "[variables('_workbookContentId1')]", + "kind": "Workbook", + "version": "[variables('workbookVersion1')]", + "source": { + "kind": "Solution", + "name": "GreyNoiseThreatIntelligence", + "sourceId": "[variables('_solutionId')]" + }, + "author": { + "name": "JP Bourget jp@bluecycle.net" + }, + "support": { + "name": "GreyNoise", + "email": "support@greynoise.io", + "tier": "Partner", + "link": "https://www.greynoise.io/contact/general" + }, + "dependencies": { + "operator": "AND", + "criteria": [ + { + "contentId": "ThreatIntelligenceIndicator", + "kind": "DataType" + }, + { + "contentId": "GreyNoise2SentinelAPI", + "kind": "DataConnector" + } + ] + } + } + } + ] + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_workbookContentId1')]", + "contentKind": "Workbook", + "displayName": "[parameters('workbook1-name')]", + "contentProductId": "[variables('_workbookcontentProductId1')]", + "id": "[variables('_workbookcontentProductId1')]", + "version": "[variables('workbookVersion1')]" + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", + "name": "[variables('analyticRuleTemplateSpecName1')]", + "location": "[parameters('workspace-location')]", + "dependsOn": [ + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" + ], + "properties": { + "description": "GreyNoise_IPEntity_DnsEvents_AnalyticalRules Analytics Rule with template version 3.0.0", + "mainTemplate": { + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "[variables('analyticRuleVersion1')]", + "parameters": {}, + "variables": {}, + "resources": [ + { + "type": "Microsoft.SecurityInsights/AlertRuleTemplates", + "name": "[variables('analyticRulecontentId1')]", + "apiVersion": "2022-04-01-preview", + "kind": "Scheduled", + "location": "[parameters('workspace-location')]", + "properties": { + "description": "This query maps any IP indicators of compromise (IOCs) from GreyNoise Threat Intelligence (TI), by searching for matches in DnsEvents.", + "displayName": "GreyNoise TI Map IP Entity to DnsEvents", + "enabled": false, + "query": "let dt_lookBack = 1h; // Look back 1 hour for DNS events\nlet ioc_lookBack = 14d; // Look back 14 days for threat intelligence indicators\n// Fetch threat intelligence indicators related to IP addresses\nlet IP_Indicators = ThreatIntelligenceIndicator\n | where TimeGenerated >= ago(ioc_lookBack)\n | summarize LatestIndicatorTime = arg_max(TimeGenerated, *) by IndicatorId\n | where Active == true and ExpirationDateTime > now()\n | where SourceSystem == 'GreyNoise'\n | where isnotempty(NetworkIP) or isnotempty(EmailSourceIpAddress) or isnotempty(NetworkDestinationIP) or isnotempty(NetworkSourceIP)\n | extend TI_ipEntity = iff(isnotempty(NetworkIP), NetworkIP, NetworkDestinationIP)\n | extend TI_ipEntity = iff(isempty(TI_ipEntity) and isnotempty(NetworkSourceIP), NetworkSourceIP, TI_ipEntity)\n | extend TI_ipEntity = iff(isempty(TI_ipEntity) and isnotempty(EmailSourceIpAddress), EmailSourceIpAddress, TI_ipEntity)\n | where ipv4_is_private(TI_ipEntity) == false and TI_ipEntity !startswith \"fe80\" and TI_ipEntity !startswith \"::\" and TI_ipEntity !startswith \"127.\";\n// Perform a join between IP indicators and DNS events\nIP_Indicators\n // Use innerunique to keep performance fast and result set low, as we only need one match to indicate potential malicious activity that needs investigation\n | join kind=innerunique (\n DnsEvents\n | where TimeGenerated >= ago(dt_lookBack)\n | where SubType =~ \"LookupQuery\" and isnotempty(IPAddresses)\n | mv-expand SingleIP = split(IPAddresses, \", \") to typeof(string)\n | extend DNS_TimeGenerated = TimeGenerated\n )\n on $left.TI_ipEntity == $right.SingleIP\n // Filter out DNS events that occurred after the expiration of the corresponding indicator\n | where DNS_TimeGenerated < ExpirationDateTime\n // Group the results by IndicatorId and SingleIP, and keep the DNS event with the latest timestamp\n | summarize DNS_TimeGenerated = arg_max(DNS_TimeGenerated, *) by IndicatorId, SingleIP\n // Select the desired output fields\n | project DNS_TimeGenerated, Description, ActivityGroupNames, IndicatorId, ThreatType, Url, DomainName, ExpirationDateTime, ConfidenceScore,\n TI_ipEntity, Computer, EventId, SubType, ClientIP, Name, IPAddresses, NetworkIP, NetworkDestinationIP, NetworkSourceIP, EmailSourceIpAddress, Type\n | extend timestamp = DNS_TimeGenerated, HostName = tostring(split(Computer, '.', 0)[0]), DnsDomain = tostring(strcat_array(array_slice(split(Computer, '.'), 1, -1), '.'))\n", + "queryFrequency": "PT1H", + "queryPeriod": "P14D", + "severity": "Medium", + "suppressionDuration": "PT1H", + "suppressionEnabled": false, + "triggerOperator": "GreaterThan", + "triggerThreshold": 0, + "status": "Available", + "requiredDataConnectors": [ + { + "dataTypes": [ + "ThreatIntelligenceIndicator" + ], + "connectorId": "ThreatIntelligence" + }, + { + "dataTypes": [ + "ThreatIntelligenceIndicator" + ], + "connectorId": "ThreatIntelligenceTaxii" + }, + { + "dataTypes": [ + "DnsEvents" + ], + "connectorId": "DNS" + }, + { + "dataTypes": [ + "ThreatIntelligenceIndicator" + ], + "connectorId": "GreyNoise2SentinelAPI" + } + ], + "tactics": [ + "Impact" + ], + "entityMappings": [ + { + "entityType": "Host", + "fieldMappings": [ + { + "columnName": "HostName", + "identifier": "HostName" + }, + { + "columnName": "DnsDomain", + "identifier": "DnsDomain" + } + ] + }, + { + "entityType": "IP", + "fieldMappings": [ + { + "columnName": "ClientIP", + "identifier": "Address" + } + ] + }, + { + "entityType": "URL", + "fieldMappings": [ + { + "columnName": "Url", + "identifier": "Url" + } + ] + } + ] + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", + "apiVersion": "2022-01-01-preview", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('AnalyticsRule-', last(split(variables('analyticRuleId1'),'/'))))]", + "properties": { + "description": "GreyNoiseThreatIntelligence Analytics Rule 1", + "parentId": "[variables('analyticRuleId1')]", + "contentId": "[variables('_analyticRulecontentId1')]", + "kind": "AnalyticsRule", + "version": "[variables('analyticRuleVersion1')]", + "source": { + "kind": "Solution", + "name": "GreyNoiseThreatIntelligence", + "sourceId": "[variables('_solutionId')]" + }, + "author": { + "name": "JP Bourget jp@bluecycle.net" + }, + "support": { + "name": "GreyNoise", + "email": "support@greynoise.io", + "tier": "Partner", + "link": "https://www.greynoise.io/contact/general" + } + } + } + ] + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_analyticRulecontentId1')]", + "contentKind": "AnalyticsRule", + "displayName": "GreyNoise TI Map IP Entity to DnsEvents", + "contentProductId": "[variables('_analyticRulecontentProductId1')]", + "id": "[variables('_analyticRulecontentProductId1')]", + "version": "[variables('analyticRuleVersion1')]" + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", + "name": "[variables('analyticRuleTemplateSpecName2')]", + "location": "[parameters('workspace-location')]", + "dependsOn": [ + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" + ], + "properties": { + "description": "GreyNoise_IPEntity_CustomSecurityLog_AnalyticalRules Analytics Rule with template version 3.0.0", + "mainTemplate": { + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "[variables('analyticRuleVersion2')]", + "parameters": {}, + "variables": {}, + "resources": [ + { + "type": "Microsoft.SecurityInsights/AlertRuleTemplates", + "name": "[variables('analyticRulecontentId2')]", + "apiVersion": "2022-04-01-preview", + "kind": "Scheduled", + "location": "[parameters('workspace-location')]", + "properties": { + "description": "This query maps GreyNoise IP indicators of compromise (IOCs) from threat intelligence (TI), by searching for matches in CommonSecurityLog.", + "displayName": "GreyNoise TI Map IP Entity to CommonSecurityLog", + "enabled": false, + "query": "let IPRegex = '[0-9]{1,3}\\\\.[0-9]{1,3}\\\\.[0-9]{1,3}\\\\.[0-9]{1,3}';\nlet dt_lookBack = 1h; // Look back 1 hour for CommonSecurityLog events\nlet ioc_lookBack = 14d; // Look back 14 days for threat intelligence indicators\n// Fetch threat intelligence indicators related to IP addresses\nlet IP_Indicators = ThreatIntelligenceIndicator\n | where TimeGenerated >= ago(ioc_lookBack)\n | summarize LatestIndicatorTime = arg_max(TimeGenerated, *) by IndicatorId\n | where Active == true and ExpirationDateTime > now()\n | where SourceSystem == 'GreyNoise'\n | where isnotempty(NetworkIP) or isnotempty(EmailSourceIpAddress) or isnotempty(NetworkDestinationIP) or isnotempty(NetworkSourceIP)\n | extend TI_ipEntity = iff(isnotempty(NetworkIP), NetworkIP, NetworkDestinationIP)\n | extend TI_ipEntity = iff(isempty(TI_ipEntity) and isnotempty(NetworkSourceIP), NetworkSourceIP, TI_ipEntity)\n | extend TI_ipEntity = iff(isempty(TI_ipEntity) and isnotempty(EmailSourceIpAddress), EmailSourceIpAddress, TI_ipEntity)\n | where ipv4_is_private(TI_ipEntity) == false and TI_ipEntity !startswith \"fe80\" and TI_ipEntity !startswith \"::\" and TI_ipEntity !startswith \"127.\";\n// Perform a join between IP indicators and CommonSecurityLog events\nIP_Indicators\n // Use innerunique to keep performance fast and result set low, as we only need one match to indicate potential malicious activity that needs investigation\n | join kind=innerunique (\n CommonSecurityLog\n | where TimeGenerated >= ago(dt_lookBack)\n | extend MessageIP = extract(IPRegex, 0, Message)\n | extend CS_ipEntity = iff(isnotempty(SourceIP), SourceIP, DestinationIP)\n | extend CS_ipEntity = iff(isempty(CS_ipEntity) and isnotempty(MessageIP), MessageIP, CS_ipEntity)\n | extend CommonSecurityLog_TimeGenerated = TimeGenerated\n )\n on $left.TI_ipEntity == $right.CS_ipEntity\n // Filter out logs that occurred after the expiration of the corresponding indicator\n | where CommonSecurityLog_TimeGenerated < ExpirationDateTime\n // Group the results by IndicatorId and CS_ipEntity, and keep the log entry with the latest timestamp\n | summarize CommonSecurityLog_TimeGenerated = arg_max(CommonSecurityLog_TimeGenerated, *) by IndicatorId, CS_ipEntity\n // Select the desired output fields\n | project timestamp = CommonSecurityLog_TimeGenerated, SourceIP, DestinationIP, MessageIP, Message, DeviceVendor, DeviceProduct, IndicatorId, ThreatType, ExpirationDateTime, ConfidenceScore, TI_ipEntity, CS_ipEntity, LogSeverity, DeviceAction, Type\n", + "queryFrequency": "PT4H", + "queryPeriod": "P14D", + "severity": "Medium", + "suppressionDuration": "PT1H", + "suppressionEnabled": false, + "triggerOperator": "GreaterThan", + "triggerThreshold": 0, + "status": "Available", + "requiredDataConnectors": [ + { + "dataTypes": [ + "ThreatIntelligenceIndicator" + ], + "connectorId": "ThreatIntelligence" + }, + { + "dataTypes": [ + "CommonSecurityLog" + ], + "connectorId": "CEF" + }, + { + "dataTypes": [ + "ThreatIntelligenceIndicator" + ], + "connectorId": "GreyNoise2SentinelAPI" + } + ], + "tactics": [ + "Impact" + ], + "entityMappings": [ + { + "entityType": "IP", + "fieldMappings": [ + { + "columnName": "CS_ipEntity", + "identifier": "Address" + } + ] + } + ] + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", + "apiVersion": "2022-01-01-preview", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('AnalyticsRule-', last(split(variables('analyticRuleId2'),'/'))))]", + "properties": { + "description": "GreyNoiseThreatIntelligence Analytics Rule 2", + "parentId": "[variables('analyticRuleId2')]", + "contentId": "[variables('_analyticRulecontentId2')]", + "kind": "AnalyticsRule", + "version": "[variables('analyticRuleVersion2')]", + "source": { + "kind": "Solution", + "name": "GreyNoiseThreatIntelligence", + "sourceId": "[variables('_solutionId')]" + }, + "author": { + "name": "JP Bourget jp@bluecycle.net" + }, + "support": { + "name": "GreyNoise", + "email": "support@greynoise.io", + "tier": "Partner", + "link": "https://www.greynoise.io/contact/general" + } + } + } + ] + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_analyticRulecontentId2')]", + "contentKind": "AnalyticsRule", + "displayName": "GreyNoise TI Map IP Entity to CommonSecurityLog", + "contentProductId": "[variables('_analyticRulecontentProductId2')]", + "id": "[variables('_analyticRulecontentProductId2')]", + "version": "[variables('analyticRuleVersion2')]" + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", + "name": "[variables('analyticRuleTemplateSpecName3')]", + "location": "[parameters('workspace-location')]", + "dependsOn": [ + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" + ], + "properties": { + "description": "GreyNoise_IPEntity_imNetworkSession_AnalyticalRules Analytics Rule with template version 3.0.0", + "mainTemplate": { + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "[variables('analyticRuleVersion3')]", + "parameters": {}, + "variables": {}, + "resources": [ + { + "type": "Microsoft.SecurityInsights/AlertRuleTemplates", + "name": "[variables('analyticRulecontentId3')]", + "apiVersion": "2022-04-01-preview", + "kind": "Scheduled", + "location": "[parameters('workspace-location')]", + "properties": { + "description": "This rule identifies a match Network Sessions for which the source or destination IP address is a known GreyNoise IoC.

\nThis analytic rule uses [ASIM](https://aka.ms/AboutASIM) and supports any built-in or custom source that supports the ASIM NetworkSession schema", + "displayName": "GreyNoise TI map IP entity to Network Session Events (ASIM Network Session schema)", + "enabled": false, + "query": "let dt_lookBack = 1h;\nlet ioc_lookBack = 14d;\nlet IP_TI = materialize (\nThreatIntelligenceIndicator\n| where TimeGenerated >= ago(ioc_lookBack)\n| summarize LatestIndicatorTime = arg_max(TimeGenerated, *) by IndicatorId\n| where Active == true and ExpirationDateTime > now()\n| where SourceSystem == 'GreyNoise'\n | extend TI_ipEntity = coalesce(NetworkIP, NetworkDestinationIP, NetworkSourceIP,EmailSourceIpAddress,\"NO_IP\")\n | where TI_ipEntity != \"NO_IP\"\n);\nIP_TI\n // using innerunique to keep perf fast and result set low, we only need one match to indicate potential malicious activity that needs to be investigated\n| join kind=innerunique \n(\n _Im_NetworkSession (starttime=ago(dt_lookBack))\n | where isnotempty(SrcIpAddr)\n | summarize imNWS_mintime=min(TimeGenerated), imNWS_maxtime=max(TimeGenerated) by SrcIpAddr, DstIpAddr, Dvc, EventProduct, EventVendor \n | lookup (IP_TI | project TI_ipEntity, Active) on $left.SrcIpAddr == $right.TI_ipEntity\n | project-rename SrcMatch = Active\n | lookup (IP_TI | project TI_ipEntity, Active) on $left.DstIpAddr == $right.TI_ipEntity\n | project-rename DstMatch = Active\n | where SrcMatch or DstMatch\n | extend \n IoCIP = iff(SrcMatch, SrcIpAddr, DstIpAddr),\n IoCDirection = iff(SrcMatch, \"Source\", \"Destination\")\n)on $left.TI_ipEntity == $right.IoCIP\n| where imNWS_mintime < ExpirationDateTime\n| project imNWS_mintime, imNWS_maxtime, Description, ActivityGroupNames, IndicatorId, ThreatType, ExpirationDateTime, ConfidenceScore, SrcIpAddr, DstIpAddr, IoCDirection, IoCIP, Dvc, EventVendor, EventProduct\n", + "queryFrequency": "PT1H", + "queryPeriod": "P14D", + "severity": "Medium", + "suppressionDuration": "PT1H", + "suppressionEnabled": false, + "triggerOperator": "GreaterThan", + "triggerThreshold": 0, + "status": "Available", + "requiredDataConnectors": [ + { + "dataTypes": [ + "AWSVPCFlow" + ], + "connectorId": "AWSS3" + }, + { + "dataTypes": [ + "DeviceNetworkEvents" + ], + "connectorId": "MicrosoftThreatProtection" + }, + { + "dataTypes": [ + "SecurityEvent" + ], + "connectorId": "SecurityEvents" + }, + { + "dataTypes": [ + "WindowsEvent" + ], + "connectorId": "WindowsForwardedEvents" + }, + { + "dataTypes": [ + "CommonSecurityLog" + ], + "connectorId": "Zscaler" + }, + { + "dataTypes": [ + "Syslog" + ], + "connectorId": "MicrosoftSysmonForLinux" + }, + { + "dataTypes": [ + "CommonSecurityLog" + ], + "connectorId": "PaloAltoNetworks" + }, + { + "dataTypes": [ + "VMConnection" + ], + "connectorId": "AzureMonitor(VMInsights)" + }, + { + "dataTypes": [ + "AzureDiagnostics" + ], + "connectorId": "AzureFirewall" + }, + { + "dataTypes": [ + "AzureDiagnostics" + ], + "connectorId": "AzureNSG" + }, + { + "dataTypes": [ + "CommonSecurityLog" + ], + "connectorId": "CiscoASA" + }, + { + "dataTypes": [ + "Corelight_CL" + ], + "connectorId": "Corelight" + }, + { + "dataTypes": [ + "VectraStream" + ], + "connectorId": "AIVectraStream" + }, + { + "dataTypes": [ + "CommonSecurityLog" + ], + "connectorId": "CheckPoint" + }, + { + "dataTypes": [ + "CommonSecurityLog" + ], + "connectorId": "Fortinet" + }, + { + "dataTypes": [ + "ThreatIntelligenceIndicator" + ], + "connectorId": "MicrosoftDefenderThreatIntelligence" + }, + { + "dataTypes": [ + "Syslog", + "CiscoMerakiNativePoller" + ], + "connectorId": "CiscoMeraki" + }, + { + "dataTypes": [ + "ThreatIntelligenceIndicator" + ], + "connectorId": "GreyNoise2SentinelAPI" + } + ], + "tactics": [ + "Impact" + ], + "entityMappings": [ + { + "entityType": "IP", + "fieldMappings": [ + { + "columnName": "IoCIP", + "identifier": "Address" + } + ] + } + ], + "customDetails": { + "IndicatorId": "IndicatorId", + "IoCExpirationTime": "ExpirationDateTime", + "IoCDescription": "Description", + "ThreatType": "ThreatType", + "IoCIPDirection": "IoCDirection", + "ActivityGroupNames": "ActivityGroupNames", + "IoCConfidenceScore": "ConfidenceScore", + "EventEndTime": "imNWS_maxtime", + "EventStartTime": "imNWS_mintime" + }, + "alertDetailsOverride": { + "alertDisplayNameFormat": "A network session {{IoCDirection}} address {{IoCIP}} matched an IoC.", + "alertDescriptionFormat": "The {{IoCDirection}} address {{IoCIP}} of a network session matched a known indicator of compromise of {{ThreatType}}. Consult the threat intelligence blead for more information on the indicator." + } + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", + "apiVersion": "2022-01-01-preview", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('AnalyticsRule-', last(split(variables('analyticRuleId3'),'/'))))]", + "properties": { + "description": "GreyNoiseThreatIntelligence Analytics Rule 3", + "parentId": "[variables('analyticRuleId3')]", + "contentId": "[variables('_analyticRulecontentId3')]", + "kind": "AnalyticsRule", + "version": "[variables('analyticRuleVersion3')]", + "source": { + "kind": "Solution", + "name": "GreyNoiseThreatIntelligence", + "sourceId": "[variables('_solutionId')]" + }, + "author": { + "name": "JP Bourget jp@bluecycle.net" + }, + "support": { + "name": "GreyNoise", + "email": "support@greynoise.io", + "tier": "Partner", + "link": "https://www.greynoise.io/contact/general" + } + } + } + ] + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_analyticRulecontentId3')]", + "contentKind": "AnalyticsRule", + "displayName": "GreyNoise TI map IP entity to Network Session Events (ASIM Network Session schema)", + "contentProductId": "[variables('_analyticRulecontentProductId3')]", + "id": "[variables('_analyticRulecontentProductId3')]", + "version": "[variables('analyticRuleVersion3')]" + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", + "name": "[variables('analyticRuleTemplateSpecName4')]", + "location": "[parameters('workspace-location')]", + "dependsOn": [ + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" + ], + "properties": { + "description": "GreyNoise_IPEntity_OfficeActivity_AnalyticalRules Analytics Rule with template version 3.0.0", + "mainTemplate": { + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "[variables('analyticRuleVersion4')]", + "parameters": {}, + "variables": {}, + "resources": [ + { + "type": "Microsoft.SecurityInsights/AlertRuleTemplates", + "name": "[variables('analyticRulecontentId4')]", + "apiVersion": "2022-04-01-preview", + "kind": "Scheduled", + "location": "[parameters('workspace-location')]", + "properties": { + "description": "This query maps any GreyNoise IP indicators of compromise (IOCs) from threat intelligence (TI), by searching for matches in OfficeActivity.", + "displayName": "GreyNoise TI map IP entity to OfficeActivity", + "enabled": false, + "query": "let dt_lookBack = 1h; // Look back 1 hour for OfficeActivity events\nlet ioc_lookBack = 14d; // Look back 14 days for threat intelligence indicators\n// Fetch threat intelligence indicators related to IP addresses\nlet IP_Indicators = ThreatIntelligenceIndicator\n | where TimeGenerated >= ago(ioc_lookBack)\n | summarize LatestIndicatorTime = arg_max(TimeGenerated, *) by IndicatorId\n | where Active == true and ExpirationDateTime > now()\n | where SourceSystem == 'GreyNoise'\n | where isnotempty(NetworkIP) or isnotempty(EmailSourceIpAddress) or isnotempty(NetworkDestinationIP) or isnotempty(NetworkSourceIP)\n | extend TI_ipEntity = iff(isnotempty(NetworkIP), NetworkIP, NetworkDestinationIP)\n | extend TI_ipEntity = iff(isempty(TI_ipEntity) and isnotempty(NetworkSourceIP), NetworkSourceIP, TI_ipEntity)\n | extend TI_ipEntity = iff(isempty(TI_ipEntity) and isnotempty(EmailSourceIpAddress), EmailSourceIpAddress, TI_ipEntity)\n | where ipv4_is_private(TI_ipEntity) == false and TI_ipEntity !startswith \"fe80\" and TI_ipEntity !startswith \"::\" and TI_ipEntity !startswith \"127.\";\n// Perform a join between IP indicators and OfficeActivity events\nIP_Indicators\n // Use innerunique to keep performance fast and result set low, as we only need one match to indicate potential malicious activity that needs investigation\n | join kind=innerunique (\n OfficeActivity\n | where TimeGenerated >= ago(dt_lookBack)\n | where isnotempty(ClientIP)\n | extend ClientIPValues = extract_all(@'\\[?(::ffff:)?(?P(\\d+\\.\\d+\\.\\d+\\.\\d+)|[^\\]%]+)(%\\d+)?\\]?([-:](?P\\d+))?', dynamic([\"IPAddress\", \"Port\"]), ClientIP)[0]\n | extend IPAddress = iff(array_length(ClientIPValues) > 0, tostring(ClientIPValues[0]), '')\n | extend OfficeActivity_TimeGenerated = TimeGenerated\n )\n on $left.TI_ipEntity == $right.IPAddress\n // Filter out OfficeActivity events that occurred after the expiration of the corresponding indicator\n | where OfficeActivity_TimeGenerated < ExpirationDateTime\n // Group the results by IndicatorId and keep the OfficeActivity event with the latest timestamp\n | summarize OfficeActivity_TimeGenerated = arg_max(OfficeActivity_TimeGenerated, *) by IndicatorId\n // Select the desired output fields\n | project OfficeActivity_TimeGenerated, Description, ActivityGroupNames, IndicatorId, ThreatType, Url, ExpirationDateTime, ConfidenceScore,\n TI_ipEntity, ClientIP, UserId, Operation, ResultStatus, RecordType, OfficeObjectId, NetworkIP, NetworkDestinationIP, NetworkSourceIP, EmailSourceIpAddress, Type\n | extend timestamp = OfficeActivity_TimeGenerated, Name = tostring(split(UserId, '@', 0)[0]), UPNSuffix = tostring(split(UserId, '@', 1)[0])\n", + "queryFrequency": "PT1H", + "queryPeriod": "P14D", + "severity": "Medium", + "suppressionDuration": "PT1H", + "suppressionEnabled": false, + "triggerOperator": "GreaterThan", + "triggerThreshold": 0, + "status": "Available", + "requiredDataConnectors": [ + { + "dataTypes": [ + "ThreatIntelligenceIndicator" + ], + "connectorId": "ThreatIntelligence" + }, + { + "dataTypes": [ + "ThreatIntelligenceIndicator" + ], + "connectorId": "ThreatIntelligenceTaxii" + }, + { + "dataTypes": [ + "ThreatIntelligenceIndicator" + ], + "connectorId": "MicrosoftDefenderThreatIntelligence" + }, + { + "dataTypes": [ + "OfficeActivity" + ], + "connectorId": "Office365" + }, + { + "dataTypes": [ + "ThreatIntelligenceIndicator" + ], + "connectorId": "GreyNoise2SentinelAPI" + } + ], + "tactics": [ + "Impact" + ], + "entityMappings": [ + { + "entityType": "Account", + "fieldMappings": [ + { + "columnName": "Name", + "identifier": "Name" + }, + { + "columnName": "UPNSuffix", + "identifier": "UPNSuffix" + } + ] + }, + { + "entityType": "IP", + "fieldMappings": [ + { + "columnName": "TI_ipEntity", + "identifier": "Address" + } + ] + }, + { + "entityType": "URL", + "fieldMappings": [ + { + "columnName": "Url", + "identifier": "Url" + } + ] + } + ] + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", + "apiVersion": "2022-01-01-preview", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('AnalyticsRule-', last(split(variables('analyticRuleId4'),'/'))))]", + "properties": { + "description": "GreyNoiseThreatIntelligence Analytics Rule 4", + "parentId": "[variables('analyticRuleId4')]", + "contentId": "[variables('_analyticRulecontentId4')]", + "kind": "AnalyticsRule", + "version": "[variables('analyticRuleVersion4')]", + "source": { + "kind": "Solution", + "name": "GreyNoiseThreatIntelligence", + "sourceId": "[variables('_solutionId')]" + }, + "author": { + "name": "JP Bourget jp@bluecycle.net" + }, + "support": { + "name": "GreyNoise", + "email": "support@greynoise.io", + "tier": "Partner", + "link": "https://www.greynoise.io/contact/general" + } + } + } + ] + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_analyticRulecontentId4')]", + "contentKind": "AnalyticsRule", + "displayName": "GreyNoise TI map IP entity to OfficeActivity", + "contentProductId": "[variables('_analyticRulecontentProductId4')]", + "id": "[variables('_analyticRulecontentProductId4')]", + "version": "[variables('analyticRuleVersion4')]" + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", + "name": "[variables('analyticRuleTemplateSpecName5')]", + "location": "[parameters('workspace-location')]", + "dependsOn": [ + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" + ], + "properties": { + "description": "GreyNoise_IPEntity_SigninLogs_AnalyticalRules Analytics Rule with template version 3.0.0", + "mainTemplate": { + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "[variables('analyticRuleVersion5')]", + "parameters": {}, + "variables": {}, + "resources": [ + { + "type": "Microsoft.SecurityInsights/AlertRuleTemplates", + "name": "[variables('analyticRulecontentId5')]", + "apiVersion": "2022-04-01-preview", + "kind": "Scheduled", + "location": "[parameters('workspace-location')]", + "properties": { + "description": "This query maps any GreyNoise IP indicators of compromise (IOCs) from threat intelligence (TI), by searching for matches in SigninLogs.", + "displayName": "GreyNoise TI Map IP Entity to SigninLogs", + "enabled": false, + "query": "let dt_lookBack = 1h;\nlet ioc_lookBack = 14d;\nlet aadFunc = (tableName:string){\nThreatIntelligenceIndicator\n| where TimeGenerated >= ago(ioc_lookBack)\n| summarize LatestIndicatorTime = arg_max(TimeGenerated, *) by IndicatorId\n| where Active == true and ExpirationDateTime > now()\n| where SourceSystem == 'GreyNoise'\n// Picking up only IOC's that contain the entities we want\n| where isnotempty(NetworkIP) or isnotempty(EmailSourceIpAddress) or isnotempty(NetworkDestinationIP) or isnotempty(NetworkSourceIP)\n// As there is potentially more than 1 indicator type for matching IP, taking NetworkIP first, then others if that is empty.\n// Taking the first non-empty value based on potential IOC match availability\n| extend TI_ipEntity = iff(isnotempty(NetworkIP), NetworkIP, NetworkDestinationIP)\n| extend TI_ipEntity = iff(isempty(TI_ipEntity) and isnotempty(NetworkSourceIP), NetworkSourceIP, TI_ipEntity)\n| extend TI_ipEntity = iff(isempty(TI_ipEntity) and isnotempty(EmailSourceIpAddress), EmailSourceIpAddress, TI_ipEntity)\n// using innerunique to keep perf fast and result set low, we only need one match to indicate potential malicious activity that needs to be investigated\n| join kind=innerunique (\n table(tableName) | where TimeGenerated >= ago(dt_lookBack)\n | extend Status = todynamic(Status), LocationDetails = todynamic(LocationDetails)\n | extend StatusCode = tostring(Status.errorCode), StatusDetails = tostring(Status.additionalDetails), StatusReason = tostring(Status.failureReason)\n | extend State = tostring(LocationDetails.state), City = tostring(LocationDetails.city), Region = tostring(LocationDetails.countryOrRegion)\n // renaming time column so it is clear the log this came from\n | extend SigninLogs_TimeGenerated = TimeGenerated, Type = Type\n)\non $left.TI_ipEntity == $right.IPAddress\n| where SigninLogs_TimeGenerated < ExpirationDateTime\n| summarize SigninLogs_TimeGenerated = arg_max(SigninLogs_TimeGenerated, *) by IndicatorId, IPAddress\n| project SigninLogs_TimeGenerated, Description, ActivityGroupNames, IndicatorId, ThreatType, Url, ExpirationDateTime, ConfidenceScore,\nTI_ipEntity, IPAddress, UserPrincipalName, AppDisplayName, StatusCode, StatusDetails, StatusReason, NetworkIP, NetworkDestinationIP, NetworkSourceIP, EmailSourceIpAddress, Type\n| extend timestamp = SigninLogs_TimeGenerated, Name = tostring(split(UserPrincipalName, '@', 0)[0]), UPNSuffix = tostring(split(UserPrincipalName, '@', 1)[0])\n};\nlet aadSignin = aadFunc(\"SigninLogs\");\nlet aadNonInt = aadFunc(\"AADNonInteractiveUserSignInLogs\");\nunion isfuzzy=true aadSignin, aadNonInt\n", + "queryFrequency": "PT1H", + "queryPeriod": "P14D", + "severity": "Medium", + "suppressionDuration": "PT1H", + "suppressionEnabled": false, + "triggerOperator": "GreaterThan", + "triggerThreshold": 0, + "status": "Available", + "requiredDataConnectors": [ + { + "dataTypes": [ + "ThreatIntelligenceIndicator" + ], + "connectorId": "ThreatIntelligence" + }, + { + "dataTypes": [ + "ThreatIntelligenceIndicator" + ], + "connectorId": "ThreatIntelligenceTaxii" + }, + { + "dataTypes": [ + "SigninLogs" + ], + "connectorId": "AzureActiveDirectory" + }, + { + "dataTypes": [ + "AADNonInteractiveUserSignInLogs" + ], + "connectorId": "AzureActiveDirectory" + }, + { + "dataTypes": [ + "ThreatIntelligenceIndicator" + ], + "connectorId": "MicrosoftDefenderThreatIntelligence" + }, + { + "dataTypes": [ + "ThreatIntelligenceIndicator" + ], + "connectorId": "GreyNoise2SentinelAPI" + } + ], + "tactics": [ + "Impact" + ], + "entityMappings": [ + { + "entityType": "Account", + "fieldMappings": [ + { + "columnName": "Name", + "identifier": "Name" + }, + { + "columnName": "UPNSuffix", + "identifier": "UPNSuffix" + } + ] + }, + { + "entityType": "IP", + "fieldMappings": [ + { + "columnName": "IPAddress", + "identifier": "Address" + } + ] + }, + { + "entityType": "URL", + "fieldMappings": [ + { + "columnName": "Url", + "identifier": "Url" + } + ] + } + ] + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", + "apiVersion": "2022-01-01-preview", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('AnalyticsRule-', last(split(variables('analyticRuleId5'),'/'))))]", + "properties": { + "description": "GreyNoiseThreatIntelligence Analytics Rule 5", + "parentId": "[variables('analyticRuleId5')]", + "contentId": "[variables('_analyticRulecontentId5')]", + "kind": "AnalyticsRule", + "version": "[variables('analyticRuleVersion5')]", + "source": { + "kind": "Solution", + "name": "GreyNoiseThreatIntelligence", + "sourceId": "[variables('_solutionId')]" + }, + "author": { + "name": "JP Bourget jp@bluecycle.net" + }, + "support": { + "name": "GreyNoise", + "email": "support@greynoise.io", + "tier": "Partner", + "link": "https://www.greynoise.io/contact/general" + } + } + } + ] + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_analyticRulecontentId5')]", + "contentKind": "AnalyticsRule", + "displayName": "GreyNoise TI Map IP Entity to SigninLogs", + "contentProductId": "[variables('_analyticRulecontentProductId5')]", + "id": "[variables('_analyticRulecontentProductId5')]", + "version": "[variables('analyticRuleVersion5')]" + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", + "name": "[variables('dataConnectorTemplateSpecName1')]", + "location": "[parameters('workspace-location')]", + "dependsOn": [ + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" + ], + "properties": { + "description": "GreyNoiseThreatIntelligence data connector with template version 3.0.0", + "mainTemplate": { + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "[variables('dataConnectorVersion1')]", + "parameters": {}, + "variables": {}, + "resources": [ + { + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',variables('_dataConnectorContentId1'))]", + "apiVersion": "2021-03-01-preview", + "type": "Microsoft.OperationalInsights/workspaces/providers/dataConnectors", + "location": "[parameters('workspace-location')]", + "kind": "GenericUI", + "properties": { + "connectorUiConfig": { + "id": "[variables('_uiConfigId1')]", + "title": "GreyNoise Threat Intelligence (Using Azure Functions) (using Azure Functions)", + "publisher": "GreyNoise, Inc. and BlueCycle LLC", + "descriptionMarkdown": "This Data Connector installs an Azure Function app to download GreyNoise indicators once per day and inserts them into the ThreatIntelligenceIndicator table in Microsoft Sentinel.", + "graphQueries": [ + { + "metricName": "Total indicators received", + "legend": "Connection Events", + "baseQuery": "ThreatIntelligenceIndicator | where SourceSystem == 'GreyNoise'" + } + ], + "sampleQueries": [ + { + "description": "All Threat Intelligence APIs Indicators", + "query": "ThreatIntelligenceIndicator | where SourceSystem == 'GreyNoise'| sort by TimeGenerated desc" + } + ], + "dataTypes": [ + { + "name": "ThreatIntelligenceIndicator", + "lastDataReceivedQuery": "ThreatIntelligenceIndicator| where isnotempty(TimeGenerated) and SourceSystem == 'GreyNoise' | summarize Time = max(TimeGenerated)" + } + ], + "connectivityCriterias": [ + { + "type": "IsConnectedQuery", + "value": [ + "ThreatIntelligenceIndicator| where SourceSystem == 'GreyNoise' | summarize LastLogReceived = max(TimeGenerated) | project IsConnected = LastLogReceived > ago(30d)" + ] + } + ], + "availability": { + "status": 1, + "isPreview": false + }, + "permissions": { + "resourceProvider": [ + { + "provider": "Microsoft.SecurityInsights/threatintelligence/write", + "permissionsDisplayText": "write permissions are required.", + "providerDisplayName": "Workspace", + "scope": "Workspace", + "requiredPermissions": { + "write": true, + "read": true, + "delete": true + } + }, + { + "provider": "Microsoft.OperationalInsights/workspaces", + "permissionsDisplayText": "read and write permissions on the workspace are required.", + "providerDisplayName": "Workspace", + "scope": "Workspace", + "requiredPermissions": { + "write": true, + "read": true, + "delete": true + } + } + ], + "customs": [ + { + "name": "Microsoft.Web/sites permissions", + "description": "Read and write permissions to Azure Functions to create a Function App is required. [See the documentation to learn more about Azure Functions](https://docs.microsoft.com/azure/azure-functions/)." + }, + { + "name": "GreyNoise API Key", + "description": "Retreive your GreyNoise API Key [here](https://viz.greynoise.io/account/api-key)." + } + ] + }, + "instructionSteps": [ + { + "description": "\n> The following steps create an Azure AAD application, retrieves a GreyNoise API key, and saves the values in an Azure Function App Configuration.", + "title": "You can connect GreyNoise Threat Intelligence to Microsoft Sentinel by following the below steps: " + }, + { + "description": "Generate an API key from GreyNoise Portal https://docs.greynoise.io/docs/using-the-greynoise-api", + "title": "1. Retrieve API Key from GreyNoise Portal." + }, + { + "description": "Follow the instructions here to create your Azure AAD app and save your Client ID and Tenant ID: https://learn.microsoft.com/en-us/azure/sentinel/connect-threat-intelligence-upload-api#instructions\n NOTE: Wait until step 5 to generate your client secret.", + "instructions": [ + { + "parameters": { + "fillWith": [ + "WorkspaceId" + ], + "label": "Workspace ID" + }, + "type": "CopyableLabel" + } + ], + "title": "2. In your Azure AD tenant, create an Azure Active Directory (AAD) application and acquire Tenant ID, Client ID and (note: hold off generating a Client Secret until Step 5).Also get the Log Analytics Workspace ID associated with your Microsoft Sentinel instance should be below." + }, + { + "description": "Follow the instructions here to add the Microsoft Sentinel Contributor Role: https://learn.microsoft.com/en-us/azure/sentinel/connect-threat-intelligence-upload-api#assign-a-role-to-the-application", + "title": "3. Assign the AAD application the Microsoft Sentinel Contributor Role." + }, + { + "description": "Follow this section here to add **'ThreatIndicators.ReadWrite.OwnedBy'** permission to the AAD App: https://learn.microsoft.com/en-us/azure/sentinel/connect-threat-intelligence-tip#specify-the-permissions-required-by-the-application. \n Back in your AAD App, ensure you grant admin consent for the permissions you just added. \n Finally, in the 'Tokens and APIs' section, generate a client secret and save it. You will need it in Step 6. ", + "title": "4. Specify the AAD permissions to enable MS Graph API access to the upload-indicators API." + }, + { + "description": "See Microsoft Sentinel Content Hub for this Solution, and install it this Microsoft Sentinel instance.", + "title": "5. Deploy the Threat Intellegence (Preview) Solution which includes the Threat Intelligence Upload Indicators API (Preview)" + }, + { + "description": "Click the Deploy to Azure button.\n\n [![Deploy To Azure](https://aka.ms/deploytoazurebutton)](https://aka.ms/sentinel-GreyNoise-azuredeploy)\n\n Fill in the appropriate values for each parameter. **Be aware** that the only valid values for the **GREYNOISE_CLASSIFICATIONS** parameter are **malicious** and/or **unknown**, which must be comma separated. Do not bring in **benign**, as this will bring in millions of IPs which are known good and will likely cause many unwanted alerts.", + "title": "6. Deploy the Azure Function" + }, + { + "description": "The function app installed in Step 6 queries the GreyNoise GNQL API once per day, and submits each indicator found in STIX 2.1 format to the [Microsoft Upload Threat Intelligence Indicators API](https://learn.microsoft.com/en-us/azure/sentinel/upload-indicators-api). \n Each indicator expires in ~24 hours from creation unless it's found on the next day's query, in which case the TI Indicator's **Valid Until** time is extended for another 24 hours, which keeps it active in Microsoft Sentinel. \n\n For more information on the GreyNoise API and the GreyNoise Query Language (GNQL) [click here](https://developer.greynoise.io/docs/using-the-greynoise-api).", + "title": "7. Send indicators to Sentinel" + } + ], + "metadata": { + "id": "27dc60cc-758b-566e-93ce-932560a6ff81", + "version": "1.0.0", + "kind": "dataConnector", + "source": { + "kind": "solution", + "name": "GreyNoise Intelligence Solution for Microsoft Sentinel" + }, + "author": { + "name": "Blue Cycle LLC | GreyNoise, Inc." + }, + "support": { + "tier": "developer", + "name": "Support Team", + "email": "support@greynoise.io", + "link": "https://www.greynoise.io/contact/sales" + } + } + } + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", + "apiVersion": "2023-04-01-preview", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('DataConnector-', last(split(variables('_dataConnectorId1'),'/'))))]", + "properties": { + "parentId": "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/dataConnectors', variables('_dataConnectorContentId1'))]", + "contentId": "[variables('_dataConnectorContentId1')]", + "kind": "DataConnector", + "version": "[variables('dataConnectorVersion1')]", + "source": { + "kind": "Solution", + "name": "GreyNoiseThreatIntelligence", + "sourceId": "[variables('_solutionId')]" + }, + "author": { + "name": "JP Bourget jp@bluecycle.net" + }, + "support": { + "name": "GreyNoise", + "email": "support@greynoise.io", + "tier": "Partner", + "link": "https://www.greynoise.io/contact/general" + } + } + } + ] + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_dataConnectorContentId1')]", + "contentKind": "DataConnector", + "displayName": "GreyNoise Threat Intelligence (Using Azure Functions) (using Azure Functions)", + "contentProductId": "[variables('_dataConnectorcontentProductId1')]", + "id": "[variables('_dataConnectorcontentProductId1')]", + "version": "[variables('dataConnectorVersion1')]" + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", + "apiVersion": "2023-04-01-preview", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('DataConnector-', last(split(variables('_dataConnectorId1'),'/'))))]", + "dependsOn": [ + "[variables('_dataConnectorId1')]" + ], + "location": "[parameters('workspace-location')]", + "properties": { + "parentId": "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/dataConnectors', variables('_dataConnectorContentId1'))]", + "contentId": "[variables('_dataConnectorContentId1')]", + "kind": "DataConnector", + "version": "[variables('dataConnectorVersion1')]", + "source": { + "kind": "Solution", + "name": "GreyNoiseThreatIntelligence", + "sourceId": "[variables('_solutionId')]" + }, + "author": { + "name": "JP Bourget jp@bluecycle.net" + }, + "support": { + "name": "GreyNoise", + "email": "support@greynoise.io", + "tier": "Partner", + "link": "https://www.greynoise.io/contact/general" + } + } + }, + { + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',variables('_dataConnectorContentId1'))]", + "apiVersion": "2021-03-01-preview", + "type": "Microsoft.OperationalInsights/workspaces/providers/dataConnectors", + "location": "[parameters('workspace-location')]", + "kind": "GenericUI", + "properties": { + "connectorUiConfig": { + "title": "GreyNoise Threat Intelligence (Using Azure Functions) (using Azure Functions)", + "publisher": "GreyNoise, Inc. and BlueCycle LLC", + "descriptionMarkdown": "This Data Connector installs an Azure Function app to download GreyNoise indicators once per day and inserts them into the ThreatIntelligenceIndicator table in Microsoft Sentinel.", + "graphQueries": [ + { + "metricName": "Total indicators received", + "legend": "Connection Events", + "baseQuery": "ThreatIntelligenceIndicator | where SourceSystem == 'GreyNoise'" + } + ], + "dataTypes": [ + { + "name": "ThreatIntelligenceIndicator", + "lastDataReceivedQuery": "ThreatIntelligenceIndicator| where isnotempty(TimeGenerated) and SourceSystem == 'GreyNoise' | summarize Time = max(TimeGenerated)" + } + ], + "connectivityCriterias": [ + { + "type": "IsConnectedQuery", + "value": [ + "ThreatIntelligenceIndicator| where SourceSystem == 'GreyNoise' | summarize LastLogReceived = max(TimeGenerated) | project IsConnected = LastLogReceived > ago(30d)" + ] + } + ], + "sampleQueries": [ + { + "description": "All Threat Intelligence APIs Indicators", + "query": "ThreatIntelligenceIndicator | where SourceSystem == 'GreyNoise'| sort by TimeGenerated desc" + } + ], + "availability": { + "status": 1, + "isPreview": false + }, + "permissions": { + "resourceProvider": [ + { + "provider": "Microsoft.SecurityInsights/threatintelligence/write", + "permissionsDisplayText": "write permissions are required.", + "providerDisplayName": "Workspace", + "scope": "Workspace", + "requiredPermissions": { + "write": true, + "read": true, + "delete": true + } + }, + { + "provider": "Microsoft.OperationalInsights/workspaces", + "permissionsDisplayText": "read and write permissions on the workspace are required.", + "providerDisplayName": "Workspace", + "scope": "Workspace", + "requiredPermissions": { + "write": true, + "read": true, + "delete": true + } + } + ], + "customs": [ + { + "name": "Microsoft.Web/sites permissions", + "description": "Read and write permissions to Azure Functions to create a Function App is required. [See the documentation to learn more about Azure Functions](https://docs.microsoft.com/azure/azure-functions/)." + }, + { + "name": "GreyNoise API Key", + "description": "Retreive your GreyNoise API Key [here](https://viz.greynoise.io/account/api-key)." + } + ] + }, + "instructionSteps": [ + { + "description": "\n> The following steps create an Azure AAD application, retrieves a GreyNoise API key, and saves the values in an Azure Function App Configuration.", + "title": "You can connect GreyNoise Threat Intelligence to Microsoft Sentinel by following the below steps: " + }, + { + "description": "Generate an API key from GreyNoise Portal https://docs.greynoise.io/docs/using-the-greynoise-api", + "title": "1. Retrieve API Key from GreyNoise Portal." + }, + { + "description": "Follow the instructions here to create your Azure AAD app and save your Client ID and Tenant ID: https://learn.microsoft.com/en-us/azure/sentinel/connect-threat-intelligence-upload-api#instructions\n NOTE: Wait until step 5 to generate your client secret.", + "instructions": [ + { + "parameters": { + "fillWith": [ + "WorkspaceId" + ], + "label": "Workspace ID" + }, + "type": "CopyableLabel" + } + ], + "title": "2. In your Azure AD tenant, create an Azure Active Directory (AAD) application and acquire Tenant ID, Client ID and (note: hold off generating a Client Secret until Step 5).Also get the Log Analytics Workspace ID associated with your Microsoft Sentinel instance should be below." + }, + { + "description": "Follow the instructions here to add the Microsoft Sentinel Contributor Role: https://learn.microsoft.com/en-us/azure/sentinel/connect-threat-intelligence-upload-api#assign-a-role-to-the-application", + "title": "3. Assign the AAD application the Microsoft Sentinel Contributor Role." + }, + { + "description": "Follow this section here to add **'ThreatIndicators.ReadWrite.OwnedBy'** permission to the AAD App: https://learn.microsoft.com/en-us/azure/sentinel/connect-threat-intelligence-tip#specify-the-permissions-required-by-the-application. \n Back in your AAD App, ensure you grant admin consent for the permissions you just added. \n Finally, in the 'Tokens and APIs' section, generate a client secret and save it. You will need it in Step 6. ", + "title": "4. Specify the AAD permissions to enable MS Graph API access to the upload-indicators API." + }, + { + "description": "See Microsoft Sentinel Content Hub for this Solution, and install it this Microsoft Sentinel instance.", + "title": "5. Deploy the Threat Intellegence (Preview) Solution which includes the Threat Intelligence Upload Indicators API (Preview)" + }, + { + "description": "Click the Deploy to Azure button.\n\n [![Deploy To Azure](https://aka.ms/deploytoazurebutton)](https://aka.ms/sentinel-GreyNoise-azuredeploy)\n\n Fill in the appropriate values for each parameter. **Be aware** that the only valid values for the **GREYNOISE_CLASSIFICATIONS** parameter are **malicious** and/or **unknown**, which must be comma separated. Do not bring in **benign**, as this will bring in millions of IPs which are known good and will likely cause many unwanted alerts.", + "title": "6. Deploy the Azure Function" + }, + { + "description": "The function app installed in Step 6 queries the GreyNoise GNQL API once per day, and submits each indicator found in STIX 2.1 format to the [Microsoft Upload Threat Intelligence Indicators API](https://learn.microsoft.com/en-us/azure/sentinel/upload-indicators-api). \n Each indicator expires in ~24 hours from creation unless it's found on the next day's query, in which case the TI Indicator's **Valid Until** time is extended for another 24 hours, which keeps it active in Microsoft Sentinel. \n\n For more information on the GreyNoise API and the GreyNoise Query Language (GNQL) [click here](https://developer.greynoise.io/docs/using-the-greynoise-api).", + "title": "7. Send indicators to Sentinel" + } + ], + "id": "[variables('_uiConfigId1')]" + } + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/contentPackages", + "apiVersion": "2023-04-01-preview", + "location": "[parameters('workspace-location')]", + "properties": { + "version": "3.0.0", + "kind": "Solution", + "contentSchemaVersion": "3.0.0", + "displayName": "GreyNoiseThreatIntelligence", + "publisherDisplayName": "GreyNoise", + "descriptionHtml": "

Note: There may be known issues pertaining to this Solution, please refer to them before installing.

\n

The GreyNoise Threat Intelligence solution for Microsoft Sentinel provides context to IP addresses seen in your environment by querying the GreyNoise API.

GreyNoise collects, analyzes, and labels data on IPs that scan the internet and saturate security tools with noise. We provides near real time, actionable threat intelligence from our proprietary network of over 3,100 sensors running worldwide. This unique perspective helps analysts spend less time on irrelevant or harmless activity, and more time on targeted and emerging threats.\nReview the solution Release Notes

\n

Learn More about GreyNoise Threat Intelligence | GreyNoise Docs

\n

Data Connectors: 1, Workbooks: 1, Analytic Rules: 5

\n

Learn more about Microsoft Sentinel | Learn more about Solutions

\n", + "contentKind": "Solution", + "contentProductId": "[variables('_solutioncontentProductId')]", + "id": "[variables('_solutioncontentProductId')]", + "icon": "", + "contentId": "[variables('_solutionId')]", + "parentId": "[variables('_solutionId')]", + "source": { + "kind": "Solution", + "name": "GreyNoiseThreatIntelligence", + "sourceId": "[variables('_solutionId')]" + }, + "author": { + "name": "JP Bourget jp@bluecycle.net" + }, + "support": { + "name": "GreyNoise", + "email": "support@greynoise.io", + "tier": "Partner", + "link": "https://www.greynoise.io/contact/general" + }, + "dependencies": { + "operator": "AND", + "criteria": [ + { + "kind": "Workbook", + "contentId": "[variables('_workbookContentId1')]", + "version": "[variables('workbookVersion1')]" + }, + { + "kind": "AnalyticsRule", + "contentId": "[variables('analyticRulecontentId1')]", + "version": "[variables('analyticRuleVersion1')]" + }, + { + "kind": "AnalyticsRule", + "contentId": "[variables('analyticRulecontentId2')]", + "version": "[variables('analyticRuleVersion2')]" + }, + { + "kind": "AnalyticsRule", + "contentId": "[variables('analyticRulecontentId3')]", + "version": "[variables('analyticRuleVersion3')]" + }, + { + "kind": "AnalyticsRule", + "contentId": "[variables('analyticRulecontentId4')]", + "version": "[variables('analyticRuleVersion4')]" + }, + { + "kind": "AnalyticsRule", + "contentId": "[variables('analyticRulecontentId5')]", + "version": "[variables('analyticRuleVersion5')]" + }, + { + "kind": "DataConnector", + "contentId": "[variables('_dataConnectorContentId1')]", + "version": "[variables('dataConnectorVersion1')]" + } + ] + }, + "firstPublishDate": "2023-09-05", + "lastPublishDate": "2023-09-05", + "providers": [ + "GreyNoise Intelligence, Inc." + ], + "categories": { + "domains": [ + "Security - Threat Intelligence" + ] + } + }, + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/', variables('_solutionId'))]" + } + ], + "outputs": {} +} diff --git a/Solutions/GreyNoiseThreatIntelligence/ReleaseNotes.md b/Solutions/GreyNoiseThreatIntelligence/ReleaseNotes.md new file mode 100644 index 00000000000..0b28f03a717 --- /dev/null +++ b/Solutions/GreyNoiseThreatIntelligence/ReleaseNotes.md @@ -0,0 +1,3 @@ +| **Version** | **Date Modified (DD-MM-YYYY)** | **Change History** | +|-------------|--------------------------------|---------------------------------------------| +| 3.0.0 | 09-21-2023 | Initial Version Release | diff --git a/Solutions/GreyNoiseThreatIntelligence/SolutionMetadata.json b/Solutions/GreyNoiseThreatIntelligence/SolutionMetadata.json new file mode 100644 index 00000000000..20aac90575a --- /dev/null +++ b/Solutions/GreyNoiseThreatIntelligence/SolutionMetadata.json @@ -0,0 +1,17 @@ + { + "publisherId": "greynoiseintelligenceinc1681236078693", + "offerId": "microsoft-sentinel-byol-greynoise", + "firstPublishDate": "2023-09-05", + "lastPublishDate": "2023-09-05", + "providers": ["GreyNoise Intelligence, Inc."], + "categories": { + "domains" : ["Security - Threat Intelligence"], + "verticals": [] + }, + "support": { + "name": "GreyNoise", + "email": "support@greynoise.io", + "tier": "Partner", + "link": "https://www.greynoise.io/contact/general" + } +} diff --git a/Solutions/GreyNoiseThreatIntelligence/Workbooks/GreyNoiseOverview.json b/Solutions/GreyNoiseThreatIntelligence/Workbooks/GreyNoiseOverview.json new file mode 100644 index 00000000000..ae04cee6b98 --- /dev/null +++ b/Solutions/GreyNoiseThreatIntelligence/Workbooks/GreyNoiseOverview.json @@ -0,0 +1,566 @@ +{ + "version": "Notebook/1.0", + "items": [ + { + "type": 9, + "content": { + "version": "KqlParameterItem/1.0", + "parameters": [ + { + "id": "a4b4e975-fa7c-46a3-b669-850aacc88134", + "version": "KqlParameterItem/1.0", + "name": "Help", + "label": "Guide", + "type": 10, + "isRequired": true, + "typeSettings": { + "showDefault": false + }, + "jsonData": "[\r\n {\"value\": \"Yes\", \"label\": \"Yes\", \"selected\":true},\r\n {\"value\": \"No\", \"label\": \"No\"}\r\n]" + }, + { + "version": "KqlParameterItem/1.0", + "name": "DefaultSubscription_Internal", + "type": 1, + "isRequired": true, + "query": "where type =~ 'microsoft.operationalinsights/workspaces'\r\n| take 1\r\n| project subscriptionId", + "crossComponentResources": [ + "value::selected" + ], + "isHiddenWhenLocked": true, + "queryType": 1, + "resourceType": "microsoft.resourcegraph/resources", + "id": "314d02bf-4691-43fa-af59-d67073c8b8fa" + }, + { + "id": "e6ded9a1-a83c-4762-938d-5bf8ff3d3d38", + "version": "KqlParameterItem/1.0", + "name": "Subscription", + "type": 6, + "isRequired": true, + "multiSelect": true, + "quote": "'", + "delimiter": ",", + "query": "summarize by subscriptionId\r\n| project value = strcat(\"/subscriptions/\", subscriptionId), label = subscriptionId, selected = iff(subscriptionId =~ '{DefaultSubscription_Internal}', true, false)", + "crossComponentResources": [ + "value::all" + ], + "typeSettings": { + "additionalResourceOptions": [ + "value::all" + ], + "showDefault": false + }, + "queryType": 1, + "resourceType": "microsoft.resourcegraph/resources", + "value": [ + "value::all" + ] + }, + { + "id": "e3225ed0-6210-40a1-b2d0-66e42ffa71d6", + "version": "KqlParameterItem/1.0", + "name": "Workspace", + "type": 5, + "isRequired": true, + "multiSelect": true, + "quote": "'", + "delimiter": ",", + "query": "resources\r\n| where type =~ 'microsoft.operationalinsights/workspaces'\r\n| order by name asc\r\n| summarize Selected = makelist(id, 10), All = makelist(id, 1000)\r\n| mvexpand All limit 100\r\n| project value = tostring(All), label = tostring(All), selected = iff(Selected contains All, true, false)", + "crossComponentResources": [ + "{Subscription}" + ], + "typeSettings": { + "additionalResourceOptions": [ + "value::all" + ], + "showDefault": false + }, + "queryType": 1, + "resourceType": "microsoft.resourcegraph/resources", + "value": [ + "value::all" + ] + }, + { + "id": "15b2c181-7397-43c1-900a-28e175ae8a6f", + "version": "KqlParameterItem/1.0", + "name": "TimeRange", + "type": 4, + "isRequired": true, + "value": { + "durationMs": 604800000 + }, + "typeSettings": { + "selectableValues": [ + { + "durationMs": 86400000 + }, + { + "durationMs": 172800000 + }, + { + "durationMs": 604800000 + } + ], + "allowCustom": true + }, + "timeContextFromParameter": "TimeRange" + } + ], + "style": "pills", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + }, + "name": "Parameter Selectors" + }, + { + "type": 1, + "content": { + "json": "# [GreyNoise Threat Intelligence](https://www.greynoise.io/)\n---\nGreyNoise collects, analyzes, and labels data on IPs that scan the internet and saturate security tools with noise. We provides near real time, actionable threat intelligence from our proprietary network of over 3,100 sensors running worldwide. This unique perspective helps analysts spend less time on irrelevant or harmless activity, and more time on targeted and emerging threats.
\n\nTired of dealing with brute force attempts, web crawlers, and other scanners filling up your logs and trying to break into your infrastructure? With GreyNoise’s Malicious, Benign and Unknown Indicators, you can prevent noisy scanners from hitting your perimeter, effectively shutting them out, and giving yourself time to patch when there is an emerging exploit. Find out more at https://www.greynoise.io/solutions/maximize-soc-efficiency\n" + }, + "conditionalVisibility": { + "parameterName": "Help", + "comparison": "isEqualTo", + "value": "Yes" + }, + "customWidth": "79", + "name": "Workbook Overview" + }, + { + "type": 1, + "content": { + "json": "![Image Name](https://raw.githubusercontent.com/Azure/Azure-Sentinel/111713a2f762af4196d8ca4794b4f689bc95af73/Logos/greynoise_logomark_black.svg) " + }, + "conditionalVisibility": { + "parameterName": "Help", + "comparison": "isEqualTo", + "value": "Yes" + }, + "customWidth": "20", + "name": "GreyNoise Logo" + }, + { + "type": 11, + "content": { + "version": "LinkItem/1.0", + "style": "tabs", + "links": [ + { + "id": "18c690d7-7cbd-46c1-b677-1f72692d40cd", + "cellValue": "TAB", + "linkTarget": "parameter", + "linkLabel": "Indicators Ingestion", + "subTarget": "Indicators", + "preText": "Alert rules", + "style": "link" + }, + { + "id": "f88dcf47-af98-4684-9de3-1ee5f48f68fc", + "cellValue": "TAB", + "linkTarget": "parameter", + "linkLabel": "Indicators Search", + "subTarget": "Observed", + "style": "link" + } + ] + }, + "name": "Tabs link" + }, + { + "type": 12, + "content": { + "version": "NotebookGroup/1.0", + "groupType": "editable", + "items": [ + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "ThreatIntelligenceIndicator\r\n| where SourceSystem == 'GreyNoise'\r\n// Select all indicators from the table\r\n// Create a new column to identify the type of indicator, IP, Domain, URL, File, or Other\r\n| extend IndicatorType = iif(isnotempty(EmailSourceIpAddress) or isnotempty(NetworkDestinationIP) or isnotempty(NetworkIP) or isnotempty(NetworkSourceIP) or isnotempty(NetworkCidrBlock), \"IP\",\r\n iff(isnotempty(Url), \"URL\",\r\n iff(isnotempty(EmailRecipient) or isnotempty(EmailSenderAddress), \"Email\",\r\n iff(isnotempty(FileHashValue), \"File\",\r\n iff(isnotempty(DomainName) or isnotempty(EmailSourceDomain), \"Domain\",\r\n \"Other\")))))\r\n// Summarize and order the data, then render the chart\r\n| summarize CountOfIndicators = count() by IndicatorType, bin(TimeGenerated, 24h)\r\n| order by CountOfIndicators desc \r\n| render barchart kind=stacked ", + "size": 0, + "showAnalytics": true, + "title": "Total GreyNoise Indicators Imported into Sentinel by Date", + "timeContextFromParameter": "TimeRange", + "showExportToExcel": true, + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "crossComponentResources": [ + "{Workspace}" + ] + }, + "customWidth": "50", + "name": "query - 1" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "ThreatIntelligenceIndicator\r\n| where SourceSystem == 'GreyNoise'\r\n// Select all indicators from the table\r\n| where TimeGenerated < now()\r\n// Select only indicators that have not expired\r\n and ExpirationDateTime > now()\r\n// Select only indicators that are marked active\r\n and Active == true\r\n// Select all indicators from the table\r\n// Summarize and order the data, then render the chart\r\n| summarize CountOfIndicators = count() by translate(\"[]\\\"\", \"\", Tags) \r\n| render barchart kind=stacked", + "size": 0, + "showAnalytics": true, + "title": "Active GreyNoise Indicators Imported into Sentinel by Tag", + "timeContextFromParameter": "TimeRange", + "showExportToExcel": true, + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "crossComponentResources": [ + "{Workspace}" + ] + }, + "customWidth": "50", + "name": "query - 3" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "ThreatIntelligenceIndicator\r\n// Select all indicators from the table\r\n| where TimeGenerated < now()\r\n// Select only indicators that have not expired\r\n and ExpirationDateTime > now()\r\n// Select only indicators that are marked active\r\n and Active == true\r\n// Select only the most recently ingested copy of an indicator\r\n| summarize arg_max(TimeGenerated, *) by IndicatorId\r\n// Create a new column to identify the type of indicator, IP, Domain, URL, File, or Other\r\n| extend IndicatorType = iif(isnotempty(EmailSourceIpAddress) or isnotempty(NetworkDestinationIP) or isnotempty(NetworkIP) or isnotempty(NetworkSourceIP) or isnotempty(NetworkCidrBlock), \"IP\",\r\n iff(isnotempty(Url), \"URL\",\r\n iff(isnotempty(EmailRecipient) or isnotempty(EmailSenderAddress), \"Email\",\r\n iff(isnotempty(FileHashValue), \"File\",\r\n iff(isnotempty(DomainName) or isnotempty(EmailSourceDomain), \"Domain\",\r\n \"Other\")))))\r\n// Summarize and order the data, then render the chart\r\n| summarize CountOfIndicators = count() by IndicatorType\r\n| order by CountOfIndicators desc \r\n| render barchart kind=unstacked", + "size": 0, + "showAnalytics": true, + "title": "Active Indicators by Indicator Type", + "timeContextFromParameter": "TimeRange", + "showExportToExcel": true, + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "crossComponentResources": [ + "{Workspace}" + ] + }, + "customWidth": "50", + "name": "query - 5" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "ThreatIntelligenceIndicator\r\n| where SourceSystem == 'GreyNoise'\r\n// Select all indicators from the table\r\n| where TimeGenerated < now()\r\n// Select only indicators that have not expired\r\n and ExpirationDateTime > now()\r\n// Select only indicators that are marked active\r\n and Active == true\r\n// Select only the most recently ingested copy of an indicator\r\n| summarize arg_max(TimeGenerated, *) by IndicatorId\r\n// Summarize and order the data, then render the chart\r\n| summarize CountOfIndicators = count() by ThreatType\r\n| order by CountOfIndicators desc \r\n| render barchart kind=unstacked", + "size": 0, + "showAnalytics": true, + "title": "Active GreyNoise Indicators by Classification", + "timeContextFromParameter": "TimeRange", + "showExportToExcel": true, + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "crossComponentResources": [ + "{Workspace}" + ] + }, + "customWidth": "50", + "name": "query - 7" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "ThreatIntelligenceIndicator\r\n// Select all indicators from the table\r\n| where TimeGenerated < now()\r\n// Select only indicators that have not expired\r\n and ExpirationDateTime > now()\r\n// Select only indicators that are marked active\r\n and Active == true\r\n// Select only the most recently ingested copy of an indicator\r\n| summarize arg_max(TimeGenerated, *) by IndicatorId\r\n// Summarize and order the data, then render the chart\r\n| summarize CountOfIndicators = count() by tostring(ConfidenceScore)\r\n| order by CountOfIndicators desc \r\n| render piechart", + "size": 0, + "showAnalytics": true, + "title": "Active Indicators by Confidence Score", + "timeContextFromParameter": "TimeRange", + "showExportToExcel": true, + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "crossComponentResources": [ + "{Workspace}" + ] + }, + "customWidth": "50", + "name": "query - 10" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "let DomainQuery=view() { \r\nThreatIntelligenceIndicator\r\n| summarize arg_max(TimeGenerated, *) by IndicatorId\r\n| where isnotempty(DomainName)\r\n| summarize SourceSystemArray=make_set(SourceSystem) by DomainName\r\n| summarize count() by tostring(SourceSystemArray)\r\n| project SourceSystemArray, count_, EntryType=\"DomainEntry\"\r\n};\r\nlet UrlQuery=view(){\r\nThreatIntelligenceIndicator\r\n| summarize arg_max(TimeGenerated, *) by IndicatorId\r\n| where isnotempty(Url)\r\n| summarize SourceSystemArray=make_set(SourceSystem) by Url\r\n| summarize count() by tostring(SourceSystemArray)\r\n| project SourceSystemArray, count_, EntryType=\"UrlEntry\"\r\n};\r\nlet FileHashQuery=view(){\r\nThreatIntelligenceIndicator\r\n| summarize arg_max(TimeGenerated, *) by IndicatorId\r\n| where isnotempty(FileHashValue)\r\n| summarize SourceSystemArray=make_set(SourceSystem) by FileHashValue\r\n| summarize count() by tostring(SourceSystemArray)\r\n| project SourceSystemArray, count_, EntryType=\"FileHashEntry\"\r\n};\r\nlet IPQuery=view(){\r\nThreatIntelligenceIndicator\r\n| summarize arg_max(TimeGenerated, *) by IndicatorId\r\n| where isnotempty(NetworkIP) or isnotempty(NetworkSourceIP)\r\n| summarize SourceSystemArray=make_set(SourceSystem) by NetworkIP, NetworkSourceIP\r\n| summarize count() by tostring(SourceSystemArray)\r\n| project SourceSystemArray, count_, EntryType=\"IPEntry\"\r\n};\r\nlet EmailAddressQuery=view(){\r\nThreatIntelligenceIndicator\r\n| summarize arg_max(TimeGenerated, *) by IndicatorId\r\n| where isnotempty(EmailSenderAddress)\r\n| summarize SourceSystemArray=make_set(SourceSystem) by EmailSenderAddress\r\n| summarize count() by tostring(SourceSystemArray)\r\n| project SourceSystemArray, count_, EntryType=\"EmailAddressEntry\"\r\n};\r\nlet EmailMessageQuery=view(){\r\nThreatIntelligenceIndicator\r\n| summarize arg_max(TimeGenerated, *) by IndicatorId\r\n| where isnotempty(EmailSubject)\r\n| summarize SourceSystemArray=make_set(SourceSystem) by EmailSubject\r\n| summarize count() by tostring(SourceSystemArray)\r\n| project SourceSystemArray, count_, EntryType=\"EmailMessageEntry\"\r\n};\r\nlet SingleSourceIndicators=view(){\r\n DomainQuery\r\n | union UrlQuery\r\n | union FileHashQuery\r\n | union IPQuery\r\n | union EmailAddressQuery\r\n | union EmailMessageQuery\r\n | where array_length(todynamic(SourceSystemArray))==1\r\n | summarize sum(count_) by SourceSystemArray\r\n | extend counter=1 \r\n};\r\nlet MultipleSourceIndicators=view(){\r\n DomainQuery\r\n | union UrlQuery\r\n | union FileHashQuery\r\n | union IPQuery\r\n | union EmailAddressQuery\r\n | union EmailMessageQuery\r\n | where array_length(todynamic(SourceSystemArray))!=1\r\n | summarize sum(count_) by SourceSystemArray\r\n | extend counter=1\r\n};\r\nlet CountOfActiveIndicatorsBySource=view(){\r\n ThreatIntelligenceIndicator\r\n\t| summarize arg_max(TimeGenerated, *) by IndicatorId\r\n | where ExpirationDateTime > now() and Active == true\r\n | summarize count() by SourceSystem\r\n | project SourceSystem, count_\r\n};\r\nSingleSourceIndicators\r\n| join kind=fullouter MultipleSourceIndicators on counter \r\n| where SourceSystemArray contains todynamic(SourceSystemArray)[0] \r\n| order by SourceSystemArray\r\n| extend solitary_count=sum_count_\r\n| summarize shared_count = sum(sum_count_1) by SourceSystemArray, solitary_count\r\n| extend total_count = shared_count + solitary_count\r\n| extend unique_percentage = round(toreal(solitary_count)/toreal(total_count)*100, 1)\r\n| extend IndicatorSource = tostring(todynamic(SourceSystemArray)[0])\r\n| join kind=inner CountOfActiveIndicatorsBySource on $left.IndicatorSource == $right.SourceSystem\r\n| order by unique_percentage desc\r\n| project Source=IndicatorSource, UniquenessPercentage=unique_percentage, ActiveIndicators = count_\r\n\r\n", + "size": 0, + "showAnalytics": true, + "title": "Uniqueness of Threat Intelligence Sources", + "timeContextFromParameter": "TimeRange", + "showExportToExcel": true, + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "crossComponentResources": [ + "{Workspace}" + ], + "gridSettings": { + "formatters": [ + { + "columnMatch": "Source", + "formatter": 18, + "formatOptions": { + "thresholdsOptions": "icons", + "thresholdsGrid": [ + { + "operator": "Default", + "thresholdValue": "", + "representation": "View", + "text": "{0}{1}" + } + ] + } + }, + { + "columnMatch": "ActiveIndicators", + "formatter": 4, + "formatOptions": { + "palette": "blue" + } + } + ], + "filter": true + } + }, + "customWidth": "50", + "name": "query - 12" + } + ] + }, + "conditionalVisibility": { + "parameterName": "TAB", + "comparison": "isEqualTo", + "value": "Indicators" + }, + "name": "Indicators Ingestion" + }, + { + "type": 12, + "content": { + "version": "NotebookGroup/1.0", + "groupType": "editable", + "items": [ + { + "type": 9, + "content": { + "version": "KqlParameterItem/1.0", + "parameters": [ + { + "id": "9aec751b-07bd-43ba-80b9-f711887dce45", + "version": "KqlParameterItem/1.0", + "name": "Indicator", + "label": "Search Indicator in Events", + "type": 1, + "value": "", + "timeContext": { + "durationMs": 7776000000 + }, + "timeContextFromParameter": "TimeRange" + } + ], + "style": "pills", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + }, + "customWidth": "50", + "name": "Threat Research Parameters" + }, + { + "type": 1, + "content": { + "json": "" + }, + "customWidth": "50", + "name": "text - 9" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "//Add additional lines for desired data columns\r\nunion withsource= Table_Name *\r\n| where SourceSystem == \"GreyNoise\"\r\n| where column_ifexists('CallerIpAddress', '') has \"{Indicator}\"\r\nor column_ifexists('DestinationIP', '') has \"{Indicator}\"\r\nor column_ifexists('IpAddress', '') has \"{Indicator}\"\r\nor column_ifexists('IPAddresses', '') has \"{Indicator}\"\r\nor column_ifexists('IPAddress', '') has \"{Indicator}\"\r\nor column_ifexists('RemoteIP', '') has \"{Indicator}\"\r\nor column_ifexists('SourceIP', '') has \"{Indicator}\"\r\nor column_ifexists('SrcIpAddr', '') has \"{Indicator}\"\r\nor column_ifexists('DstIpAddr', '') has \"{Indicator}\"\r\nor column_ifexists('NetworkSourceIP', '') has \"{Indicator}\"\r\nor column_ifexists('NetworkIP', '') has \"{Indicator}\"\r\nor column_ifexists('NetworkDestinationIP', '') has \"{Indicator}\"\r\nor column_ifexists('EmailSourceIpAddress', '') has \"{Indicator}\"\r\n| summarize count() by Table_Name \r\n| project-rename ['Data Table']=Table_Name, ['Logs Count']=count_\r\n| sort by ['Logs Count'] desc", + "size": 0, + "showAnalytics": true, + "title": "Indicators Observed", + "noDataMessage": "No indicators observed within these thresholds", + "timeContextFromParameter": "TimeRange", + "exportFieldName": "Type", + "exportParameterName": "Type", + "showExportToExcel": true, + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "crossComponentResources": [ + "{Workspace}" + ], + "gridSettings": { + "formatters": [ + { + "columnMatch": "Data Table", + "formatter": 18, + "formatOptions": { + "thresholdsOptions": "icons", + "thresholdsGrid": [ + { + "operator": "Default", + "thresholdValue": "", + "representation": "Log", + "text": "{0}{1}" + } + ] + } + }, + { + "columnMatch": "Logs Count", + "formatter": 4, + "formatOptions": { + "palette": "blue" + } + } + ], + "filter": true + } + }, + "customWidth": "50", + "name": "query - 4" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "//Add additional lines for desired data columns\r\nunion withsource= Table_Name *\r\n| where SourceSystem == \"GreyNoise\"\r\n| where column_ifexists('CallerIpAddress', '') has \"{Indicator}\"\r\nor column_ifexists('DestinationIP', '') has \"{Indicator}\"\r\nor column_ifexists('IpAddress', '') has \"{Indicator}\"\r\nor column_ifexists('IPAddresses', '') has \"{Indicator}\"\r\nor column_ifexists('IPAddress', '') has \"{Indicator}\"\r\nor column_ifexists('RemoteIP', '') has \"{Indicator}\"\r\nor column_ifexists('SourceIP', '') has \"{Indicator}\"\r\nor column_ifexists('SrcIpAddr', '') has \"{Indicator}\"\r\nor column_ifexists('DstIpAddr', '') has \"{Indicator}\"\r\nor column_ifexists('NetworkSourceIP', '') has \"{Indicator}\"\r\nor column_ifexists('NetworkIP', '') has \"{Indicator}\"\r\nor column_ifexists('NetworkDestinationIP', '') has \"{Indicator}\"\r\n| make-series count() default=0 on TimeGenerated from {TimeRange:start} to {TimeRange:end} step 1d by Type\r\n| render areachart", + "size": 0, + "showAnalytics": true, + "title": "Indicators Observed over Time", + "noDataMessage": "No indicators observed within these thresholds", + "timeContextFromParameter": "TimeRange", + "showExportToExcel": true, + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "crossComponentResources": [ + "{Workspace}" + ], + "gridSettings": { + "formatters": [ + { + "columnMatch": "Data Table", + "formatter": 18, + "formatOptions": { + "thresholdsOptions": "icons", + "thresholdsGrid": [ + { + "operator": "Default", + "thresholdValue": "", + "representation": "Log", + "text": "{0}{1}" + } + ] + } + }, + { + "columnMatch": "Logs Count", + "formatter": 4, + "formatOptions": { + "palette": "redBright" + } + } + ], + "filter": true + } + }, + "customWidth": "50", + "name": "query - 4 - Copy" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "let tiObservables = ThreatIntelligenceIndicator\r\n | where SourceSystem == \"GreyNoise\"\r\n | where TimeGenerated < now()\r\n | project IndicatorId, ThreatType, Description, Active, IndicatorTime = TimeGenerated, Indicator = strcat(NetworkSourceIP, NetworkIP, NetworkDestinationIP, Url, FileHashValue, EmailSourceIpAddress, EmailSenderAddress, DomainName), SourceSystem;\r\nlet alertEntity = SecurityAlert \r\n | project parse_json(Entities), SystemAlertId , AlertTime = TimeGenerated\r\n | mvexpand(Entities)\r\n | extend entity = iif(isnotempty(Entities.Address), Entities.Address,\r\n iif(isnotempty(Entities.HostName),strcat(Entities.HostName, \".\", Entities.DnsDomain),\r\n iif(isnotempty(Entities.Url), Entities.Url,\r\n iif(isnotempty(Entities.Value), Entities.Value,\r\n iif(Entities.Type == \"account\", strcat(Entities.Name,\"@\",Entities.UPNSuffix),\"\")))))\r\n | where isnotempty(entity) \r\n | project entity, SystemAlertId, AlertTime;\r\nlet IncidentAlerts = SecurityIncident\r\n | project IncidentTime = TimeGenerated, IncidentNumber, Title, parse_json(AlertIds)\r\n | mv-expand AlertIds\r\n | project IncidentTime, IncidentNumber, Title, tostring(AlertIds);\r\nlet AlertsWithTiObservables = alertEntity\r\n | join kind=inner tiObservables on $left.entity == $right.Indicator;\r\nlet IncidentsWithAlertsWithTiObservables = AlertsWithTiObservables\r\n | join kind=inner IncidentAlerts on $left.SystemAlertId == $right.AlertIds;\r\nIncidentsWithAlertsWithTiObservables\r\n| where Indicator contains '{Indicator}' or Indicator == \"*\"\r\n| summarize Incidents=dcount(IncidentNumber), Alerts=dcount(SystemAlertId) by Indicator, ThreatType, Source = SourceSystem, Description\r\n| sort by Incidents, Alerts desc", + "size": 0, + "showAnalytics": true, + "title": "Threat Intelligence Alerts", + "noDataMessage": "No indicators observed within these thresholds", + "timeContextFromParameter": "TimeRange", + "showExportToExcel": true, + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "crossComponentResources": [ + "{Workspace}" + ], + "gridSettings": { + "formatters": [ + { + "columnMatch": "ThreatType", + "formatter": 18, + "formatOptions": { + "thresholdsOptions": "icons", + "thresholdsGrid": [ + { + "operator": "==", + "thresholdValue": "Botnet", + "representation": "Command and Control", + "text": "{0}{1}" + }, + { + "operator": "==", + "thresholdValue": "MaliciousUrl", + "representation": "Initial_Access", + "text": "{0}{1}" + }, + { + "operator": "==", + "thresholdValue": "Malware", + "representation": "Execution", + "text": "{0}{1}" + }, + { + "operator": "==", + "thresholdValue": "Phishing", + "representation": "Exfiltration", + "text": "{0}{1}" + }, + { + "operator": "Default", + "thresholdValue": "", + "representation": "Pre attack", + "text": "{0}{1}" + } + ] + } + }, + { + "columnMatch": "Source", + "formatter": 18, + "formatOptions": { + "thresholdsOptions": "icons", + "thresholdsGrid": [ + { + "operator": "Default", + "thresholdValue": "", + "representation": "success", + "text": "{0}{1}" + } + ] + } + }, + { + "columnMatch": "Incidents", + "formatter": 4, + "formatOptions": { + "palette": "redBright" + } + }, + { + "columnMatch": "Alerts", + "formatter": 4, + "formatOptions": { + "palette": "orange" + } + } + ], + "filter": true + } + }, + "name": "query - 5" + } + ] + }, + "conditionalVisibility": { + "parameterName": "TAB", + "comparison": "isEqualTo", + "value": "Observed" + }, + "name": "Indicators Observed" + } + ], + "styleSettings": {}, + "fromTemplateId": "sentinel-GreyNoiseOverview", + "$schema": "https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json" +} diff --git a/Solutions/GreyNoiseThreatIntelligence/Workbooks/Images/Logo/greynoise_logomark_black.svg b/Solutions/GreyNoiseThreatIntelligence/Workbooks/Images/Logo/greynoise_logomark_black.svg new file mode 100644 index 00000000000..12c2e131372 --- /dev/null +++ b/Solutions/GreyNoiseThreatIntelligence/Workbooks/Images/Logo/greynoise_logomark_black.svg @@ -0,0 +1,42 @@ + + + + + + + + + + + + + + + + + + + + + diff --git a/Solutions/GreyNoiseThreatIntelligence/Workbooks/Images/Preview/GreyNoiseOverviewBlack.png b/Solutions/GreyNoiseThreatIntelligence/Workbooks/Images/Preview/GreyNoiseOverviewBlack.png new file mode 100644 index 00000000000..79d9cb60c45 Binary files /dev/null and b/Solutions/GreyNoiseThreatIntelligence/Workbooks/Images/Preview/GreyNoiseOverviewBlack.png differ diff --git a/Solutions/GreyNoiseThreatIntelligence/Workbooks/Images/Preview/GreyNoiseOverviewWhite.png b/Solutions/GreyNoiseThreatIntelligence/Workbooks/Images/Preview/GreyNoiseOverviewWhite.png new file mode 100644 index 00000000000..14c534e9a70 Binary files /dev/null and b/Solutions/GreyNoiseThreatIntelligence/Workbooks/Images/Preview/GreyNoiseOverviewWhite.png differ diff --git a/Solutions/ISC Bind/Data Connectors/Connector_Syslog_ISCBind.json b/Solutions/ISC Bind/Data Connectors/Connector_Syslog_ISCBind.json index d7e6f99813d..5ff9587054c 100644 --- a/Solutions/ISC Bind/Data Connectors/Connector_Syslog_ISCBind.json +++ b/Solutions/ISC Bind/Data Connectors/Connector_Syslog_ISCBind.json @@ -62,7 +62,7 @@ "instructionSteps": [ { "title": "", - "description":"**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected which is deployed as part of the solution. To view the function code in Log Analytics, open Log Analytics/Microsoft Sentinel Logs blade, click Functions and search for the alias ISCBind and load the function code or click [here](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/ISC%20Bind/Parsers/ISCBind.txt).The function usually takes 10-15 minutes to activate after solution installation/update." , + "description":"**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected which is deployed as part of the solution. To view the function code in Log Analytics, open Log Analytics/Microsoft Sentinel Logs blade, click Functions and search for the alias ISCBind and load the function code or click [here](https://aka.ms/sentinel-iscbind-parser).The function usually takes 10-15 minutes to activate after solution installation/update." , "instructions": [ ] }, diff --git a/Solutions/ISC Bind/Data/Solution_ISC Bind.json b/Solutions/ISC Bind/Data/Solution_ISC Bind.json index 17c3788d095..c324e724db2 100644 --- a/Solutions/ISC Bind/Data/Solution_ISC Bind.json +++ b/Solutions/ISC Bind/Data/Solution_ISC Bind.json @@ -2,12 +2,12 @@ "Name": "ISC Bind", "Author": "Microsoft - support@microsoft.com", "Logo": "", - "Description": "The [ISC Bind](https://www.isc.org/bind/) solution for Microsoft sentinel allows you to ingest ISC Bind logs to get better insights into your organization's network traffic data, DNS query data, traffic statistics and improves your security operation capabilities.\n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs\n\n a. [Agent-based log collection (Syslog)](https://learn.microsoft.com/azure/sentinel/connect-syslog)", + "Description": "The [ISC Bind](https://www.isc.org/bind/) solution for Microsoft Sentinel allows you to ingest ISC Bind logs to get better insights into your organization's network traffic data, DNS query data, traffic statistics and improves your security operation capabilities.\n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs\n\n a. [Agent-based log collection (Syslog)](https://learn.microsoft.com/azure/sentinel/connect-syslog)", "Data Connectors": [ "Solutions/ISC Bind/Data Connectors/Connector_Syslog_ISCBind.json" ], "Parsers": [ - "Solutions/ISC Bind/Parsers/ISCBind.txt" + "Solutions/ISC Bind/Parsers/ISCBind.yaml" ], "BasePath": "C:\\GitHub\\Azure-Sentinel", "Version": "2.0.1", diff --git a/Solutions/ISC Bind/Data/system_generated_metadata.json b/Solutions/ISC Bind/Data/system_generated_metadata.json new file mode 100644 index 00000000000..9418200408f --- /dev/null +++ b/Solutions/ISC Bind/Data/system_generated_metadata.json @@ -0,0 +1,31 @@ +{ + "Name": "ISC Bind", + "Author": "Microsoft - support@microsoft.com", + "Logo": "", + "Description": "The [ISC Bind](https://www.isc.org/bind/) solution for Microsoft Sentinel allows you to ingest ISC Bind logs to get better insights into your organization's network traffic data, DNS query data, traffic statistics and improves your security operation capabilities.\n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs\n\n a. [Agent-based log collection (Syslog)](https://learn.microsoft.com/azure/sentinel/connect-syslog)", + "BasePath": "C:\\GitHub\\Azure-Sentinel", + "Metadata": "SolutionMetadata.json", + "TemplateSpec": true, + "Is1PConnector": false, + "Version": "3.0.0", + "publisherId": "azuresentinel", + "offerId": "azure-sentinel-solution-iscbind", + "providers": [ + "ISC" + ], + "categories": { + "domains": [ + "Networking" + ], + "verticals": [] + }, + "firstPublishDate": "2022-09-20", + "support": { + "tier": "Microsoft", + "name": "Microsoft Corporation", + "email": "support@microsoft.com", + "link": "https://support.microsoft.com/" + }, + "Data Connectors": "[\n \"Connector_Syslog_ISCBind.json\"\n]", + "Parsers": "[\n \"ISCBind.yaml\"\n]" +} diff --git a/Solutions/ISC Bind/Package/3.0.0.zip b/Solutions/ISC Bind/Package/3.0.0.zip new file mode 100644 index 00000000000..0f167715fa2 Binary files /dev/null and b/Solutions/ISC Bind/Package/3.0.0.zip differ diff --git a/Solutions/ISC Bind/Package/createUiDefinition.json b/Solutions/ISC Bind/Package/createUiDefinition.json index a0c9b07ee85..5f5020aa23f 100644 --- a/Solutions/ISC Bind/Package/createUiDefinition.json +++ b/Solutions/ISC Bind/Package/createUiDefinition.json @@ -6,7 +6,7 @@ "config": { "isWizard": false, "basics": { - "description": "\n\n**Note:** _There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing._\n\nThe [ISC Bind](https://www.isc.org/bind/) solution for Microsoft sentinel allows you to ingest ISC Bind logs to get better insights into your organization's network traffic data, DNS query data, traffic statistics and improves your security operation capabilities.\n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs\n\n a. [Agent-based log collection (Syslog)](https://learn.microsoft.com/azure/sentinel/connect-syslog)\n\n**Data Connectors:** 1, **Parsers:** 1\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)", + "description": "\n\n**Note:** Please refer to the following before installing the solution: \r \n • Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/ISCBind/ReleaseNotes.md)\r \n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe [ISC Bind](https://www.isc.org/bind/) solution for Microsoft Sentinel allows you to ingest ISC Bind logs to get better insights into your organization's network traffic data, DNS query data, traffic statistics and improves your security operation capabilities.\n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs:\n\n a. [Agent-based log collection (Syslog)](https://learn.microsoft.com/azure/sentinel/connect-syslog)\n\n**Data Connectors:** 1, **Parsers:** 1\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)", "subscription": { "resourceProviders": [ "Microsoft.OperationsManagement/solutions", diff --git a/Solutions/ISC Bind/Package/mainTemplate.json b/Solutions/ISC Bind/Package/mainTemplate.json index a756498cee4..a2deb61d28c 100644 --- a/Solutions/ISC Bind/Package/mainTemplate.json +++ b/Solutions/ISC Bind/Package/mainTemplate.json @@ -34,53 +34,39 @@ "_solutionId": "[variables('solutionId')]", "email": "support@microsoft.com", "_email": "[variables('email')]", - "workspaceResourceId": "[resourceId('microsoft.OperationalInsights/Workspaces', parameters('workspace'))]", + "_solutionName": "ISC Bind", + "_solutionVersion": "3.0.0", "uiConfigId1": "ISCBind", "_uiConfigId1": "[variables('uiConfigId1')]", "dataConnectorContentId1": "ISCBind", "_dataConnectorContentId1": "[variables('dataConnectorContentId1')]", "dataConnectorId1": "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/dataConnectors', variables('_dataConnectorContentId1'))]", "_dataConnectorId1": "[variables('dataConnectorId1')]", - "dataConnectorTemplateSpecName1": "[concat(parameters('workspace'),'-dc-',uniquestring(variables('_dataConnectorContentId1')))]", + "dataConnectorTemplateSpecName1": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-dc-',uniquestring(variables('_dataConnectorContentId1'))))]", "dataConnectorVersion1": "1.0", - "parserVersion1": "1.0.0", - "parserContentId1": "ISCBind-Parser", - "_parserContentId1": "[variables('parserContentId1')]", + "_dataConnectorcontentProductId1": "[concat(take(variables('_solutionId'),50),'-','dc','-', uniqueString(concat(variables('_solutionId'),'-','DataConnector','-',variables('_dataConnectorContentId1'),'-', variables('dataConnectorVersion1'))))]", "parserName1": "ISCBind", "_parserName1": "[concat(parameters('workspace'),'/',variables('parserName1'))]", "parserId1": "[resourceId('Microsoft.OperationalInsights/workspaces/savedSearches', parameters('workspace'), variables('parserName1'))]", "_parserId1": "[variables('parserId1')]", - "parserTemplateSpecName1": "[concat(parameters('workspace'),'-pr-',uniquestring(variables('_parserContentId1')))]" + "parserTemplateSpecName1": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pr-',uniquestring(variables('_parserContentId1'))))]", + "parserVersion1": "1.0.0", + "parserContentId1": "ISCBind-Parser", + "_parserContentId1": "[variables('parserContentId1')]", + "_parsercontentProductId1": "[concat(take(variables('_solutionId'),50),'-','pr','-', uniqueString(concat(variables('_solutionId'),'-','Parser','-',variables('_parserContentId1'),'-', variables('parserVersion1'))))]", + "_solutioncontentProductId": "[concat(take(variables('_solutionId'),50),'-','sl','-', uniqueString(concat(variables('_solutionId'),'-','Solution','-',variables('_solutionId'),'-', variables('_solutionVersion'))))]" }, "resources": [ { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2021-05-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('dataConnectorTemplateSpecName1')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "DataConnector" - }, - "properties": { - "description": "ISC Bind data connector with template", - "displayName": "ISC Bind template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2021-05-01", - "name": "[concat(variables('dataConnectorTemplateSpecName1'),'/',variables('dataConnectorVersion1'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "DataConnector" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('dataConnectorTemplateSpecName1'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "ISC Bind data connector with template version 2.0.1", + "description": "ISC Bind data connector with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('dataConnectorVersion1')]", @@ -157,7 +143,7 @@ }, "instructionSteps": [ { - "description": "**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected which is deployed as part of the solution. To view the function code in Log Analytics, open Log Analytics/Microsoft Sentinel Logs blade, click Functions and search for the alias ISCBind and load the function code or click [here](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/ISC%20Bind/Parsers/ISCBind.txt).The function usually takes 10-15 minutes to activate after solution installation/update." + "description": "**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected which is deployed as part of the solution. To view the function code in Log Analytics, open Log Analytics/Microsoft Sentinel Logs blade, click Functions and search for the alias ISCBind and load the function code or click [here](https://aka.ms/sentinel-iscbind-parser).The function usually takes 10-15 minutes to activate after solution installation/update." }, { "description": "Typically, you should install the agent on a different computer from the one on which the logs are generated.\n\n> Syslog logs are collected only from **Linux** agents.", @@ -226,8 +212,8 @@ "name": "Microsoft" }, "support": { - "tier": "microsoft", - "name": "Microsoft", + "tier": "Microsoft", + "name": "Microsoft Corporation", "email": "support@microsoft.com" } } @@ -236,7 +222,7 @@ }, { "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2022-01-01-preview", + "apiVersion": "2023-04-01-preview", "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('DataConnector-', last(split(variables('_dataConnectorId1'),'/'))))]", "properties": { "parentId": "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/dataConnectors', variables('_dataConnectorContentId1'))]", @@ -261,12 +247,23 @@ } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_dataConnectorContentId1')]", + "contentKind": "DataConnector", + "displayName": "ISC Bind", + "contentProductId": "[variables('_dataConnectorcontentProductId1')]", + "id": "[variables('_dataConnectorcontentProductId1')]", + "version": "[variables('dataConnectorVersion1')]" } }, { "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2022-01-01-preview", + "apiVersion": "2023-04-01-preview", "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('DataConnector-', last(split(variables('_dataConnectorId1'),'/'))))]", "dependsOn": [ "[variables('_dataConnectorId1')]" @@ -362,7 +359,7 @@ }, "instructionSteps": [ { - "description": "**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected which is deployed as part of the solution. To view the function code in Log Analytics, open Log Analytics/Microsoft Sentinel Logs blade, click Functions and search for the alias ISCBind and load the function code or click [here](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/ISC%20Bind/Parsers/ISCBind.txt).The function usually takes 10-15 minutes to activate after solution installation/update." + "description": "**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected which is deployed as part of the solution. To view the function code in Log Analytics, open Log Analytics/Microsoft Sentinel Logs blade, click Functions and search for the alias ISCBind and load the function code or click [here](https://aka.ms/sentinel-iscbind-parser).The function usually takes 10-15 minutes to activate after solution installation/update." }, { "description": "Typically, you should install the agent on a different computer from the one on which the logs are generated.\n\n> Syslog logs are collected only from **Linux** agents.", @@ -425,33 +422,15 @@ } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2021-05-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('parserTemplateSpecName1')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Parser" - }, - "properties": { - "description": "ISCBind Data Parser with template", - "displayName": "ISCBind Data Parser template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2021-05-01", - "name": "[concat(variables('parserTemplateSpecName1'),'/',variables('parserVersion1'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Parser" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('parserTemplateSpecName1'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "ISCBind Data Parser with template version 2.0.1", + "description": "ISCBind Data Parser with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('parserVersion1')]", @@ -460,20 +439,21 @@ "resources": [ { "name": "[variables('_parserName1')]", - "apiVersion": "2020-08-01", + "apiVersion": "2022-10-01", "type": "Microsoft.OperationalInsights/workspaces/savedSearches", "location": "[parameters('workspace-location')]", "properties": { "eTag": "*", "displayName": "ISCBind", - "category": "Samples", + "category": "Microsoft Sentinel Parser", "functionAlias": "ISCBind", - "query": "\n\r\nlet request = Syslog \r\n| where SyslogMessage has_all (\"client\", \"query:\") and SyslogMessage !has \"response:\"\r\n| parse SyslogMessage with\r\n * \"client \" * \" \"\r\n SrcIpAddr:string \"#\" \r\n SrcPortNumber:string \" \" *\r\n \"query: \"\r\n DnsQuery:string \" \"\r\n DnsQueryClassName:string \" \"\r\n DnsQueryTypeName:string \" \"\r\n DnsFlags:string\r\n| extend ServerIPAddressIndex= indexof(DnsFlags, \" \")\r\n| extend ServerIPAddress = iif(ServerIPAddressIndex != \"-1\", substring(DnsFlags, ServerIPAddressIndex),\"\")\r\n| extend ServerIPAddress = replace_regex(ServerIPAddress,@\"[()]\",\"\")\r\n| extend DnsFlags =iif(ServerIPAddressIndex != \"-1\", substring(DnsFlags, 0, ServerIPAddressIndex), DnsFlags)\r\n| extend SrcPortNumber = replace_regex(SrcPortNumber,@\"[^\\d]\",\"\")\r\n| extend EventSubType = \"request\",DnsResponseCodeName = \"NA\"\r\n| project-away SyslogMessage,ProcessName,ProcessID,Facility,SeverityLevel,HostName,ServerIPAddressIndex;\r\nlet requestcache = Syslog \r\n| where SyslogMessage has_all (\"client\", \"query (cache)\") and SyslogMessage !has \"response:\"\r\n| parse SyslogMessage with\r\n * \"client \" * \" \"\r\n SrcIpAddr:string \"#\" \r\n SrcPortNumber:string \" \" *\r\n \"query (cache) '\"\r\n DnsQuery:string \"/\"\r\n DnsQueryTypeName:string \"/\"\r\n DnsQueryClassName:string \"' \"\r\n Action\r\n| extend EventSubType = \"requestcache\",DnsResponseCodeName = \"NA\"\r\n| project-away SyslogMessage,ProcessName,ProcessID,Facility,SeverityLevel,HostName;\r\nlet response =Syslog \r\n| where SyslogMessage has_all (\"client\", \"query:\", \"response:\")\r\n| parse SyslogMessage with\r\n * \"client \" * \" \"\r\n SrcIpAddr:string \"#\" \r\n SrcPortNumber:string \" \" * \"view \" * \": \"\r\n NetworkProtocol:string \": query: \"\r\n DnsQuery:string \" \"\r\n DnsQueryClassName:string \" \"\r\n DnsQueryTypeName:string \" \"\r\n \"response: \" DnsResponseCodeName: string\r\n \" \" DnsFlags: string\r\n| extend DNSResourceRecordIndex= indexof(DnsFlags, \" \")\r\n| extend DnsResponseName =iif(DNSResourceRecordIndex != \"-1\", substring(DnsFlags, DNSResourceRecordIndex), \"\")\r\n| extend DnsFlags =iif(DNSResourceRecordIndex != \"-1\", substring(DnsFlags, 0, DNSResourceRecordIndex), DnsFlags)\r\n| extend EventSubType = \"response\"\r\n| project-away SyslogMessage,ProcessName,ProcessID,Facility,SeverityLevel,HostName,DNSResourceRecordIndex;\r\nunion request,requestcache,response", - "version": 1, + "query": "//request events\nlet request = Syslog \n| where SyslogMessage has_all (\"client\", \"query:\") and SyslogMessage !has \"response:\"\n| parse SyslogMessage with\n * \"client \" * \" \"\n SrcIpAddr:string \"#\" \n SrcPortNumber:string \" \" *\n \"query: \"\n DnsQuery:string \" \"\n DnsQueryClassName:string \" \"\n DnsQueryTypeName:string \" \"\n DnsFlags:string\n| extend ServerIPAddressIndex= indexof(DnsFlags, \" \")\n| extend ServerIPAddress = iif(ServerIPAddressIndex != \"-1\", substring(DnsFlags, ServerIPAddressIndex),\"\")\n| extend ServerIPAddress = replace_regex(ServerIPAddress,@\"[()]\",\"\")\n| extend DnsFlags =iif(ServerIPAddressIndex != \"-1\", substring(DnsFlags, 0, ServerIPAddressIndex), DnsFlags)\n| extend SrcPortNumber = replace_regex(SrcPortNumber,@\"[^\\d]\",\"\")\n| extend EventSubType = \"request\",DnsResponseCodeName = \"NA\"\n| project-away SyslogMessage,ProcessName,ProcessID,Facility,SeverityLevel,HostName,ServerIPAddressIndex;\n//request (cache) events\nlet requestcache = Syslog \n| where SyslogMessage has_all (\"client\", \"query (cache)\") and SyslogMessage !has \"response:\"\n| parse SyslogMessage with\n * \"client \" * \" \"\n SrcIpAddr:string \"#\" \n SrcPortNumber:string \" \" *\n \"query (cache) '\"\n DnsQuery:string \"/\"\n DnsQueryTypeName:string \"/\"\n DnsQueryClassName:string \"' \"\n Action\n| extend EventSubType = \"requestcache\",DnsResponseCodeName = \"NA\"\n| project-away SyslogMessage,ProcessName,ProcessID,Facility,SeverityLevel,HostName;\n// response events\nlet response =Syslog \n| where SyslogMessage has_all (\"client\", \"query:\", \"response:\")\n| parse SyslogMessage with\n * \"client \" * \" \"\n SrcIpAddr:string \"#\" \n SrcPortNumber:string \" \" * \"view \" * \": \"\n NetworkProtocol:string \": query: \"\n DnsQuery:string \" \"\n DnsQueryClassName:string \" \"\n DnsQueryTypeName:string \" \"\n \"response: \" DnsResponseCodeName: string\n \" \" DnsFlags: string\n| extend DNSResourceRecordIndex= indexof(DnsFlags, \" \")\n| extend DnsResponseName =iif(DNSResourceRecordIndex != \"-1\", substring(DnsFlags, DNSResourceRecordIndex), \"\")\n| extend DnsFlags =iif(DNSResourceRecordIndex != \"-1\", substring(DnsFlags, 0, DNSResourceRecordIndex), DnsFlags)\n| extend EventSubType = \"response\"\n| project-away SyslogMessage,ProcessName,ProcessID,Facility,SeverityLevel,HostName,DNSResourceRecordIndex;\nunion request,requestcache,response\n", + "functionParameters": "", + "version": 2, "tags": [ { "name": "description", - "value": "ISCBind" + "value": "" } ] } @@ -483,7 +463,7 @@ "apiVersion": "2022-01-01-preview", "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Parser-', last(split(variables('_parserId1'),'/'))))]", "dependsOn": [ - "[variables('_parserName1')]" + "[variables('_parserId1')]" ], "properties": { "parentId": "[resourceId('Microsoft.OperationalInsights/workspaces/savedSearches', parameters('workspace'), variables('parserName1'))]", @@ -508,21 +488,39 @@ } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_parserContentId1')]", + "contentKind": "Parser", + "displayName": "ISCBind", + "contentProductId": "[variables('_parsercontentProductId1')]", + "id": "[variables('_parsercontentProductId1')]", + "version": "[variables('parserVersion1')]" } }, { "type": "Microsoft.OperationalInsights/workspaces/savedSearches", - "apiVersion": "2021-06-01", + "apiVersion": "2022-10-01", "name": "[variables('_parserName1')]", "location": "[parameters('workspace-location')]", "properties": { "eTag": "*", "displayName": "ISCBind", - "category": "Samples", + "category": "Microsoft Sentinel Parser", "functionAlias": "ISCBind", - "query": "\n\r\nlet request = Syslog \r\n| where SyslogMessage has_all (\"client\", \"query:\") and SyslogMessage !has \"response:\"\r\n| parse SyslogMessage with\r\n * \"client \" * \" \"\r\n SrcIpAddr:string \"#\" \r\n SrcPortNumber:string \" \" *\r\n \"query: \"\r\n DnsQuery:string \" \"\r\n DnsQueryClassName:string \" \"\r\n DnsQueryTypeName:string \" \"\r\n DnsFlags:string\r\n| extend ServerIPAddressIndex= indexof(DnsFlags, \" \")\r\n| extend ServerIPAddress = iif(ServerIPAddressIndex != \"-1\", substring(DnsFlags, ServerIPAddressIndex),\"\")\r\n| extend ServerIPAddress = replace_regex(ServerIPAddress,@\"[()]\",\"\")\r\n| extend DnsFlags =iif(ServerIPAddressIndex != \"-1\", substring(DnsFlags, 0, ServerIPAddressIndex), DnsFlags)\r\n| extend SrcPortNumber = replace_regex(SrcPortNumber,@\"[^\\d]\",\"\")\r\n| extend EventSubType = \"request\",DnsResponseCodeName = \"NA\"\r\n| project-away SyslogMessage,ProcessName,ProcessID,Facility,SeverityLevel,HostName,ServerIPAddressIndex;\r\nlet requestcache = Syslog \r\n| where SyslogMessage has_all (\"client\", \"query (cache)\") and SyslogMessage !has \"response:\"\r\n| parse SyslogMessage with\r\n * \"client \" * \" \"\r\n SrcIpAddr:string \"#\" \r\n SrcPortNumber:string \" \" *\r\n \"query (cache) '\"\r\n DnsQuery:string \"/\"\r\n DnsQueryTypeName:string \"/\"\r\n DnsQueryClassName:string \"' \"\r\n Action\r\n| extend EventSubType = \"requestcache\",DnsResponseCodeName = \"NA\"\r\n| project-away SyslogMessage,ProcessName,ProcessID,Facility,SeverityLevel,HostName;\r\nlet response =Syslog \r\n| where SyslogMessage has_all (\"client\", \"query:\", \"response:\")\r\n| parse SyslogMessage with\r\n * \"client \" * \" \"\r\n SrcIpAddr:string \"#\" \r\n SrcPortNumber:string \" \" * \"view \" * \": \"\r\n NetworkProtocol:string \": query: \"\r\n DnsQuery:string \" \"\r\n DnsQueryClassName:string \" \"\r\n DnsQueryTypeName:string \" \"\r\n \"response: \" DnsResponseCodeName: string\r\n \" \" DnsFlags: string\r\n| extend DNSResourceRecordIndex= indexof(DnsFlags, \" \")\r\n| extend DnsResponseName =iif(DNSResourceRecordIndex != \"-1\", substring(DnsFlags, DNSResourceRecordIndex), \"\")\r\n| extend DnsFlags =iif(DNSResourceRecordIndex != \"-1\", substring(DnsFlags, 0, DNSResourceRecordIndex), DnsFlags)\r\n| extend EventSubType = \"response\"\r\n| project-away SyslogMessage,ProcessName,ProcessID,Facility,SeverityLevel,HostName,DNSResourceRecordIndex;\r\nunion request,requestcache,response", - "version": 1 + "query": "//request events\nlet request = Syslog \n| where SyslogMessage has_all (\"client\", \"query:\") and SyslogMessage !has \"response:\"\n| parse SyslogMessage with\n * \"client \" * \" \"\n SrcIpAddr:string \"#\" \n SrcPortNumber:string \" \" *\n \"query: \"\n DnsQuery:string \" \"\n DnsQueryClassName:string \" \"\n DnsQueryTypeName:string \" \"\n DnsFlags:string\n| extend ServerIPAddressIndex= indexof(DnsFlags, \" \")\n| extend ServerIPAddress = iif(ServerIPAddressIndex != \"-1\", substring(DnsFlags, ServerIPAddressIndex),\"\")\n| extend ServerIPAddress = replace_regex(ServerIPAddress,@\"[()]\",\"\")\n| extend DnsFlags =iif(ServerIPAddressIndex != \"-1\", substring(DnsFlags, 0, ServerIPAddressIndex), DnsFlags)\n| extend SrcPortNumber = replace_regex(SrcPortNumber,@\"[^\\d]\",\"\")\n| extend EventSubType = \"request\",DnsResponseCodeName = \"NA\"\n| project-away SyslogMessage,ProcessName,ProcessID,Facility,SeverityLevel,HostName,ServerIPAddressIndex;\n//request (cache) events\nlet requestcache = Syslog \n| where SyslogMessage has_all (\"client\", \"query (cache)\") and SyslogMessage !has \"response:\"\n| parse SyslogMessage with\n * \"client \" * \" \"\n SrcIpAddr:string \"#\" \n SrcPortNumber:string \" \" *\n \"query (cache) '\"\n DnsQuery:string \"/\"\n DnsQueryTypeName:string \"/\"\n DnsQueryClassName:string \"' \"\n Action\n| extend EventSubType = \"requestcache\",DnsResponseCodeName = \"NA\"\n| project-away SyslogMessage,ProcessName,ProcessID,Facility,SeverityLevel,HostName;\n// response events\nlet response =Syslog \n| where SyslogMessage has_all (\"client\", \"query:\", \"response:\")\n| parse SyslogMessage with\n * \"client \" * \" \"\n SrcIpAddr:string \"#\" \n SrcPortNumber:string \" \" * \"view \" * \": \"\n NetworkProtocol:string \": query: \"\n DnsQuery:string \" \"\n DnsQueryClassName:string \" \"\n DnsQueryTypeName:string \" \"\n \"response: \" DnsResponseCodeName: string\n \" \" DnsFlags: string\n| extend DNSResourceRecordIndex= indexof(DnsFlags, \" \")\n| extend DnsResponseName =iif(DNSResourceRecordIndex != \"-1\", substring(DnsFlags, DNSResourceRecordIndex), \"\")\n| extend DnsFlags =iif(DNSResourceRecordIndex != \"-1\", substring(DnsFlags, 0, DNSResourceRecordIndex), DnsFlags)\n| extend EventSubType = \"response\"\n| project-away SyslogMessage,ProcessName,ProcessID,Facility,SeverityLevel,HostName,DNSResourceRecordIndex;\nunion request,requestcache,response\n", + "functionParameters": "", + "version": 2, + "tags": [ + { + "name": "description", + "value": "" + } + ] } }, { @@ -556,13 +554,20 @@ } }, { - "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2022-01-01-preview", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentPackages", + "apiVersion": "2023-04-01-preview", "location": "[parameters('workspace-location')]", "properties": { - "version": "2.0.1", + "version": "3.0.0", "kind": "Solution", - "contentSchemaVersion": "2.0.0", + "contentSchemaVersion": "3.0.0", + "displayName": "ISC Bind", + "publisherDisplayName": "Microsoft Sentinel, Microsoft Corporation", + "descriptionHtml": "

Note: There may be known issues pertaining to this Solution, please refer to them before installing.

\n

The ISC Bind solution for Microsoft Sentinel allows you to ingest ISC Bind logs to get better insights into your organization's network traffic data, DNS query data, traffic statistics and improves your security operation capabilities.

\n

Underlying Microsoft Technologies used:

\n

This solution takes a dependency on the following technologies, and some of these dependencies either may be in Preview state or might result in additional ingestion or operational costs

\n
    \n
  1. Agent-based log collection (Syslog)
  2. \n
\n

Data Connectors: 1, Parsers: 1

\n

Learn more about Microsoft Sentinel | Learn more about Solutions

\n", + "contentKind": "Solution", + "contentProductId": "[variables('_solutioncontentProductId')]", + "id": "[variables('_solutioncontentProductId')]", + "icon": "", "contentId": "[variables('_solutionId')]", "parentId": "[variables('_solutionId')]", "source": { diff --git a/Solutions/ISC Bind/Parsers/ISCBind.txt b/Solutions/ISC Bind/Parsers/ISCBind.txt deleted file mode 100644 index 582e5d4ccdd..00000000000 --- a/Solutions/ISC Bind/Parsers/ISCBind.txt +++ /dev/null @@ -1,65 +0,0 @@ -// Title: ISC Bind -// Author: Microsoft -// Version: 1.0 -// Last Updated: 09/16/2022 -// Comment: Inital Release -// -// DESCRIPTION: -// This parser takes raw ISC Bind logs from a Syslog stream and parses the logs into a normalized schema. -// -// -// REFERENCES: -// Using functions in Azure monitor log queries: https://docs.microsoft.com/azure/azure-monitor/log-query/functions - -//request events -let request = Syslog -| where SyslogMessage has_all ("client", "query:") and SyslogMessage !has "response:" -| parse SyslogMessage with - * "client " * " " - SrcIpAddr:string "#" - SrcPortNumber:string " " * - "query: " - DnsQuery:string " " - DnsQueryClassName:string " " - DnsQueryTypeName:string " " - DnsFlags:string -| extend ServerIPAddressIndex= indexof(DnsFlags, " ") -| extend ServerIPAddress = iif(ServerIPAddressIndex != "-1", substring(DnsFlags, ServerIPAddressIndex),"") -| extend ServerIPAddress = replace_regex(ServerIPAddress,@"[()]","") -| extend DnsFlags =iif(ServerIPAddressIndex != "-1", substring(DnsFlags, 0, ServerIPAddressIndex), DnsFlags) -| extend SrcPortNumber = replace_regex(SrcPortNumber,@"[^\d]","") -| extend EventSubType = "request",DnsResponseCodeName = "NA" -| project-away SyslogMessage,ProcessName,ProcessID,Facility,SeverityLevel,HostName,ServerIPAddressIndex; -//request (cache) events -let requestcache = Syslog -| where SyslogMessage has_all ("client", "query (cache)") and SyslogMessage !has "response:" -| parse SyslogMessage with - * "client " * " " - SrcIpAddr:string "#" - SrcPortNumber:string " " * - "query (cache) '" - DnsQuery:string "/" - DnsQueryTypeName:string "/" - DnsQueryClassName:string "' " - Action -| extend EventSubType = "requestcache",DnsResponseCodeName = "NA" -| project-away SyslogMessage,ProcessName,ProcessID,Facility,SeverityLevel,HostName; -// response events -let response =Syslog -| where SyslogMessage has_all ("client", "query:", "response:") -| parse SyslogMessage with - * "client " * " " - SrcIpAddr:string "#" - SrcPortNumber:string " " * "view " * ": " - NetworkProtocol:string ": query: " - DnsQuery:string " " - DnsQueryClassName:string " " - DnsQueryTypeName:string " " - "response: " DnsResponseCodeName: string - " " DnsFlags: string -| extend DNSResourceRecordIndex= indexof(DnsFlags, " ") -| extend DnsResponseName =iif(DNSResourceRecordIndex != "-1", substring(DnsFlags, DNSResourceRecordIndex), "") -| extend DnsFlags =iif(DNSResourceRecordIndex != "-1", substring(DnsFlags, 0, DNSResourceRecordIndex), DnsFlags) -| extend EventSubType = "response" -| project-away SyslogMessage,ProcessName,ProcessID,Facility,SeverityLevel,HostName,DNSResourceRecordIndex; -union request,requestcache,response \ No newline at end of file diff --git a/Solutions/ISC Bind/ReleaseNotes.md b/Solutions/ISC Bind/ReleaseNotes.md new file mode 100644 index 00000000000..fedd8f71d41 --- /dev/null +++ b/Solutions/ISC Bind/ReleaseNotes.md @@ -0,0 +1,5 @@ +| **Version** | **Date Modified (DD-MM-YYYY)** | **Change History** | +|-------------|--------------------------------|--------------------------------------------------------------------| +| 3.0.0 | 09-10-2023 | Corrected the links in the solution | + + diff --git a/Solutions/Recorded Future/Analytic Rules/RecordedFutureDomainMalwareC2inDNSEvents.yaml b/Solutions/Recorded Future/Analytic Rules/RecordedFutureDomainMalwareC2inDNSEvents.yaml index bb75fe43bef..de514d32b40 100644 --- a/Solutions/Recorded Future/Analytic Rules/RecordedFutureDomainMalwareC2inDNSEvents.yaml +++ b/Solutions/Recorded Future/Analytic Rules/RecordedFutureDomainMalwareC2inDNSEvents.yaml @@ -23,7 +23,7 @@ query: | let list_tlds = ThreatIntelligenceIndicator | where TimeGenerated > ago(ioc_lookBack) // Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection) - | where Description == 'Recorded Future - DOMAIN - C2 DNS Name' + | where Description == 'Recorded Future - Domains - Command and Control Activity' | where isnotempty(DomainName) | extend parts = split(DomainName, '.') | extend tld = parts[(array_length(parts)-1)] @@ -33,7 +33,7 @@ query: | | where TimeGenerated >= ago(ioc_lookBack) and ExpirationDateTime > now() | where Active == true // Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection) - | where Description == 'Recorded Future - DOMAIN - C2 DNS Name' + | where Description == 'Recorded Future - Domains - Command and Control Activity' // Picking up only IOC's that contain the entities we want | where isnotempty(DomainName) | join ( @@ -66,5 +66,5 @@ entityMappings: fieldMappings: - identifier: DomainName columnName: DomainCustomEntity -version: 1.0.0 +version: 1.0.1 kind: Scheduled \ No newline at end of file diff --git a/Solutions/Recorded Future/Analytic Rules/RecordedFutureDomainMalwareC2inSyslogEvents.yaml b/Solutions/Recorded Future/Analytic Rules/RecordedFutureDomainMalwareC2inSyslogEvents.yaml index 3b01cf134e4..a6df326b77e 100644 --- a/Solutions/Recorded Future/Analytic Rules/RecordedFutureDomainMalwareC2inSyslogEvents.yaml +++ b/Solutions/Recorded Future/Analytic Rules/RecordedFutureDomainMalwareC2inSyslogEvents.yaml @@ -23,7 +23,7 @@ query: | let list_tlds = ThreatIntelligenceIndicator | where TimeGenerated > ago(ioc_lookBack) // Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection) - | where Description == 'Recorded Future - DOMAIN - C2 DNS Name' + | where Description == 'Recorded Future - Domains - Command and Control Activity' | where isnotempty(DomainName) | extend parts = split(DomainName, '.') | extend tld = parts[(array_length(parts)-1)] @@ -33,7 +33,7 @@ query: | | where TimeGenerated >= ago(ioc_lookBack) and ExpirationDateTime > now() | where Active == true // Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection) - | where Description == 'Recorded Future - DOMAIN - C2 DNS Name' + | where Description == 'Recorded Future - Domains - Command and Control Activity' // Picking up only IOC's that contain the entities we want | where isnotempty(DomainName) | join ( @@ -71,5 +71,5 @@ entityMappings: fieldMappings: - identifier: DomainName columnName: domain -version: 1.0.0 +version: 1.0.1 kind: Scheduled \ No newline at end of file diff --git a/Solutions/Recorded Future/Data/Solution_RecordedFuture.json b/Solutions/Recorded Future/Data/Solution_RecordedFuture.json index 41e9a9bce7c..d81c92e63c1 100644 --- a/Solutions/Recorded Future/Data/Solution_RecordedFuture.json +++ b/Solutions/Recorded Future/Data/Solution_RecordedFuture.json @@ -12,21 +12,32 @@ "Analytic Rules/RecordedFutureUrlReportedbyInsiktGroupinSyslogEvents.yaml" ], "Playbooks": [ + "Playbooks/RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash/azuredeploy.json", + "Playbooks/RecordedFuture-Sandbox_Enrichment-Url/azuredeploy.json", + "Playbooks/RecordedFuture-Playbook-Alert-Importer/azuredeploy.json", + "Playbooks/RecordedFuture-Alert-Importer/azuredeploy.json", + "Playbooks/RecordedFuture-ThreatIntelligenceImport/azuredeploy.json", + "Playbooks/RecordedFuture-Domain-IndicatorImport/azuredeploy.json", + "Playbooks/RecordedFuture-Hash-IndicatorImport/azuredeploy.json", + "Playbooks/RecordedFuture-IP-IndicatorImport/azuredeploy.json", + "Playbooks/RecordedFuture-URL-IndicatorImport/azuredeploy.json", "Playbooks/RecordedFuture-ImportToSentinel/azuredeploy.json", "Playbooks/RecordedFuture-DOMAIN-C2_DNS_Name-IndicatorProcessor/azuredeploy.json", "Playbooks/RecordedFuture-HASH-Observed_in_Underground_Virus_Test_Sites-IndicatorProcessor/azuredeploy.json", - "Playbooks/RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash/azuredeploy.json", "Playbooks/RecordedFuture-IP-Actively_Comm_C2_Server-IndicatorProcessor/azuredeploy.json", "Playbooks/RecordedFuture-URL-Recent_Rep_by_Insikt_Group-IndicatorProcessor/azuredeploy.json", - "Playbooks/RecordedFuture-Ukraine-IndicatorProcessor/azuredeploy.json", - "Playbooks/RecordedFuture-Sandbox_Enrichment-Url/azuredeploy.json" + "Playbooks/RecordedFuture-Ukraine-IndicatorProcessor/azuredeploy.json" ], "Workbooks": [ - "Workbooks/Recorded Future - C&C DNS Name to DNS Events - Correlation&Threat Hunting.json", - "Workbooks/Recorded Future - Actively Communicating C&C IPs to DNS Events - Correlation&Threat Hunting.json" + "Workbooks/RecordedFuturePlaybookAlertOverview.json", + "Workbooks/RecordedFutureAlertOverview.json", + "Workbooks/RecordedFutureDomainCorrelation.json", + "Workbooks/RecordedFutureHashCorrelation.json", + "Workbooks/RecordedFutureIPCorrelation.json", + "Workbooks/RecordedFutureURLCorrelation.json" ], "BasePath": "C:\\GitHub\\Azure-Sentinel\\Solutions\\Recorded Future", - "Version": "2.4.0", + "Version": "3.0.0", "Metadata": "SolutionMetadata.json", "TemplateSpec": true, "Is1Pconnector": false diff --git a/Solutions/Recorded Future/Package/3.0.0.zip b/Solutions/Recorded Future/Package/3.0.0.zip new file mode 100644 index 00000000000..6bcba6ff254 Binary files /dev/null and b/Solutions/Recorded Future/Package/3.0.0.zip differ diff --git a/Solutions/Recorded Future/Package/createUiDefinition.json b/Solutions/Recorded Future/Package/createUiDefinition.json index ca552bd5051..e3257e4df46 100644 --- a/Solutions/Recorded Future/Package/createUiDefinition.json +++ b/Solutions/Recorded Future/Package/createUiDefinition.json @@ -6,7 +6,7 @@ "config": { "isWizard": false, "basics": { - "description": "\n\n**Note:** _There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing._\n\n[Recorded Future](https://www.recordedfuture.com/) is the worlds largest provider of intelligence for enterprise security. By combining persistent and pervasive automated data collection and analytics with human analysis, Recorded Future delivers intelligence that is timely, accurate, and actionable.\n\nPlaybooks have internal dependencies to RecordedFuture-ImportToSentinel so install the RecordedFuture-ImportToSentinel playbook before any of the others. \n \n \nThis solution takes a dependency on functionality like Azure Logic Apps, Azure Monitor Logs. Some of these dependencies might result in additional ingestion or operational costs.\n\n* https://learn.microsoft.com/en-us/azure/azure-monitor/logs/workspace-design \n* https://learn.microsoft.com/en-us/azure/logic-apps/ \n* https://learn.microsoft.com/en-us/azure/sentinel/work-with-threat-indicators \n\n\n**Workbooks:** 2, **Analytic Rules:** 6, **Playbooks:** 8\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)", + "description": "\n\n**Note:** _There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing._\n\n[Recorded Future](https://www.recordedfuture.com/) is the worlds largest provider of intelligence for enterprise security. By combining persistent and pervasive automated data collection and analytics with human analysis, Recorded Future delivers intelligence that is timely, accurate, and actionable.\n\nPlaybooks have internal dependencies to RecordedFuture-ImportToSentinel so install the RecordedFuture-ImportToSentinel playbook before any of the others. \n \n \nThis solution takes a dependency on functionality like Azure Logic Apps, Azure Monitor Logs. Some of these dependencies might result in additional ingestion or operational costs.\n\n* https://learn.microsoft.com/en-us/azure/azure-monitor/logs/workspace-design \n* https://learn.microsoft.com/en-us/azure/logic-apps/ \n* https://learn.microsoft.com/en-us/azure/sentinel/work-with-threat-indicators \n\n\n**Workbooks:** 6, **Analytic Rules:** 6, **Playbooks:** 15\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)", "subscription": { "resourceProviders": [ "Microsoft.OperationsManagement/solutions", @@ -80,13 +80,13 @@ { "name": "workbook1", "type": "Microsoft.Common.Section", - "label": "Recorded Future - C&C DNS Name to DNS Events - Correlation&Threat Hunting", + "label": "Recorded Future - Playbook Alerts Overview", "elements": [ { "name": "workbook1-text", "type": "Microsoft.Common.TextBlock", "options": { - "text": "Sets the time name for DNS Events and Threat Intelligence Time Range" + "text": "Recorded Future Playbook Alerts Overview Workbook. This workbook will visualize playbook alerts imported via the RecordedFuture-Playbook-Alert-Importer." } } ] @@ -94,13 +94,69 @@ { "name": "workbook2", "type": "Microsoft.Common.Section", - "label": "Recorded Future - Actively Communicating C&C IPs to DNS Events - Correlation&Threat Hunting", + "label": "Recorded Future - Alerts Overview", "elements": [ { "name": "workbook2-text", "type": "Microsoft.Common.TextBlock", "options": { - "text": "Sets the time name for DNS Events and Threat Intelligence Time Range" + "text": "Recorded Future Alerts Overview Workbook. This workbook will visualize playbook alerts imported via the RecordedFuture-Alert-Importer." + } + } + ] + }, + { + "name": "workbook3", + "type": "Microsoft.Common.Section", + "label": "Recorded Future - Domain Correlation", + "elements": [ + { + "name": "workbook3-text", + "type": "Microsoft.Common.TextBlock", + "options": { + "text": "Recorded Future Domain Correlation Workbook. This workbook will visualize Recorded Future threat intelligence data together with infrastructure logs ingested in to Sentinel." + } + } + ] + }, + { + "name": "workbook4", + "type": "Microsoft.Common.Section", + "label": "Recorded Future - Hash Correlation", + "elements": [ + { + "name": "workbook4-text", + "type": "Microsoft.Common.TextBlock", + "options": { + "text": "Recorded Future Hash Correlation Workbook. This workbook will visualize Recorded Future threat intelligence data together with infrastructure logs ingested in to Sentinel." + } + } + ] + }, + { + "name": "workbook5", + "type": "Microsoft.Common.Section", + "label": "Recorded Future - IP Correlation", + "elements": [ + { + "name": "workbook5-text", + "type": "Microsoft.Common.TextBlock", + "options": { + "text": "Recorded Future IP Correlation Workbook. This workbook will visualize Recorded Future threat intelligence data together with infrastructure logs ingested in to Sentinel." + } + } + ] + }, + { + "name": "workbook6", + "type": "Microsoft.Common.Section", + "label": "Recorded Future - URL Correlation", + "elements": [ + { + "name": "workbook6-text", + "type": "Microsoft.Common.TextBlock", + "options": { + "text": "Recorded Future URL Correlation Workbook. This workbook will visualize Recorded Future threat intelligence data together with infrastructure logs ingested in to Sentinel." } } ] diff --git a/Solutions/Recorded Future/Package/mainTemplate.json b/Solutions/Recorded Future/Package/mainTemplate.json index bfcd5baa8f6..4bee2ad211f 100644 --- a/Solutions/Recorded Future/Package/mainTemplate.json +++ b/Solutions/Recorded Future/Package/mainTemplate.json @@ -30,7 +30,7 @@ }, "workbook1-name": { "type": "string", - "defaultValue": "Recorded Future - C&C DNS Name to DNS Events - Correlation&Threat Hunting", + "defaultValue": "Recorded Future - Playbook Alerts Overview", "minLength": 1, "metadata": { "description": "Name for the workbook" @@ -38,7 +38,39 @@ }, "workbook2-name": { "type": "string", - "defaultValue": "Recorded Future - Actively Communicating C&C IPs to DNS Events - Correlation&Threat Hunting", + "defaultValue": "Recorded Future - Alerts Overview", + "minLength": 1, + "metadata": { + "description": "Name for the workbook" + } + }, + "workbook3-name": { + "type": "string", + "defaultValue": "Recorded Future - Domain Correlation", + "minLength": 1, + "metadata": { + "description": "Name for the workbook" + } + }, + "workbook4-name": { + "type": "string", + "defaultValue": "Recorded Future - Hash Correlation", + "minLength": 1, + "metadata": { + "description": "Name for the workbook" + } + }, + "workbook5-name": { + "type": "string", + "defaultValue": "Recorded Future - IP Correlation", + "minLength": 1, + "metadata": { + "description": "Name for the workbook" + } + }, + "workbook6-name": { + "type": "string", + "defaultValue": "Recorded Future - URL Correlation", "minLength": 1, "metadata": { "description": "Name for the workbook" @@ -46,139 +78,218 @@ } }, "variables": { - "solutionId": "recordedfuture1605638642586.recorded_future_sentinel_solution", - "_solutionId": "[variables('solutionId')]", "email": "support@recordedfuture.com", "_email": "[variables('email')]", - "analyticRuleVersion1": "1.0.0", + "_solutionName": "Recorded Future", + "_solutionVersion": "3.0.0", + "solutionId": "recordedfuture1605638642586.recorded_future_sentinel_solution", + "_solutionId": "[variables('solutionId')]", + "analyticRuleVersion1": "1.0.1", "analyticRulecontentId1": "a1c02815-4248-4728-a9ae-dac73c67db23", "_analyticRulecontentId1": "[variables('analyticRulecontentId1')]", "analyticRuleId1": "[resourceId('Microsoft.SecurityInsights/AlertRuleTemplates', variables('analyticRulecontentId1'))]", - "analyticRuleTemplateSpecName1": "[concat(parameters('workspace'),'-ar-',uniquestring(variables('_analyticRulecontentId1')))]", - "workspaceResourceId": "[resourceId('microsoft.OperationalInsights/Workspaces', parameters('workspace'))]", - "analyticRuleVersion2": "1.0.0", + "analyticRuleTemplateSpecName1": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-ar-',uniquestring(variables('_analyticRulecontentId1'))))]", + "_analyticRulecontentProductId1": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-',variables('_analyticRulecontentId1'),'-', variables('analyticRuleVersion1'))))]", + "analyticRuleVersion2": "1.0.1", "analyticRulecontentId2": "dffd068f-fdab-440e-bbc0-34c14b623c89", "_analyticRulecontentId2": "[variables('analyticRulecontentId2')]", "analyticRuleId2": "[resourceId('Microsoft.SecurityInsights/AlertRuleTemplates', variables('analyticRulecontentId2'))]", - "analyticRuleTemplateSpecName2": "[concat(parameters('workspace'),'-ar-',uniquestring(variables('_analyticRulecontentId2')))]", + "analyticRuleTemplateSpecName2": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-ar-',uniquestring(variables('_analyticRulecontentId2'))))]", + "_analyticRulecontentProductId2": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-',variables('_analyticRulecontentId2'),'-', variables('analyticRuleVersion2'))))]", "analyticRuleVersion3": "1.0.0", "analyticRulecontentId3": "388e197d-ec9e-46b6-addb-947d74d2a5c4", "_analyticRulecontentId3": "[variables('analyticRulecontentId3')]", "analyticRuleId3": "[resourceId('Microsoft.SecurityInsights/AlertRuleTemplates', variables('analyticRulecontentId3'))]", - "analyticRuleTemplateSpecName3": "[concat(parameters('workspace'),'-ar-',uniquestring(variables('_analyticRulecontentId3')))]", + "analyticRuleTemplateSpecName3": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-ar-',uniquestring(variables('_analyticRulecontentId3'))))]", + "_analyticRulecontentProductId3": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-',variables('_analyticRulecontentId3'),'-', variables('analyticRuleVersion3'))))]", "analyticRuleVersion4": "1.0.0", "analyticRulecontentId4": "588dc717-7583-452c-a743-dee96705898e", "_analyticRulecontentId4": "[variables('analyticRulecontentId4')]", "analyticRuleId4": "[resourceId('Microsoft.SecurityInsights/AlertRuleTemplates', variables('analyticRulecontentId4'))]", - "analyticRuleTemplateSpecName4": "[concat(parameters('workspace'),'-ar-',uniquestring(variables('_analyticRulecontentId4')))]", + "analyticRuleTemplateSpecName4": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-ar-',uniquestring(variables('_analyticRulecontentId4'))))]", + "_analyticRulecontentProductId4": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-',variables('_analyticRulecontentId4'),'-', variables('analyticRuleVersion4'))))]", "analyticRuleVersion5": "1.0.0", "analyticRulecontentId5": "22cc1dff-14ad-481d-97e1-0602895e429e", "_analyticRulecontentId5": "[variables('analyticRulecontentId5')]", "analyticRuleId5": "[resourceId('Microsoft.SecurityInsights/AlertRuleTemplates', variables('analyticRulecontentId5'))]", - "analyticRuleTemplateSpecName5": "[concat(parameters('workspace'),'-ar-',uniquestring(variables('_analyticRulecontentId5')))]", + "analyticRuleTemplateSpecName5": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-ar-',uniquestring(variables('_analyticRulecontentId5'))))]", + "_analyticRulecontentProductId5": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-',variables('_analyticRulecontentId5'),'-', variables('analyticRuleVersion5'))))]", "analyticRuleVersion6": "1.0.0", "analyticRulecontentId6": "9acb3664-72c4-4676-80fa-9f81912e347e", "_analyticRulecontentId6": "[variables('analyticRulecontentId6')]", "analyticRuleId6": "[resourceId('Microsoft.SecurityInsights/AlertRuleTemplates', variables('analyticRulecontentId6'))]", - "analyticRuleTemplateSpecName6": "[concat(parameters('workspace'),'-ar-',uniquestring(variables('_analyticRulecontentId6')))]", - "RecordedFuture-ImportToSentinel": "RecordedFuture-ImportToSentinel", - "_RecordedFuture-ImportToSentinel": "[variables('RecordedFuture-ImportToSentinel')]", - "playbookVersion1": "1.0", - "playbookContentId1": "RecordedFuture-ImportToSentinel", + "analyticRuleTemplateSpecName6": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-ar-',uniquestring(variables('_analyticRulecontentId6'))))]", + "_analyticRulecontentProductId6": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-',variables('_analyticRulecontentId6'),'-', variables('analyticRuleVersion6'))))]", + "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash", + "_RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash": "[variables('RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash')]", + "playbookVersion1": "2.5", + "playbookContentId1": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash", "_playbookContentId1": "[variables('playbookContentId1')]", "playbookId1": "[resourceId('Microsoft.Logic/workflows', variables('playbookContentId1'))]", - "playbookTemplateSpecName1": "[concat(parameters('workspace'),'-pl-',uniquestring(variables('_playbookContentId1')))]", - "RecordedFuture-DOMAIN-C2_DNS_Name-IndicatorProcessor": "RecordedFuture-DOMAIN-C2_DNS_Name-IndicatorProcessor", - "_RecordedFuture-DOMAIN-C2_DNS_Name-IndicatorProcessor": "[variables('RecordedFuture-DOMAIN-C2_DNS_Name-IndicatorProcessor')]", + "playbookTemplateSpecName1": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pl-',uniquestring(variables('_playbookContentId1'))))]", + "workspaceResourceId": "[resourceId('microsoft.OperationalInsights/Workspaces', parameters('workspace'))]", + "_playbookcontentProductId1": "[concat(take(variables('_solutionId'),50),'-','pl','-', uniqueString(concat(variables('_solutionId'),'-','Playbook','-',variables('_playbookContentId1'),'-', variables('playbookVersion1'))))]", + "RecordedFuture-Sandbox_Enrichment-Url": "RecordedFuture-Sandbox_Enrichment-Url", + "_RecordedFuture-Sandbox_Enrichment-Url": "[variables('RecordedFuture-Sandbox_Enrichment-Url')]", "playbookVersion2": "1.0", - "playbookContentId2": "RecordedFuture-DOMAIN-C2_DNS_Name-IndicatorProcessor", + "playbookContentId2": "RecordedFuture-Sandbox_Enrichment-Url", "_playbookContentId2": "[variables('playbookContentId2')]", "playbookId2": "[resourceId('Microsoft.Logic/workflows', variables('playbookContentId2'))]", - "playbookTemplateSpecName2": "[concat(parameters('workspace'),'-pl-',uniquestring(variables('_playbookContentId2')))]", - "RecordedFuture-HASH-Observed_in_Underground_Virus_Test_Sites-IndicatorProcessor": "RecordedFuture-HASH-Observed_in_Underground_Virus_Test_Sites-IndicatorProcessor", - "_RecordedFuture-HASH-Observed_in_Underground_Virus_Test_Sites-IndicatorProcessor": "[variables('RecordedFuture-HASH-Observed_in_Underground_Virus_Test_Sites-IndicatorProcessor')]", + "playbookTemplateSpecName2": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pl-',uniquestring(variables('_playbookContentId2'))))]", + "_playbookcontentProductId2": "[concat(take(variables('_solutionId'),50),'-','pl','-', uniqueString(concat(variables('_solutionId'),'-','Playbook','-',variables('_playbookContentId2'),'-', variables('playbookVersion2'))))]", + "RecordedFuture-Playbook-Alert-Importer": "RecordedFuture-Playbook-Alert-Importer", + "_RecordedFuture-Playbook-Alert-Importer": "[variables('RecordedFuture-Playbook-Alert-Importer')]", "playbookVersion3": "1.0", - "playbookContentId3": "RecordedFuture-HASH-Observed_in_Underground_Virus_Test_Sites-IndicatorProcessor", + "playbookContentId3": "RecordedFuture-Playbook-Alert-Importer", "_playbookContentId3": "[variables('playbookContentId3')]", "playbookId3": "[resourceId('Microsoft.Logic/workflows', variables('playbookContentId3'))]", - "playbookTemplateSpecName3": "[concat(parameters('workspace'),'-pl-',uniquestring(variables('_playbookContentId3')))]", - "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash", - "_RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash": "[variables('RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash')]", + "playbookTemplateSpecName3": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pl-',uniquestring(variables('_playbookContentId3'))))]", + "_playbookcontentProductId3": "[concat(take(variables('_solutionId'),50),'-','pl','-', uniqueString(concat(variables('_solutionId'),'-','Playbook','-',variables('_playbookContentId3'),'-', variables('playbookVersion3'))))]", + "RecordedFuture-Alert-Importer": "RecordedFuture-Alert-Importer", + "_RecordedFuture-Alert-Importer": "[variables('RecordedFuture-Alert-Importer')]", "playbookVersion4": "1.0", - "playbookContentId4": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash", + "playbookContentId4": "RecordedFuture-Alert-Importer", "_playbookContentId4": "[variables('playbookContentId4')]", "playbookId4": "[resourceId('Microsoft.Logic/workflows', variables('playbookContentId4'))]", - "playbookTemplateSpecName4": "[concat(parameters('workspace'),'-pl-',uniquestring(variables('_playbookContentId4')))]", - "RecordedFuture-IP-Actively_Comm_C2_Server-IndicatorProcessor": "RecordedFuture-IP-Actively_Comm_C2_Server-IndicatorProcessor", - "_RecordedFuture-IP-Actively_Comm_C2_Server-IndicatorProcessor": "[variables('RecordedFuture-IP-Actively_Comm_C2_Server-IndicatorProcessor')]", + "playbookTemplateSpecName4": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pl-',uniquestring(variables('_playbookContentId4'))))]", + "_playbookcontentProductId4": "[concat(take(variables('_solutionId'),50),'-','pl','-', uniqueString(concat(variables('_solutionId'),'-','Playbook','-',variables('_playbookContentId4'),'-', variables('playbookVersion4'))))]", + "RecordedFuture-ThreatIntelligenceImport": "RecordedFuture-ThreatIntelligenceImport", + "_RecordedFuture-ThreatIntelligenceImport": "[variables('RecordedFuture-ThreatIntelligenceImport')]", "playbookVersion5": "1.0", - "playbookContentId5": "RecordedFuture-IP-Actively_Comm_C2_Server-IndicatorProcessor", + "playbookContentId5": "RecordedFuture-ThreatIntelligenceImport", "_playbookContentId5": "[variables('playbookContentId5')]", "playbookId5": "[resourceId('Microsoft.Logic/workflows', variables('playbookContentId5'))]", - "playbookTemplateSpecName5": "[concat(parameters('workspace'),'-pl-',uniquestring(variables('_playbookContentId5')))]", - "RecordedFuture-URL-Recent_Rep_by_Insikt_Group-IndicatorProcessor": "RecordedFuture-URL-Recent_Rep_by_Insikt_Group-IndicatorProcessor", - "_RecordedFuture-URL-Recent_Rep_by_Insikt_Group-IndicatorProcessor": "[variables('RecordedFuture-URL-Recent_Rep_by_Insikt_Group-IndicatorProcessor')]", + "playbookTemplateSpecName5": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pl-',uniquestring(variables('_playbookContentId5'))))]", + "_playbookcontentProductId5": "[concat(take(variables('_solutionId'),50),'-','pl','-', uniqueString(concat(variables('_solutionId'),'-','Playbook','-',variables('_playbookContentId5'),'-', variables('playbookVersion5'))))]", + "RecordedFuture-Domain-IndicatorImport": "RecordedFuture-Domain-IndicatorImport", + "_RecordedFuture-Domain-IndicatorImport": "[variables('RecordedFuture-Domain-IndicatorImport')]", "playbookVersion6": "1.0", - "playbookContentId6": "RecordedFuture-URL-Recent_Rep_by_Insikt_Group-IndicatorProcessor", + "playbookContentId6": "RecordedFuture-Domain-IndicatorImport", "_playbookContentId6": "[variables('playbookContentId6')]", "playbookId6": "[resourceId('Microsoft.Logic/workflows', variables('playbookContentId6'))]", - "playbookTemplateSpecName6": "[concat(parameters('workspace'),'-pl-',uniquestring(variables('_playbookContentId6')))]", - "RecordedFuture-Ukraine-IndicatorProcessor": "RecordedFuture-Ukraine-IndicatorProcessor", - "_RecordedFuture-Ukraine-IndicatorProcessor": "[variables('RecordedFuture-Ukraine-IndicatorProcessor')]", + "playbookTemplateSpecName6": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pl-',uniquestring(variables('_playbookContentId6'))))]", + "_playbookcontentProductId6": "[concat(take(variables('_solutionId'),50),'-','pl','-', uniqueString(concat(variables('_solutionId'),'-','Playbook','-',variables('_playbookContentId6'),'-', variables('playbookVersion6'))))]", + "RecordedFuture-Hash-IndicatorImport": "RecordedFuture-Hash-IndicatorImport", + "_RecordedFuture-Hash-IndicatorImport": "[variables('RecordedFuture-Hash-IndicatorImport')]", "playbookVersion7": "1.0", - "playbookContentId7": "RecordedFuture-Ukraine-IndicatorProcessor", + "playbookContentId7": "RecordedFuture-Hash-IndicatorImport", "_playbookContentId7": "[variables('playbookContentId7')]", "playbookId7": "[resourceId('Microsoft.Logic/workflows', variables('playbookContentId7'))]", - "playbookTemplateSpecName7": "[concat(parameters('workspace'),'-pl-',uniquestring(variables('_playbookContentId7')))]", - "blanks": "[replace('b', 'b', '')]", - "RecordedFuture-Sandbox_Enrichment-Url": "RecordedFuture-Sandbox_Enrichment-Url", - "_RecordedFuture-Sandbox_Enrichment-Url": "[variables('RecordedFuture-Sandbox_Enrichment-Url')]", + "playbookTemplateSpecName7": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pl-',uniquestring(variables('_playbookContentId7'))))]", + "_playbookcontentProductId7": "[concat(take(variables('_solutionId'),50),'-','pl','-', uniqueString(concat(variables('_solutionId'),'-','Playbook','-',variables('_playbookContentId7'),'-', variables('playbookVersion7'))))]", + "RecordedFuture-IP-IndicatorImport": "RecordedFuture-IP-IndicatorImport", + "_RecordedFuture-IP-IndicatorImport": "[variables('RecordedFuture-IP-IndicatorImport')]", "playbookVersion8": "1.0", - "playbookContentId8": "RecordedFuture-Sandbox_Enrichment-Url", + "playbookContentId8": "RecordedFuture-IP-IndicatorImport", "_playbookContentId8": "[variables('playbookContentId8')]", "playbookId8": "[resourceId('Microsoft.Logic/workflows', variables('playbookContentId8'))]", - "playbookTemplateSpecName8": "[concat(parameters('workspace'),'-pl-',uniquestring(variables('_playbookContentId8')))]", - "TemplateEmptyArray": "[json('[]')]", + "playbookTemplateSpecName8": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pl-',uniquestring(variables('_playbookContentId8'))))]", + "_playbookcontentProductId8": "[concat(take(variables('_solutionId'),50),'-','pl','-', uniqueString(concat(variables('_solutionId'),'-','Playbook','-',variables('_playbookContentId8'),'-', variables('playbookVersion8'))))]", + "RecordedFuture-URL-IndicatorImport": "RecordedFuture-URL-IndicatorImport", + "_RecordedFuture-URL-IndicatorImport": "[variables('RecordedFuture-URL-IndicatorImport')]", + "playbookVersion9": "1.0", + "playbookContentId9": "RecordedFuture-URL-IndicatorImport", + "_playbookContentId9": "[variables('playbookContentId9')]", + "playbookId9": "[resourceId('Microsoft.Logic/workflows', variables('playbookContentId9'))]", + "playbookTemplateSpecName9": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pl-',uniquestring(variables('_playbookContentId9'))))]", + "_playbookcontentProductId9": "[concat(take(variables('_solutionId'),50),'-','pl','-', uniqueString(concat(variables('_solutionId'),'-','Playbook','-',variables('_playbookContentId9'),'-', variables('playbookVersion9'))))]", + "RecordedFuture-ImportToSentinel": "RecordedFuture-ImportToSentinel", + "_RecordedFuture-ImportToSentinel": "[variables('RecordedFuture-ImportToSentinel')]", + "playbookVersion10": "1.1", + "playbookContentId10": "RecordedFuture-ImportToSentinel", + "_playbookContentId10": "[variables('playbookContentId10')]", + "playbookId10": "[resourceId('Microsoft.Logic/workflows', variables('playbookContentId10'))]", + "playbookTemplateSpecName10": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pl-',uniquestring(variables('_playbookContentId10'))))]", + "_playbookcontentProductId10": "[concat(take(variables('_solutionId'),50),'-','pl','-', uniqueString(concat(variables('_solutionId'),'-','Playbook','-',variables('_playbookContentId10'),'-', variables('playbookVersion10'))))]", + "RecordedFuture-DOMAIN-C2_DNS_Name-IndicatorProcessor": "RecordedFuture-DOMAIN-C2_DNS_Name-IndicatorProcessor", + "_RecordedFuture-DOMAIN-C2_DNS_Name-IndicatorProcessor": "[variables('RecordedFuture-DOMAIN-C2_DNS_Name-IndicatorProcessor')]", + "playbookVersion11": "1.1", + "playbookContentId11": "RecordedFuture-DOMAIN-C2_DNS_Name-IndicatorProcessor", + "_playbookContentId11": "[variables('playbookContentId11')]", + "playbookId11": "[resourceId('Microsoft.Logic/workflows', variables('playbookContentId11'))]", + "playbookTemplateSpecName11": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pl-',uniquestring(variables('_playbookContentId11'))))]", + "_playbookcontentProductId11": "[concat(take(variables('_solutionId'),50),'-','pl','-', uniqueString(concat(variables('_solutionId'),'-','Playbook','-',variables('_playbookContentId11'),'-', variables('playbookVersion11'))))]", + "RecordedFuture-HASH-Observed_in_Underground_Virus_Test_Sites-IndicatorProcessor": "RecordedFuture-HASH-Observed_in_Underground_Virus_Test_Sites-IndicatorProcessor", + "_RecordedFuture-HASH-Observed_in_Underground_Virus_Test_Sites-IndicatorProcessor": "[variables('RecordedFuture-HASH-Observed_in_Underground_Virus_Test_Sites-IndicatorProcessor')]", + "playbookVersion12": "1.1", + "playbookContentId12": "RecordedFuture-HASH-Observed_in_Underground_Virus_Test_Sites-IndicatorProcessor", + "_playbookContentId12": "[variables('playbookContentId12')]", + "playbookId12": "[resourceId('Microsoft.Logic/workflows', variables('playbookContentId12'))]", + "playbookTemplateSpecName12": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pl-',uniquestring(variables('_playbookContentId12'))))]", + "_playbookcontentProductId12": "[concat(take(variables('_solutionId'),50),'-','pl','-', uniqueString(concat(variables('_solutionId'),'-','Playbook','-',variables('_playbookContentId12'),'-', variables('playbookVersion12'))))]", + "RecordedFuture-IP-Actively_Comm_C2_Server-IndicatorProcessor": "RecordedFuture-IP-Actively_Comm_C2_Server-IndicatorProcessor", + "_RecordedFuture-IP-Actively_Comm_C2_Server-IndicatorProcessor": "[variables('RecordedFuture-IP-Actively_Comm_C2_Server-IndicatorProcessor')]", + "playbookVersion13": "1.1", + "playbookContentId13": "RecordedFuture-IP-Actively_Comm_C2_Server-IndicatorProcessor", + "_playbookContentId13": "[variables('playbookContentId13')]", + "playbookId13": "[resourceId('Microsoft.Logic/workflows', variables('playbookContentId13'))]", + "playbookTemplateSpecName13": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pl-',uniquestring(variables('_playbookContentId13'))))]", + "_playbookcontentProductId13": "[concat(take(variables('_solutionId'),50),'-','pl','-', uniqueString(concat(variables('_solutionId'),'-','Playbook','-',variables('_playbookContentId13'),'-', variables('playbookVersion13'))))]", + "RecordedFuture-URL-Recent_Rep_by_Insikt_Group-IndicatorProcessor": "RecordedFuture-URL-Recent_Rep_by_Insikt_Group-IndicatorProcessor", + "_RecordedFuture-URL-Recent_Rep_by_Insikt_Group-IndicatorProcessor": "[variables('RecordedFuture-URL-Recent_Rep_by_Insikt_Group-IndicatorProcessor')]", + "playbookVersion14": "1.1", + "playbookContentId14": "RecordedFuture-URL-Recent_Rep_by_Insikt_Group-IndicatorProcessor", + "_playbookContentId14": "[variables('playbookContentId14')]", + "playbookId14": "[resourceId('Microsoft.Logic/workflows', variables('playbookContentId14'))]", + "playbookTemplateSpecName14": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pl-',uniquestring(variables('_playbookContentId14'))))]", + "_playbookcontentProductId14": "[concat(take(variables('_solutionId'),50),'-','pl','-', uniqueString(concat(variables('_solutionId'),'-','Playbook','-',variables('_playbookContentId14'),'-', variables('playbookVersion14'))))]", + "RecordedFuture-Ukraine-IndicatorProcessor": "RecordedFuture-Ukraine-IndicatorProcessor", + "_RecordedFuture-Ukraine-IndicatorProcessor": "[variables('RecordedFuture-Ukraine-IndicatorProcessor')]", + "playbookVersion15": "1.1", + "playbookContentId15": "RecordedFuture-Ukraine-IndicatorProcessor", + "_playbookContentId15": "[variables('playbookContentId15')]", + "playbookId15": "[resourceId('Microsoft.Logic/workflows', variables('playbookContentId15'))]", + "playbookTemplateSpecName15": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-pl-',uniquestring(variables('_playbookContentId15'))))]", + "_playbookcontentProductId15": "[concat(take(variables('_solutionId'),50),'-','pl','-', uniqueString(concat(variables('_solutionId'),'-','Playbook','-',variables('_playbookContentId15'),'-', variables('playbookVersion15'))))]", "workbookVersion1": "1.0.0", - "workbookContentId1": "RecordedFutureDomainC2DNSWorkbook", + "workbookContentId1": "RecordedFuturePlaybookAlertOverviewWorkbook", "workbookId1": "[resourceId('Microsoft.Insights/workbooks', variables('workbookContentId1'))]", - "workbookTemplateSpecName1": "[concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId1')))]", + "workbookTemplateSpecName1": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId1'))))]", "_workbookContentId1": "[variables('workbookContentId1')]", + "_workbookcontentProductId1": "[concat(take(variables('_solutionId'),50),'-','wb','-', uniqueString(concat(variables('_solutionId'),'-','Workbook','-',variables('_workbookContentId1'),'-', variables('workbookVersion1'))))]", "workbookVersion2": "1.0.0", - "workbookContentId2": "RecordedFutureIPActiveC2Workbook", + "workbookContentId2": "RecordedFutureAlertOverviewWorkbook", "workbookId2": "[resourceId('Microsoft.Insights/workbooks', variables('workbookContentId2'))]", - "workbookTemplateSpecName2": "[concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId2')))]", - "_workbookContentId2": "[variables('workbookContentId2')]" + "workbookTemplateSpecName2": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId2'))))]", + "_workbookContentId2": "[variables('workbookContentId2')]", + "_workbookcontentProductId2": "[concat(take(variables('_solutionId'),50),'-','wb','-', uniqueString(concat(variables('_solutionId'),'-','Workbook','-',variables('_workbookContentId2'),'-', variables('workbookVersion2'))))]", + "workbookVersion3": "1.0.1", + "workbookContentId3": "RecordedFutureDomainCorrelationWorkbook", + "workbookId3": "[resourceId('Microsoft.Insights/workbooks', variables('workbookContentId3'))]", + "workbookTemplateSpecName3": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId3'))))]", + "_workbookContentId3": "[variables('workbookContentId3')]", + "_workbookcontentProductId3": "[concat(take(variables('_solutionId'),50),'-','wb','-', uniqueString(concat(variables('_solutionId'),'-','Workbook','-',variables('_workbookContentId3'),'-', variables('workbookVersion3'))))]", + "workbookVersion4": "1.0.1", + "workbookContentId4": "RecordedFutureHashCorrelationWorkbook", + "workbookId4": "[resourceId('Microsoft.Insights/workbooks', variables('workbookContentId4'))]", + "workbookTemplateSpecName4": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId4'))))]", + "_workbookContentId4": "[variables('workbookContentId4')]", + "_workbookcontentProductId4": "[concat(take(variables('_solutionId'),50),'-','wb','-', uniqueString(concat(variables('_solutionId'),'-','Workbook','-',variables('_workbookContentId4'),'-', variables('workbookVersion4'))))]", + "workbookVersion5": "1.0.1", + "workbookContentId5": "RecordedFutureIPCorrelationWorkbook", + "workbookId5": "[resourceId('Microsoft.Insights/workbooks', variables('workbookContentId5'))]", + "workbookTemplateSpecName5": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId5'))))]", + "_workbookContentId5": "[variables('workbookContentId5')]", + "_workbookcontentProductId5": "[concat(take(variables('_solutionId'),50),'-','wb','-', uniqueString(concat(variables('_solutionId'),'-','Workbook','-',variables('_workbookContentId5'),'-', variables('workbookVersion5'))))]", + "workbookVersion6": "1.0.1", + "workbookContentId6": "RecordedFutureURLCorrelationWorkbook", + "workbookId6": "[resourceId('Microsoft.Insights/workbooks', variables('workbookContentId6'))]", + "workbookTemplateSpecName6": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-wb-',uniquestring(variables('_workbookContentId6'))))]", + "_workbookContentId6": "[variables('workbookContentId6')]", + "_workbookcontentProductId6": "[concat(take(variables('_solutionId'),50),'-','wb','-', uniqueString(concat(variables('_solutionId'),'-','Workbook','-',variables('_workbookContentId6'),'-', variables('workbookVersion6'))))]", + "_solutioncontentProductId": "[concat(take(variables('_solutionId'),50),'-','sl','-', uniqueString(concat(variables('_solutionId'),'-','Solution','-',variables('_solutionId'),'-', variables('_solutionVersion'))))]" }, "resources": [ { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('analyticRuleTemplateSpecName1')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "AnalyticsRule" - }, - "properties": { - "description": "Recorded Future Analytics Rule 1 with template", - "displayName": "Recorded Future Analytics Rule template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('analyticRuleTemplateSpecName1'),'/',variables('analyticRuleVersion1'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "AnalyticsRule" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('analyticRuleTemplateSpecName1'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "RecordedFutureDomainMalwareC2inDNSEvents_AnalyticalRules Analytics Rule with template version 2.4.0", + "description": "RecordedFutureDomainMalwareC2inDNSEvents_AnalyticalRules Analytics Rule with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('analyticRuleVersion1')]", @@ -187,7 +298,7 @@ "resources": [ { "type": "Microsoft.SecurityInsights/AlertRuleTemplates", - "name": "[variables('AnalyticRulecontentId1')]", + "name": "[variables('analyticRulecontentId1')]", "apiVersion": "2022-04-01-preview", "kind": "Scheduled", "location": "[parameters('workspace-location')]", @@ -195,7 +306,7 @@ "description": "Identifies a match in DNSEvents from Recorded Future C2 DNS Name Domains Risklist.", "displayName": "Detection of Malware C2 Domains in DNS Events", "enabled": false, - "query": "// Identifies a match in DnsEvent from the Recorded Future DOMAIN Malware C2 DNS Name \nlet dt_lookBack = 1h;\nlet ioc_lookBack = 1d;\n//Create a list of TLDs in our threat feed for later validation\nlet list_tlds = ThreatIntelligenceIndicator\n| where TimeGenerated > ago(ioc_lookBack)\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\n| where Description == 'Recorded Future - DOMAIN - C2 DNS Name'\n| where isnotempty(DomainName)\n| extend parts = split(DomainName, '.')\n| extend tld = parts[(array_length(parts)-1)]\n| summarize count() by tostring(tld)\n| summarize make_list(tld);\nThreatIntelligenceIndicator\n| where TimeGenerated >= ago(ioc_lookBack) and ExpirationDateTime > now()\n| where Active == true\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\n| where Description == 'Recorded Future - DOMAIN - C2 DNS Name'\n// Picking up only IOC's that contain the entities we want\n| where isnotempty(DomainName)\n| join (\n DnsEvents\n | where TimeGenerated > ago(dt_lookBack)\n //Extract Domain patterns from syslog message\n | where isnotempty(Name)\n | extend parts = split(Name, '.')\n //Split out the TLD\n | extend tld = parts[(array_length(parts)-1)]\n //Validate parsed Domain by checking if the TLD is in the list of TLDs in our threat feed\n | where tld in~ (list_tlds)\n | extend DNS_TimeGenerated = TimeGenerated\n ) \non $left.DomainName==$right.Name\n| where DNS_TimeGenerated >= TimeGenerated and DNS_TimeGenerated < ExpirationDateTime\n| summarize LatestIndicatorTime = arg_max(TimeGenerated, *) by IndicatorId\n| project LatestIndicatorTime, DomainName, Description, ConfidenceScore, AdditionalInformation, ActivityGroupNames, IndicatorId, ThreatType, ExpirationDateTime, DNS_TimeGenerated, Computer, ClientIP, Name, QueryType\n| extend timestamp = DNS_TimeGenerated, HostCustomEntity = Computer, IPCustomEntity = ClientIP, DomainCustomEntity = DomainName\n", + "query": "// Identifies a match in DnsEvent from the Recorded Future DOMAIN Malware C2 DNS Name \nlet dt_lookBack = 1h;\nlet ioc_lookBack = 1d;\n//Create a list of TLDs in our threat feed for later validation\nlet list_tlds = ThreatIntelligenceIndicator\n| where TimeGenerated > ago(ioc_lookBack)\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\n| where Description == 'Recorded Future - Domains - Command and Control Activity'\n| where isnotempty(DomainName)\n| extend parts = split(DomainName, '.')\n| extend tld = parts[(array_length(parts)-1)]\n| summarize count() by tostring(tld)\n| summarize make_list(tld);\nThreatIntelligenceIndicator\n| where TimeGenerated >= ago(ioc_lookBack) and ExpirationDateTime > now()\n| where Active == true\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\n| where Description == 'Recorded Future - Domains - Command and Control Activity'\n// Picking up only IOC's that contain the entities we want\n| where isnotempty(DomainName)\n| join (\n DnsEvents\n | where TimeGenerated > ago(dt_lookBack)\n //Extract Domain patterns from syslog message\n | where isnotempty(Name)\n | extend parts = split(Name, '.')\n //Split out the TLD\n | extend tld = parts[(array_length(parts)-1)]\n //Validate parsed Domain by checking if the TLD is in the list of TLDs in our threat feed\n | where tld in~ (list_tlds)\n | extend DNS_TimeGenerated = TimeGenerated\n ) \non $left.DomainName==$right.Name\n| where DNS_TimeGenerated >= TimeGenerated and DNS_TimeGenerated < ExpirationDateTime\n| summarize LatestIndicatorTime = arg_max(TimeGenerated, *) by IndicatorId\n| project LatestIndicatorTime, DomainName, Description, ConfidenceScore, AdditionalInformation, ActivityGroupNames, IndicatorId, ThreatType, ExpirationDateTime, DNS_TimeGenerated, Computer, ClientIP, Name, QueryType\n| extend timestamp = DNS_TimeGenerated, HostCustomEntity = Computer, IPCustomEntity = ClientIP, DomainCustomEntity = DomainName\n", "queryFrequency": "PT1H", "queryPeriod": "P1D", "severity": "Medium", @@ -217,31 +328,31 @@ ], "entityMappings": [ { + "entityType": "Host", "fieldMappings": [ { "identifier": "FullName", "columnName": "HostCustomEntity" } - ], - "entityType": "Host" + ] }, { + "entityType": "IP", "fieldMappings": [ { "identifier": "Address", "columnName": "IPCustomEntity" } - ], - "entityType": "IP" + ] }, { + "entityType": "DNS", "fieldMappings": [ { "identifier": "DomainName", "columnName": "DomainCustomEntity" } - ], - "entityType": "DNS" + ] } ] } @@ -274,37 +385,30 @@ } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_analyticRulecontentId1')]", + "contentKind": "AnalyticsRule", + "displayName": "Detection of Malware C2 Domains in DNS Events", + "contentProductId": "[variables('_analyticRulecontentProductId1')]", + "id": "[variables('_analyticRulecontentProductId1')]", + "version": "[variables('analyticRuleVersion1')]" } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('analyticRuleTemplateSpecName2')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "AnalyticsRule" - }, - "properties": { - "description": "Recorded Future Analytics Rule 2 with template", - "displayName": "Recorded Future Analytics Rule template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('analyticRuleTemplateSpecName2'),'/',variables('analyticRuleVersion2'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "AnalyticsRule" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('analyticRuleTemplateSpecName2'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "RecordedFutureDomainMalwareC2inSyslogEvents_AnalyticalRules Analytics Rule with template version 2.4.0", + "description": "RecordedFutureDomainMalwareC2inSyslogEvents_AnalyticalRules Analytics Rule with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('analyticRuleVersion2')]", @@ -313,7 +417,7 @@ "resources": [ { "type": "Microsoft.SecurityInsights/AlertRuleTemplates", - "name": "[variables('AnalyticRulecontentId2')]", + "name": "[variables('analyticRulecontentId2')]", "apiVersion": "2022-04-01-preview", "kind": "Scheduled", "location": "[parameters('workspace-location')]", @@ -321,7 +425,7 @@ "description": "Identifies a match in Syslog from Recorded Future C2 DNS Name Domains Risklist.", "displayName": "Detection of Malware C2 Domains in Syslog Events", "enabled": false, - "query": "// Identifies a match in Syslog from the Recorded Future DOMAIN Malware C2 DNS Name \nlet dt_lookBack = 1h;\nlet ioc_lookBack = 1d;\n//Create a list of TLDs in our threat feed for later validation\nlet list_tlds = ThreatIntelligenceIndicator\n| where TimeGenerated > ago(ioc_lookBack)\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\n| where Description == 'Recorded Future - DOMAIN - C2 DNS Name'\n| where isnotempty(DomainName)\n| extend parts = split(DomainName, '.')\n| extend tld = parts[(array_length(parts)-1)]\n| summarize count() by tostring(tld)\n| summarize make_list(tld);\nThreatIntelligenceIndicator\n| where TimeGenerated >= ago(ioc_lookBack) and ExpirationDateTime > now()\n| where Active == true\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\n| where Description == 'Recorded Future - DOMAIN - C2 DNS Name'\n// Picking up only IOC's that contain the entities we want\n| where isnotempty(DomainName)\n| join (\n Syslog\n | where TimeGenerated > ago(dt_lookBack)\n //Extract domain patterns from syslog message\n | extend domain = extract(\"(([a-z0-9]+(-[a-z0-9]+)*\\\\.)+[a-z]{2,})\",1, tolower(SyslogMessage))\n | where isnotempty(domain)\n | extend parts = split(domain, '.')\n //Split out the TLD\n | extend tld = parts[(array_length(parts)-1)]\n //Validate parsed domain by checking if the TLD is in the list of TLDs in our threat feed\n | where tld in~ (list_tlds)\n | extend Syslog_TimeGenerated = TimeGenerated\n ) \non $left.DomainName==$right.domain\n| where Syslog_TimeGenerated >= TimeGenerated and Syslog_TimeGenerated < ExpirationDateTime\n| summarize LatestIndicatorTime = arg_max(TimeGenerated, *) by IndicatorId\n| project LatestIndicatorTime, Description, ActivityGroupNames, IndicatorId, ThreatType, ExpirationDateTime, ConfidenceScore, Syslog_TimeGenerated, SyslogMessage, Computer, ProcessName, domain, HostIP, Url\n| extend timestamp = Syslog_TimeGenerated, HostCustomEntity = Computer, IPCustomEntity = HostIP, URLCustomEntity = Url\n", + "query": "// Identifies a match in Syslog from the Recorded Future DOMAIN Malware C2 DNS Name \nlet dt_lookBack = 1h;\nlet ioc_lookBack = 1d;\n//Create a list of TLDs in our threat feed for later validation\nlet list_tlds = ThreatIntelligenceIndicator\n| where TimeGenerated > ago(ioc_lookBack)\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\n| where Description == 'Recorded Future - Domains - Command and Control Activity'\n| where isnotempty(DomainName)\n| extend parts = split(DomainName, '.')\n| extend tld = parts[(array_length(parts)-1)]\n| summarize count() by tostring(tld)\n| summarize make_list(tld);\nThreatIntelligenceIndicator\n| where TimeGenerated >= ago(ioc_lookBack) and ExpirationDateTime > now()\n| where Active == true\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\n| where Description == 'Recorded Future - Domains - Command and Control Activity'\n// Picking up only IOC's that contain the entities we want\n| where isnotempty(DomainName)\n| join (\n Syslog\n | where TimeGenerated > ago(dt_lookBack)\n //Extract domain patterns from syslog message\n | extend domain = extract(\"(([a-z0-9]+(-[a-z0-9]+)*\\\\.)+[a-z]{2,})\",1, tolower(SyslogMessage))\n | where isnotempty(domain)\n | extend parts = split(domain, '.')\n //Split out the TLD\n | extend tld = parts[(array_length(parts)-1)]\n //Validate parsed domain by checking if the TLD is in the list of TLDs in our threat feed\n | where tld in~ (list_tlds)\n | extend Syslog_TimeGenerated = TimeGenerated\n ) \non $left.DomainName==$right.domain\n| where Syslog_TimeGenerated >= TimeGenerated and Syslog_TimeGenerated < ExpirationDateTime\n| summarize LatestIndicatorTime = arg_max(TimeGenerated, *) by IndicatorId\n| project LatestIndicatorTime, Description, ActivityGroupNames, IndicatorId, ThreatType, ExpirationDateTime, ConfidenceScore, Syslog_TimeGenerated, SyslogMessage, Computer, ProcessName, domain, HostIP, Url\n| extend timestamp = Syslog_TimeGenerated, HostCustomEntity = Computer, IPCustomEntity = HostIP, URLCustomEntity = Url\n", "queryFrequency": "PT1H", "queryPeriod": "P1D", "severity": "Medium", @@ -343,40 +447,40 @@ ], "entityMappings": [ { + "entityType": "Host", "fieldMappings": [ { "identifier": "FullName", "columnName": "HostCustomEntity" } - ], - "entityType": "Host" + ] }, { + "entityType": "IP", "fieldMappings": [ { "identifier": "Address", "columnName": "IPCustomEntity" } - ], - "entityType": "IP" + ] }, { + "entityType": "URL", "fieldMappings": [ { "identifier": "Url", "columnName": "URLCustomEntity" } - ], - "entityType": "URL" + ] }, { + "entityType": "DNS", "fieldMappings": [ { "identifier": "DomainName", "columnName": "domain" } - ], - "entityType": "DNS" + ] } ] } @@ -409,37 +513,30 @@ } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_analyticRulecontentId2')]", + "contentKind": "AnalyticsRule", + "displayName": "Detection of Malware C2 Domains in Syslog Events", + "contentProductId": "[variables('_analyticRulecontentProductId2')]", + "id": "[variables('_analyticRulecontentProductId2')]", + "version": "[variables('analyticRuleVersion2')]" } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('analyticRuleTemplateSpecName3')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "AnalyticsRule" - }, - "properties": { - "description": "Recorded Future Analytics Rule 3 with template", - "displayName": "Recorded Future Analytics Rule template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('analyticRuleTemplateSpecName3'),'/',variables('analyticRuleVersion3'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "AnalyticsRule" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('analyticRuleTemplateSpecName3'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "RecordedFutureHashObservedInUndergroundinCommonSecurityLog_AnalyticalRules Analytics Rule with template version 2.4.0", + "description": "RecordedFutureHashObservedInUndergroundinCommonSecurityLog_AnalyticalRules Analytics Rule with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('analyticRuleVersion3')]", @@ -448,7 +545,7 @@ "resources": [ { "type": "Microsoft.SecurityInsights/AlertRuleTemplates", - "name": "[variables('AnalyticRulecontentId3')]", + "name": "[variables('analyticRulecontentId3')]", "apiVersion": "2022-04-01-preview", "kind": "Scheduled", "location": "[parameters('workspace-location')]", @@ -481,40 +578,40 @@ ], "entityMappings": [ { + "entityType": "Account", "fieldMappings": [ { "identifier": "FullName", "columnName": "AccountCustomEntity" } - ], - "entityType": "Account" + ] }, { + "entityType": "Host", "fieldMappings": [ { "identifier": "FullName", "columnName": "HostCustomEntity" } - ], - "entityType": "Host" + ] }, { + "entityType": "IP", "fieldMappings": [ { "identifier": "Address", "columnName": "IPCustomEntity" } - ], - "entityType": "IP" + ] }, { + "entityType": "URL", "fieldMappings": [ { "identifier": "Url", "columnName": "URLCustomEntity" } - ], - "entityType": "URL" + ] } ] } @@ -547,37 +644,30 @@ } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_analyticRulecontentId3')]", + "contentKind": "AnalyticsRule", + "displayName": "Detection of Specific Hashes in CommonSecurityLog", + "contentProductId": "[variables('_analyticRulecontentProductId3')]", + "id": "[variables('_analyticRulecontentProductId3')]", + "version": "[variables('analyticRuleVersion3')]" } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('analyticRuleTemplateSpecName4')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "AnalyticsRule" - }, - "properties": { - "description": "Recorded Future Analytics Rule 4 with template", - "displayName": "Recorded Future Analytics Rule template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('analyticRuleTemplateSpecName4'),'/',variables('analyticRuleVersion4'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "AnalyticsRule" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('analyticRuleTemplateSpecName4'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "RecordedFutureIPMalwareC2inAzureActivityEvents_AnalyticalRules Analytics Rule with template version 2.4.0", + "description": "RecordedFutureIPMalwareC2inAzureActivityEvents_AnalyticalRules Analytics Rule with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('analyticRuleVersion4')]", @@ -586,7 +676,7 @@ "resources": [ { "type": "Microsoft.SecurityInsights/AlertRuleTemplates", - "name": "[variables('AnalyticRulecontentId4')]", + "name": "[variables('analyticRulecontentId4')]", "apiVersion": "2022-04-01-preview", "kind": "Scheduled", "location": "[parameters('workspace-location')]", @@ -616,40 +706,40 @@ ], "entityMappings": [ { + "entityType": "Account", "fieldMappings": [ { "identifier": "FullName", "columnName": "AccountCustomEntity" } - ], - "entityType": "Account" + ] }, { + "entityType": "IP", "fieldMappings": [ { "identifier": "Address", "columnName": "IPCustomEntity" } - ], - "entityType": "IP" + ] }, { + "entityType": "URL", "fieldMappings": [ { "identifier": "Url", "columnName": "URLCustomEntity" } - ], - "entityType": "URL" + ] }, { + "entityType": "IP", "fieldMappings": [ { "identifier": "Address", "columnName": "TI_ipEntity" } - ], - "entityType": "IP" + ] } ] } @@ -682,37 +772,30 @@ } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_analyticRulecontentId4')]", + "contentKind": "AnalyticsRule", + "displayName": "Detection of Malware C2 IPs in Azure Act. Events", + "contentProductId": "[variables('_analyticRulecontentProductId4')]", + "id": "[variables('_analyticRulecontentProductId4')]", + "version": "[variables('analyticRuleVersion4')]" } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('analyticRuleTemplateSpecName5')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "AnalyticsRule" - }, - "properties": { - "description": "Recorded Future Analytics Rule 5 with template", - "displayName": "Recorded Future Analytics Rule template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('analyticRuleTemplateSpecName5'),'/',variables('analyticRuleVersion5'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "AnalyticsRule" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('analyticRuleTemplateSpecName5'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "RecordedFutureIPMalwareC2inDNSEvents_AnalyticalRules Analytics Rule with template version 2.4.0", + "description": "RecordedFutureIPMalwareC2inDNSEvents_AnalyticalRules Analytics Rule with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('analyticRuleVersion5')]", @@ -721,7 +804,7 @@ "resources": [ { "type": "Microsoft.SecurityInsights/AlertRuleTemplates", - "name": "[variables('AnalyticRulecontentId5')]", + "name": "[variables('analyticRulecontentId5')]", "apiVersion": "2022-04-01-preview", "kind": "Scheduled", "location": "[parameters('workspace-location')]", @@ -751,40 +834,40 @@ ], "entityMappings": [ { + "entityType": "Host", "fieldMappings": [ { "identifier": "FullName", "columnName": "HostCustomEntity" } - ], - "entityType": "Host" + ] }, { + "entityType": "IP", "fieldMappings": [ { "identifier": "Address", "columnName": "IPCustomEntity" } - ], - "entityType": "IP" + ] }, { + "entityType": "URL", "fieldMappings": [ { "identifier": "Url", "columnName": "URLCustomEntity" } - ], - "entityType": "URL" + ] }, { + "entityType": "IP", "fieldMappings": [ { "identifier": "Address", "columnName": "TI_ipEntity" } - ], - "entityType": "IP" + ] } ] } @@ -817,37 +900,30 @@ } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_analyticRulecontentId5')]", + "contentKind": "AnalyticsRule", + "displayName": "Detection of Malware C2 IPs in DNS Events", + "contentProductId": "[variables('_analyticRulecontentProductId5')]", + "id": "[variables('_analyticRulecontentProductId5')]", + "version": "[variables('analyticRuleVersion5')]" } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('analyticRuleTemplateSpecName6')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "AnalyticsRule" - }, - "properties": { - "description": "Recorded Future Analytics Rule 6 with template", - "displayName": "Recorded Future Analytics Rule template" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('analyticRuleTemplateSpecName6'),'/',variables('analyticRuleVersion6'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "AnalyticsRule" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('analyticRuleTemplateSpecName6'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "RecordedFutureUrlReportedbyInsiktGroupinSyslogEvents_AnalyticalRules Analytics Rule with template version 2.4.0", + "description": "RecordedFutureUrlReportedbyInsiktGroupinSyslogEvents_AnalyticalRules Analytics Rule with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('analyticRuleVersion6')]", @@ -856,7 +932,7 @@ "resources": [ { "type": "Microsoft.SecurityInsights/AlertRuleTemplates", - "name": "[variables('AnalyticRulecontentId6')]", + "name": "[variables('analyticRulecontentId6')]", "apiVersion": "2022-04-01-preview", "kind": "Scheduled", "location": "[parameters('workspace-location')]", @@ -886,31 +962,31 @@ ], "entityMappings": [ { + "entityType": "Host", "fieldMappings": [ { "identifier": "FullName", "columnName": "HostCustomEntity" } - ], - "entityType": "Host" + ] }, { + "entityType": "IP", "fieldMappings": [ { "identifier": "Address", "columnName": "IPCustomEntity" } - ], - "entityType": "IP" + ] }, { + "entityType": "URL", "fieldMappings": [ { "identifier": "Url", "columnName": "URLCustomEntity" } - ], - "entityType": "URL" + ] } ] } @@ -943,50 +1019,46 @@ } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_analyticRulecontentId6')]", + "contentKind": "AnalyticsRule", + "displayName": "Detection of Malicious URLs in Syslog Events", + "contentProductId": "[variables('_analyticRulecontentProductId6')]", + "id": "[variables('_analyticRulecontentProductId6')]", + "version": "[variables('analyticRuleVersion6')]" } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", "name": "[variables('playbookTemplateSpecName1')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Playbook" - }, - "properties": { - "description": "RecordedFuture-ImportToSentinel playbook", - "displayName": "RecordedFuture-ImportToSentinel playbook" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('playbookTemplateSpecName1'),'/',variables('playbookVersion1'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Playbook" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('playbookTemplateSpecName1'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "RecordedFuture-ImportToSentinel Playbook with template version 2.4.0", + "description": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash Playbook with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('playbookVersion1')]", "parameters": { "PlaybookName": { - "type": "string", - "defaultValue": "RecordedFuture-ImportToSentinel" + "defaultValue": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash", + "type": "string" } }, "variables": { - "GraphSecurityConnectionName": "[[concat('microsoftgraphsecurity-', parameters('PlaybookName'))]", - "connection-2": "[[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/',variables('workspace-location-inline'),'/managedApis/microsoftgraphsecurity')]", + "RecordedFutureConnectionName": "recordedfuture-connectorv2", + "AzureSentinelConnectionName": "[[concat('azuresentinel-', parameters('PlaybookName'))]", + "connection-2": "[[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/',variables('workspace-location-inline'),'/managedApis/recordedfuturev2')]", "_connection-2": "[[variables('connection-2')]", + "connection-3": "[[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/',variables('workspace-location-inline'),'/managedApis/azuresentinel')]", + "_connection-3": "[[variables('connection-3')]", "workspace-location-inline": "[concat('[resourceGroup().locatio', 'n]')]", "workspace-name": "[parameters('workspace')]", "workspaceResourceId": "[[resourceId('microsoft.OperationalInsights/Workspaces', variables('workspace-name'))]" @@ -997,807 +1069,162 @@ "apiVersion": "2019-05-01", "name": "[[parameters('PlaybookName')]", "location": "[[variables('workspace-location-inline')]", + "tags": { + "hidden-SentinelTemplateVersion": "2.5", + "hidden-SentinelWorkspaceId": "[[variables('workspaceResourceId')]" + }, "dependsOn": [ - "[[resourceId('Microsoft.Web/connections', variables('GraphSecurityConnectionName'))]" + "[[resourceId('Microsoft.Web/connections', variables('AzureSentinelConnectionName'))]", + "[[resourceId('Microsoft.Web/connections', variables('RecordedFutureConnectionName'))]" ], "properties": { "definition": { "$schema": "https://schema.management.azure.com/providers/Microsoft.Logic/schemas/2016-06-01/workflowdefinition.json#", "actions": { - "Select": { - "inputs": { - "from": "@triggerBody()['items']", - "select": "@item()['content']" - }, - "type": "Select" - }, - "Submit_multiple_tiIndicators": { - "inputs": { - "body": { - "value": "@body('Select')" - }, - "host": { - "connection": { - "name": "@parameters('$connections')['microsoftgraphsecurity']['connectionId']" - } - }, - "method": "post", - "path": "/beta/security/tiIndicators/submitTiIndicators" - }, - "runAfter": { - "Select": [ - "Succeeded" - ] - }, - "type": "ApiConnection" - } - }, - "contentVersion": "1.0.0.0", - "parameters": { - "$connections": { - "type": "Object" - } - }, - "triggers": { - "Batch_messages": { - "inputs": { - "configurations": { - "RFImportToSentinel": { - "releaseCriteria": { - "messageCount": 100, - "recurrence": { - "frequency": "Minute", - "interval": 10 - } + "For_each": { + "actions": { + "Parse_JSON_2": { + "inputs": { + "content": "@items('For_each')", + "schema": { + "properties": { + "id": { + "type": "string" + }, + "kind": { + "type": "string" + }, + "properties": { + "type": "object" + }, + "type": { + "type": "string" + } + }, + "type": "object" } - } + }, + "type": "ParseJson" }, - "mode": "Inline" - }, - "type": "Batch" - } - } - }, - "parameters": { - "$connections": { - "value": { - "microsoftgraphsecurity": { - "id": "[[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/',variables('workspace-location-inline'),'/managedApis/microsoftgraphsecurity')]", - "connectionId": "[[resourceId('Microsoft.Web/connections', variables('GraphSecurityConnectionName'))]", - "connectionName": "[[variables('GraphSecurityConnectionName')]" - } - } - } - } - }, - "tags": { - "hidden-SentinelWorkspaceId": "[[variables('workspaceResourceId')]" - } - }, - { - "type": "Microsoft.Web/connections", - "apiVersion": "2016-06-01", - "location": "[[variables('workspace-location-inline')]", - "name": "[[variables('GraphSecurityConnectionName')]", - "properties": { - "api": { - "id": "[[variables('_connection-2')]" - } - } - }, - { - "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2022-01-01-preview", - "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Playbook-', last(split(variables('playbookId1'),'/'))))]", - "properties": { - "parentId": "[variables('playbookId1')]", - "contentId": "[variables('_playbookContentId1')]", - "kind": "Playbook", - "version": "[variables('playbookVersion1')]", - "source": { - "kind": "Solution", - "name": "Recorded Future", - "sourceId": "[variables('_solutionId')]" - }, - "author": { - "name": "Recorded Future Premier Integrations", - "email": "[variables('_email')]" - }, - "support": { - "name": "Recorded Future Support Team", - "email": "support@recordedfuture.com", - "tier": "Partner", - "link": "http://support.recordedfuture.com/" - } - } - } - ], - "metadata": { - "title": "RecordedFuture-ImportToSentinel", - "description": "This playbook is purposed to listen (via batching mechanism provided by Microsoft Azure) for incoming messages from the IndicatorProcessor Playbooks and create submit the indicators for creation", - "postDeployment": [ - "After deployment you have to open the playbook to configure all connections and press save." - ], - "prerequisites": [ - "None" - ], - "lastUpdateTime": "2022-08-01T00:00:00Z", - "tags": [ - "Threat Intelligence" - ], - "releaseNotes": [ - { - "version": "1.0.0", - "title": "RecordedFuture-ImportToSentinel", - "notes": [ - "Initial version" - ] - } - ] - } - } - } - }, - { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", - "name": "[variables('playbookTemplateSpecName2')]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Playbook" - }, - "properties": { - "description": "RecordedFuture-DOMAIN-C2_DNS_Name-TIProcessor playbook", - "displayName": "RecordedFuture-DOMAIN-C2_DNS_Name-TIProcessor playbook" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('playbookTemplateSpecName2'),'/',variables('playbookVersion2'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Playbook" - }, - "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('playbookTemplateSpecName2'))]" - ], - "properties": { - "description": "RecordedFuture-DOMAIN-C2_DNS_Name-TIProcessor Playbook with template version 2.4.0", - "mainTemplate": { - "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", - "contentVersion": "[variables('playbookVersion2')]", - "parameters": { - "PlaybookName": { - "defaultValue": "RecordedFuture-DOMAIN-C2_DNS_Name-TIProcessor", - "type": "String" - }, - "PlaybookNameBatching": { - "defaultValue": "RecordedFuture-ImportToSentinel", - "type": "String" - } - }, - "variables": { - "RecordedFutureConnectionName": "recordedfuture-connectorv2", - "connection-2": "[[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/',variables('workspace-location-inline'),'/managedApis/recordedfuturev2')]", - "_connection-2": "[[variables('connection-2')]", - "workspace-location-inline": "[concat('[resourceGroup().locatio', 'n]')]", - "workspace-name": "[parameters('workspace')]", - "workspaceResourceId": "[[resourceId('microsoft.OperationalInsights/Workspaces', variables('workspace-name'))]" - }, - "resources": [ - { - "type": "Microsoft.Logic/workflows", - "apiVersion": "2019-05-01", - "name": "[[parameters('PlaybookName')]", - "location": "[[variables('workspace-location-inline')]", - "dependsOn": [ - "[[resourceId('Microsoft.Web/connections', variables('RecordedFutureConnectionName'))]" - ], - "properties": { - "definition": { - "$schema": "https://schema.management.azure.com/providers/Microsoft.Logic/schemas/2016-06-01/workflowdefinition.json#", - "actions": { - "For_each": { - "actions": { - "Parse_JSON": { - "inputs": { - "content": "@items('For_each')", - "schema": { - "properties": { - "EvidenceDetails": { - "properties": { - "EvidenceDetails": { - "items": { - "properties": { - "Criticality": { - "type": "integer" - }, - "CriticalityLabel": { - "type": "string" - }, - "EvidenceString": { - "type": "string" - }, - "Rule": { - "type": "string" - }, - "Timestamp": { - "type": "integer" - } - }, - "required": [ - "Rule", - "EvidenceString", - "CriticalityLabel", - "Timestamp", - "Criticality" - ], - "type": "object" - }, - "type": "array" - } + "Switch": { + "cases": { + "Case": { + "actions": { + "Add_comment_to_incident_(V3)_-_Domain": { + "inputs": { + "body": { + "incidentArmId": "@triggerBody()?['object']?['id']", + "message": "

@{body('Domain_Enrichment')?['data']?['html_response']}

" + }, + "host": { + "connection": { + "name": "@parameters('$connections')['azuresentinel']['connectionId']" + } + }, + "method": "post", + "path": "/Incidents/Comment" }, - "type": "object" + "runAfter": { + "Domain_Enrichment": [ + "Succeeded" + ] + }, + "type": "ApiConnection" }, - "Name": { - "type": "string" + "Add_comment_to_incident_(V3)_4": { + "inputs": { + "body": { + "incidentArmId": "@triggerBody()?['object']?['id']", + "message": "


\nNo Recorded Future data on @{body('Parse_JSON_-_DNS_Resolution')?['domainName']}
\nRequest Data Collection In The Recorded Future Portal

" + }, + "host": { + "connection": { + "name": "@parameters('$connections')['azuresentinel']['connectionId']" + } + }, + "method": "post", + "path": "/Incidents/Comment" + }, + "runAfter": { + "Add_comment_to_incident_(V3)_-_Domain": [ + "Skipped" + ] + }, + "type": "ApiConnection" }, - "Risk": { - "type": "integer" + "Domain_Enrichment": { + "inputs": { + "host": { + "connection": { + "name": "@parameters('$connections')['recordedfuture']['connectionId']" + } + }, + "method": "get", + "path": "/lookup/domain/@{encodeURIComponent(body('Parse_JSON_-_DNS_Resolution')?['domainName'])}", + "queries": { + "IntelligenceCloud": "@parameters('IntelligenceCloud')", + "RFIncidentId": "@variables('RFIncidentId')", + "Techniques": "@string(triggerBody()?['object']?['properties']?['additionalData']?['techniques'])", + "WorkspaceId": "@triggerBody()?['workspaceInfo']?['WorkspaceName']", + "fields": "intelCard,risk,links", + "htmlresponse": "True" + } + }, + "runAfter": { + "Parse_JSON_-_DNS_Resolution": [ + "Succeeded" + ] + }, + "type": "ApiConnection" }, - "riskString": { - "type": "string" + "Parse_JSON_-_DNS_Resolution": { + "inputs": { + "content": "@body('Parse_JSON_2')?['properties']", + "schema": { + "properties": { + "domainName": { + "type": "string" + }, + "friendlyName": { + "type": "string" + } + }, + "type": "object" + } + }, + "type": "ParseJson" } }, - "type": "object" - } - }, - "type": "ParseJson" - }, - "RecordedFuture-ImportToSentinel": { - "inputs": { - "batchName": "RFImportToSentinel", - "content": { - "action": "alert", - "additionalInformation": "@{body('Parse_JSON')?['EvidenceDetails']}", - "azureTenantId": "[[subscription().tenantId]", - "confidence": "@int(body('Parse_JSON')?['Risk'])", - "description": "Recorded Future - DOMAIN - C2 DNS Name", - "domainName": "@{body('Parse_JSON')?['Name']}", - "expirationDateTime": "@{addHours(utcNow(),2)}", - "ingestedDateTime": "@{utcNow()}", - "targetProduct": "Azure Sentinel", - "threatType": "C2", - "tlpLevel": "amber" + "case": "DnsResolution" }, - "host": { - "triggerName": "Batch_messages", - "workflow": { - "id": "[[concat('/subscriptions/', subscription().subscriptionId, '/resourceGroups/', resourceGroup().name, '/providers/Microsoft.Logic/workflows/', parameters('PlaybookNameBatching'))]" - } - } - }, - "runAfter": { - "Parse_JSON": [ - "Succeeded" - ] - }, - "type": "SendToBatch" - } - }, - "foreach": "@body('Recorded_Future_RiskLists_and_SCF_Download')", - "runAfter": { - "Recorded_Future_RiskLists_and_SCF_Download": [ - "Succeeded" - ] - }, - "type": "Foreach" - }, - "Recorded_Future_RiskLists_and_SCF_Download": { - "inputs": { - "host": { - "connection": { - "name": "@parameters('$connections')['recordedfuture']['connectionId']" - } - }, - "method": "get", - "path": "/fusion/files", - "queries": { - "path": "/public/MicrosoftAzure/domain_c2_dns.json" - } - }, - "type": "ApiConnection" - } - }, - "contentVersion": "1.0.0.0", - "parameters": { - "$connections": { - "type": "Object" - } - }, - "triggers": { - "Recurrence": { - "recurrence": { - "frequency": "Hour", - "interval": 2 - }, - "type": "Recurrence" - } - } - }, - "parameters": { - "$connections": { - "value": { - "recordedfuture": { - "id": "[[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/',variables('workspace-location-inline'),'/managedApis/recordedfuturev2')]", - "connectionId": "[[resourceId('Microsoft.Web/connections', variables('RecordedFutureConnectionName'))]", - "connectionName": "[[variables('RecordedFutureConnectionName')]" - } - } - } - } - }, - "tags": { - "hidden-SentinelWorkspaceId": "[[variables('workspaceResourceId')]" - } - }, - { - "type": "Microsoft.Web/connections", - "apiVersion": "2016-06-01", - "name": "[[variables('RecordedFutureConnectionName')]", - "location": "[[variables('workspace-location-inline')]", - "properties": { - "api": { - "id": "[[variables('_connection-2')]" - } - } - }, - { - "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2022-01-01-preview", - "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Playbook-', last(split(variables('playbookId2'),'/'))))]", - "properties": { - "parentId": "[variables('playbookId2')]", - "contentId": "[variables('_playbookContentId2')]", - "kind": "Playbook", - "version": "[variables('playbookVersion2')]", - "source": { - "kind": "Solution", - "name": "Recorded Future", - "sourceId": "[variables('_solutionId')]" - }, - "author": { - "name": "Recorded Future Premier Integrations", - "email": "[variables('_email')]" - }, - "support": { - "name": "Recorded Future Support Team", - "email": "support@recordedfuture.com", - "tier": "Partner", - "link": "http://support.recordedfuture.com/" - } - } - } - ], - "metadata": { - "title": "RecordedFuture-DOMAIN-C2_DNS_Name-TIProcessor", - "description": "This playbook leverages the Recorded Future API and automatically imports the C&C DNS Name Domain RiskList, as Threat Intelligence Indicators, for detection purposes in Microsoft Sentinel.\n\nThis playbook depends on RecordedFuture-ImportToSentinel that need to be installed **manually** before installing current playbook.", - "prerequisites": [ - "First install the RecordedFuture-ImportToSentinel playbook.", - "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials" - ], - "postDeployment": [ - "After deployment you have to open the playbook to configure all connections and press save." - ], - "lastUpdateTime": "2022-08-01T00:00:00Z", - "tags": [ - "Threat Intelligence" - ], - "releaseNotes": [ - { - "version": "1.0.0", - "title": "RecordedFuture-DOMAIN-C2_DNS_Name-IndicatorProcessor", - "notes": [ - "Initial version" - ] - } - ] - } - } - } - }, - { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", - "name": "[variables('playbookTemplateSpecName3')]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Playbook" - }, - "properties": { - "description": "RecordedFuture-HASH-Obs_in_Underground-TIProcessor playbook", - "displayName": "RecordedFuture-HASH-Obs_in_Underground-TIProcessor playbook" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('playbookTemplateSpecName3'),'/',variables('playbookVersion3'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Playbook" - }, - "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('playbookTemplateSpecName3'))]" - ], - "properties": { - "description": "RecordedFuture-HASH-Obs_in_Underground-TIProcessor Playbook with template version 2.4.0", - "mainTemplate": { - "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", - "contentVersion": "[variables('playbookVersion3')]", - "parameters": { - "PlaybookName": { - "defaultValue": "RecordedFuture-HASH-Obs_in_Underground-TIProcessor", - "type": "String" - }, - "PlaybookNameBatching": { - "defaultValue": "RecordedFuture-ImportToSentinel", - "type": "String" - } - }, - "variables": { - "RecordedFutureConnectionName": "recordedfuture-connectorv2", - "connection-2": "[[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/',variables('workspace-location-inline'),'/managedApis/recordedfuturev2')]", - "_connection-2": "[[variables('connection-2')]", - "workspace-location-inline": "[concat('[resourceGroup().locatio', 'n]')]", - "workspace-name": "[parameters('workspace')]", - "workspaceResourceId": "[[resourceId('microsoft.OperationalInsights/Workspaces', variables('workspace-name'))]" - }, - "resources": [ - { - "type": "Microsoft.Logic/workflows", - "apiVersion": "2019-05-01", - "name": "[[parameters('PlaybookName')]", - "location": "[[variables('workspace-location-inline')]", - "dependsOn": [ - "[[resourceId('Microsoft.Web/connections', variables('RecordedFutureConnectionName'))]" - ], - "properties": { - "definition": { - "$schema": "https://schema.management.azure.com/providers/Microsoft.Logic/schemas/2016-06-01/workflowdefinition.json#", - "actions": { - "For_each": { - "actions": { - "Parse_JSON": { - "inputs": { - "content": "@items('For_each')", - "schema": { - "properties": { - "EvidenceDetails": { - "properties": { - "EvidenceDetails": { - "items": { - "properties": { - "Criticality": { - "type": "integer" - }, - "CriticalityLabel": { - "type": "string" - }, - "EvidenceString": { - "type": "string" - }, - "Rule": { - "type": "string" - }, - "Timestamp": { - "type": "integer" - } - }, - "required": [ - "Rule", - "EvidenceString", - "CriticalityLabel", - "Timestamp", - "Criticality" - ], - "type": "object" - }, - "type": "array" - } + "Case_2": { + "actions": { + "Add_comment_to_incident_(V3)_-_Hash": { + "inputs": { + "body": { + "incidentArmId": "@triggerBody()?['object']?['id']", + "message": "

@{body('Hash_Enrichment')?['data']?['html_response']}

" + }, + "host": { + "connection": { + "name": "@parameters('$connections')['azuresentinel']['connectionId']" + } + }, + "method": "post", + "path": "/Incidents/Comment" }, - "type": "object" - }, - "Name": { - "type": "string" - }, - "Risk": { - "type": "integer" + "runAfter": { + "Hash_Enrichment": [ + "Succeeded" + ] + }, + "type": "ApiConnection" }, - "riskString": { - "type": "string" - } - }, - "type": "object" - } - }, - "type": "ParseJson" - }, - "RecordedFuture-ImportToSentinel": { - "inputs": { - "batchName": "RFImportToSentinel", - "content": { - "action": "alert", - "additionalInformation": "@{body('Parse_JSON')?['EvidenceDetails']}", - "azureTenantId": "[[subscription().tenantId]", - "confidence": "@int(body('Parse_JSON')?['Risk'])", - "description": "Recorded Future - HASH - Observed in Underground Virus Testing Sites", - "expirationDateTime": "@{addDays(utcNow(),1)}", - "fileHashType": "unknown", - "fileHashValue": "@{body('Parse_JSON')?['Name']}", - "ingestedDateTime": "@{utcNow()}", - "targetProduct": "Azure Sentinel", - "threatType": "Malware", - "tlpLevel": "amber" - }, - "host": { - "triggerName": "Batch_messages", - "workflow": { - "id": "[[concat('/subscriptions/', subscription().subscriptionId, '/resourceGroups/', resourceGroup().name, '/providers/Microsoft.Logic/workflows/', parameters('PlaybookNameBatching'))]" - } - } - }, - "runAfter": { - "Parse_JSON": [ - "Succeeded" - ] - }, - "type": "SendToBatch" - } - }, - "foreach": "@body('Recorded_Future_RiskLists_and_SCF_Download')", - "runAfter": { - "Recorded_Future_RiskLists_and_SCF_Download": [ - "Succeeded" - ] - }, - "type": "Foreach" - }, - "Recorded_Future_RiskLists_and_SCF_Download": { - "inputs": { - "host": { - "connection": { - "name": "@parameters('$connections')['recordedfuture']['connectionId']" - } - }, - "method": "get", - "path": "/fusion/files", - "queries": { - "path": "/public/MicrosoftAzure/hash_observed_testing.json" - } - }, - "type": "ApiConnection" - } - }, - "contentVersion": "1.0.0.0", - "parameters": { - "$connections": { - "type": "Object" - } - }, - "triggers": { - "Recurrence": { - "recurrence": { - "frequency": "Day", - "interval": 1 - }, - "type": "Recurrence" - } - } - }, - "parameters": { - "$connections": { - "value": { - "recordedfuture": { - "id": "[[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/',variables('workspace-location-inline'),'/managedApis/recordedfuturev2')]", - "connectionId": "[[resourceId('Microsoft.Web/connections', variables('RecordedFutureConnectionName'))]", - "connectionName": "[[variables('RecordedFutureConnectionName')]" - } - } - } - } - }, - "tags": { - "hidden-SentinelWorkspaceId": "[[variables('workspaceResourceId')]" - } - }, - { - "type": "Microsoft.Web/connections", - "apiVersion": "2016-06-01", - "name": "[[variables('RecordedFutureConnectionName')]", - "location": "[[variables('workspace-location-inline')]", - "properties": { - "api": { - "id": "[[variables('_connection-2')]" - } - } - }, - { - "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2022-01-01-preview", - "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Playbook-', last(split(variables('playbookId3'),'/'))))]", - "properties": { - "parentId": "[variables('playbookId3')]", - "contentId": "[variables('_playbookContentId3')]", - "kind": "Playbook", - "version": "[variables('playbookVersion3')]", - "source": { - "kind": "Solution", - "name": "Recorded Future", - "sourceId": "[variables('_solutionId')]" - }, - "author": { - "name": "Recorded Future Premier Integrations", - "email": "[variables('_email')]" - }, - "support": { - "name": "Recorded Future Support Team", - "email": "support@recordedfuture.com", - "tier": "Partner", - "link": "http://support.recordedfuture.com/" - } - } - } - ], - "metadata": { - "title": "RecordedFuture-HASH-Obs_in_Underground-TIProcessor", - "description": "This playbook leverages the Recorded Future API and automatically imports the Observed in Underground Virus Testing Sites Hash RiskList, as Threat Intelligence Indicators, for detection purposes in Microsoft Sentinel.\n\nThis playbook depends on RecordedFuture-ImportToSentinel that need to be installed **manually** before installing current playbook.", - "prerequisites": [ - "First install the RecordedFuture-ImportToSentinel playbook.", - "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials" - ], - "postDeployment": [ - "After deployment you have to open the playbook to configure all connections and press save." - ], - "lastUpdateTime": "2022-08-01T00:00:00Z", - "tags": [ - "Threat Intelligence" - ], - "releaseNotes": [ - { - "version": "1.0.0", - "title": "RecordedFuture-HASH-Obs_in_Underground-TIProcessor", - "notes": [ - "Initial version" - ] - } - ] - } - } - } - }, - { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", - "name": "[variables('playbookTemplateSpecName4')]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Playbook" - }, - "properties": { - "description": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash playbook", - "displayName": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash playbook" - } - }, - { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('playbookTemplateSpecName4'),'/',variables('playbookVersion4'))]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Playbook" - }, - "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('playbookTemplateSpecName4'))]" - ], - "properties": { - "description": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash Playbook with template version 2.4.0", - "mainTemplate": { - "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", - "contentVersion": "[variables('playbookVersion4')]", - "parameters": { - "PlaybookName": { - "defaultValue": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash", - "type": "string" - } - }, - "variables": { - "RecordedFutureConnectionName": "recordedfuture-connectorv2", - "AzureSentinelConnectionName": "[[concat('azuresentinel-', parameters('PlaybookName'))]", - "connection-2": "[[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/',variables('workspace-location-inline'),'/managedApis/recordedfuturev2')]", - "_connection-2": "[[variables('connection-2')]", - "connection-3": "[[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/',variables('workspace-location-inline'),'/managedApis/azuresentinel')]", - "_connection-3": "[[variables('connection-3')]", - "workspace-location-inline": "[concat('[resourceGroup().locatio', 'n]')]", - "workspace-name": "[parameters('workspace')]", - "workspaceResourceId": "[[resourceId('microsoft.OperationalInsights/Workspaces', variables('workspace-name'))]" - }, - "resources": [ - { - "type": "Microsoft.Logic/workflows", - "apiVersion": "2019-05-01", - "name": "[[parameters('PlaybookName')]", - "location": "[[variables('workspace-location-inline')]", - "dependsOn": [ - "[[resourceId('Microsoft.Web/connections', variables('AzureSentinelConnectionName'))]", - "[[resourceId('Microsoft.Web/connections', variables('RecordedFutureConnectionName'))]" - ], - "properties": { - "definition": { - "$schema": "https://schema.management.azure.com/providers/Microsoft.Logic/schemas/2016-06-01/workflowdefinition.json#", - "actions": { - "For_each": { - "actions": { - "Parse_JSON_2": { - "inputs": { - "content": "@items('For_each')", - "schema": { - "properties": { - "id": { - "type": "string" - }, - "kind": { - "type": "string" - }, - "properties": { - "type": "object" - }, - "type": { - "type": "string" - } - }, - "type": "object" - } - }, - "type": "ParseJson" - }, - "Switch": { - "cases": { - "Case": { - "actions": { - "Add_comment_to_incident_(V3)_-_Domain": { - "inputs": { - "body": { - "incidentArmId": "@triggerBody()?['object']?['id']", - "message": "


\nEnrichmed Domain: @{body('Parse_JSON_-_DNS_Resolution')?['domainName']}
\nRisk Score: @{body('Domain_Enrichment')?['data']?['risk']?['score']} of 99
\n@{concat('Open IOC Intelligence Card (Portal)


')}
\nInfrastructure Detections: @{body('Domain_Observed_ioc_HTML_table')}
\nRisk Rules: @{body('Domain_Evidence_Details_HTML_table')}
\nTechnical Links: @{body('Domain_Technical_Links_HTML_table')}
\nResearch Links: @{body('Domain_Research_Links_HTML_table')}

" - }, - "host": { - "connection": { - "name": "@parameters('$connections')['azuresentinel']['connectionId']" - } - }, - "method": "post", - "path": "/Incidents/Comment" - }, - "runAfter": { - "Domain_Observed_ioc_HTML_table": [ - "Succeeded" - ] - }, - "type": "ApiConnection" - }, - "Add_comment_to_incident_(V3)_4": { + "Add_comment_to_incident_(V3)_3": { "inputs": { "body": { "incidentArmId": "@triggerBody()?['object']?['id']", - "message": "


\nNo Recorded Future data on @{body('Parse_JSON_-_DNS_Resolution')?['domainName']}
\nRequest Data Collection In The Recorded Future Portal

" + "message": "


\nNo Recorded Future data on @{body('Parse_JSON_-_File_Hash')?['hashValue']}
\nRequest Data Collection In The Recorded Future Portal

" }, "host": { "connection": { @@ -1808,13 +1235,13 @@ "path": "/Incidents/Comment" }, "runAfter": { - "Add_comment_to_incident_(V3)_-_Domain": [ - "SKIPPED" + "Add_comment_to_incident_(V3)_-_Hash": [ + "Skipped" ] }, "type": "ApiConnection" }, - "Domain_Enrichment": { + "Hash_Enrichment": { "inputs": { "host": { "connection": { @@ -1822,144 +1249,36 @@ } }, "method": "get", - "path": "/lookup/domain/@{encodeURIComponent(body('Parse_JSON_-_DNS_Resolution')?['domainName'])}", + "path": "/lookup/hash/@{encodeURIComponent(body('Parse_JSON_-_File_Hash')?['hashValue'])}", "queries": { "IntelligenceCloud": "@parameters('IntelligenceCloud')", "RFIncidentId": "@variables('RFIncidentId')", "Techniques": "@string(triggerBody()?['object']?['properties']?['additionalData']?['techniques'])", "WorkspaceId": "@triggerBody()?['workspaceInfo']?['WorkspaceName']", - "fields": "intelCard,risk,links" + "fields": "intelCard,risk,links", + "htmlresponse": "True" } }, "runAfter": { - "Parse_JSON_-_DNS_Resolution": [ + "Parse_JSON_-_File_Hash": [ "Succeeded" ] }, "type": "ApiConnection" }, - "Domain_Evidence_Details_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Risk_Rules", - "value": "@item()?['rule']" - }, - { - "header": "Severity", - "value": "@item()?['criticalityLabel']" - }, - { - "header": "Evidence_Details", - "value": "@item()?['evidenceString']" - } - ], - "format": "HTML", - "from": "@body('Domain_Enrichment')?['data']?['risk']?['evidenceDetails']" - }, - "runAfter": { - "Domain_Enrichment": [ - "Succeeded" - ] - }, - "type": "Table" - }, - "Domain_Research_Links_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Entity", - "value": "@replace(item()?['name'],'.','[.]')" - }, - { - "header": "Entity_Type", - "value": "@item()?['type']" - }, - { - "header": "Category", - "value": "@item()?['category']" - }, - { - "header": "Risk_Score", - "value": "@item()?['score']" - } - ], - "format": "HTML", - "from": "@if(empty(body('Domain_Enrichment')?['data']?['links']?['research']),variables('EmptyArray'),body('Domain_Enrichment')?['data']?['links']?['research']?['entities'])" - }, - "runAfter": { - "Domain_Technical_Links_HTML_table": [ - "Succeeded" - ] - }, - "type": "Table" - }, - "Domain_Technical_Links_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Entity", - "value": "@replace(item()?['name'],'.','[.]')" - }, - { - "header": "Entity_Type", - "value": "@item()?['type']" - }, - { - "header": "Category", - "value": "@item()?['category']" - }, - { - "header": "Risk_Score", - "value": "@item()?['score']" - } - ], - "format": "HTML", - "from": "@if(empty(body('Domain_Enrichment')?['data']?['links']?['technical']),variables('EmptyArray'),body('Domain_Enrichment')?['data']?['links']?['technical']?['entities'])" - }, - "runAfter": { - "Domain_Evidence_Details_HTML_table": [ - "Succeeded" - ] - }, - "type": "Table" - }, - "Domain_Observed_ioc_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Timestamp", - "value": "@item()?['timestamp']" - }, - { - "header": "Integration_Type", - "value": "@item()?['integration_type']" - }, - { - "header": "Instance_Id", - "value": "@item()?['integration_instance_id']" - } - ], - "format": "HTML", - "from": "@if(empty(body('Domain_Enrichment')?['observed_iocs_history']),variables('EmptyArray'),body('Domain_Enrichment')?['observed_iocs_history'])" - }, - "runAfter": { - "DOMAIN_Research_Links_HTML_table": [ - "Succeeded" - ] - }, - "type": "Table" - }, - "Parse_JSON_-_DNS_Resolution": { + "Parse_JSON_-_File_Hash": { "inputs": { "content": "@body('Parse_JSON_2')?['properties']", "schema": { "properties": { - "domainName": { + "algorithm": { "type": "string" }, "friendlyName": { "type": "string" + }, + "hashValue": { + "type": "string" } }, "type": "object" @@ -1968,15 +1287,15 @@ "type": "ParseJson" } }, - "case": "DnsResolution" + "case": "FileHash" }, - "Case_2": { + "Case_3": { "actions": { - "Add_comment_to_incident_(V3)_-_Hash": { + "Add_comment_to_incident_(V3)_-_URL": { "inputs": { "body": { "incidentArmId": "@triggerBody()?['object']?['id']", - "message": "


\nEnriched Hash: @{body('Parse_JSON_-_File_Hash')?['hashValue']}
\nRisk Score: @{body('Hash_Enrichment')?['data']?['risk']?['score']} of 99
\n@{concat('Open Intelligence Card (Portal)


')}
\nInfrastructure Detections: @{body('Hash_Observed_ioc_HTML_table')}
\nRisk Rules: @{body('Hash_Evidence_Details_HTML_table')}
\nTechnical Links: @{body('Hash_Technical_Links_HTML_table')}
\nResearch Links: @{body('Hash_Research_Links_HTML_table')}

" + "message": "

@{body('URL_Enrichment')?['data']?['html_response']}

" }, "host": { "connection": { @@ -1987,17 +1306,17 @@ "path": "/Incidents/Comment" }, "runAfter": { - "Hash_Observed_ioc_HTML_table": [ + "URL_Enrichment": [ "Succeeded" ] }, "type": "ApiConnection" }, - "Add_comment_to_incident_(V3)_3": { + "Add_comment_to_incident_(V3)_2": { "inputs": { "body": { "incidentArmId": "@triggerBody()?['object']?['id']", - "message": "


\nNo Recorded Future data on @{body('Parse_JSON_-_File_Hash')?['hashValue']}
\nRequest Data Collection In The Recorded Future Portal

" + "message": "


\nNo Recorded Future data on @{body('Parse_JSON_-_Url')?['url']}
\nRequest Data Collection In The Recorded Future Portal

" }, "host": { "connection": { @@ -2008,13 +1327,30 @@ "path": "/Incidents/Comment" }, "runAfter": { - "Add_comment_to_incident_(V3)_-_Hash": [ - "SKIPPED" + "Add_comment_to_incident_(V3)_-_URL": [ + "Skipped" ] }, "type": "ApiConnection" }, - "Hash_Enrichment": { + "Parse_JSON_-_Url": { + "inputs": { + "content": "@body('Parse_JSON_2')?['properties']", + "schema": { + "properties": { + "friendlyName": { + "type": "string" + }, + "url": { + "type": "string" + } + }, + "type": "object" + } + }, + "type": "ParseJson" + }, + "URL_Enrichment": { "inputs": { "host": { "connection": { @@ -2022,164 +1358,33 @@ } }, "method": "get", - "path": "/lookup/hash/@{encodeURIComponent(body('Parse_JSON_-_File_Hash')?['hashValue'])}", + "path": "/lookup/url/@{encodeURIComponent(body('Parse_JSON_-_Url')?['url'])}", "queries": { "IntelligenceCloud": "@parameters('IntelligenceCloud')", "RFIncidentId": "@variables('RFIncidentId')", "Techniques": "@string(triggerBody()?['object']?['properties']?['additionalData']?['techniques'])", "WorkspaceId": "@triggerBody()?['workspaceInfo']?['WorkspaceName']", - "fields": "intelCard,risk,links" + "fields": "intelCard,risk,links", + "htmlresponse": "True" } }, "runAfter": { - "Parse_JSON_-_File_Hash": [ + "Parse_JSON_-_Url": [ "Succeeded" ] }, "type": "ApiConnection" - }, - "Hash_Evidence_Details_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Risk_Rules", - "value": "@item()?['rule']" - }, - { - "header": "Severity", - "value": "@item()?['criticalityLabel']" - }, - { - "header": "Evidence_Details", - "value": "@item()?['evidenceString']" - } - ], - "format": "HTML", - "from": "@body('Hash_Enrichment')?['data']?['risk']?['evidenceDetails']" - }, - "runAfter": { - "Hash_Enrichment": [ - "Succeeded" - ] - }, - "type": "Table" - }, - "Hash_Research_Links_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Entity", - "value": "@replace(item()?['name'],'.','[.]')" - }, - { - "header": "Entity_Type", - "value": "@item()?['type']" - }, - { - "header": "Category", - "value": "@item()?['category']" - }, - { - "header": "Risk_Score", - "value": "@item()?['score']" - } - ], - "format": "HTML", - "from": "@if(empty(body('Hash_Enrichment')?['data']?['links']?['research']),variables('EmptyArray'),body('Hash_Enrichment')?['data']?['links']?['research']?['entities'])" - }, - "runAfter": { - "Hash_Evidence_Details_HTML_table": [ - "Succeeded" - ] - }, - "type": "Table" - }, - "Hash_Technical_Links_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Entity", - "value": "@replace(item()?['name'],'.','[.]')" - }, - { - "header": "Entity_Type", - "value": "@item()?['type']" - }, - { - "header": "Category", - "value": "@item()?['category']" - }, - { - "header": "Risk_Score", - "value": "@item()?['score']" - } - ], - "format": "HTML", - "from": "@if(empty(body('Hash_Enrichment')?['data']?['links']?['technical']),variables('EmptyArray'),body('Hash_Enrichment')?['data']?['links']?['technical']?['entities'])" - }, - "runAfter": { - "Hash_Research_Links_HTML_table": [ - "Succeeded" - ] - }, - "type": "Table" - }, - "Hash_Observed_ioc_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Timestamp", - "value": "@item()?['timestamp']" - }, - { - "header": "Integration_Type", - "value": "@item()?['integration_type']" - }, - { - "header": "Instance_Id", - "value": "@item()?['integration_instance_id']" - } - ], - "format": "HTML", - "from": "@if(empty(body('Hash_Enrichment')?['observed_iocs_history']),variables('EmptyArray'),body('Hash_Enrichment')?['observed_iocs_history'])" - }, - "runAfter": { - "Hash_Technical_Links_HTML_table": [ - "Succeeded" - ] - }, - "type": "Table" - }, - "Parse_JSON_-_File_Hash": { - "inputs": { - "content": "@body('Parse_JSON_2')?['properties']", - "schema": { - "properties": { - "algorithm": { - "type": "string" - }, - "friendlyName": { - "type": "string" - }, - "hashValue": { - "type": "string" - } - }, - "type": "object" - } - }, - "type": "ParseJson" } }, - "case": "FileHash" + "case": "Url" }, - "Case_3": { + "Case_4": { "actions": { - "Add_comment_to_incident_(V3)_-_URL": { + "Add_comment_to_incident_(V3)": { "inputs": { "body": { "incidentArmId": "@triggerBody()?['object']?['id']", - "message": "


\nEnriched URL: @{replace(body('Parse_JSON_-_Url')?['url'], '.', '[.]')}
\nRisk Score: @{body('URL_Enrichment')?['data']?['risk']?['score']} of 99@{concat('


')}
\nInfrastructure Detections: @{body('Url_Observed_ioc_HTML_table')}
\nRisk Rules: @{body('URL_Evidence_Details_HTML_table')}
\nTechnical Links: @{body('URL_Technical_Links_HTML_table')}
\nResearch Links: @{body('URL_Research_Links_HTML_table')}

" + "message": "


\nNo Recorded Future data on @{body('Parse_JSON_-_Ip')?['address']}
\nRequest Data Collection In The Recorded Future Portal

" }, "host": { "connection": { @@ -2190,17 +1395,17 @@ "path": "/Incidents/Comment" }, "runAfter": { - "Url_Observed_ioc_HTML_table": [ - "Succeeded" + "Add_comment_to_incident_(V3)_-_IP": [ + "Skipped" ] }, "type": "ApiConnection" }, - "Add_comment_to_incident_(V3)_2": { + "Add_comment_to_incident_(V3)_-_IP": { "inputs": { "body": { "incidentArmId": "@triggerBody()?['object']?['id']", - "message": "


\nNo Recorded Future data on @{body('Parse_JSON_-_Url')?['url']}
\nRequest Data Collection In The Recorded Future Portal

" + "message": "

@{body('IP_Enrichment')?['data']?['html_response']}

" }, "host": { "connection": { @@ -2211,30 +1416,13 @@ "path": "/Incidents/Comment" }, "runAfter": { - "Add_comment_to_incident_(V3)_-_URL": [ - "SKIPPED" + "IP_Enrichment": [ + "Succeeded" ] }, "type": "ApiConnection" }, - "Parse_JSON_-_Url": { - "inputs": { - "content": "@body('Parse_JSON_2')?['properties']", - "schema": { - "properties": { - "friendlyName": { - "type": "string" - }, - "url": { - "type": "string" - } - }, - "type": "object" - } - }, - "type": "ParseJson" - }, - "URL_Enrichment": { + "IP_Enrichment": { "inputs": { "host": { "connection": { @@ -2242,463 +1430,2947 @@ } }, "method": "get", - "path": "/lookup/url/@{encodeURIComponent(body('Parse_JSON_-_Url')?['url'])}", + "path": "/lookup/ip/@{encodeURIComponent(body('Parse_JSON_-_Ip')?['address'])}", "queries": { "IntelligenceCloud": "@parameters('IntelligenceCloud')", "RFIncidentId": "@variables('RFIncidentId')", "Techniques": "@string(triggerBody()?['object']?['properties']?['additionalData']?['techniques'])", "WorkspaceId": "@triggerBody()?['workspaceInfo']?['WorkspaceName']", - "fields": "intelCard,risk,links" + "fields": "intelCard,risk,links", + "htmlresponse": "True" } }, "runAfter": { - "Parse_JSON_-_Url": [ + "Parse_JSON_-_Ip": [ "Succeeded" ] }, "type": "ApiConnection" }, - "URL_Evidence_Details_HTML_table": { + "Parse_JSON_-_Ip": { "inputs": { - "columns": [ - { - "header": "Risk_Rules", - "value": "@item()?['rule']" - }, - { - "header": "Severity", - "value": "@item()?['criticalityLabel']" + "content": "@body('Parse_JSON_2')?['properties']", + "schema": { + "properties": { + "address": { + "type": "string" + }, + "friendlyName": { + "type": "string" + } }, - { - "header": "Evidence_Details", - "value": "@item()?['evidenceString']" - } - ], - "format": "HTML", - "from": "@body('URL_Enrichment')?['data']?['risk']?['evidenceDetails']" - }, - "runAfter": { - "URL_Enrichment": [ - "Succeeded" - ] + "type": "object" + } }, - "type": "Table" - }, - "URL_Research_Links_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Entity", - "value": "@replace(item()?['name'],'.','[.]')" - }, - { - "header": "Entity_Type", - "value": "@item()?['type']" - }, - { - "header": "Category", - "value": "@item()?['category']" - }, - { - "header": "Risk_Score", - "value": "@item()?['score']" - } - ], - "format": "HTML", - "from": "@if(empty(body('URL_Enrichment')?['data']?['links']?['research']),variables('EmptyArray'),body('URL_Enrichment')?['data']?['links']?['research']?['entities'])" - }, - "runAfter": { - "URL_Technical_Links_HTML_table": [ - "Succeeded" + "type": "ParseJson" + } + }, + "case": "Ip" + } + }, + "expression": "@body('Parse_JSON_2')?['kind']", + "runAfter": { + "Parse_JSON_2": [ + "Succeeded" + ] + }, + "type": "Switch" + } + }, + "foreach": "@triggerBody()?['object']?['properties']?['relatedEntities']", + "runAfter": { + "RFIncidentId": [ + "Succeeded" + ] + }, + "type": "Foreach" + }, + "RFIncidentId": { + "inputs": { + "variables": [ + { + "name": "RFIncidentId", + "type": "string", + "value": "@{guid()}" + } + ] + }, + "type": "InitializeVariable" + } + }, + "contentVersion": "1.0.0.0", + "parameters": { + "IntelligenceCloud": { + "defaultValue": true, + "type": "Bool" + }, + "$connections": { + "type": "Object" + } + }, + "triggers": { + "When_Azure_Sentinel_incident_creation_rule_was_triggered": { + "inputs": { + "body": { + "callback_url": "@{listCallbackUrl()}" + }, + "host": { + "connection": { + "name": "@parameters('$connections')['azuresentinel']['connectionId']" + } + }, + "path": "/incident-creation" + }, + "type": "ApiConnectionWebhook" + } + } + }, + "parameters": { + "$connections": { + "value": { + "azuresentinel": { + "id": "[[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/',variables('workspace-location-inline'),'/managedApis/azuresentinel')]", + "connectionId": "[[resourceId('Microsoft.Web/connections', variables('AzureSentinelConnectionName'))]", + "connectionName": "[[variables('AzureSentinelConnectionName')]" + }, + "recordedfuture": { + "id": "[[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/',variables('workspace-location-inline'),'/managedApis/recordedfuturev2')]", + "connectionId": "[[resourceId('Microsoft.Web/connections', variables('RecordedFutureConnectionName'))]", + "connectionName": "[[variables('RecordedFutureConnectionName')]" + } + } + } + } + } + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "name": "[[variables('RecordedFutureConnectionName')]", + "location": "[[variables('workspace-location-inline')]", + "properties": { + "api": { + "id": "[[variables('_connection-2')]" + } + } + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "name": "[[variables('AzureSentinelConnectionName')]", + "location": "[[variables('workspace-location-inline')]", + "properties": { + "api": { + "id": "[[variables('_connection-3')]" + } + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", + "apiVersion": "2022-01-01-preview", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Playbook-', last(split(variables('playbookId1'),'/'))))]", + "properties": { + "parentId": "[variables('playbookId1')]", + "contentId": "[variables('_playbookContentId1')]", + "kind": "Playbook", + "version": "[variables('playbookVersion1')]", + "source": { + "kind": "Solution", + "name": "Recorded Future", + "sourceId": "[variables('_solutionId')]" + }, + "author": { + "name": "Recorded Future Premier Integrations", + "email": "[variables('_email')]" + }, + "support": { + "name": "Recorded Future Support Team", + "email": "support@recordedfuture.com", + "tier": "Partner", + "link": "http://support.recordedfuture.com/" + } + } + } + ], + "metadata": { + "title": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash", + "description": "This playbook leverages the Recorded Future API to enrich IP, Domain, Url & Hash indicators, found in Microsoft Sentinel incidents, with the following context: Risk Score, Risk Rules and Link to Intelligence Card. The enrichment content will be posted as a comment in the Microsoft Sentinel incident \"Microsoft.", + "prerequisites": [ + "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials" + ], + "postDeployment": [ + "After deployment open the playbook in edit mode and configure/authorize all connections and press save.\"Logic" + ], + "lastUpdateTime": "2023-03-08T00:00:00Z", + "entities": [ + "ip", + "url", + "dnsresolution", + "filehash" + ], + "tags": [ + "Enrichment" + ], + "releaseNotes": [ + { + "version": "1.0", + "title": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash", + "notes": [ + "Initial version" + ] + }, + { + "version": "1.1", + "title": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash", + "notes": [ + "Improved layout and added Recorded Future Collective Insights." + ] + }, + { + "version": "1.2", + "title": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash", + "notes": [ + "Fixed risk rule severity and correct image url." + ] + }, + { + "version": "2.3", + "title": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash", + "notes": [ + "Updated readme and improved layout." + ] + }, + { + "version": "2.4", + "title": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash", + "notes": [ + "Handle 404 result from enrichment." + ] + }, + { + "version": "2.5", + "title": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash", + "notes": [ + "Backend rendered markdown/html to increse performance and reduce cost of enrichment." + ] + } + ] + } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_playbookContentId1')]", + "contentKind": "Playbook", + "displayName": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash", + "contentProductId": "[variables('_playbookcontentProductId1')]", + "id": "[variables('_playbookcontentProductId1')]", + "version": "[variables('playbookVersion1')]" + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", + "name": "[variables('playbookTemplateSpecName2')]", + "location": "[parameters('workspace-location')]", + "dependsOn": [ + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" + ], + "properties": { + "description": "RecordedFuture-Sandbox_Enrichment-Url Playbook with template version 3.0.0", + "mainTemplate": { + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "[variables('playbookVersion2')]", + "parameters": { + "PlaybookName": { + "defaultValue": "RecordedFuture-Sandbox_Enrichment-Url", + "type": "string" + }, + "Sandbox API Key": { + "type": "string", + "metadata": { + "description": "Enter value for Sandbox API Key. Retrive API Key from [Recorded Future Portal](https://sandbox.recordedfuture.com/account)" + } + } + }, + "variables": { + "RecordedfutureConnectionName": "[[concat('', parameters('PlaybookName'))]", + "MicrosoftSentinelConnectionName": "[[concat('MicrosoftSentinel-', parameters('PlaybookName'))]", + "connection-2": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/recordedfuturesandbo')]", + "_connection-2": "[[variables('connection-2')]", + "connection-3": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/Azuresentinel')]", + "_connection-3": "[[variables('connection-3')]", + "workspace-location-inline": "[concat('[resourceGroup().locatio', 'n]')]", + "workspace-name": "[parameters('workspace')]", + "workspaceResourceId": "[[resourceId('microsoft.OperationalInsights/Workspaces', variables('workspace-name'))]" + }, + "resources": [ + { + "properties": { + "provisioningState": "Succeeded", + "state": "Enabled", + "definition": { + "$schema": "https://schema.management.azure.com/providers/Microsoft.Logic/schemas/2016-06-01/workflowdefinition.json#", + "contentVersion": "1.0.0.0", + "parameters": { + "$connections": { + "type": "Object" + }, + "Sandbox API Key": { + "defaultValue": "[[parameters('Sandbox API Key')]", + "type": "string" + } + }, + "triggers": { + "Microsoft_Sentinel_incident": { + "type": "ApiConnectionWebhook", + "inputs": { + "body": { + "callback_url": "@{listCallbackUrl()}" + }, + "host": { + "connection": { + "name": "@parameters('$connections')['azuresentinel']['connectionId']" + } + }, + "path": "/incident-creation" + } + } + }, + "actions": { + "Entities_-_Get_URLs": { + "type": "ApiConnection", + "inputs": { + "body": "@triggerBody()?['object']?['properties']?['relatedEntities']", + "host": { + "connection": { + "name": "@parameters('$connections')['azuresentinel']['connectionId']" + } + }, + "method": "post", + "path": "/entities/url" + } + }, + "For_each": { + "foreach": "@body('Entities_-_Get_URLs')?['URLs']", + "actions": { + "Add_comment_to_incident_(V3)": { + "runAfter": { + "Get_the_full_report": [ + "Succeeded" + ] + }, + "type": "ApiConnection", + "inputs": { + "body": { + "incidentArmId": "@triggerBody()?['object']?['id']", + "message": "

@{body('Get_the_full_report')?['html_report']}

" + }, + "host": { + "connection": { + "name": "@parameters('$connections')['azuresentinel']['connectionId']" + } + }, + "method": "post", + "path": "/Incidents/Comment" + } + }, + "Get_the_full_report": { + "runAfter": { + "Wait_for_sandbox_report": [ + "Succeeded" + ] + }, + "type": "ApiConnection", + "inputs": { + "headers": { + "SandboxToken": "@parameters('Sandbox API Key')" + }, + "host": { + "connection": { + "name": "@parameters('$connections')['recordedfuturesandbo']['connectionId']" + } + }, + "method": "get", + "path": "/samples/@{encodeURIComponent(body('Get_the_full_summary')?['id'])}/overview.json" + } + }, + "Initialize_Sandbox_status": { + "runAfter": { + "Submit_url_samples": [ + "Succeeded" + ] + }, + "type": "SetVariable", + "inputs": { + "name": "sandbox_status", + "value": "@body('Submit_url_samples')?['status']" + } + }, + "Submit_url_samples": { + "type": "ApiConnection", + "inputs": { + "body": { + "url": "@items('For_each')?['Url']" + }, + "headers": { + "Content-Type": "application/json", + "SandboxToken": "@parameters('Sandbox API Key')" + }, + "host": { + "connection": { + "name": "@parameters('$connections')['recordedfuturesandbo']['connectionId']" + } + }, + "method": "post", + "path": "/samples/url" + } + }, + "Wait_for_sandbox_report": { + "actions": { + "Delay": { + "runAfter": { + "Set_sandbox_status": [ + "Succeeded" + ] + }, + "type": "Wait", + "inputs": { + "interval": { + "count": 2, + "unit": "Minute" + } + } + }, + "Get_the_full_summary": { + "type": "ApiConnection", + "inputs": { + "headers": { + "SandboxToken": "@parameters('Sandbox API Key')" + }, + "host": { + "connection": { + "name": "@parameters('$connections')['recordedfuturesandbo']['connectionId']" + } + }, + "method": "get", + "path": "/samples/@{encodeURIComponent(body('Submit_url_samples')?['id'])}" + } + }, + "Set_sandbox_status": { + "runAfter": { + "Get_the_full_summary": [ + "Succeeded" + ] + }, + "type": "SetVariable", + "inputs": { + "name": "sandbox_status", + "value": "@body('Get_the_full_summary')?['status']" + } + } + }, + "runAfter": { + "Initialize_Sandbox_status": [ + "Succeeded" + ] + }, + "expression": "@equals(variables('sandbox_status'), 'reported')", + "limit": { + "count": 60, + "timeout": "PT1H" + }, + "type": "Until" + } + }, + "runAfter": { + "Define_sandbox_status": [ + "Succeeded" + ] + }, + "type": "Foreach" + }, + "Define_sandbox_status": { + "runAfter": { + "Entities_-_Get_URLs": [ + "Succeeded" + ] + }, + "type": "InitializeVariable", + "inputs": { + "variables": [ + { + "name": "sandbox_status", + "type": "string" + } + ] + } + } + } + }, + "parameters": { + "$connections": { + "value": { + "azuresentinel": { + "connectionId": "[[resourceId('Microsoft.Web/connections', variables('MicrosoftSentinelConnectionName'))]", + "connectionName": "[[variables('MicrosoftSentinelConnectionName')]", + "id": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/Azuresentinel')]", + "connectionProperties": { + "authentication": { + "type": "ManagedServiceIdentity" + } + } + }, + "recordedfuturesandbo": { + "connectionId": "[[resourceId('Microsoft.Web/connections', variables('RecordedfutureConnectionName'))]", + "connectionName": "recordedfuturesandbo", + "id": "[[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/recordedfuturesandbo')]" + } + } + } + } + }, + "name": "[[parameters('PlaybookName')]", + "type": "Microsoft.Logic/workflows", + "location": "[[variables('workspace-location-inline')]", + "identity": { + "type": "SystemAssigned" + }, + "tags": { + "hidden-SentinelTemplateName": "RecordedFuture-Sandbox_Enrichment-Url", + "hidden-SentinelTemplateVersion": "1.0", + "hidden-SentinelWorkspaceId": "[[variables('workspaceResourceId')]" + }, + "apiVersion": "2017-07-01", + "dependsOn": [ + "[[resourceId('Microsoft.Web/connections', variables('MicrosoftSentinelConnectionName'))]", + "[[resourceId('Microsoft.Web/connections', variables('RecordedfutureConnectionName'))]" + ] + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "name": "[[variables('RecordedfutureConnectionName')]", + "location": "[[variables('workspace-location-inline')]", + "kind": "V1", + "properties": { + "displayName": "[[variables('RecordedfutureConnectionName')]", + "api": { + "id": "[[variables('_connection-2')]" + } + } + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "name": "[[variables('MicrosoftSentinelConnectionName')]", + "location": "[[variables('workspace-location-inline')]", + "kind": "V1", + "properties": { + "displayName": "[[variables('MicrosoftSentinelConnectionName')]", + "parameterValueType": "Alternative", + "api": { + "id": "[[variables('_connection-3')]" + } + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", + "apiVersion": "2022-01-01-preview", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Playbook-', last(split(variables('playbookId2'),'/'))))]", + "properties": { + "parentId": "[variables('playbookId2')]", + "contentId": "[variables('_playbookContentId2')]", + "kind": "Playbook", + "version": "[variables('playbookVersion2')]", + "source": { + "kind": "Solution", + "name": "Recorded Future", + "sourceId": "[variables('_solutionId')]" + }, + "author": { + "name": "Recorded Future Premier Integrations", + "email": "[variables('_email')]" + }, + "support": { + "name": "Recorded Future Support Team", + "email": "support@recordedfuture.com", + "tier": "Partner", + "link": "http://support.recordedfuture.com/" + } + } + } + ], + "metadata": { + "title": "RecordedFuture-Sandbox_Enrichment-Url", + "description": "This playbook will enrich url entities in an incident and send them to Recorded Future Sandbox. The result will be written as a incident comment.", + "prerequisites": "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials", + "postDeployment": [ + "After deployment you have to open the playbook to configure all connections and press save." + ], + "lastUpdateTime": "2023-03-24T00:00:00Z", + "entities": [ + "url" + ], + "tags": [ + "Enrichment" + ], + "releaseNotes": [ + { + "version": "1.0", + "title": "RecordedFuture-Sandbox_Enrichment-Url", + "notes": [ + "Initial version" + ] + } + ] + } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_playbookContentId2')]", + "contentKind": "Playbook", + "displayName": "RecordedFuture-Sandbox_Enrichment-Url", + "contentProductId": "[variables('_playbookcontentProductId2')]", + "id": "[variables('_playbookcontentProductId2')]", + "version": "[variables('playbookVersion2')]" + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", + "name": "[variables('playbookTemplateSpecName3')]", + "location": "[parameters('workspace-location')]", + "dependsOn": [ + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" + ], + "properties": { + "description": "RecordedFuture-Playbook-Alert-Importer Playbook with template version 3.0.0", + "mainTemplate": { + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "[variables('playbookVersion3')]", + "parameters": { + "PlaybookName": { + "defaultValue": "RecordedFuture-Playbook-Alert-Importer", + "type": "string" + } + }, + "variables": { + "AzureloganalyticsdatacollectorConnectionName": "[[concat('Azureloganalyticsdatacollector-', parameters('PlaybookName'))]", + "RecordedFutureConnectionName": "recordedfuture-connectorv2", + "connection-2": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/Azureloganalyticsdatacollector')]", + "_connection-2": "[[variables('connection-2')]", + "connection-3": "[[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/',variables('workspace-location-inline'),'/managedApis/recordedfuturev2')]", + "_connection-3": "[[variables('connection-3')]", + "workspace-location-inline": "[concat('[resourceGroup().locatio', 'n]')]", + "workspace-name": "[parameters('workspace')]", + "workspaceResourceId": "[[resourceId('microsoft.OperationalInsights/Workspaces', variables('workspace-name'))]" + }, + "resources": [ + { + "properties": { + "provisioningState": "Succeeded", + "state": "Enabled", + "definition": { + "$schema": "https://schema.management.azure.com/providers/Microsoft.Logic/schemas/2016-06-01/workflowdefinition.json#", + "contentVersion": "1.0.0.0", + "parameters": { + "$connections": { + "type": "Object" + } + }, + "triggers": { + "Recurrence": { + "recurrence": { + "frequency": "Hour", + "interval": 1 + }, + "evaluatedRecurrence": { + "frequency": "Hour", + "interval": 1 + }, + "type": "Recurrence" + } + }, + "actions": { + "For_each": { + "foreach": "@body('Search_Playbook_Alerts')", + "actions": { + "Get_Playbook_Alert_by_ID": { + "type": "ApiConnection", + "inputs": { + "host": { + "connection": { + "name": "@parameters('$connections')['recordedfuturev2']['connectionId']" + } + }, + "method": "get", + "path": "/playbook-alert/@{encodeURIComponent(items('For_each')?['playbook_alert_id'])}" + } + }, + "Send_Data": { + "runAfter": { + "Get_Playbook_Alert_by_ID": [ + "Succeeded" + ] + }, + "type": "ApiConnection", + "inputs": { + "body": "{\n\"title\": \"@{body('Get_Playbook_Alert_by_ID')?['title']}\",\n\"id\": \"@{body('Get_Playbook_Alert_by_ID')?['id']}\",\n\"category\":\"@{body('Get_Playbook_Alert_by_ID')?['category']}\",\n\"rule_label\":\"@{body('Get_Playbook_Alert_by_ID')?['rule_label']}\",\n\"status\": \"@{body('Get_Playbook_Alert_by_ID')?['status']}\", \n\"priority\": \"@{body('Get_Playbook_Alert_by_ID')?['priority']}\",\n\"created_date\": \"@{body('Get_Playbook_Alert_by_ID')?['created_date']}\",\n\"updated_date\": \"@{body('Get_Playbook_Alert_by_ID')?['updated_date']}\",\n\"targets\":\"@{body('Get_Playbook_Alert_by_ID')?['targets']}\",\n\"evidence_summary\": \"@{body('Get_Playbook_Alert_by_ID')?['evidence_summary']}\",\n\"link\": \"@{body('Get_Playbook_Alert_by_ID')?['link']}\"\n}", + "headers": { + "Log-Type": "RecordedFuturePlaybookAlerts" + }, + "host": { + "connection": { + "name": "@parameters('$connections')['azureloganalyticsdatacollector']['connectionId']" + } + }, + "method": "post", + "path": "/api/logs" + } + } + }, + "runAfter": { + "Search_Playbook_Alerts": [ + "Succeeded" + ] + }, + "type": "Foreach" + }, + "Search_Playbook_Alerts": { + "type": "ApiConnection", + "inputs": { + "body": { + "categories": [ + "domain_abuse", + "cyber_vulnerability", + "code_repo_leakage" + ], + "created_from_relative": "-1" + }, + "host": { + "connection": { + "name": "@parameters('$connections')['recordedfuturev2']['connectionId']" + } + }, + "method": "post", + "path": "/playbook-alert/search" + } + } + } + }, + "parameters": { + "$connections": { + "value": { + "azureloganalyticsdatacollector": { + "connectionId": "[[resourceId('Microsoft.Web/connections', variables('AzureloganalyticsdatacollectorConnectionName'))]", + "connectionName": "[[variables('AzureloganalyticsdatacollectorConnectionName')]", + "id": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/Azureloganalyticsdatacollector')]" + }, + "recordedfuturev2": { + "id": "[[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/',variables('workspace-location-inline'),'/managedApis/recordedfuturev2')]", + "connectionId": "[[resourceId('Microsoft.Web/connections', variables('RecordedFutureConnectionName'))]", + "connectionName": "[[variables('RecordedFutureConnectionName')]" + } + } + } + } + }, + "name": "[[parameters('PlaybookName')]", + "type": "Microsoft.Logic/workflows", + "location": "[[variables('workspace-location-inline')]", + "tags": { + "hidden-SentinelTemplateName": "PlaybookAlert-Import", + "hidden-SentinelTemplateVersion": "1.0", + "hidden-SentinelWorkspaceId": "[[variables('workspaceResourceId')]" + }, + "identity": { + "type": "SystemAssigned" + }, + "apiVersion": "2017-07-01", + "dependsOn": [ + "[[resourceId('Microsoft.Web/connections', variables('AzureloganalyticsdatacollectorConnectionName'))]", + "[[resourceId('Microsoft.Web/connections', variables('RecordedFutureConnectionName'))]" + ] + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "name": "[[variables('AzureloganalyticsdatacollectorConnectionName')]", + "location": "[[variables('workspace-location-inline')]", + "kind": "V1", + "properties": { + "displayName": "[[variables('AzureloganalyticsdatacollectorConnectionName')]", + "api": { + "id": "[[variables('_connection-2')]" + } + } + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "name": "[[variables('RecordedFutureConnectionName')]", + "location": "[[variables('workspace-location-inline')]", + "properties": { + "api": { + "id": "[[variables('_connection-3')]" + } + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", + "apiVersion": "2022-01-01-preview", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Playbook-', last(split(variables('playbookId3'),'/'))))]", + "properties": { + "parentId": "[variables('playbookId3')]", + "contentId": "[variables('_playbookContentId3')]", + "kind": "Playbook", + "version": "[variables('playbookVersion3')]", + "source": { + "kind": "Solution", + "name": "Recorded Future", + "sourceId": "[variables('_solutionId')]" + }, + "author": { + "name": "Recorded Future Premier Integrations", + "email": "[variables('_email')]" + }, + "support": { + "name": "Recorded Future Support Team", + "email": "support@recordedfuture.com", + "tier": "Partner", + "link": "http://support.recordedfuture.com/" + } + } + } + ], + "metadata": { + "title": "RecordedFuture-Playbook-Alert-Importer", + "description": "This playbook imports alerts from Recorded Future and stores them in a custom log in the log analytics workspace.", + "prerequisites": [ + "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials" + ], + "postDeployment": [ + "After deployment, open the playbook to configure all connections and press save." + ], + "lastUpdateTime": "2023-07-06T00:00:00Z", + "tags": [ + "Alert" + ], + "releaseNotes": [ + { + "version": "1.0", + "title": "RecordedFuture-Playbook-Alert-Importer", + "notes": [ + "Initial version" + ] + } + ] + } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_playbookContentId3')]", + "contentKind": "Playbook", + "displayName": "RecordedFuture-Playbook-Alert-Importer", + "contentProductId": "[variables('_playbookcontentProductId3')]", + "id": "[variables('_playbookcontentProductId3')]", + "version": "[variables('playbookVersion3')]" + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", + "name": "[variables('playbookTemplateSpecName4')]", + "location": "[parameters('workspace-location')]", + "dependsOn": [ + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" + ], + "properties": { + "description": "RecordedFuture-AlertImporter Playbook with template version 3.0.0", + "mainTemplate": { + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "[variables('playbookVersion4')]", + "parameters": { + "PlaybookName": { + "defaultValue": "RecordedFuture-AlertImporter", + "type": "string" + }, + "create_incident": { + "type": "string", + "metadata": { + "description": "Create Microsoft Sentinel incidents (possible values true/false)" + } + }, + "workspace_name": { + "type": "string", + "defaultValue": "", + "metadata": { + "description": "Microsoft Sentinel Workspace name" + } + } + }, + "variables": { + "AzureloganalyticsdatacollectorConnectionName": "[[concat('Azureloganalyticsdatacollector-', parameters('PlaybookName'))]", + "AzuremonitorlogsConnectionName": "[[concat('Azuremonitorlogs-', parameters('PlaybookName'))]", + "MicrosoftSentinelConnectionName": "[[concat('MicrosoftSentinel-', parameters('PlaybookName'))]", + "Recordedfuturev2ConnectionName": "[[concat('Recordedfuturev2-', parameters('PlaybookName'))]", + "connection-2": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/Azureloganalyticsdatacollector')]", + "_connection-2": "[[variables('connection-2')]", + "connection-3": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/Azuremonitorlogs')]", + "_connection-3": "[[variables('connection-3')]", + "connection-4": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/Azuresentinel')]", + "_connection-4": "[[variables('connection-4')]", + "connection-5": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/Recordedfuturev2')]", + "_connection-5": "[[variables('connection-5')]", + "workspace-location-inline": "[concat('[resourceGroup().locatio', 'n]')]", + "workspace-name": "[parameters('workspace')]", + "workspaceResourceId": "[[resourceId('microsoft.OperationalInsights/Workspaces', variables('workspace-name'))]" + }, + "resources": [ + { + "properties": { + "provisioningState": "Succeeded", + "state": "Enabled", + "definition": { + "$schema": "https://schema.management.azure.com/providers/Microsoft.Logic/schemas/2016-06-01/workflowdefinition.json#", + "contentVersion": "1.0.0.0", + "parameters": { + "$connections": { + "type": "Object" + }, + "create_incident": { + "type": "string", + "defaultValue": "[[parameters('create_incident')]" + } + }, + "triggers": { + "Recurrence": { + "recurrence": { + "frequency": "Hour", + "interval": 1 + }, + "evaluatedRecurrence": { + "frequency": "Hour", + "interval": 1 + }, + "type": "Recurrence" + } + }, + "actions": { + "For_each_triggered_alert": { + "foreach": "@body('Search_Triggered_Alerts')?['data']", + "actions": { + "Create_incident_if_parameter_is_set": { + "actions": { + "Add_comment_to_incident_(V3)": { + "runAfter": { + "Parse_JSON_2": [ + "Succeeded" + ] + }, + "type": "ApiConnection", + "inputs": { + "body": { + "incidentArmId": "@body('Create_incident')?['id']", + "message": "

@{items('For_each_triggered_alert')?['title']}
\nAlert ID: @{items('For_each_triggered_alert')?['id']}
\nTriggered: @{items('For_each_triggered_alert')?['log']?['triggered']}
\n[Open Recorded Future portal](@{items('For_each_triggered_alert')?['url']?['portal']})
\nAI Summary: @{items('For_each_triggered_alert')?['ai_insights']?['text']}

" + }, + "host": { + "connection": { + "name": "@parameters('$connections')['azuresentinel']['connectionId']" + } + }, + "method": "post", + "path": "/Incidents/Comment" + } + }, + "Create_incident": { + "type": "ApiConnection", + "inputs": { + "body": { + "description": "**Recorded Future Alert**\n@{items('For_each_triggered_alert')?['title']}\nAlert ID: @{items('For_each_triggered_alert')?['id']}\nTriggered: @{items('For_each_triggered_alert')?['log']?['triggered']}\n[Open Recorded Future portal](@{items('For_each_triggered_alert')?['url']?['portal']})\nAI summary: @{items('For_each_triggered_alert')?['ai_insights']?['text']}", + "severity": "Medium", + "status": "New", + "tagsToAdd": { + "TagsToAdd": [ + { + "Tag": "Recorded Future Alert" + } ] }, - "type": "Table" + "title": "@items('For_each_triggered_alert')?['title']" }, - "URL_Technical_Links_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Entity", - "value": "@replace(item()?['name'],'.','[.]')" + "host": { + "connection": { + "name": "@parameters('$connections')['azuresentinel']['connectionId']" + } + }, + "method": "put", + "path": "[[concat('/Incidents/subscriptions/', subscription().subscriptionId,'/resourceGroups/',resourceGroup().name,'/workspaces/',parameters('workspace_name') ) ]" + } + }, + "Parse_JSON_2": { + "runAfter": { + "Create_incident": [ + "Succeeded" + ] + }, + "type": "ParseJson", + "inputs": { + "content": "@items('For_each_triggered_alert')?['hits']", + "schema": { + "items": { + "properties": { + "document": { + "properties": { + "authors": { + "type": "array" + }, + "source": { + "properties": { + "id": { + "type": "string" + }, + "name": { + "type": "string" + }, + "type": { + "type": "string" + } + }, + "type": "object" + }, + "title": { + "type": [ + "string", + "null" + ] + } + }, + "type": "object" }, - { - "header": "Entity_Type", - "value": "@item()?['type']" + "entities": { + "items": { + "properties": { + "id": { + "type": "string" + }, + "name": { + "type": "string" + }, + "type": { + "type": "string" + } + }, + "required": [ + "id", + "name", + "type" + ], + "type": "object" + }, + "type": "array" + }, + "fragment": { + "type": "string" + }, + "id": { + "type": "string" + }, + "language": { + "type": "string" + } + }, + "required": [ + "entities", + "document", + "fragment", + "id", + "language", + "primary_entity", + "analyst_note" + ], + "type": "object" + }, + "type": "array" + } + } + } + }, + "runAfter": { + "For_each_hit": [ + "Succeeded" + ] + }, + "expression": { + "and": [ + { + "equals": [ + "@parameters('create_incident')", + "true" + ] + } + ] + }, + "type": "If" + }, + "For_each_hit": { + "foreach": "@items('For_each_triggered_alert')['hits']", + "actions": { + "Parse_JSON": { + "type": "ParseJson", + "inputs": { + "content": "@items('For_each_hit')", + "schema": { + "properties": { + "document": { + "properties": { + "authors": { + "items": { + "properties": { + "id": { + "type": "string" + }, + "name": { + "type": "string" + }, + "type": { + "type": "string" + } + }, + "required": [ + "id", + "name", + "type" + ], + "type": "object" + }, + "type": "array" + }, + "source": { + "properties": { + "id": { + "type": "string" + }, + "name": { + "type": "string" + }, + "type": { + "type": "string" + } + }, + "type": "object" + }, + "title": { + "type": [ + "string", + "null" + ] + } }, - { - "header": "Category", - "value": "@item()?['category']" + "type": "object" + }, + "entities": { + "items": { + "properties": { + "id": { + "type": "string" + }, + "name": { + "type": "string" + }, + "type": { + "type": "string" + } + }, + "required": [ + "id", + "name", + "type" + ], + "type": "object" }, - { - "header": "Risk_Score", - "value": "@item()?['score']" - } - ], - "format": "HTML", - "from": "@if(empty(body('URL_Enrichment')?['data']?['links']?['technical']),variables('EmptyArray'),body('URL_Enrichment')?['data']?['links']?['technical']?['entities'])" - }, - "runAfter": { - "URL_Evidence_Details_HTML_table": [ - "Succeeded" - ] + "type": "array" + }, + "fragment": { + "type": "string" + }, + "id": { + "type": "string" + }, + "language": { + "type": "string" + } }, - "type": "Table" + "type": "object" + } + } + }, + "Send_Data_2": { + "runAfter": { + "Parse_JSON": [ + "Succeeded" + ] + }, + "type": "ApiConnection", + "inputs": { + "body": "{\n\"RuleName\": \"@{items('For_each_triggered_alert')?['rule']?['name']}\",\n\"Triggered\": \"@{items('For_each_triggered_alert')?['log']?['triggered']}\",\n\"AlertName\": \"@{items('For_each_triggered_alert')?['title']}\",\n\"AlertID\": \"@{items('For_each_triggered_alert')?['id']}\", \n\"Entity\": @{items('For_each_hit')?['entities']},\n\"Documents\": @{items('For_each_hit')?['document']},\n\"URL\": \"@{items('For_each_triggered_alert')?['rule']?['url']?['portal']}\",\n\"Document_url\": \"@{items('For_each_hit')?['document']?['url']}\",\n\"AISummary\": \"@{items('For_each_triggered_alert')?['ai_insights']?['text']}\",\n\"Fragment\": \"@{replace(replace(body('Parse_JSON')?['fragment'], '\\', '\\\\'), '\"', '\\\"')}\"}", + "headers": { + "Log-Type": "RecordedFuturePortalAlerts" }, - "Url_Observed_ioc_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Timestamp", - "value": "@item()?['timestamp']" - }, - { - "header": "Integration_Type", - "value": "@item()?['integration_type']" + "host": { + "connection": { + "name": "@parameters('$connections')['azureloganalyticsdatacollector']['connectionId']" + } + }, + "method": "post", + "path": "/api/logs" + } + } + }, + "type": "Foreach" + } + }, + "runAfter": { + "Search_Triggered_Alerts": [ + "Succeeded" + ] + }, + "type": "Foreach" + }, + "Initialize_variable": { + "type": "InitializeVariable", + "inputs": { + "variables": [ + { + "name": "latest_event_date", + "type": "string", + "value": "@{addHours(utcNow(), -24)}" + } + ] + } + }, + "Run_query_and_list_results": { + "runAfter": { + "Initialize_variable": [ + "Succeeded" + ] + }, + "type": "ApiConnection", + "inputs": { + "body": "RecordedFuturePortalAlerts_CL\n| summarize LatestEvent=max(Triggered_t)", + "host": { + "connection": { + "name": "@parameters('$connections')['azuremonitorlogs_1']['connectionId']" + } + }, + "method": "post", + "path": "/queryData", + "queries": { + "resourcegroups": "[[resourceGroup().name]", + "resourcename": "[[parameters('workspace_name')]", + "resourcetype": "Log Analytics Workspace", + "subscriptions": "[[subscription().subscriptionId]", + "timerange": "Last 7 days" + } + } + }, + "Search_Triggered_Alerts": { + "runAfter": { + "Set_variable": [ + "Succeeded", + "Skipped" + ] + }, + "type": "ApiConnection", + "inputs": { + "host": { + "connection": { + "name": "@parameters('$connections')['recordedfuturev2']['connectionId']" + } + }, + "method": "get", + "path": "/v2/alerts", + "queries": { + "triggered": "[[@{addSeconds(variables('latest_event_date'),1)},@{utcNow()}]" + } + } + }, + "Set_variable": { + "runAfter": { + "Run_query_and_list_results": [ + "Succeeded" + ] + }, + "type": "SetVariable", + "inputs": { + "name": "latest_event_date", + "value": "@string(body('Run_query_and_list_results')?['value'][0]['LatestEvent'])" + } + } + } + }, + "parameters": { + "$connections": { + "value": { + "azureloganalyticsdatacollector": { + "connectionId": "[[resourceId('Microsoft.Web/connections', variables('AzureloganalyticsdatacollectorConnectionName'))]", + "connectionName": "[[variables('AzureloganalyticsdatacollectorConnectionName')]", + "id": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/Azureloganalyticsdatacollector')]" + }, + "azuremonitorlogs_1": { + "connectionId": "[[resourceId('Microsoft.Web/connections', variables('AzuremonitorlogsConnectionName'))]", + "connectionName": "[[variables('AzuremonitorlogsConnectionName')]", + "id": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/Azuremonitorlogs')]" + }, + "azuresentinel": { + "connectionId": "[[resourceId('Microsoft.Web/connections', variables('MicrosoftSentinelConnectionName'))]", + "connectionName": "[[variables('MicrosoftSentinelConnectionName')]", + "id": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/Azuresentinel')]", + "connectionProperties": { + "authentication": { + "type": "ManagedServiceIdentity" + } + } + }, + "recordedfuturev2": { + "connectionId": "[[resourceId('Microsoft.Web/connections', variables('Recordedfuturev2ConnectionName'))]", + "connectionName": "[[variables('Recordedfuturev2ConnectionName')]", + "id": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/Recordedfuturev2')]" + } + } + } + } + }, + "name": "[[parameters('PlaybookName')]", + "type": "Microsoft.Logic/workflows", + "location": "[[variables('workspace-location-inline')]", + "tags": { + "hidden-SentinelTemplateName": "RecordedFuture-AlertImporter", + "hidden-SentinelTemplateVersion": "1.0", + "hidden-SentinelWorkspaceId": "[[variables('workspaceResourceId')]" + }, + "identity": { + "type": "SystemAssigned" + }, + "apiVersion": "2017-07-01", + "dependsOn": [ + "[[resourceId('Microsoft.Web/connections', variables('AzureloganalyticsdatacollectorConnectionName'))]", + "[[resourceId('Microsoft.Web/connections', variables('AzuremonitorlogsConnectionName'))]", + "[[resourceId('Microsoft.Web/connections', variables('MicrosoftSentinelConnectionName'))]", + "[[resourceId('Microsoft.Web/connections', variables('Recordedfuturev2ConnectionName'))]" + ] + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "name": "[[variables('AzureloganalyticsdatacollectorConnectionName')]", + "location": "[[variables('workspace-location-inline')]", + "kind": "V1", + "properties": { + "displayName": "[[variables('AzureloganalyticsdatacollectorConnectionName')]", + "api": { + "id": "[[variables('_connection-2')]" + } + } + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "name": "[[variables('AzuremonitorlogsConnectionName')]", + "location": "[[variables('workspace-location-inline')]", + "kind": "V1", + "properties": { + "displayName": "[[variables('AzuremonitorlogsConnectionName')]", + "api": { + "id": "[[variables('_connection-3')]" + } + } + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "name": "[[variables('MicrosoftSentinelConnectionName')]", + "location": "[[variables('workspace-location-inline')]", + "kind": "V1", + "properties": { + "displayName": "[[variables('MicrosoftSentinelConnectionName')]", + "parameterValueType": "Alternative", + "api": { + "id": "[[variables('_connection-4')]" + } + } + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "name": "[[variables('Recordedfuturev2ConnectionName')]", + "location": "[[variables('workspace-location-inline')]", + "kind": "V1", + "properties": { + "displayName": "[[variables('Recordedfuturev2ConnectionName')]", + "api": { + "id": "[[variables('_connection-5')]" + } + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", + "apiVersion": "2022-01-01-preview", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Playbook-', last(split(variables('playbookId4'),'/'))))]", + "properties": { + "parentId": "[variables('playbookId4')]", + "contentId": "[variables('_playbookContentId4')]", + "kind": "Playbook", + "version": "[variables('playbookVersion4')]", + "source": { + "kind": "Solution", + "name": "Recorded Future", + "sourceId": "[variables('_solutionId')]" + }, + "author": { + "name": "Recorded Future Premier Integrations", + "email": "[variables('_email')]" + }, + "support": { + "name": "Recorded Future Support Team", + "email": "support@recordedfuture.com", + "tier": "Partner", + "link": "http://support.recordedfuture.com/" + } + } + } + ], + "metadata": { + "title": "RecordedFuture-Alert-Importer", + "description": "This playbook imports alerts from Recorded Future and stores them in a custom log in the log analytics workspace. It can create alerts dependant on the parameter: create_incident. ", + "prerequisites": [ + "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials" + ], + "postDeployment": [ + "After deployment, open the playbook to configure all connections and press save." + ], + "lastUpdateTime": "2023-09-13T00:00:00Z", + "tags": [ + "Alert" + ], + "releaseNotes": [ + { + "version": "1.0", + "title": "RecordedFuture-Alert-Importer", + "notes": [ + "Initial version" + ] + } + ] + } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_playbookContentId4')]", + "contentKind": "Playbook", + "displayName": "RecordedFuture-AlertImporter", + "contentProductId": "[variables('_playbookcontentProductId4')]", + "id": "[variables('_playbookcontentProductId4')]", + "version": "[variables('playbookVersion4')]" + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", + "name": "[variables('playbookTemplateSpecName5')]", + "location": "[parameters('workspace-location')]", + "dependsOn": [ + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" + ], + "properties": { + "description": "RecordedFuture-ThreatIntelligenceImport Playbook with template version 3.0.0", + "mainTemplate": { + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "[variables('playbookVersion5')]", + "parameters": { + "PlaybookName": { + "defaultValue": "RecordedFuture-ThreatIntelligenceImport", + "type": "string" + }, + "workspace": { + "type": "string", + "defaultValue": "", + "metadata": { + "description": "Microsoft Sentinel Workspace name" + } + } + }, + "variables": { + "MicrosoftSentinelConnectionName": "[[concat('MicrosoftSentinel-', parameters('PlaybookName'))]", + "connection-2": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/Azuresentinel')]", + "_connection-2": "[[variables('connection-2')]", + "workspace-location-inline": "[concat('[resourceGroup().locatio', 'n]')]", + "workspace-name": "[parameters('workspace')]", + "workspaceResourceId": "[[resourceId('microsoft.OperationalInsights/Workspaces', variables('workspace-name'))]" + }, + "resources": [ + { + "properties": { + "provisioningState": "Succeeded", + "state": "Enabled", + "definition": { + "$schema": "https://schema.management.azure.com/providers/Microsoft.Logic/schemas/2016-06-01/workflowdefinition.json#", + "contentVersion": "1.0.0.0", + "parameters": { + "$connections": { + "type": "Object" + } + }, + "triggers": { + "Batch_messages": { + "type": "Batch", + "inputs": { + "configurations": { + "RFImportToSentinel": { + "releaseCriteria": { + "messageCount": 100, + "recurrence": { + "frequency": "Minute", + "interval": 10 + } + } + } + }, + "mode": "Inline" + } + } + }, + "actions": { + "Compose": { + "runAfter": { + "Select": [ + "Succeeded" + ] + }, + "type": "Compose", + "inputs": { + "sourcesystem": "Recorded Future", + "value": "@body('Select')" + } + }, + "Select": { + "type": "Select", + "inputs": { + "from": "@triggerBody()['items']", + "select": "@item()['content']" + } + }, + "Threat_Intelligence_-_Upload_Indicators_of_Compromise_(Private_Preview)": { + "runAfter": { + "Compose": [ + "Succeeded" + ] + }, + "type": "ApiConnection", + "inputs": { + "body": "@outputs('Compose')", + "host": { + "connection": { + "name": "@parameters('$connections')['azuresentinel']['connectionId']" + } + }, + "method": "post", + "path": "[[concat('/ThreatIntelligence/', reference(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace'))).customerId,'/UploadIndicators')]" + } + } + } + }, + "parameters": { + "$connections": { + "value": { + "azuresentinel": { + "connectionId": "[[resourceId('Microsoft.Web/connections', variables('MicrosoftSentinelConnectionName'))]", + "connectionName": "[[variables('MicrosoftSentinelConnectionName')]", + "id": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/Azuresentinel')]", + "connectionProperties": { + "authentication": { + "type": "ManagedServiceIdentity" + } + } + } + } + } + } + }, + "name": "[[parameters('PlaybookName')]", + "type": "Microsoft.Logic/workflows", + "location": "[[variables('workspace-location-inline')]", + "identity": { + "type": "SystemAssigned" + }, + "apiVersion": "2017-07-01", + "tags": { + "hidden-SentinelTemplateName": "RecordedFuture-ThreatIntelligenceImport", + "hidden-SentinelTemplateVersion": "1.0", + "hidden-SentinelWorkspaceId": "[[variables('workspaceResourceId')]" + }, + "dependsOn": [ + "[[resourceId('Microsoft.Web/connections', variables('MicrosoftSentinelConnectionName'))]" + ] + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "name": "[[variables('MicrosoftSentinelConnectionName')]", + "location": "[[variables('workspace-location-inline')]", + "kind": "V1", + "properties": { + "displayName": "[[variables('MicrosoftSentinelConnectionName')]", + "parameterValueType": "Alternative", + "api": { + "id": "[[variables('_connection-2')]" + } + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", + "apiVersion": "2022-01-01-preview", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Playbook-', last(split(variables('playbookId5'),'/'))))]", + "properties": { + "parentId": "[variables('playbookId5')]", + "contentId": "[variables('_playbookContentId5')]", + "kind": "Playbook", + "version": "[variables('playbookVersion5')]", + "source": { + "kind": "Solution", + "name": "Recorded Future", + "sourceId": "[variables('_solutionId')]" + }, + "author": { + "name": "Recorded Future Premier Integrations", + "email": "[variables('_email')]" + }, + "support": { + "name": "Recorded Future Support Team", + "email": "support@recordedfuture.com", + "tier": "Partner", + "link": "http://support.recordedfuture.com/" + } + } + } + ], + "metadata": { + "title": "RecordedFuture-ThreatIntelligenceImport", + "description": "This playbook will write indicators in batch to ThreatIntelligenceIndicator log analytics table.", + "prerequisites": [ + "Microsoft Sentinel Threat Intelligence active" + ], + "postDeployment": [ + "After deployment, open the playbook to configure all connections and press save." + ], + "lastUpdateTime": "2023-07-06T00:00:00Z", + "tags": [ + "Threat Intelligence" + ], + "releaseNotes": [ + { + "version": "1.0", + "title": "RecordedFuture-ThreatIntelligenceImport", + "notes": [ + "Initial version" + ] + } + ] + } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_playbookContentId5')]", + "contentKind": "Playbook", + "displayName": "RecordedFuture-ThreatIntelligenceImport", + "contentProductId": "[variables('_playbookcontentProductId5')]", + "id": "[variables('_playbookcontentProductId5')]", + "version": "[variables('playbookVersion5')]" + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", + "name": "[variables('playbookTemplateSpecName6')]", + "location": "[parameters('workspace-location')]", + "dependsOn": [ + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" + ], + "properties": { + "description": "RecordedFuture-Domain-IndicatorImport Playbook with template version 3.0.0", + "mainTemplate": { + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "[variables('playbookVersion6')]", + "parameters": { + "PlaybookName": { + "defaultValue": "RecordedFuture-Domain-IndicatorImport", + "type": "string" + }, + "PlaybookNameBatching": { + "defaultValue": "RecordedFuture-ThreatIntelligenceImport", + "type": "String" + } + }, + "variables": { + "RecordedfutureConnectionName": "[[concat('Recordedfuture-', parameters('PlaybookName'))]", + "connection-2": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/Recordedfuturev2')]", + "_connection-2": "[[variables('connection-2')]", + "workspace-location-inline": "[concat('[resourceGroup().locatio', 'n]')]", + "workspace-name": "[parameters('workspace')]", + "workspaceResourceId": "[[resourceId('microsoft.OperationalInsights/Workspaces', variables('workspace-name'))]" + }, + "resources": [ + { + "properties": { + "provisioningState": "Succeeded", + "state": "Enabled", + "definition": { + "$schema": "https://schema.management.azure.com/providers/Microsoft.Logic/schemas/2016-06-01/workflowdefinition.json#", + "contentVersion": "1.0.0.0", + "parameters": { + "$connections": { + "type": "Object" + } + }, + "triggers": { + "Recurrence": { + "recurrence": { + "frequency": "Hour", + "interval": 2 + }, + "evaluatedRecurrence": { + "frequency": "Hour", + "interval": 24 + }, + "type": "Recurrence" + } + }, + "actions": { + "For_each": { + "foreach": "@body('Recorded_Future_RiskLists_and_SCF_Download')", + "actions": { + "Parse_JSON": { + "type": "ParseJson", + "inputs": { + "content": "@items('For_each')", + "schema": { + "properties": { + "EvidenceDetails": { + "properties": { + "EvidenceDetails": { + "items": { + "properties": { + "Criticality": { + "type": "integer" + }, + "CriticalityLabel": { + "type": "string" + }, + "EvidenceString": { + "type": "string" + }, + "Rule": { + "type": "string" + }, + "Timestamp": { + "type": "integer" + } + }, + "required": [ + "Rule", + "EvidenceString", + "CriticalityLabel", + "Timestamp", + "Criticality" + ], + "type": "object" }, - { - "header": "Instance_Id", - "value": "@item()?['integration_instance_id']" - } - ], - "format": "HTML", - "from": "@if(empty(body('URL_Enrichment')?['observed_iocs_history']),variables('EmptyArray'),body('URL_Enrichment')?['observed_iocs_history'])" - }, - "runAfter": { - "URL_Research_Links_HTML_table": [ - "Succeeded" - ] + "type": "array" + } }, - "type": "Table" + "type": "object" + }, + "Name": { + "type": "string" + }, + "Risk": { + "type": "integer" + }, + "riskString": { + "type": "string" } }, - "case": "Url" + "type": "object" + } + } + }, + "RecordedFuture-ImportToSentinel": { + "runAfter": { + "Parse_JSON": [ + "Succeeded" + ] + }, + "type": "SendToBatch", + "inputs": { + "batchName": "RFImportToSentinel", + "content": { + "confidence": "@int(body('Parse_JSON')?['Risk'])", + "created": "@{utcNow()}", + "description": "Recorded Future - Domains - Command and Control Activity", + "id": "indicator--@{guid()}", + "indicator_types": [ + "malicious-activity" + ], + "labels": [ + "@{body('Parse_JSON')?['EvidenceDetails']?['EvidenceDetails']}" + ], + "modified": "@{utcNow()}", + "name": "@{body('Parse_JSON')?['Name']}", + "pattern": "[[[domain-name:value = '@{body('Parse_JSON')?['Name']}']", + "pattern_type": "stix", + "spec_version": "2.1", + "type": "indicator", + "valid_from": "@{utcNow()}", + "valid_until": "@{addHours(utcNow(),2)}" }, - "Case_4": { - "actions": { - "Add_comment_to_incident_(V3)": { - "inputs": { - "body": { - "incidentArmId": "@triggerBody()?['object']?['id']", - "message": "


\nNo Recorded Future data on @{body('Parse_JSON_-_Ip')?['address']}
\nRequest Data Collection In The Recorded Future Portal

" - }, - "host": { - "connection": { - "name": "@parameters('$connections')['azuresentinel']['connectionId']" - } - }, - "method": "post", - "path": "/Incidents/Comment" - }, - "runAfter": { - "Add_comment_to_incident_(V3)_-_IP": [ - "Skipped" - ] + "host": { + "triggerName": "Batch_messages", + "workflow": { + "id": "[[concat('/subscriptions/', subscription().subscriptionId, '/resourceGroups/', resourceGroup().name, '/providers/Microsoft.Logic/workflows/', parameters('PlaybookNameBatching'))]" + } + } + } + } + }, + "runAfter": { + "Recorded_Future_RiskLists_and_SCF_Download": [ + "Succeeded" + ] + }, + "type": "Foreach" + }, + "Recorded_Future_RiskLists_and_SCF_Download": { + "type": "ApiConnection", + "inputs": { + "host": { + "connection": { + "name": "@parameters('$connections')['recordedfuture']['connectionId']" + } + }, + "method": "get", + "path": "/fusion/files", + "queries": { + "path": "/public/MicrosoftAzure/domain_c2_dns.json" + } + } + } + } + }, + "parameters": { + "$connections": { + "value": { + "recordedfuture": { + "connectionId": "[[resourceId('Microsoft.Web/connections', variables('RecordedfutureConnectionName'))]", + "connectionName": "[[variables('RecordedfutureConnectionName')]", + "id": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/Recordedfuturev2')]" + } + } + } + } + }, + "name": "[[parameters('PlaybookName')]", + "type": "Microsoft.Logic/workflows", + "location": "[[variables('workspace-location-inline')]", + "identity": { + "type": "SystemAssigned" + }, + "apiVersion": "2017-07-01", + "tags": { + "hidden-SentinelTemplateName": "RecordedFuture-Domain-IndicatorImport", + "hidden-SentinelTemplateVersion": "1.0", + "hidden-SentinelWorkspaceId": "[[variables('workspaceResourceId')]" + }, + "dependsOn": [ + "[[resourceId('Microsoft.Web/connections', variables('RecordedfutureConnectionName'))]" + ] + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "name": "[[variables('RecordedfutureConnectionName')]", + "location": "[[variables('workspace-location-inline')]", + "kind": "V1", + "properties": { + "displayName": "[[variables('RecordedfutureConnectionName')]", + "api": { + "id": "[[variables('_connection-2')]" + } + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", + "apiVersion": "2022-01-01-preview", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Playbook-', last(split(variables('playbookId6'),'/'))))]", + "properties": { + "parentId": "[variables('playbookId6')]", + "contentId": "[variables('_playbookContentId6')]", + "kind": "Playbook", + "version": "[variables('playbookVersion6')]", + "source": { + "kind": "Solution", + "name": "Recorded Future", + "sourceId": "[variables('_solutionId')]" + }, + "author": { + "name": "Recorded Future Premier Integrations", + "email": "[variables('_email')]" + }, + "support": { + "name": "Recorded Future Support Team", + "email": "support@recordedfuture.com", + "tier": "Partner", + "link": "http://support.recordedfuture.com/" + } + } + } + ], + "metadata": { + "title": "RecordedFuture-Domain-IndicatorImport", + "description": "This playbook imports Domain risk lists from Recorded Future and stores them as Threat Intelligence Indicators in Microsoft Sentinel, for detection purposes.\n\nThis playbook depends on RecordedFuture-ThreatIntelligenceImport that need to be installed **manually** before installing this playbook.", + "prerequisites": [ + "First install the RecordedFuture-ThreatIntelligenceImport playbook.", + "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials" + ], + "postDeployment": [ + "After deployment, open the playbook to configure all connections and press save." + ], + "lastUpdateTime": "2023-07-06T00:00:00Z", + "tags": [ + "Threat Intelligence" + ], + "releaseNotes": [ + { + "version": "1.0", + "title": "RecordedFuture-Domain-IndicatorImport", + "notes": [ + "Initial version" + ] + } + ] + } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_playbookContentId6')]", + "contentKind": "Playbook", + "displayName": "RecordedFuture-Domain-IndicatorImport", + "contentProductId": "[variables('_playbookcontentProductId6')]", + "id": "[variables('_playbookcontentProductId6')]", + "version": "[variables('playbookVersion6')]" + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", + "name": "[variables('playbookTemplateSpecName7')]", + "location": "[parameters('workspace-location')]", + "dependsOn": [ + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" + ], + "properties": { + "description": "RecordedFuture-Hash-IndicatorImport Playbook with template version 3.0.0", + "mainTemplate": { + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "[variables('playbookVersion7')]", + "parameters": { + "PlaybookName": { + "defaultValue": "RecordedFuture-Hash-IndicatorImport", + "type": "string" + }, + "PlaybookNameBatching": { + "defaultValue": "RecordedFuture-ThreatIntelligenceImport", + "type": "String" + } + }, + "variables": { + "RecordedfutureConnectionName": "[[concat('Recordedfuture-', parameters('PlaybookName'))]", + "connection-2": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/Recordedfuturev2')]", + "_connection-2": "[[variables('connection-2')]", + "workspace-location-inline": "[concat('[resourceGroup().locatio', 'n]')]", + "workspace-name": "[parameters('workspace')]", + "workspaceResourceId": "[[resourceId('microsoft.OperationalInsights/Workspaces', variables('workspace-name'))]" + }, + "resources": [ + { + "properties": { + "provisioningState": "Succeeded", + "state": "Enabled", + "definition": { + "$schema": "https://schema.management.azure.com/providers/Microsoft.Logic/schemas/2016-06-01/workflowdefinition.json#", + "contentVersion": "1.0.0.0", + "parameters": { + "$connections": { + "type": "Object" + } + }, + "triggers": { + "Recurrence": { + "recurrence": { + "frequency": "Hour", + "interval": 24 + }, + "evaluatedRecurrence": { + "frequency": "Hour", + "interval": 24 + }, + "type": "Recurrence" + } + }, + "actions": { + "For_each": { + "foreach": "@body('Recorded_Future_RiskLists_and_SCF_Download')", + "actions": { + "Parse_JSON": { + "type": "ParseJson", + "inputs": { + "content": "@items('For_each')", + "schema": { + "properties": { + "EvidenceDetails": { + "properties": { + "EvidenceDetails": { + "items": { + "properties": { + "Criticality": { + "type": "integer" + }, + "CriticalityLabel": { + "type": "string" + }, + "EvidenceString": { + "type": "string" + }, + "Rule": { + "type": "string" + }, + "Timestamp": { + "type": "integer" + } + }, + "required": [ + "Rule", + "EvidenceString", + "CriticalityLabel", + "Timestamp", + "Criticality" + ], + "type": "object" + }, + "type": "array" + } }, - "type": "ApiConnection" + "type": "object" }, - "Add_comment_to_incident_(V3)_-_IP": { - "inputs": { - "body": { - "incidentArmId": "@triggerBody()?['object']?['id']", - "message": "


\nEnriched IP: @{body('Parse_JSON_-_Ip')?['address']}
\nRisk Score: @{body('IP_Enrichment')?['data']?['risk']?['score']} of 99
\n@{concat('Open Intelligence Card (Portal)


')}
\nInfrastructure Detections: @{body('IP_Observed_ioc_HTML_table')}
\nRisk Rules: @{body('IP_Evidence_Details_HTML_table')}
\nTechnical Links: @{body('IP_Technical_Links_HTML_table')}
\nResearch Links: @{body('IP_Research_Links_HTML_table')}

" - }, - "host": { - "connection": { - "name": "@parameters('$connections')['azuresentinel']['connectionId']" - } - }, - "method": "post", - "path": "/Incidents/Comment" - }, - "runAfter": { - "IP_Observed_ioc_HTML_table": [ - "Succeeded" - ] - }, - "type": "ApiConnection" + "Name": { + "type": "string" }, - "IP_Enrichment": { - "inputs": { - "host": { - "connection": { - "name": "@parameters('$connections')['recordedfuture']['connectionId']" - } - }, - "method": "get", - "path": "/lookup/ip/@{encodeURIComponent(body('Parse_JSON_-_Ip')?['address'])}", - "queries": { - "IntelligenceCloud": "@parameters('IntelligenceCloud')", - "RFIncidentId": "@variables('RFIncidentId')", - "Techniques": "@string(triggerBody()?['object']?['properties']?['additionalData']?['techniques'])", - "WorkspaceId": "@triggerBody()?['workspaceInfo']?['WorkspaceName']", - "fields": "intelCard,risk,links" + "Risk": { + "type": "integer" + }, + "riskString": { + "type": "string" + } + }, + "type": "object" + } + } + }, + "RecordedFuture-ImportToSentinel": { + "runAfter": { + "Parse_JSON": [ + "Succeeded" + ] + }, + "type": "SendToBatch", + "inputs": { + "batchName": "RFImportToSentinel", + "content": { + "confidence": "@int(body('Parse_JSON')?['Risk'])", + "created": "@{utcNow()}", + "description": "Recorded Future - HASH - Observed in Underground Virus Testing Sites", + "id": "indicator--@{guid()}", + "indicator_types": [ + "malicious-activity" + ], + "labels": [ + "@{body('Parse_JSON')?['EvidenceDetails']?['EvidenceDetails']}" + ], + "modified": "@{utcNow()}", + "name": "@{body('Parse_JSON')?['Name']}", + "pattern": "[[[file:hashes.'@{body('Parse_JSON')?['Algorithm']}' = '@{body('Parse_JSON')?['Name']}']", + "pattern_type": "stix", + "spec_version": "2.1", + "type": "indicator", + "valid_from": "@{utcNow()}", + "valid_until": "@{addHours(utcNow(),24)}" + }, + "host": { + "triggerName": "Batch_messages", + "workflow": { + "id": "[[concat('/subscriptions/', subscription().subscriptionId, '/resourceGroups/', resourceGroup().name, '/providers/Microsoft.Logic/workflows/', parameters('PlaybookNameBatching'))]" + } + } + } + } + }, + "runAfter": { + "Recorded_Future_RiskLists_and_SCF_Download": [ + "Succeeded" + ] + }, + "type": "Foreach" + }, + "Recorded_Future_RiskLists_and_SCF_Download": { + "type": "ApiConnection", + "inputs": { + "host": { + "connection": { + "name": "@parameters('$connections')['recordedfuture']['connectionId']" + } + }, + "method": "get", + "path": "/fusion/files", + "queries": { + "path": "/public/MicrosoftAzure/hash_observed_testing.json" + } + } + } + } + }, + "parameters": { + "$connections": { + "value": { + "recordedfuture": { + "connectionId": "[[resourceId('Microsoft.Web/connections', variables('RecordedfutureConnectionName'))]", + "connectionName": "[[variables('RecordedfutureConnectionName')]", + "id": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/Recordedfuturev2')]" + } + } + } + } + }, + "name": "[[parameters('PlaybookName')]", + "type": "Microsoft.Logic/workflows", + "location": "[[variables('workspace-location-inline')]", + "identity": { + "type": "SystemAssigned" + }, + "apiVersion": "2017-07-01", + "tags": { + "hidden-SentinelTemplateName": "RecordedFuture-Hash-IndicatorImport", + "hidden-SentinelTemplateVersion": "1.0", + "hidden-SentinelWorkspaceId": "[[variables('workspaceResourceId')]" + }, + "dependsOn": [ + "[[resourceId('Microsoft.Web/connections', variables('RecordedfutureConnectionName'))]" + ] + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "name": "[[variables('RecordedfutureConnectionName')]", + "location": "[[variables('workspace-location-inline')]", + "kind": "V1", + "properties": { + "displayName": "[[variables('RecordedfutureConnectionName')]", + "api": { + "id": "[[variables('_connection-2')]" + } + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", + "apiVersion": "2022-01-01-preview", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Playbook-', last(split(variables('playbookId7'),'/'))))]", + "properties": { + "parentId": "[variables('playbookId7')]", + "contentId": "[variables('_playbookContentId7')]", + "kind": "Playbook", + "version": "[variables('playbookVersion7')]", + "source": { + "kind": "Solution", + "name": "Recorded Future", + "sourceId": "[variables('_solutionId')]" + }, + "author": { + "name": "Recorded Future Premier Integrations", + "email": "[variables('_email')]" + }, + "support": { + "name": "Recorded Future Support Team", + "email": "support@recordedfuture.com", + "tier": "Partner", + "link": "http://support.recordedfuture.com/" + } + } + } + ], + "metadata": { + "title": "RecordedFuture-Hash-IndicatorImport", + "description": "This playbook imports Hash risk lists from Recorded Future and stores them as Threat Intelligence Indicators in Microsoft Sentinel, for detection purposes.\n\nThis playbook depends on RecordedFuture-ThreatIntelligenceImport that need to be installed **manually** before installing this playbook.", + "prerequisites": [ + "First install the RecordedFuture-ThreatIntelligenceImport playbook.", + "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials" + ], + "postDeployment": [ + "After deployment, open the playbook to configure all connections and press save." + ], + "lastUpdateTime": "2023-07-06T00:00:00Z", + "tags": [ + "Threat Intelligence" + ], + "releaseNotes": [ + { + "version": "1.0", + "title": "RecordedFuture-Hash-IndicatorImport", + "notes": [ + "Initial version" + ] + } + ] + } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_playbookContentId7')]", + "contentKind": "Playbook", + "displayName": "RecordedFuture-Hash-IndicatorImport", + "contentProductId": "[variables('_playbookcontentProductId7')]", + "id": "[variables('_playbookcontentProductId7')]", + "version": "[variables('playbookVersion7')]" + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", + "name": "[variables('playbookTemplateSpecName8')]", + "location": "[parameters('workspace-location')]", + "dependsOn": [ + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" + ], + "properties": { + "description": "RecordedFuture-IP-IndicatorImport Playbook with template version 3.0.0", + "mainTemplate": { + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "[variables('playbookVersion8')]", + "parameters": { + "PlaybookName": { + "defaultValue": "RecordedFuture-IP-IndicatorImport", + "type": "string" + }, + "PlaybookNameBatching": { + "defaultValue": "RecordedFuture-ThreatIntelligenceImport", + "type": "String" + } + }, + "variables": { + "RecordedfutureConnectionName": "[[concat('Recordedfuture-', parameters('PlaybookName'))]", + "connection-2": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/Recordedfuturev2')]", + "_connection-2": "[[variables('connection-2')]", + "workspace-location-inline": "[concat('[resourceGroup().locatio', 'n]')]", + "workspace-name": "[parameters('workspace')]", + "workspaceResourceId": "[[resourceId('microsoft.OperationalInsights/Workspaces', variables('workspace-name'))]" + }, + "resources": [ + { + "properties": { + "provisioningState": "Succeeded", + "state": "Enabled", + "definition": { + "$schema": "https://schema.management.azure.com/providers/Microsoft.Logic/schemas/2016-06-01/workflowdefinition.json#", + "contentVersion": "1.0.0.0", + "parameters": { + "$connections": { + "type": "Object" + } + }, + "triggers": { + "Recurrence": { + "recurrence": { + "frequency": "Hour", + "interval": 1 + }, + "evaluatedRecurrence": { + "frequency": "Hour", + "interval": 24 + }, + "type": "Recurrence" + } + }, + "actions": { + "For_each": { + "foreach": "@body('Recorded_Future_RiskLists_and_SCF_Download')", + "actions": { + "Parse_JSON": { + "type": "ParseJson", + "inputs": { + "content": "@items('For_each')", + "schema": { + "properties": { + "EvidenceDetails": { + "properties": { + "EvidenceDetails": { + "items": { + "properties": { + "Criticality": { + "type": "integer" + }, + "CriticalityLabel": { + "type": "string" + }, + "EvidenceString": { + "type": "string" + }, + "Rule": { + "type": "string" + }, + "Timestamp": { + "type": "integer" + } + }, + "required": [ + "Rule", + "EvidenceString", + "CriticalityLabel", + "Timestamp", + "Criticality" + ], + "type": "object" + }, + "type": "array" } }, - "runAfter": { - "Parse_JSON_-_Ip": [ - "Succeeded" - ] - }, - "type": "ApiConnection" + "type": "object" }, - "IP_Evidence_Details_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Risk_Rules", - "value": "@item()?['rule']" - }, - { - "header": "Severity", - "value": "@item()?['criticalityLabel']" - }, - { - "header": "Evidence_Details", - "value": "@item()?['evidenceString']" - } - ], - "format": "HTML", - "from": "@body('IP_Enrichment')?['data']?['risk']?['evidenceDetails']" - }, - "runAfter": { - "IP_Enrichment": [ - "Succeeded" - ] - }, - "type": "Table" + "Name": { + "type": "string" }, - "IP_Research_Links_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Entity", - "value": "@replace(item()?['name'],'.','[.]')" - }, - { - "header": "Entity_Type", - "value": "@item()?['type']" - }, - { - "header": "Category", - "value": "@item()?['category']" + "Risk": { + "type": "integer" + }, + "riskString": { + "type": "string" + } + }, + "type": "object" + } + } + }, + "RecordedFuture-ThreatIntelligenceImport": { + "runAfter": { + "Parse_JSON": [ + "Succeeded" + ] + }, + "type": "SendToBatch", + "inputs": { + "batchName": "RFImportToSentinel", + "content": { + "confidence": "@int(body('Parse_JSON')?['Risk'])", + "created": "@{utcNow()}", + "description": "Recorded Future - IP - Actively Communicating C&C Server", + "id": "indicator--@{guid()}", + "indicator_types": [ + "malicious-activity" + ], + "labels": [ + "@{body('Parse_JSON')?['EvidenceDetails']?['EvidenceDetails']}" + ], + "modified": "@{utcNow()}", + "name": "@{body('Parse_JSON')?['Name']}", + "pattern": "[[[ipv4-addr:value = '@{body('Parse_JSON')?['Name']}']", + "pattern_type": "stix", + "spec_version": "2.1", + "type": "indicator", + "valid_from": "@{utcNow()}", + "valid_until": "@{addHours(utcNow(),1)}" + }, + "host": { + "triggerName": "Batch_messages", + "workflow": { + "id": "[[concat('/subscriptions/', subscription().subscriptionId, '/resourceGroups/', resourceGroup().name, '/providers/Microsoft.Logic/workflows/', parameters('PlaybookNameBatching'))]" + } + } + } + } + }, + "runAfter": { + "Recorded_Future_RiskLists_and_SCF_Download": [ + "Succeeded" + ] + }, + "type": "Foreach" + }, + "Recorded_Future_RiskLists_and_SCF_Download": { + "type": "ApiConnection", + "inputs": { + "host": { + "connection": { + "name": "@parameters('$connections')['recordedfuture']['connectionId']" + } + }, + "method": "get", + "path": "/fusion/files", + "queries": { + "path": "/public/MicrosoftAzure/ip_active_c2.json" + } + } + } + } + }, + "parameters": { + "$connections": { + "value": { + "recordedfuture": { + "connectionId": "[[resourceId('Microsoft.Web/connections', variables('RecordedfutureConnectionName'))]", + "connectionName": "[[variables('RecordedfutureConnectionName')]", + "id": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/Recordedfuturev2')]" + } + } + } + } + }, + "name": "[[parameters('PlaybookName')]", + "type": "Microsoft.Logic/workflows", + "location": "[[variables('workspace-location-inline')]", + "identity": { + "type": "SystemAssigned" + }, + "apiVersion": "2017-07-01", + "tags": { + "hidden-SentinelTemplateName": "RecordedFuture-IP-IndicatorImport", + "hidden-SentinelTemplateVersion": "1.0", + "hidden-SentinelWorkspaceId": "[[variables('workspaceResourceId')]" + }, + "dependsOn": [ + "[[resourceId('Microsoft.Web/connections', variables('RecordedfutureConnectionName'))]" + ] + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "name": "[[variables('RecordedfutureConnectionName')]", + "location": "[[variables('workspace-location-inline')]", + "kind": "V1", + "properties": { + "displayName": "[[variables('RecordedfutureConnectionName')]", + "api": { + "id": "[[variables('_connection-2')]" + } + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", + "apiVersion": "2022-01-01-preview", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Playbook-', last(split(variables('playbookId8'),'/'))))]", + "properties": { + "parentId": "[variables('playbookId8')]", + "contentId": "[variables('_playbookContentId8')]", + "kind": "Playbook", + "version": "[variables('playbookVersion8')]", + "source": { + "kind": "Solution", + "name": "Recorded Future", + "sourceId": "[variables('_solutionId')]" + }, + "author": { + "name": "Recorded Future Premier Integrations", + "email": "[variables('_email')]" + }, + "support": { + "name": "Recorded Future Support Team", + "email": "support@recordedfuture.com", + "tier": "Partner", + "link": "http://support.recordedfuture.com/" + } + } + } + ], + "metadata": { + "title": "RecordedFuture-IP-IndicatorImport", + "description": "This playbook imports IP risk lists from Recorded Future and stores them as Threat Intelligence Indicators in Microsoft Sentinel, for detection purposes.\n\nThis playbook depends on RecordedFuture-ThreatIntelligenceImport that need to be installed **manually** before installing this playbook.", + "prerequisites": [ + "First install the RecordedFuture-ThreatIntelligenceImport playbook.", + "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials" + ], + "postDeployment": [ + "After deployment, open the playbook to configure all connections and press save." + ], + "lastUpdateTime": "2023-07-06T00:00:00Z", + "tags": [ + "Threat Intelligence" + ], + "releaseNotes": [ + { + "version": "1.0", + "title": "RecordedFuture-IP-IndicatorImport", + "notes": [ + "Initial version" + ] + } + ] + } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_playbookContentId8')]", + "contentKind": "Playbook", + "displayName": "RecordedFuture-IP-IndicatorImport", + "contentProductId": "[variables('_playbookcontentProductId8')]", + "id": "[variables('_playbookcontentProductId8')]", + "version": "[variables('playbookVersion8')]" + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", + "name": "[variables('playbookTemplateSpecName9')]", + "location": "[parameters('workspace-location')]", + "dependsOn": [ + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" + ], + "properties": { + "description": "RecordedFuture-URL-IndicatorImport Playbook with template version 3.0.0", + "mainTemplate": { + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "[variables('playbookVersion9')]", + "parameters": { + "PlaybookName": { + "defaultValue": "RecordedFuture-URL-IndicatorImport", + "type": "string" + }, + "PlaybookNameBatching": { + "defaultValue": "RecordedFuture-ThreatIntelligenceImport", + "type": "String" + } + }, + "variables": { + "RecordedfutureConnectionName": "[[concat('Recordedfuture-', parameters('PlaybookName'))]", + "connection-2": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/Recordedfuturev2')]", + "_connection-2": "[[variables('connection-2')]", + "workspace-location-inline": "[concat('[resourceGroup().locatio', 'n]')]", + "workspace-name": "[parameters('workspace')]", + "workspaceResourceId": "[[resourceId('microsoft.OperationalInsights/Workspaces', variables('workspace-name'))]" + }, + "resources": [ + { + "properties": { + "provisioningState": "Succeeded", + "state": "Enabled", + "definition": { + "$schema": "https://schema.management.azure.com/providers/Microsoft.Logic/schemas/2016-06-01/workflowdefinition.json#", + "contentVersion": "1.0.0.0", + "parameters": { + "$connections": { + "type": "Object" + } + }, + "triggers": { + "Recurrence": { + "recurrence": { + "frequency": "Hour", + "interval": 2 + }, + "evaluatedRecurrence": { + "frequency": "Hour", + "interval": 24 + }, + "type": "Recurrence" + } + }, + "actions": { + "For_each": { + "foreach": "@body('Recorded_Future_RiskLists_and_SCF_Download')", + "actions": { + "Parse_JSON": { + "type": "ParseJson", + "inputs": { + "content": "@items('For_each')", + "schema": { + "properties": { + "EvidenceDetails": { + "properties": { + "EvidenceDetails": { + "items": { + "properties": { + "Criticality": { + "type": "integer" + }, + "CriticalityLabel": { + "type": "string" + }, + "EvidenceString": { + "type": "string" + }, + "Rule": { + "type": "string" + }, + "Timestamp": { + "type": "integer" + } + }, + "required": [ + "Rule", + "EvidenceString", + "CriticalityLabel", + "Timestamp", + "Criticality" + ], + "type": "object" }, - { - "header": "Risk_Score", - "value": "@item()?['score']" - } - ], - "format": "HTML", - "from": "@if(empty(body('IP_Enrichment')?['data']?['links']?['research']),variables('EmptyArray'),body('IP_Enrichment')?['data']?['links']?['research']?['entities'])" - }, - "runAfter": { - "IP_Technical_Links_HTML_table": [ - "Succeeded" - ] + "type": "array" + } }, - "type": "Table" + "type": "object" }, - "IP_Technical_Links_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Entity", - "value": "@replace(item()?['name'],'.','[.]')" - }, - { - "header": "Entity_Type", - "value": "@item()?['type']" - }, - { - "header": "Category", - "value": "@item()?['category']" - }, - { - "header": "Risk_Score", - "value": "@item()?['score']" - } - ], - "format": "HTML", - "from": "@if(empty(body('IP_Enrichment')?['data']?['links']?['technical']),variables('EmptyArray'),body('IP_Enrichment')?['data']?['links']?['technical']?['entities'])" - }, - "runAfter": { - "IP_Evidence_Details_HTML_table": [ - "Succeeded" - ] - }, - "type": "Table" + "Name": { + "type": "string" }, - "IP_Observed_ioc_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Timestamp", - "value": "@item()?['timestamp']" - }, - { - "header": "Integration_Type", - "value": "@item()?['integration_type']" - }, - { - "header": "Instance_Id", - "value": "@item()?['integration_instance_id']" - } - ], - "format": "HTML", - "from": "@if(empty(body('IP_Enrichment')?['observed_iocs_history']),variables('EmptyArray'),body('IP_Enrichment')?['observed_iocs_history'])" - }, - "runAfter": { - "IP_Research_Links_HTML_table": [ - "Succeeded" - ] - }, - "type": "Table" + "Risk": { + "type": "integer" }, - "Parse_JSON_-_Ip": { - "inputs": { - "content": "@body('Parse_JSON_2')?['properties']", - "schema": { - "properties": { - "address": { - "type": "string" - }, - "friendlyName": { - "type": "string" - } - }, - "type": "object" - } - }, - "type": "ParseJson" + "riskString": { + "type": "string" } }, - "case": "Ip" + "type": "object" } - }, - "expression": "@body('Parse_JSON_2')?['kind']", + } + }, + "RecordedFuture-ImportToSentinel": { "runAfter": { - "Parse_JSON_2": [ + "Parse_JSON": [ "Succeeded" ] }, - "type": "Switch" + "type": "SendToBatch", + "inputs": { + "batchName": "RFImportToSentinel", + "content": { + "confidence": "@int(body('Parse_JSON')?['Risk'])", + "created": "@{utcNow()}", + "description": "Recorded Future - URL - Recently Reported by Insikt Group", + "id": "indicator--@{guid()}", + "indicator_types": [ + "malicious-activity" + ], + "labels": [ + "@{body('Parse_JSON')?['EvidenceDetails']?['EvidenceDetails']}" + ], + "modified": "@{utcNow()}", + "name": "@{body('Parse_JSON')?['Name']}", + "pattern": "[[[url:value = '@{body('Parse_JSON')?['Name']}']", + "pattern_type": "stix", + "spec_version": "2.1", + "type": "indicator", + "valid_from": "@{utcNow()}", + "valid_until": "@{addHours(utcNow(),2)}" + }, + "host": { + "triggerName": "Batch_messages", + "workflow": { + "id": "[[concat('/subscriptions/', subscription().subscriptionId, '/resourceGroups/', resourceGroup().name, '/providers/Microsoft.Logic/workflows/', parameters('PlaybookNameBatching'))]" + } + } + } } }, - "foreach": "@triggerBody()?['object']?['properties']?['relatedEntities']", "runAfter": { - "RFIncidentId": [ + "Recorded_Future_RiskLists_and_SCF_Download": [ "Succeeded" ] }, "type": "Foreach" }, - "Initialize_variable": { + "Recorded_Future_RiskLists_and_SCF_Download": { + "type": "ApiConnection", + "inputs": { + "host": { + "connection": { + "name": "@parameters('$connections')['recordedfuture']['connectionId']" + } + }, + "method": "get", + "path": "/fusion/files", + "queries": { + "path": "/public/MicrosoftAzure/url_insikt.json" + } + } + } + } + }, + "parameters": { + "$connections": { + "value": { + "recordedfuture": { + "connectionId": "[[resourceId('Microsoft.Web/connections', variables('RecordedfutureConnectionName'))]", + "connectionName": "[[variables('RecordedfutureConnectionName')]", + "id": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/Recordedfuturev2')]" + } + } + } + } + }, + "name": "[[parameters('PlaybookName')]", + "type": "Microsoft.Logic/workflows", + "location": "[[variables('workspace-location-inline')]", + "identity": { + "type": "SystemAssigned" + }, + "apiVersion": "2017-07-01", + "tags": { + "hidden-SentinelTemplateName": "RecordedFuture-URL-IndicatorImport", + "hidden-SentinelTemplateVersion": "1.0", + "hidden-SentinelWorkspaceId": "[[variables('workspaceResourceId')]" + }, + "dependsOn": [ + "[[resourceId('Microsoft.Web/connections', variables('RecordedfutureConnectionName'))]" + ] + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "name": "[[variables('RecordedfutureConnectionName')]", + "location": "[[variables('workspace-location-inline')]", + "kind": "V1", + "properties": { + "displayName": "[[variables('RecordedfutureConnectionName')]", + "api": { + "id": "[[variables('_connection-2')]" + } + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", + "apiVersion": "2022-01-01-preview", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Playbook-', last(split(variables('playbookId9'),'/'))))]", + "properties": { + "parentId": "[variables('playbookId9')]", + "contentId": "[variables('_playbookContentId9')]", + "kind": "Playbook", + "version": "[variables('playbookVersion9')]", + "source": { + "kind": "Solution", + "name": "Recorded Future", + "sourceId": "[variables('_solutionId')]" + }, + "author": { + "name": "Recorded Future Premier Integrations", + "email": "[variables('_email')]" + }, + "support": { + "name": "Recorded Future Support Team", + "email": "support@recordedfuture.com", + "tier": "Partner", + "link": "http://support.recordedfuture.com/" + } + } + } + ], + "metadata": { + "title": "RecordedFuture-URL-IndicatorImport", + "description": "This playbook imports URL risk lists from Recorded Future and stores them as Threat Intelligence Indicators in Microsoft Sentinel, for detection purposes.\n\nThis playbook depends on RecordedFuture-ThreatIntelligenceImport that need to be installed **manually** before installing this playbook.", + "prerequisites": [ + "First install the RecordedFuture-ThreatIntelligenceImport playbook.", + "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials" + ], + "postDeployment": [ + "After deployment, open the playbook to configure all connections and press save." + ], + "lastUpdateTime": "2023-07-06T00:00:00Z", + "tags": [ + "Threat Intelligence" + ], + "releaseNotes": [ + { + "version": "1.0", + "title": "RecordedFuture-URL-IndicatorImport", + "notes": [ + "Initial version" + ] + } + ] + } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_playbookContentId9')]", + "contentKind": "Playbook", + "displayName": "RecordedFuture-URL-IndicatorImport", + "contentProductId": "[variables('_playbookcontentProductId9')]", + "id": "[variables('_playbookcontentProductId9')]", + "version": "[variables('playbookVersion9')]" + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", + "name": "[variables('playbookTemplateSpecName10')]", + "location": "[parameters('workspace-location')]", + "dependsOn": [ + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" + ], + "properties": { + "description": "RecordedFuture-ImportToSentinel Playbook with template version 3.0.0", + "mainTemplate": { + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "[variables('playbookVersion10')]", + "parameters": { + "PlaybookName": { + "type": "string", + "defaultValue": "RecordedFuture-ImportToSentinel" + } + }, + "variables": { + "GraphSecurityConnectionName": "[[concat('microsoftgraphsecurity-', parameters('PlaybookName'))]", + "connection-2": "[[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/',variables('workspace-location-inline'),'/managedApis/microsoftgraphsecurity')]", + "_connection-2": "[[variables('connection-2')]", + "workspace-location-inline": "[concat('[resourceGroup().locatio', 'n]')]", + "workspace-name": "[parameters('workspace')]", + "workspaceResourceId": "[[resourceId('microsoft.OperationalInsights/Workspaces', variables('workspace-name'))]" + }, + "resources": [ + { + "type": "Microsoft.Logic/workflows", + "apiVersion": "2019-05-01", + "name": "[[parameters('PlaybookName')]", + "location": "[[variables('workspace-location-inline')]", + "tags": { + "hidden-SentinelTemplateName": "RecordedFuture-ImportToSentinel", + "hidden-SentinelTemplateVersion": "1.1", + "hidden-SentinelWorkspaceId": "[[variables('workspaceResourceId')]" + }, + "dependsOn": [ + "[[resourceId('Microsoft.Web/connections', variables('GraphSecurityConnectionName'))]" + ], + "properties": { + "definition": { + "$schema": "https://schema.management.azure.com/providers/Microsoft.Logic/schemas/2016-06-01/workflowdefinition.json#", + "actions": { + "Select": { "inputs": { - "variables": [ - { - "name": "EmptyArray", - "type": "array" - } - ] + "from": "@triggerBody()['items']", + "select": "@item()['content']" }, - "type": "InitializeVariable" + "type": "Select" }, - "RFIncidentId": { + "Submit_multiple_tiIndicators": { "inputs": { - "variables": [ - { - "name": "RFIncidentId", - "type": "string", - "value": "@{guid()}" + "body": { + "value": "@body('Select')" + }, + "host": { + "connection": { + "name": "@parameters('$connections')['microsoftgraphsecurity']['connectionId']" } - ] + }, + "method": "post", + "path": "/beta/security/tiIndicators/submitTiIndicators" }, "runAfter": { - "Initialize_variable": [ + "Select": [ "Succeeded" ] }, - "type": "InitializeVariable" + "type": "ApiConnection" } }, "contentVersion": "1.0.0.0", "parameters": { - "IntelligenceCloud": { - "defaultValue": true, - "type": "Bool" - }, "$connections": { "type": "Object" } }, "triggers": { - "When_Azure_Sentinel_incident_creation_rule_was_triggered": { + "Batch_messages": { "inputs": { - "body": { - "callback_url": "@{listCallbackUrl()}" - }, - "host": { - "connection": { - "name": "@parameters('$connections')['azuresentinel']['connectionId']" + "configurations": { + "RFImportToSentinel": { + "releaseCriteria": { + "messageCount": 100, + "recurrence": { + "frequency": "Minute", + "interval": 10 + } + } } }, - "path": "/incident-creation" + "mode": "Inline" }, - "type": "ApiConnectionWebhook" + "type": "Batch" } } }, "parameters": { "$connections": { "value": { - "azuresentinel": { - "id": "[[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/',variables('workspace-location-inline'),'/managedApis/azuresentinel')]", - "connectionId": "[[resourceId('Microsoft.Web/connections', variables('AzureSentinelConnectionName'))]", - "connectionName": "[[variables('AzureSentinelConnectionName')]" - }, - "recordedfuture": { - "id": "[[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/',variables('workspace-location-inline'),'/managedApis/recordedfuturev2')]", - "connectionId": "[[resourceId('Microsoft.Web/connections', variables('RecordedFutureConnectionName'))]", - "connectionName": "[[variables('RecordedFutureConnectionName')]" + "microsoftgraphsecurity": { + "id": "[[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/',variables('workspace-location-inline'),'/managedApis/microsoftgraphsecurity')]", + "connectionId": "[[resourceId('Microsoft.Web/connections', variables('GraphSecurityConnectionName'))]", + "connectionName": "[[variables('GraphSecurityConnectionName')]" } } } } - }, - "tags": { - "hidden-SentinelWorkspaceId": "[[variables('workspaceResourceId')]" } }, { "type": "Microsoft.Web/connections", "apiVersion": "2016-06-01", - "name": "[[variables('RecordedFutureConnectionName')]", "location": "[[variables('workspace-location-inline')]", + "name": "[[variables('GraphSecurityConnectionName')]", "properties": { "api": { "id": "[[variables('_connection-2')]" } } }, - { - "type": "Microsoft.Web/connections", - "apiVersion": "2016-06-01", - "name": "[[variables('AzureSentinelConnectionName')]", - "location": "[[variables('workspace-location-inline')]", - "properties": { - "api": { - "id": "[[variables('_connection-3')]" - } - } - }, { "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", "apiVersion": "2022-01-01-preview", - "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Playbook-', last(split(variables('playbookId4'),'/'))))]", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Playbook-', last(split(variables('playbookId10'),'/'))))]", "properties": { - "parentId": "[variables('playbookId4')]", - "contentId": "[variables('_playbookContentId4')]", + "parentId": "[variables('playbookId10')]", + "contentId": "[variables('_playbookContentId10')]", "kind": "Playbook", - "version": "[variables('playbookVersion4')]", + "version": "[variables('playbookVersion10')]", "source": { "kind": "Solution", "name": "Recorded Future", @@ -2718,99 +4390,67 @@ } ], "metadata": { - "title": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash", - "description": "This playbook leverages the Recorded Future API to enrich IP, Domain, Url & Hash indicators, found in Sentinel incidents, with the following context: Risk Score, Risk Rules and Link to Intelligence Card. The enrichment content will be posted as a comment in the Sentinel incident \"Sentinel.", - "prerequisites": [ - "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials" - ], + "title": "RecordedFuture-ImportToSentinel", + "description": "**[Deprecated]**\nDeprecated due to changes in the Threat Intelligence Platform. Use the new IndicatorImport playbooks that is provided in this Solution.\n\nThis playbook is purposed to listen (via batching mechanism provided by Microsoft Azure) for incoming messages from the IndicatorProcessor Playbooks and create submit the indicators for creation", "postDeployment": [ - "After deployment open the playbook in edit mode and configure/authorize all connections and press save.\"Logic" + "After deployment you have to open the playbook to configure all connections and press save." ], - "lastUpdateTime": "2023-03-08T00:00:00Z", - "entities": [ - "ip", - "url", - "dnsresolution", - "filehash" + "prerequisites": [ + "None" ], + "lastUpdateTime": "2023-08-09T00:00:00Z", "tags": [ - "Enrichment" + "Deprecated", + "Threat Intelligence" ], "releaseNotes": [ { - "version": "2.3.1", - "title": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash", - "notes": [ - "Handle 404 result from enrichment." - ] - }, - { - "version": "2.3.0", - "title": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash", - "notes": [ - "Added detections, updated readme and improved layout." - ] - }, - { - "version": "1.1.1", - "title": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash", - "notes": [ - "Fixed riskrule severity and correct image url." - ] - }, - { - "version": "1.1.0", - "title": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash", + "version": "1.1", + "title": "Deprecated", "notes": [ - "Improved layout and added consent for intelligence Recorded Future cloud sharing." + "Deprecated in favor for the new IndicatorImport playbooks. More information can be found in the readme on Github https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Recorded%20Future/Playbooks/readme.md", + "Once a new IndicatorImport playbook is installed downloading the same risk list. Deactivate or delete this playbook." ] }, { - "version": "1.0.0", - "title": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash", + "version": "1.0", + "title": "RecordedFuture-ImportToSentinel", "notes": [ "Initial version" ] } ] } - } - } - }, - { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", - "name": "[variables('playbookTemplateSpecName5')]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Playbook" - }, - "properties": { - "description": "RecordedFuture-IP-Actively_Comm_C2_Server-TIProcessor playbook", - "displayName": "RecordedFuture-IP-Actively_Comm_C2_Server-TIProcessor playbook" + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_playbookContentId10')]", + "contentKind": "Playbook", + "displayName": "RecordedFuture-ImportToSentinel", + "contentProductId": "[variables('_playbookcontentProductId10')]", + "id": "[variables('_playbookcontentProductId10')]", + "version": "[variables('playbookVersion10')]" } }, { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('playbookTemplateSpecName5'),'/',variables('playbookVersion5'))]", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", + "name": "[variables('playbookTemplateSpecName11')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Playbook" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('playbookTemplateSpecName5'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "RecordedFuture-IP-Actively_Comm_C2_Server-TIProcessor Playbook with template version 2.4.0", + "description": "RecordedFuture-DOMAIN-C2_DNS_Name-TIProcessor Playbook with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", - "contentVersion": "[variables('playbookVersion5')]", + "contentVersion": "[variables('playbookVersion11')]", "parameters": { "PlaybookName": { - "defaultValue": "RecordedFuture-IP-Actively_Comm_C2_Server-TIProcessor", + "defaultValue": "RecordedFuture-DOMAIN-C2_DNS_Name-TIProcessor", "type": "String" }, "PlaybookNameBatching": { @@ -2832,6 +4472,11 @@ "apiVersion": "2019-05-01", "name": "[[parameters('PlaybookName')]", "location": "[[variables('workspace-location-inline')]", + "tags": { + "hidden-SentinelTemplateName": "RecordedFuture-DOMAIN-C2_DNS_Name-TIProcessor", + "hidden-SentinelTemplateVersion": "1.1", + "hidden-SentinelWorkspaceId": "[[variables('workspaceResourceId')]" + }, "dependsOn": [ "[[resourceId('Microsoft.Web/connections', variables('RecordedFutureConnectionName'))]" ], @@ -2904,10 +4549,10 @@ "additionalInformation": "@{body('Parse_JSON')?['EvidenceDetails']}", "azureTenantId": "[[subscription().tenantId]", "confidence": "@int(body('Parse_JSON')?['Risk'])", - "description": "Recorded Future - IP - Actively Communicating C&C Server", - "expirationDateTime": "@{addHours(utcNow(),1)}", + "description": "Recorded Future - DOMAIN - C2 DNS Name", + "domainName": "@{body('Parse_JSON')?['Name']}", + "expirationDateTime": "@{addHours(utcNow(),2)}", "ingestedDateTime": "@{utcNow()}", - "networkIPv4": "@{body('Parse_JSON')?['Name']}", "targetProduct": "Azure Sentinel", "threatType": "C2", "tlpLevel": "amber" @@ -2945,7 +4590,7 @@ "method": "get", "path": "/fusion/files", "queries": { - "path": "/public/MicrosoftAzure/ip_active_c2.json" + "path": "/public/MicrosoftAzure/domain_c2_dns.json" } }, "type": "ApiConnection" @@ -2961,7 +4606,7 @@ "Recurrence": { "recurrence": { "frequency": "Hour", - "interval": 1 + "interval": 2 }, "type": "Recurrence" } @@ -2978,9 +4623,6 @@ } } } - }, - "tags": { - "hidden-SentinelWorkspaceId": "[[variables('workspaceResourceId')]" } }, { @@ -2997,12 +4639,12 @@ { "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", "apiVersion": "2022-01-01-preview", - "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Playbook-', last(split(variables('playbookId5'),'/'))))]", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Playbook-', last(split(variables('playbookId11'),'/'))))]", "properties": { - "parentId": "[variables('playbookId5')]", - "contentId": "[variables('_playbookContentId5')]", + "parentId": "[variables('playbookId11')]", + "contentId": "[variables('_playbookContentId11')]", "kind": "Playbook", - "version": "[variables('playbookVersion5')]", + "version": "[variables('playbookVersion11')]", "source": { "kind": "Solution", "name": "Recorded Future", @@ -3022,8 +4664,8 @@ } ], "metadata": { - "title": "RecordedFuture-IP-Actively_Comm_C2_Server-TIProcessor", - "description": "This playbook leverages the Recorded Future API and automatically imports the Actively Communicating C&C Server IP RiskList, as Threat Intelligence Indicators, for detection purposes in Microsoft Sentinel.\n\nThis playbook depends on RecordedFuture-ImportToSentinel that need to be installed **manually** before installing current playbook.", + "title": "RecordedFuture-DOMAIN-C2_DNS_Name-TIProcessor", + "description": "**[Deprecated]**\nDeprecated due to changes in the Threat Intelligence Platform. Use the new IndicatorImport playbooks that is provided in this Solution.\n\nThis playbook leverages the Recorded Future API and automatically imports the C&C DNS Name Domain RiskList, as Threat Intelligence Indicators, for detection purposes in Microsoft Sentinel.\n\nThis playbook depends on RecordedFuture-ImportToSentinel that need to be installed **manually** before installing current playbook.", "prerequisites": [ "First install the RecordedFuture-ImportToSentinel playbook.", "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials" @@ -3031,57 +4673,59 @@ "postDeployment": [ "After deployment you have to open the playbook to configure all connections and press save." ], - "lastUpdateTime": "2022-08-01T00:00:00Z", + "lastUpdateTime": "2023-08-07T00:00:00Z", "tags": [ + "Deprecated", "Threat Intelligence" ], "releaseNotes": [ { - "version": "1.0.0", - "title": "RecordedFuture-IP-Actively_Comm_C2_Server-IndicatorProcessor", + "version": "1.0", + "title": "RecordedFuture-DOMAIN-C2_DNS_Name-IndicatorProcessor", "notes": [ "Initial version" ] + }, + { + "version": "1.1", + "title": "Deprecated", + "notes": [ + "Deprecated in favor for the new IndicatorImport playbooks. More information can be found in the readme on Github https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Recorded%20Future/Playbooks/readme.md", + "Once a new IndicatorImport playbook is installed downloading the same risk list. Deactivate or delete this playbook." + ] } ] } - } - } - }, - { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", - "name": "[variables('playbookTemplateSpecName6')]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Playbook" - }, - "properties": { - "description": "RecordedFuture-URL-Recent_Rep_by_Insikt-TIProcessor playbook", - "displayName": "RecordedFuture-URL-Recent_Rep_by_Insikt-TIProcessor playbook" + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_playbookContentId11')]", + "contentKind": "Playbook", + "displayName": "RecordedFuture-DOMAIN-C2_DNS_Name-TIProcessor", + "contentProductId": "[variables('_playbookcontentProductId11')]", + "id": "[variables('_playbookcontentProductId11')]", + "version": "[variables('playbookVersion11')]" } }, { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('playbookTemplateSpecName6'),'/',variables('playbookVersion6'))]", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", + "name": "[variables('playbookTemplateSpecName12')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Playbook" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('playbookTemplateSpecName6'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "RecordedFuture-URL-Recent_Rep_by_Insikt-TIProcessor Playbook with template version 2.4.0", + "description": "RecordedFuture-HASH-Obs_in_Underground-TIProcessor Playbook with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", - "contentVersion": "[variables('playbookVersion6')]", + "contentVersion": "[variables('playbookVersion12')]", "parameters": { "PlaybookName": { - "defaultValue": "RecordedFuture-URL-Recent_Rep_by_Insikt-TIProcessor", + "defaultValue": "RecordedFuture-HASH-Obs_in_Underground-TIProcessor", "type": "String" }, "PlaybookNameBatching": { @@ -3103,6 +4747,11 @@ "apiVersion": "2019-05-01", "name": "[[parameters('PlaybookName')]", "location": "[[variables('workspace-location-inline')]", + "tags": { + "hidden-SentinelTemplateName": "RecordedFuture-HASH-Obs_in_Underground-TIProcessor", + "hidden-SentinelTemplateVersion": "1.1", + "hidden-SentinelWorkspaceId": "[[variables('workspaceResourceId')]" + }, "dependsOn": [ "[[resourceId('Microsoft.Web/connections', variables('RecordedFutureConnectionName'))]" ], @@ -3175,13 +4824,14 @@ "additionalInformation": "@{body('Parse_JSON')?['EvidenceDetails']}", "azureTenantId": "[[subscription().tenantId]", "confidence": "@int(body('Parse_JSON')?['Risk'])", - "description": "Recorded Future - URL - Recently Reported by Insikt Group", - "expirationDateTime": "@{addHours(utcNow(),2)}", + "description": "Recorded Future - HASH - Observed in Underground Virus Testing Sites", + "expirationDateTime": "@{addDays(utcNow(),1)}", + "fileHashType": "unknown", + "fileHashValue": "@{body('Parse_JSON')?['Name']}", "ingestedDateTime": "@{utcNow()}", "targetProduct": "Azure Sentinel", - "threatType": "MaliciousUrl", - "tlpLevel": "amber", - "url": "@{body('Parse_JSON')?['Name']}" + "threatType": "Malware", + "tlpLevel": "amber" }, "host": { "triggerName": "Batch_messages", @@ -3216,7 +4866,7 @@ "method": "get", "path": "/fusion/files", "queries": { - "path": "/public/MicrosoftAzure/url_insikt.json" + "path": "/public/MicrosoftAzure/hash_observed_testing.json" } }, "type": "ApiConnection" @@ -3231,8 +4881,8 @@ "triggers": { "Recurrence": { "recurrence": { - "frequency": "Hour", - "interval": 2 + "frequency": "Day", + "interval": 1 }, "type": "Recurrence" } @@ -3249,9 +4899,6 @@ } } } - }, - "tags": { - "hidden-SentinelWorkspaceId": "[[variables('workspaceResourceId')]" } }, { @@ -3268,12 +4915,12 @@ { "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", "apiVersion": "2022-01-01-preview", - "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Playbook-', last(split(variables('playbookId6'),'/'))))]", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Playbook-', last(split(variables('playbookId12'),'/'))))]", "properties": { - "parentId": "[variables('playbookId6')]", - "contentId": "[variables('_playbookContentId6')]", + "parentId": "[variables('playbookId12')]", + "contentId": "[variables('_playbookContentId12')]", "kind": "Playbook", - "version": "[variables('playbookVersion6')]", + "version": "[variables('playbookVersion12')]", "source": { "kind": "Solution", "name": "Recorded Future", @@ -3293,8 +4940,8 @@ } ], "metadata": { - "title": "RecordedFuture-URL-Recent_Rep_by_Insikt-TIProcessor", - "description": "This playbook leverages the Recorded Future API and automatically imports the Recently Reported by Insikt Group URL RiskList, as Threat Intelligence Indicators, for detection purposes in Microsoft Sentinel.\n\nThis playbook depends on RecordedFuture-ImportToSentinel that need to be installed **manually** before installing current playbook.", + "title": "RecordedFuture-HASH-Obs_in_Underground-TIProcessor", + "description": "**[Deprecated]**\nDeprecated due to changes in the Threat Intelligence Platform. Use the new IndicatorImport playbooks that is provided in this Solution.\n\nThis playbook leverages the Recorded Future API and automatically imports the Observed in Underground Virus Testing Sites Hash RiskList, as Threat Intelligence Indicators, for detection purposes in Microsoft Sentinel.\n\nThis playbook depends on RecordedFuture-ImportToSentinel that need to be installed **manually** before installing current playbook.", "prerequisites": [ "First install the RecordedFuture-ImportToSentinel playbook.", "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials" @@ -3302,67 +4949,69 @@ "postDeployment": [ "After deployment you have to open the playbook to configure all connections and press save." ], - "lastUpdateTime": "2022-08-01T00:00:00Z", + "lastUpdateTime": "2023-08-09T00:00:00Z", "tags": [ + "Deprecated", "Threat Intelligence" ], "releaseNotes": [ { - "version": "1.0.0", - "title": "RecordedFuture-URL-Recent_Rep_by_Insikt_Group-IndicatorProcessor", + "version": "1.1", + "title": "Deprecated", + "notes": [ + "Deprecated in favor for the new IndicatorImport playbooks. More information can be found in the readme on Github https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Recorded%20Future/Playbooks/readme.md", + "Once a new IndicatorImport playbook is installed downloading the same risk list. Deactivate or delete this playbook." + ] + }, + { + "version": "1.0", + "title": "RecordedFuture-HASH-Obs_in_Underground-TIProcessor", "notes": [ "Initial version" ] } ] } - } - } - }, - { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", - "name": "[variables('playbookTemplateSpecName7')]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Playbook" - }, - "properties": { - "description": "RecordedFuture-Ukraine-IndicatorProcessor playbook", - "displayName": "RecordedFuture-Ukraine-IndicatorProcessor playbook" + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_playbookContentId12')]", + "contentKind": "Playbook", + "displayName": "RecordedFuture-HASH-Obs_in_Underground-TIProcessor", + "contentProductId": "[variables('_playbookcontentProductId12')]", + "id": "[variables('_playbookcontentProductId12')]", + "version": "[variables('playbookVersion12')]" } }, { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('playbookTemplateSpecName7'),'/',variables('playbookVersion7'))]", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", + "name": "[variables('playbookTemplateSpecName13')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Playbook" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('playbookTemplateSpecName7'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "RecordedFuture-Ukraine-IndicatorProcessor Playbook with template version 2.4.0", + "description": "RecordedFuture-IP-Actively_Comm_C2_Server-TIProcessor Playbook with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", - "contentVersion": "[variables('playbookVersion7')]", + "contentVersion": "[variables('playbookVersion13')]", "parameters": { "PlaybookName": { - "defaultValue": "RecordedFuture-Ukraine-IndicatorProcessor", - "type": "string" + "defaultValue": "RecordedFuture-IP-Actively_Comm_C2_Server-TIProcessor", + "type": "String" }, "PlaybookNameBatching": { "defaultValue": "RecordedFuture-ImportToSentinel", - "type": "string" + "type": "String" } }, "variables": { - "RecordedfutureConnectionName": "recordedfuture-connectorv2", - "connection-2": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/Recordedfuturev2')]", + "RecordedFutureConnectionName": "recordedfuture-connectorv2", + "connection-2": "[[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/',variables('workspace-location-inline'),'/managedApis/recordedfuturev2')]", "_connection-2": "[[variables('connection-2')]", "workspace-location-inline": "[concat('[resourceGroup().locatio', 'n]')]", "workspace-name": "[parameters('workspace')]", @@ -3370,36 +5019,25 @@ }, "resources": [ { + "type": "Microsoft.Logic/workflows", + "apiVersion": "2019-05-01", + "name": "[[parameters('PlaybookName')]", + "location": "[[variables('workspace-location-inline')]", + "tags": { + "hidden-SentinelTemplateName": "RecordedFuture-IP-Actively_Comm_C2_Server-TIProcessor", + "hidden-SentinelTemplateVersion": "1.1", + "hidden-SentinelWorkspaceId": "[[variables('workspaceResourceId')]" + }, + "dependsOn": [ + "[[resourceId('Microsoft.Web/connections', variables('RecordedFutureConnectionName'))]" + ], "properties": { - "provisioningState": "Succeeded", - "state": "Enabled", "definition": { "$schema": "https://schema.management.azure.com/providers/Microsoft.Logic/schemas/2016-06-01/workflowdefinition.json#", - "contentVersion": "1.0.0.0", - "parameters": { - "$connections": { - "type": "Object" - } - }, - "triggers": { - "Recurrence": { - "recurrence": { - "frequency": "Day", - "interval": 1 - }, - "evaluatedRecurrence": { - "frequency": "Day", - "interval": 1 - }, - "type": "Recurrence" - } - }, "actions": { "For_each": { - "foreach": "@body('Recorded_Future_RiskLists_and_SCF_Download')", "actions": { "Parse_JSON": { - "type": "ParseJson", "inputs": { "content": "@items('For_each')", "schema": { @@ -3451,15 +5089,10 @@ }, "type": "object" } - } - }, - "RecordedFuture_Ukraine_Detection_ImportToSentinel": { - "runAfter": { - "Parse_JSON": [ - "Succeeded" - ] }, - "type": "SendToBatch", + "type": "ParseJson" + }, + "RecordedFuture-ImportToSentinel": { "inputs": { "batchName": "RFImportToSentinel", "content": { @@ -3467,14 +5100,13 @@ "additionalInformation": "@{body('Parse_JSON')?['EvidenceDetails']}", "azureTenantId": "[[subscription().tenantId]", "confidence": "@int(body('Parse_JSON')?['Risk'])", - "description": "Recorded Future - Ukraine IP Detection", - "expirationDateTime": "@{addDays(utcNow(),1)}", + "description": "Recorded Future - IP - Actively Communicating C&C Server", + "expirationDateTime": "@{addHours(utcNow(),1)}", "ingestedDateTime": "@{utcNow()}", - "isActive": true, "networkIPv4": "@{body('Parse_JSON')?['Name']}", "targetProduct": "Azure Sentinel", - "threatType": "WatchList", - "tlpLevel": "Amber" + "threatType": "C2", + "tlpLevel": "amber" }, "host": { "triggerName": "Batch_messages", @@ -3482,9 +5114,16 @@ "id": "[[concat('/subscriptions/', subscription().subscriptionId, '/resourceGroups/', resourceGroup().name, '/providers/Microsoft.Logic/workflows/', parameters('PlaybookNameBatching'))]" } } - } + }, + "runAfter": { + "Parse_JSON": [ + "Succeeded" + ] + }, + "type": "SendToBatch" } }, + "foreach": "@body('Recorded_Future_RiskLists_and_SCF_Download')", "runAfter": { "Recorded_Future_RiskLists_and_SCF_Download": [ "Succeeded" @@ -3492,110 +5131,190 @@ }, "type": "Foreach" }, - "For_each_2": { - "foreach": "@body('Recorded_Future_RiskLists_and_SCF_Download_2')", - "actions": { - "Parse_JSON_2": { - "type": "ParseJson", - "inputs": { - "content": "@items('For_each_2')", - "schema": { - "properties": { - "EvidenceDetails": { - "properties": { - "EvidenceDetails": { - "items": { - "properties": { - "Criticality": { - "type": "integer" - }, - "CriticalityLabel": { - "type": "string" - }, - "EvidenceString": { - "type": "string" - }, - "Rule": { - "type": "string" - }, - "Timestamp": { - "type": "integer" - } - }, - "required": [ - "Rule", - "EvidenceString", - "CriticalityLabel", - "Timestamp", - "Criticality" - ], - "type": "object" - }, - "type": "array" - } - }, - "type": "object" - }, - "Name": { - "type": "string" - }, - "Risk": { - "type": "integer" - }, - "riskString": { - "type": "string" - } - }, - "type": "object" - } + "Recorded_Future_RiskLists_and_SCF_Download": { + "inputs": { + "host": { + "connection": { + "name": "@parameters('$connections')['recordedfuture']['connectionId']" } }, - "RecordedFuture_Ukraine_Detection_ImportToSentinel_2": { - "runAfter": { - "Parse_JSON_2": [ - "Succeeded" - ] - }, - "type": "SendToBatch", - "inputs": { - "batchName": "RFImportToSentinel", - "content": { - "action": "alert", - "additionalInformation": "@{body('Parse_JSON_2')?['EvidenceDetails']}", - "azureTenantId": "[[subscription().tenantId]", - "confidence": "@int(body('Parse_JSON_2')?['Risk'])", - "description": "Recorded Future - Ukraine Domain Detection", - "domainName": "@{body('Parse_JSON_2')?['Name']}", - "expirationDateTime": "@{addHours(utcNow(),2)}", - "ingestedDateTime": "@{utcNow()}", - "isActive": true, - "targetProduct": "Microsoft Sentinel", - "threatType": "WatchList", - "tlpLevel": "Amber" - }, - "host": { - "triggerName": "Batch_messages", - "workflow": { - "id": "[[concat('/subscriptions/', subscription().subscriptionId, '/resourceGroups/', resourceGroup().name, '/providers/Microsoft.Logic/workflows/', parameters('PlaybookNameBatching'))]" - } - } - } + "method": "get", + "path": "/fusion/files", + "queries": { + "path": "/public/MicrosoftAzure/ip_active_c2.json" } }, - "runAfter": { - "Recorded_Future_RiskLists_and_SCF_Download_2": [ - "Succeeded" - ] + "type": "ApiConnection" + } + }, + "contentVersion": "1.0.0.0", + "parameters": { + "$connections": { + "type": "Object" + } + }, + "triggers": { + "Recurrence": { + "recurrence": { + "frequency": "Hour", + "interval": 1 }, - "type": "Foreach" - }, - "For_each_3": { - "foreach": "@body('Recorded_Future_RiskLists_and_SCF_Download_3')", + "type": "Recurrence" + } + } + }, + "parameters": { + "$connections": { + "value": { + "recordedfuture": { + "id": "[[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/',variables('workspace-location-inline'),'/managedApis/recordedfuturev2')]", + "connectionId": "[[resourceId('Microsoft.Web/connections', variables('RecordedFutureConnectionName'))]", + "connectionName": "[[variables('RecordedFutureConnectionName')]" + } + } + } + } + } + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "name": "[[variables('RecordedFutureConnectionName')]", + "location": "[[variables('workspace-location-inline')]", + "properties": { + "api": { + "id": "[[variables('_connection-2')]" + } + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", + "apiVersion": "2022-01-01-preview", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Playbook-', last(split(variables('playbookId13'),'/'))))]", + "properties": { + "parentId": "[variables('playbookId13')]", + "contentId": "[variables('_playbookContentId13')]", + "kind": "Playbook", + "version": "[variables('playbookVersion13')]", + "source": { + "kind": "Solution", + "name": "Recorded Future", + "sourceId": "[variables('_solutionId')]" + }, + "author": { + "name": "Recorded Future Premier Integrations", + "email": "[variables('_email')]" + }, + "support": { + "name": "Recorded Future Support Team", + "email": "support@recordedfuture.com", + "tier": "Partner", + "link": "http://support.recordedfuture.com/" + } + } + } + ], + "metadata": { + "title": "RecordedFuture-IP-Actively_Comm_C2_Server-TIProcessor", + "description": "**[Deprecated]**\nDeprecated due to changes in the Threat Intelligence Platform. Use the new IndicatorImport playbooks that is provided in this Solution.\n\nThis playbook leverages the Recorded Future API and automatically imports the Actively Communicating C&C Server IP RiskList, as Threat Intelligence Indicators, for detection purposes in Microsoft Sentinel.\n\nThis playbook depends on RecordedFuture-ImportToSentinel that need to be installed **manually** before installing current playbook.", + "prerequisites": [ + "First install the RecordedFuture-ImportToSentinel playbook.", + "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials" + ], + "postDeployment": [ + "After deployment you have to open the playbook to configure all connections and press save." + ], + "lastUpdateTime": "2023-08-09T00:00:00Z", + "tags": [ + "Deprecated", + "Threat Intelligence" + ], + "releaseNotes": [ + { + "version": "1.1", + "title": "Deprecated", + "notes": [ + "Deprecated in favor for the new IndicatorImport playbooks. More information can be found in the readme on Github https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Recorded%20Future/Playbooks/readme.md", + "Once a new IndicatorImport playbook is installed downloading the same risk list. Deactivate or delete this playbook." + ] + }, + { + "version": "1.0", + "title": "RecordedFuture-IP-Actively_Comm_C2_Server-IndicatorProcessor", + "notes": [ + "Initial version" + ] + } + ] + } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_playbookContentId13')]", + "contentKind": "Playbook", + "displayName": "RecordedFuture-IP-Actively_Comm_C2_Server-TIProcessor", + "contentProductId": "[variables('_playbookcontentProductId13')]", + "id": "[variables('_playbookcontentProductId13')]", + "version": "[variables('playbookVersion13')]" + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", + "name": "[variables('playbookTemplateSpecName14')]", + "location": "[parameters('workspace-location')]", + "dependsOn": [ + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" + ], + "properties": { + "description": "RecordedFuture-URL-Recent_Rep_by_Insikt-TIProcessor Playbook with template version 3.0.0", + "mainTemplate": { + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "[variables('playbookVersion14')]", + "parameters": { + "PlaybookName": { + "defaultValue": "RecordedFuture-URL-Recent_Rep_by_Insikt-TIProcessor", + "type": "String" + }, + "PlaybookNameBatching": { + "defaultValue": "RecordedFuture-ImportToSentinel", + "type": "String" + } + }, + "variables": { + "RecordedFutureConnectionName": "recordedfuture-connectorv2", + "connection-2": "[[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/',variables('workspace-location-inline'),'/managedApis/recordedfuturev2')]", + "_connection-2": "[[variables('connection-2')]", + "workspace-location-inline": "[concat('[resourceGroup().locatio', 'n]')]", + "workspace-name": "[parameters('workspace')]", + "workspaceResourceId": "[[resourceId('microsoft.OperationalInsights/Workspaces', variables('workspace-name'))]" + }, + "resources": [ + { + "type": "Microsoft.Logic/workflows", + "apiVersion": "2019-05-01", + "name": "[[parameters('PlaybookName')]", + "location": "[[variables('workspace-location-inline')]", + "tags": { + "hidden-SentinelTemplateName": "RecordedFuture-URL-Recent_Rep_by_Insikt-TIProcessor", + "hidden-SentinelTemplateVersion": "1.1", + "hidden-SentinelWorkspaceId": "[[variables('workspaceResourceId')]" + }, + "dependsOn": [ + "[[resourceId('Microsoft.Web/connections', variables('RecordedFutureConnectionName'))]" + ], + "properties": { + "definition": { + "$schema": "https://schema.management.azure.com/providers/Microsoft.Logic/schemas/2016-06-01/workflowdefinition.json#", + "actions": { + "For_each": { "actions": { - "Parse_JSON_3": { - "type": "ParseJson", + "Parse_JSON": { "inputs": { - "content": "@items('For_each_3')", + "content": "@items('For_each')", "schema": { "properties": { "EvidenceDetails": { @@ -3603,257 +5322,66 @@ "EvidenceDetails": { "items": { "properties": { - "Criticality": { - "type": "integer" - }, - "CriticalityLabel": { - "type": "string" - }, - "EvidenceString": { - "type": "string" - }, - "Rule": { - "type": "string" - }, - "Timestamp": { - "type": "integer" - } - }, - "required": [ - "Rule", - "EvidenceString", - "CriticalityLabel", - "Timestamp", - "Criticality" - ], - "type": "object" - }, - "type": "array" - } - }, - "type": "object" - }, - "Name": { - "type": "string" - }, - "Risk": { - "type": "integer" - }, - "riskString": { - "type": "string" - } - }, - "type": "object" - } - } - }, - "RecordedFuture_Ukraine_Detection_ImportToSentinel_3": { - "runAfter": { - "Parse_JSON_3": [ - "Succeeded" - ] - }, - "type": "SendToBatch", - "inputs": { - "batchName": "RFImportToSentinel", - "content": { - "action": "alert", - "additionalInformation": "@{body('Parse_JSON_3')?['EvidenceDetails']}", - "azureTenantId": "[[subscription().tenantId]", - "confidence": "@int(body('Parse_JSON_3')?['Risk'])", - "description": "Recorded Future - Ukraine Url Detection", - "expirationDateTime": "@{addHours(utcNow(),2)}", - "ingestedDateTime": "@{utcNow()}", - "isActive": true, - "targetProduct": "Microsoft Sentinel", - "threatType": "MaliciousUrl", - "tlpLevel": "Amber", - "url": "@{body('Parse_JSON_3')?['Name']}" - }, - "host": { - "triggerName": "Batch_messages", - "workflow": { - "id": "[[concat('/subscriptions/', subscription().subscriptionId, '/resourceGroups/', resourceGroup().name, '/providers/Microsoft.Logic/workflows/', parameters('PlaybookNameBatching'))]" - } - } - } - } - }, - "runAfter": { - "Recorded_Future_RiskLists_and_SCF_Download_3": [ - "Succeeded" - ] - }, - "type": "Foreach" - }, - "For_each_4": { - "foreach": "@body('Recorded_Future_RiskLists_and_SCF_Download_4')", - "actions": { - "Parse_JSON_4": { - "type": "ParseJson", - "inputs": { - "content": "@items('For_each_4')", - "schema": { - "properties": { - "body": { - "items": { - "properties": { - "Algorithm": { - "type": "string" - }, - "EvidenceDetails": { - "properties": { - "EvidenceDetails": { - "items": { - "properties": { - "Criticality": { - "type": "integer" - }, - "CriticalityLabel": { - "type": "string" - }, - "EvidenceString": { - "type": "string" - }, - "MitigationString": { - "type": "string" - }, - "Rule": { - "type": "string" - }, - "Timestamp": { - "type": "integer" - } - }, - "required": [ - "Rule", - "EvidenceString", - "CriticalityLabel", - "Timestamp", - "MitigationString", - "Criticality" - ], - "type": "object" - }, - "type": "array" - } - }, - "type": "object" - }, - "Name": { - "type": "string" - }, - "Risk": { - "type": "integer" - }, - "RiskString": { - "type": "string" - } - }, - "required": [ - "Name", - "Algorithm", - "Risk", - "RiskString", - "EvidenceDetails" - ], - "type": "object" - }, - "type": "array" - }, - "headers": { - "properties": { - "CF-Cache-Status": { - "type": "string" - }, - "CF-RAY": { - "type": "string" - }, - "Cache-Control": { - "type": "string" - }, - "Content-Length": { - "type": "string" - }, - "Content-Type": { - "type": "string" - }, - "Date": { - "type": "string" - }, - "Expect-CT": { - "type": "string" - }, - "Timing-Allow-Origin": { - "type": "string" - }, - "Transfer-Encoding": { - "type": "string" - }, - "pragma": { - "type": "string" - }, - "referrer-policy": { - "type": "string" - }, - "strict-transport-security": { - "type": "string" - }, - "x-content-type-options": { - "type": "string" - }, - "x-frame-options": { - "type": "string" - }, - "x-ms-apihub-cached-response": { - "type": "string" - }, - "x-ms-apihub-obo": { - "type": "string" - }, - "x-rf-proxy-basepath": { - "type": "string" - }, - "x-rf-proxy-serviceid": { - "type": "string" - }, - "x-xss-protection": { - "type": "string" + "Criticality": { + "type": "integer" + }, + "CriticalityLabel": { + "type": "string" + }, + "EvidenceString": { + "type": "string" + }, + "Rule": { + "type": "string" + }, + "Timestamp": { + "type": "integer" + } + }, + "required": [ + "Rule", + "EvidenceString", + "CriticalityLabel", + "Timestamp", + "Criticality" + ], + "type": "object" + }, + "type": "array" } }, "type": "object" }, - "statusCode": { + "Name": { + "type": "string" + }, + "Risk": { "type": "integer" + }, + "riskString": { + "type": "string" } }, "type": "object" } - } - }, - "RecordedFuture_Ukraine_Detection_ImportToSentinel_4": { - "runAfter": { - "Parse_JSON_4": [ - "Succeeded" - ] }, - "type": "SendToBatch", + "type": "ParseJson" + }, + "RecordedFuture-ImportToSentinel": { "inputs": { "batchName": "RFImportToSentinel", "content": { "action": "alert", - "additionalInformation": "@{body('Parse_JSON_4')?['EvidenceDetails']}", + "additionalInformation": "@{body('Parse_JSON')?['EvidenceDetails']}", "azureTenantId": "[[subscription().tenantId]", - "confidence": "@int(body('Parse_JSON_4')?['Risk'])", - "description": "Recorded Future - Ukraine File Hash Detection", + "confidence": "@int(body('Parse_JSON')?['Risk'])", + "description": "Recorded Future - URL - Recently Reported by Insikt Group", "expirationDateTime": "@{addHours(utcNow(),2)}", - "filehashtype": "@{replace(replace(body('Parse_JSON_4')?['Algorithm'],'SHA-256', 'sha256'),'SHA-1', 'sha1')}", - "filehashvalue": "@{body('Parse_JSON_4')?['Name']}", "ingestedDateTime": "@{utcNow()}", - "isActive": true, - "targetProduct": "Microsoft Sentinel", - "threatType": "Malware", - "tlpLevel": "Amber" + "targetProduct": "Azure Sentinel", + "threatType": "MaliciousUrl", + "tlpLevel": "amber", + "url": "@{body('Parse_JSON')?['Name']}" }, "host": { "triggerName": "Batch_messages", @@ -3861,63 +5389,24 @@ "id": "[[concat('/subscriptions/', subscription().subscriptionId, '/resourceGroups/', resourceGroup().name, '/providers/Microsoft.Logic/workflows/', parameters('PlaybookNameBatching'))]" } } - } + }, + "runAfter": { + "Parse_JSON": [ + "Succeeded" + ] + }, + "type": "SendToBatch" } }, + "foreach": "@body('Recorded_Future_RiskLists_and_SCF_Download')", "runAfter": { - "Recorded_Future_RiskLists_and_SCF_Download_4": [ + "Recorded_Future_RiskLists_and_SCF_Download": [ "Succeeded" ] }, "type": "Foreach" }, "Recorded_Future_RiskLists_and_SCF_Download": { - "type": "ApiConnection", - "inputs": { - "host": { - "connection": { - "name": "@parameters('$connections')['recordedfuture']['connectionId']" - } - }, - "method": "get", - "path": "/fusion/files", - "queries": { - "path": "/public/ukraine/ukraine_russia_ip.csv" - } - } - }, - "Recorded_Future_RiskLists_and_SCF_Download_2": { - "type": "ApiConnection", - "inputs": { - "host": { - "connection": { - "name": "@parameters('$connections')['recordedfuture']['connectionId']" - } - }, - "method": "get", - "path": "/fusion/files", - "queries": { - "path": "/public/ukraine/ukraine_russia_domain.csv" - } - } - }, - "Recorded_Future_RiskLists_and_SCF_Download_3": { - "type": "ApiConnection", - "inputs": { - "host": { - "connection": { - "name": "@parameters('$connections')['recordedfuture']['connectionId']" - } - }, - "method": "get", - "path": "/fusion/files", - "queries": { - "path": "/public/ukraine/ukraine_russia_url.csv" - } - } - }, - "Recorded_Future_RiskLists_and_SCF_Download_4": { - "type": "ApiConnection", "inputs": { "host": { "connection": { @@ -3927,9 +5416,25 @@ "method": "get", "path": "/fusion/files", "queries": { - "path": "/public/ukraine/ukraine_russia_hash.csv" + "path": "/public/MicrosoftAzure/url_insikt.json" } - } + }, + "type": "ApiConnection" + } + }, + "contentVersion": "1.0.0.0", + "parameters": { + "$connections": { + "type": "Object" + } + }, + "triggers": { + "Recurrence": { + "recurrence": { + "frequency": "Hour", + "interval": 2 + }, + "type": "Recurrence" } } }, @@ -3937,38 +5442,21 @@ "$connections": { "value": { "recordedfuture": { - "connectionId": "[[resourceId('Microsoft.Web/connections', variables('RecordedfutureConnectionName'))]", - "connectionName": "[[variables('RecordedfutureConnectionName')]", - "id": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/Recordedfuturev2')]" + "id": "[[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/',variables('workspace-location-inline'),'/managedApis/recordedfuturev2')]", + "connectionId": "[[resourceId('Microsoft.Web/connections', variables('RecordedFutureConnectionName'))]", + "connectionName": "[[variables('RecordedFutureConnectionName')]" } } } } - }, - "name": "[[parameters('PlaybookName')]", - "type": "Microsoft.Logic/workflows", - "location": "[[variables('workspace-location-inline')]", - "tags": { - "hidden-SentinelTemplateName": "RecordedFuture_Ukraine_Detection_IndicatorProcessor", - "hidden-SentinelTemplateVersion": "1.0", - "hidden-SentinelWorkspaceId": "[[variables('workspaceResourceId')]" - }, - "identity": { - "type": "SystemAssigned" - }, - "apiVersion": "2017-07-01", - "dependsOn": [ - "[[resourceId('Microsoft.Web/connections', variables('RecordedfutureConnectionName'))]" - ] + } }, { "type": "Microsoft.Web/connections", "apiVersion": "2016-06-01", - "name": "[[variables('RecordedfutureConnectionName')]", + "name": "[[variables('RecordedFutureConnectionName')]", "location": "[[variables('workspace-location-inline')]", - "kind": "V1", "properties": { - "displayName": "[[variables('RecordedfutureConnectionName')]", "api": { "id": "[[variables('_connection-2')]" } @@ -3977,12 +5465,12 @@ { "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", "apiVersion": "2022-01-01-preview", - "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Playbook-', last(split(variables('playbookId7'),'/'))))]", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Playbook-', last(split(variables('playbookId14'),'/'))))]", "properties": { - "parentId": "[variables('playbookId7')]", - "contentId": "[variables('_playbookContentId7')]", + "parentId": "[variables('playbookId14')]", + "contentId": "[variables('_playbookContentId14')]", "kind": "Playbook", - "version": "[variables('playbookVersion7')]", + "version": "[variables('playbookVersion14')]", "source": { "kind": "Solution", "name": "Recorded Future", @@ -4002,8 +5490,8 @@ } ], "metadata": { - "title": "RecordedFuture-Ukraine-IndicatorProcessor", - "description": "This playbook leverages the Recorded Future API and automatically imports the Ukraine RiskLists, as Threat Intelligence Indicators, for detection purposes in Microsoft Sentinel.\n\nThis playbook depends on RecordedFuture-ImportToSentinel that need to be installed **manually** before installing current playbook.", + "title": "RecordedFuture-URL-Recent_Rep_by_Insikt-TIProcessor", + "description": "**[Deprecated]**\nDeprecated due to changes in the Threat Intelligence Platform. Use the new IndicatorImport playbooks that is provided in this Solution.\n\nThis playbook leverages the Recorded Future API and automatically imports the Recently Reported by Insikt Group URL RiskList, as Threat Intelligence Indicators, for detection purposes in Microsoft Sentinel.\n\nThis playbook depends on RecordedFuture-ImportToSentinel that need to be installed **manually** before installing current playbook.", "prerequisites": [ "First install the RecordedFuture-ImportToSentinel playbook.", "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials" @@ -4011,71 +5499,70 @@ "postDeployment": [ "After deployment you have to open the playbook to configure all connections and press save." ], - "lastUpdateTime": "2022-09-20T00:00:00Z", + "lastUpdateTime": "2022-08-09T00:00:00Z", "tags": [ + "Deprecated", "Threat Intelligence" ], - "releaseNotes": { - "version": "1.0", - "title": "[variables('blanks')]", - "notes": [ - "Initial version" - ] - } + "releaseNotes": [ + { + "version": "1.1", + "title": "Deprecated", + "notes": [ + "Deprecated in favor for the new IndicatorImport playbooks. More information can be found in the readme on Github https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Recorded%20Future/Playbooks/readme.md", + "Once a new IndicatorImport playbook is installed downloading the same risk list. Deactivate or delete this playbook." + ] + }, + { + "version": "1.0", + "title": "RecordedFuture-URL-Recent_Rep_by_Insikt_Group-IndicatorProcessor", + "notes": [ + "Initial version" + ] + } + ] } - } - } - }, - { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", - "name": "[variables('playbookTemplateSpecName8')]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Playbook" - }, - "properties": { - "description": "RecordedFuture-Sandbox_Enrichment-Url playbook", - "displayName": "RecordedFuture-Sandbox_Enrichment-Url playbook" + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_playbookContentId14')]", + "contentKind": "Playbook", + "displayName": "RecordedFuture-URL-Recent_Rep_by_Insikt-TIProcessor", + "contentProductId": "[variables('_playbookcontentProductId14')]", + "id": "[variables('_playbookcontentProductId14')]", + "version": "[variables('playbookVersion14')]" } }, { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('playbookTemplateSpecName8'),'/',variables('playbookVersion8'))]", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", + "name": "[variables('playbookTemplateSpecName15')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Playbook" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('playbookTemplateSpecName8'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "RecordedFuture-Sandbox_Enrichment-Url Playbook with template version 2.4.0", + "description": "RecordedFuture-Ukraine-IndicatorProcessor Playbook with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", - "contentVersion": "[variables('playbookVersion8')]", + "contentVersion": "[variables('playbookVersion15')]", "parameters": { "PlaybookName": { - "defaultValue": "RecordedFuture-Sandbox_Enrichment-Url", + "defaultValue": "RecordedFuture-Ukraine-IndicatorProcessor", "type": "string" }, - "Sandbox API Key": { - "type": "string", - "metadata": { - "description": "Enter value for Sandbox API Key. Retrive API Key from [Recorded Future Portal](https://sandbox.recordedfuture.com/account)" - } + "PlaybookNameBatching": { + "defaultValue": "RecordedFuture-ImportToSentinel", + "type": "string" } }, "variables": { - "RecordedfutureConnectionName": "[[concat('', parameters('PlaybookName'))]", - "MicrosoftSentinelConnectionName": "[[concat('MicrosoftSentinel-', parameters('PlaybookName'))]", - "connection-2": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/recordedfuturesandbo')]", + "RecordedfutureConnectionName": "recordedfuture-connectorv2", + "connection-2": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/Recordedfuturev2')]", "_connection-2": "[[variables('connection-2')]", - "connection-3": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/Azuresentinel')]", - "_connection-3": "[[variables('connection-3')]", "workspace-location-inline": "[concat('[resourceGroup().locatio', 'n]')]", "workspace-name": "[parameters('workspace')]", "workspaceResourceId": "[[resourceId('microsoft.OperationalInsights/Workspaces', variables('workspace-name'))]" @@ -4091,195 +5578,556 @@ "parameters": { "$connections": { "type": "Object" - }, - "Sandbox API Key": { - "defaultValue": "[[parameters('Sandbox API Key')]", - "type": "string" } }, "triggers": { - "Microsoft_Sentinel_incident": { - "type": "ApiConnectionWebhook", - "inputs": { - "body": { - "callback_url": "@{listCallbackUrl()}" - }, - "host": { - "connection": { - "name": "@parameters('$connections')['azuresentinel']['connectionId']" - } - }, - "path": "/incident-creation" - } - } - }, - "actions": { - "Entities_-_Get_URLs": { - "type": "ApiConnection", - "inputs": { - "body": "@triggerBody()?['object']?['properties']?['relatedEntities']", - "host": { - "connection": { - "name": "@parameters('$connections')['azuresentinel']['connectionId']" - } - }, - "method": "post", - "path": "/entities/url" - } - }, + "Recurrence": { + "recurrence": { + "frequency": "Day", + "interval": 1 + }, + "evaluatedRecurrence": { + "frequency": "Day", + "interval": 1 + }, + "type": "Recurrence" + } + }, + "actions": { "For_each": { - "foreach": "@body('Entities_-_Get_URLs')?['URLs']", + "foreach": "@body('Recorded_Future_RiskLists_and_SCF_Download')", "actions": { - "Add_comment_to_incident_(V3)": { + "Parse_JSON": { + "type": "ParseJson", + "inputs": { + "content": "@items('For_each')", + "schema": { + "properties": { + "EvidenceDetails": { + "properties": { + "EvidenceDetails": { + "items": { + "properties": { + "Criticality": { + "type": "integer" + }, + "CriticalityLabel": { + "type": "string" + }, + "EvidenceString": { + "type": "string" + }, + "Rule": { + "type": "string" + }, + "Timestamp": { + "type": "integer" + } + }, + "required": [ + "Rule", + "EvidenceString", + "CriticalityLabel", + "Timestamp", + "Criticality" + ], + "type": "object" + }, + "type": "array" + } + }, + "type": "object" + }, + "Name": { + "type": "string" + }, + "Risk": { + "type": "integer" + }, + "riskString": { + "type": "string" + } + }, + "type": "object" + } + } + }, + "RecordedFuture_Ukraine_Detection_ImportToSentinel": { "runAfter": { - "Get_the_full_report": [ + "Parse_JSON": [ "Succeeded" ] }, - "type": "ApiConnection", + "type": "SendToBatch", "inputs": { - "body": { - "incidentArmId": "@triggerBody()?['object']?['id']", - "message": "

@{body('Get_the_full_report')?['html_report']}

" + "batchName": "RFImportToSentinel", + "content": { + "action": "alert", + "additionalInformation": "@{body('Parse_JSON')?['EvidenceDetails']}", + "azureTenantId": "[[subscription().tenantId]", + "confidence": "@int(body('Parse_JSON')?['Risk'])", + "description": "Recorded Future - Ukraine IP Detection", + "expirationDateTime": "@{addDays(utcNow(),1)}", + "ingestedDateTime": "@{utcNow()}", + "isActive": true, + "networkIPv4": "@{body('Parse_JSON')?['Name']}", + "targetProduct": "Azure Sentinel", + "threatType": "WatchList", + "tlpLevel": "Amber" }, "host": { - "connection": { - "name": "@parameters('$connections')['azuresentinel']['connectionId']" + "triggerName": "Batch_messages", + "workflow": { + "id": "[[concat('/subscriptions/', subscription().subscriptionId, '/resourceGroups/', resourceGroup().name, '/providers/Microsoft.Logic/workflows/', parameters('PlaybookNameBatching'))]" } - }, - "method": "post", - "path": "/Incidents/Comment" + } + } + } + }, + "runAfter": { + "Recorded_Future_RiskLists_and_SCF_Download": [ + "Succeeded" + ] + }, + "type": "Foreach" + }, + "For_each_2": { + "foreach": "@body('Recorded_Future_RiskLists_and_SCF_Download_2')", + "actions": { + "Parse_JSON_2": { + "type": "ParseJson", + "inputs": { + "content": "@items('For_each_2')", + "schema": { + "properties": { + "EvidenceDetails": { + "properties": { + "EvidenceDetails": { + "items": { + "properties": { + "Criticality": { + "type": "integer" + }, + "CriticalityLabel": { + "type": "string" + }, + "EvidenceString": { + "type": "string" + }, + "Rule": { + "type": "string" + }, + "Timestamp": { + "type": "integer" + } + }, + "required": [ + "Rule", + "EvidenceString", + "CriticalityLabel", + "Timestamp", + "Criticality" + ], + "type": "object" + }, + "type": "array" + } + }, + "type": "object" + }, + "Name": { + "type": "string" + }, + "Risk": { + "type": "integer" + }, + "riskString": { + "type": "string" + } + }, + "type": "object" + } } }, - "Get_the_full_report": { + "RecordedFuture_Ukraine_Detection_ImportToSentinel_2": { "runAfter": { - "Wait_for_sandbox_report": [ + "Parse_JSON_2": [ "Succeeded" ] }, - "type": "ApiConnection", + "type": "SendToBatch", "inputs": { - "headers": { - "SandboxToken": "@parameters('Sandbox API Key')" + "batchName": "RFImportToSentinel", + "content": { + "action": "alert", + "additionalInformation": "@{body('Parse_JSON_2')?['EvidenceDetails']}", + "azureTenantId": "[[subscription().tenantId]", + "confidence": "@int(body('Parse_JSON_2')?['Risk'])", + "description": "Recorded Future - Ukraine Domain Detection", + "domainName": "@{body('Parse_JSON_2')?['Name']}", + "expirationDateTime": "@{addHours(utcNow(),2)}", + "ingestedDateTime": "@{utcNow()}", + "isActive": true, + "targetProduct": "Microsoft Sentinel", + "threatType": "WatchList", + "tlpLevel": "Amber" }, "host": { - "connection": { - "name": "@parameters('$connections')['recordedfuturesandbo']['connectionId']" + "triggerName": "Batch_messages", + "workflow": { + "id": "[[concat('/subscriptions/', subscription().subscriptionId, '/resourceGroups/', resourceGroup().name, '/providers/Microsoft.Logic/workflows/', parameters('PlaybookNameBatching'))]" } - }, - "method": "get", - "path": "/samples/@{encodeURIComponent(body('Get_the_full_summary')?['id'])}/overview.json" + } + } + } + }, + "runAfter": { + "Recorded_Future_RiskLists_and_SCF_Download_2": [ + "Succeeded" + ] + }, + "type": "Foreach" + }, + "For_each_3": { + "foreach": "@body('Recorded_Future_RiskLists_and_SCF_Download_3')", + "actions": { + "Parse_JSON_3": { + "type": "ParseJson", + "inputs": { + "content": "@items('For_each_3')", + "schema": { + "properties": { + "EvidenceDetails": { + "properties": { + "EvidenceDetails": { + "items": { + "properties": { + "Criticality": { + "type": "integer" + }, + "CriticalityLabel": { + "type": "string" + }, + "EvidenceString": { + "type": "string" + }, + "Rule": { + "type": "string" + }, + "Timestamp": { + "type": "integer" + } + }, + "required": [ + "Rule", + "EvidenceString", + "CriticalityLabel", + "Timestamp", + "Criticality" + ], + "type": "object" + }, + "type": "array" + } + }, + "type": "object" + }, + "Name": { + "type": "string" + }, + "Risk": { + "type": "integer" + }, + "riskString": { + "type": "string" + } + }, + "type": "object" + } } }, - "Initialize_Sandbox_status": { + "RecordedFuture_Ukraine_Detection_ImportToSentinel_3": { "runAfter": { - "Submit_url_samples": [ + "Parse_JSON_3": [ "Succeeded" ] }, - "type": "SetVariable", - "inputs": { - "name": "sandbox_status", - "value": "@body('Submit_url_samples')?['status']" - } - }, - "Submit_url_samples": { - "type": "ApiConnection", + "type": "SendToBatch", "inputs": { - "body": { - "url": "@items('For_each')?['Url']" - }, - "headers": { - "Content-Type": "application/json", - "SandboxToken": "@parameters('Sandbox API Key')" + "batchName": "RFImportToSentinel", + "content": { + "action": "alert", + "additionalInformation": "@{body('Parse_JSON_3')?['EvidenceDetails']}", + "azureTenantId": "[[subscription().tenantId]", + "confidence": "@int(body('Parse_JSON_3')?['Risk'])", + "description": "Recorded Future - Ukraine Url Detection", + "expirationDateTime": "@{addHours(utcNow(),2)}", + "ingestedDateTime": "@{utcNow()}", + "isActive": true, + "targetProduct": "Microsoft Sentinel", + "threatType": "MaliciousUrl", + "tlpLevel": "Amber", + "url": "@{body('Parse_JSON_3')?['Name']}" }, "host": { - "connection": { - "name": "@parameters('$connections')['recordedfuturesandbo']['connectionId']" + "triggerName": "Batch_messages", + "workflow": { + "id": "[[concat('/subscriptions/', subscription().subscriptionId, '/resourceGroups/', resourceGroup().name, '/providers/Microsoft.Logic/workflows/', parameters('PlaybookNameBatching'))]" } - }, - "method": "post", - "path": "/samples/url" + } } - }, - "Wait_for_sandbox_report": { - "actions": { - "Delay": { - "runAfter": { - "Set_sandbox_status": [ - "Succeeded" - ] - }, - "type": "Wait", - "inputs": { - "interval": { - "count": 2, - "unit": "Minute" - } - } - }, - "Get_the_full_summary": { - "type": "ApiConnection", - "inputs": { - "headers": { - "SandboxToken": "@parameters('Sandbox API Key')" + } + }, + "runAfter": { + "Recorded_Future_RiskLists_and_SCF_Download_3": [ + "Succeeded" + ] + }, + "type": "Foreach" + }, + "For_each_4": { + "foreach": "@body('Recorded_Future_RiskLists_and_SCF_Download_4')", + "actions": { + "Parse_JSON_4": { + "type": "ParseJson", + "inputs": { + "content": "@items('For_each_4')", + "schema": { + "properties": { + "body": { + "items": { + "properties": { + "Algorithm": { + "type": "string" + }, + "EvidenceDetails": { + "properties": { + "EvidenceDetails": { + "items": { + "properties": { + "Criticality": { + "type": "integer" + }, + "CriticalityLabel": { + "type": "string" + }, + "EvidenceString": { + "type": "string" + }, + "MitigationString": { + "type": "string" + }, + "Rule": { + "type": "string" + }, + "Timestamp": { + "type": "integer" + } + }, + "required": [ + "Rule", + "EvidenceString", + "CriticalityLabel", + "Timestamp", + "MitigationString", + "Criticality" + ], + "type": "object" + }, + "type": "array" + } + }, + "type": "object" + }, + "Name": { + "type": "string" + }, + "Risk": { + "type": "integer" + }, + "RiskString": { + "type": "string" + } + }, + "required": [ + "Name", + "Algorithm", + "Risk", + "RiskString", + "EvidenceDetails" + ], + "type": "object" + }, + "type": "array" }, - "host": { - "connection": { - "name": "@parameters('$connections')['recordedfuturesandbo']['connectionId']" - } + "headers": { + "properties": { + "CF-Cache-Status": { + "type": "string" + }, + "CF-RAY": { + "type": "string" + }, + "Cache-Control": { + "type": "string" + }, + "Content-Length": { + "type": "string" + }, + "Content-Type": { + "type": "string" + }, + "Date": { + "type": "string" + }, + "Expect-CT": { + "type": "string" + }, + "Timing-Allow-Origin": { + "type": "string" + }, + "Transfer-Encoding": { + "type": "string" + }, + "pragma": { + "type": "string" + }, + "referrer-policy": { + "type": "string" + }, + "strict-transport-security": { + "type": "string" + }, + "x-content-type-options": { + "type": "string" + }, + "x-frame-options": { + "type": "string" + }, + "x-ms-apihub-cached-response": { + "type": "string" + }, + "x-ms-apihub-obo": { + "type": "string" + }, + "x-rf-proxy-basepath": { + "type": "string" + }, + "x-rf-proxy-serviceid": { + "type": "string" + }, + "x-xss-protection": { + "type": "string" + } + }, + "type": "object" }, - "method": "get", - "path": "/samples/@{encodeURIComponent(body('Submit_url_samples')?['id'])}" - } - }, - "Set_sandbox_status": { - "runAfter": { - "Get_the_full_summary": [ - "Succeeded" - ] + "statusCode": { + "type": "integer" + } }, - "type": "SetVariable", - "inputs": { - "name": "sandbox_status", - "value": "@body('Get_the_full_summary')?['status']" + "type": "object" + } + } + }, + "RecordedFuture_Ukraine_Detection_ImportToSentinel_4": { + "runAfter": { + "Parse_JSON_4": [ + "Succeeded" + ] + }, + "type": "SendToBatch", + "inputs": { + "batchName": "RFImportToSentinel", + "content": { + "action": "alert", + "additionalInformation": "@{body('Parse_JSON_4')?['EvidenceDetails']}", + "azureTenantId": "[[subscription().tenantId]", + "confidence": "@int(body('Parse_JSON_4')?['Risk'])", + "description": "Recorded Future - Ukraine File Hash Detection", + "expirationDateTime": "@{addHours(utcNow(),2)}", + "filehashtype": "@{replace(replace(body('Parse_JSON_4')?['Algorithm'],'SHA-256', 'sha256'),'SHA-1', 'sha1')}", + "filehashvalue": "@{body('Parse_JSON_4')?['Name']}", + "ingestedDateTime": "@{utcNow()}", + "isActive": true, + "targetProduct": "Microsoft Sentinel", + "threatType": "Malware", + "tlpLevel": "Amber" + }, + "host": { + "triggerName": "Batch_messages", + "workflow": { + "id": "[[concat('/subscriptions/', subscription().subscriptionId, '/resourceGroups/', resourceGroup().name, '/providers/Microsoft.Logic/workflows/', parameters('PlaybookNameBatching'))]" } } - }, - "runAfter": { - "Initialize_Sandbox_status": [ - "Succeeded" - ] - }, - "expression": "@equals(variables('sandbox_status'), 'reported')", - "limit": { - "count": 60, - "timeout": "PT1H" - }, - "type": "Until" + } } }, "runAfter": { - "Define_sandbox_status": [ + "Recorded_Future_RiskLists_and_SCF_Download_4": [ "Succeeded" ] }, "type": "Foreach" }, - "Define_sandbox_status": { - "runAfter": { - "Entities_-_Get_URLs": [ - "Succeeded" - ] - }, - "type": "InitializeVariable", + "Recorded_Future_RiskLists_and_SCF_Download": { + "type": "ApiConnection", "inputs": { - "variables": [ - { - "name": "sandbox_status", - "type": "string" + "host": { + "connection": { + "name": "@parameters('$connections')['recordedfuture']['connectionId']" } - ] + }, + "method": "get", + "path": "/fusion/files", + "queries": { + "path": "/public/ukraine/ukraine_russia_ip.csv" + } + } + }, + "Recorded_Future_RiskLists_and_SCF_Download_2": { + "type": "ApiConnection", + "inputs": { + "host": { + "connection": { + "name": "@parameters('$connections')['recordedfuture']['connectionId']" + } + }, + "method": "get", + "path": "/fusion/files", + "queries": { + "path": "/public/ukraine/ukraine_russia_domain.csv" + } + } + }, + "Recorded_Future_RiskLists_and_SCF_Download_3": { + "type": "ApiConnection", + "inputs": { + "host": { + "connection": { + "name": "@parameters('$connections')['recordedfuture']['connectionId']" + } + }, + "method": "get", + "path": "/fusion/files", + "queries": { + "path": "/public/ukraine/ukraine_russia_url.csv" + } + } + }, + "Recorded_Future_RiskLists_and_SCF_Download_4": { + "type": "ApiConnection", + "inputs": { + "host": { + "connection": { + "name": "@parameters('$connections')['recordedfuture']['connectionId']" + } + }, + "method": "get", + "path": "/fusion/files", + "queries": { + "path": "/public/ukraine/ukraine_russia_hash.csv" + } } } } @@ -4287,20 +6135,10 @@ "parameters": { "$connections": { "value": { - "azuresentinel": { - "connectionId": "[[resourceId('Microsoft.Web/connections', variables('MicrosoftSentinelConnectionName'))]", - "connectionName": "[[variables('MicrosoftSentinelConnectionName')]", - "id": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/Azuresentinel')]", - "connectionProperties": { - "authentication": { - "type": "ManagedServiceIdentity" - } - } - }, - "recordedfuturesandbo": { + "recordedfuture": { "connectionId": "[[resourceId('Microsoft.Web/connections', variables('RecordedfutureConnectionName'))]", - "connectionName": "recordedfuturesandbo", - "id": "[[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/recordedfuturesandbo')]" + "connectionName": "[[variables('RecordedfutureConnectionName')]", + "id": "[[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', variables('workspace-location-inline'), '/managedApis/Recordedfuturev2')]" } } } @@ -4309,56 +6147,317 @@ "name": "[[parameters('PlaybookName')]", "type": "Microsoft.Logic/workflows", "location": "[[variables('workspace-location-inline')]", + "tags": { + "hidden-SentinelTemplateName": "RecordedFuture-Ukraine-IndicatorProcessor", + "hidden-SentinelTemplateVersion": "1.1", + "hidden-SentinelWorkspaceId": "[[variables('workspaceResourceId')]" + }, "identity": { "type": "SystemAssigned" }, - "tags": { - "hidden-SentinelTemplateName": "RecordedFuture-Sandbox_Enrichment-Url", - "hidden-SentinelTemplateVersion": "1.0", - "hidden-SentinelWorkspaceId": "[[variables('workspaceResourceId')]" + "apiVersion": "2019-05-01", + "dependsOn": [ + "[[resourceId('Microsoft.Web/connections', variables('RecordedfutureConnectionName'))]" + ] + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "name": "[[variables('RecordedfutureConnectionName')]", + "location": "[[variables('workspace-location-inline')]", + "kind": "V1", + "properties": { + "displayName": "[[variables('RecordedfutureConnectionName')]", + "api": { + "id": "[[variables('_connection-2')]" + } + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", + "apiVersion": "2022-01-01-preview", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Playbook-', last(split(variables('playbookId15'),'/'))))]", + "properties": { + "parentId": "[variables('playbookId15')]", + "contentId": "[variables('_playbookContentId15')]", + "kind": "Playbook", + "version": "[variables('playbookVersion15')]", + "source": { + "kind": "Solution", + "name": "Recorded Future", + "sourceId": "[variables('_solutionId')]" + }, + "author": { + "name": "Recorded Future Premier Integrations", + "email": "[variables('_email')]" + }, + "support": { + "name": "Recorded Future Support Team", + "email": "support@recordedfuture.com", + "tier": "Partner", + "link": "http://support.recordedfuture.com/" + } + } + } + ], + "metadata": { + "title": "RecordedFuture-Ukraine-IndicatorProcessor", + "description": "**[Deprecated]**\nDeprecated due to changes in the Threat Intelligence Platform. Use the new IndicatorImport playbooks that is provided in this Solution.\n\nThis playbook leverages the Recorded Future API and automatically imports the Ukraine RiskLists, as Threat Intelligence Indicators, for detection purposes in Microsoft Sentinel.\n\nThis playbook depends on RecordedFuture-ImportToSentinel that need to be installed **manually** before installing current playbook.", + "prerequisites": [ + "First install the RecordedFuture-ImportToSentinel playbook.", + "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials" + ], + "postDeployment": [ + "After deployment you have to open the playbook to configure all connections and press save." + ], + "lastUpdateTime": "2023-09-13T00:00:00Z", + "tags": [ + "Deprecated", + "Threat Intelligence" + ], + "releaseNotes": [ + { + "version": "1.1", + "title": "Deprecated", + "notes": [ + "Deprecated in favor for the new IndicatorImport playbooks. More information can be found in the readme on Github https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Recorded%20Future/Playbooks/readme.md", + "Once a new IndicatorImport playbook is installed downloading the same risk list. Deactivate or delete this playbook." + ] + }, + { + "version": "1.0", + "title": "RecordedFuture-Ukraine-IndicatorProcessor", + "notes": [ + "Initial version" + ] + } + ] + } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_playbookContentId15')]", + "contentKind": "Playbook", + "displayName": "RecordedFuture-Ukraine-IndicatorProcessor", + "contentProductId": "[variables('_playbookcontentProductId15')]", + "id": "[variables('_playbookcontentProductId15')]", + "version": "[variables('playbookVersion15')]" + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", + "name": "[variables('workbookTemplateSpecName1')]", + "location": "[parameters('workspace-location')]", + "dependsOn": [ + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" + ], + "properties": { + "description": "RecordedFuturePlaybookAlertOverviewWorkbook Workbook with template version 3.0.0", + "mainTemplate": { + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "[variables('workbookVersion1')]", + "parameters": {}, + "variables": {}, + "resources": [ + { + "type": "Microsoft.Insights/workbooks", + "name": "[variables('workbookContentId1')]", + "location": "[parameters('workspace-location')]", + "kind": "shared", + "apiVersion": "2021-08-01", + "metadata": { + "description": "Recorded Future Playbook Alerts Overview Workbook. This workbook will visualize playbook alerts imported via the RecordedFuture-Playbook-Alert-Importer." + }, + "properties": { + "displayName": "[parameters('workbook1-name')]", + "serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":1,\"content\":{\"json\":\"## Recorded Future Playbook Alerts\\n---\\n\\nWorkbook to display and analyze Recorded Future Playbook Alerts. This workbook visualize data that is retrived by the ```Recorded Future Playbook Alerts Importer``` Logic app. First run the Logic app once and then select the RecordedFuturePlaybookAlerts_CL table.\",\"style\":\"info\"},\"name\":\"text - 2\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"8e8c2f1a-d25d-49d1-a217-9831dbc4f919\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"time_picker\",\"label\":\"Time Picker\",\"type\":4,\"isRequired\":true,\"typeSettings\":{\"selectableValues\":[{\"durationMs\":300000},{\"durationMs\":900000},{\"durationMs\":1800000},{\"durationMs\":3600000},{\"durationMs\":14400000},{\"durationMs\":43200000},{\"durationMs\":86400000},{\"durationMs\":172800000},{\"durationMs\":259200000},{\"durationMs\":604800000},{\"durationMs\":1209600000},{\"durationMs\":2419200000},{\"durationMs\":2592000000},{\"durationMs\":5184000000},{\"durationMs\":7776000000}]},\"timeContext\":{\"durationMs\":86400000},\"value\":{\"durationMs\":259200000}},{\"id\":\"f8d34a51-ba10-4241-abff-cb6c14b50a55\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"log_table\",\"label\":\"Playbook Alerts Log Table\",\"type\":2,\"description\":\"Run the Recorded Future Playbook Alert Importer Playbook first.\",\"isRequired\":true,\"query\":\"search *\\n| where $table endswith \\\"_CL\\\" \\n| distinct $table\\n\",\"timeContext\":{\"durationMs\":604800000},\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"value\":\"RecordedFuturePlaybookAlerts_CL\"},{\"id\":\"89279a9c-af9e-4734-8a98-21aa1f2fa545\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"categories\",\"label\":\"Category\",\"type\":2,\"description\":\"Filter categories you're looking at\",\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"query\":\"{log_table}\\n| distinct rule_label_s\",\"typeSettings\":{\"additionalResourceOptions\":[\"value::all\"],\"showDefault\":false},\"timeContext\":{\"durationMs\":0},\"timeContextFromParameter\":\"time_picker\",\"defaultValue\":\"value::all\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"a0947450-1ebd-4dea-94d7-41a751c79237\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"status\",\"label\":\"Alert Status\",\"type\":2,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"query\":\"{log_table}\\n| distinct status_s\",\"typeSettings\":{\"additionalResourceOptions\":[\"value::all\"],\"showDefault\":false},\"defaultValue\":\"value::all\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},{\"id\":\"25a82661-1700-43a6-ba7a-b3ae5d8fe7b9\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"priority\",\"label\":\"Alert Priority\",\"type\":2,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"query\":\"{log_table}\\n| distinct priority_s\",\"typeSettings\":{\"additionalResourceOptions\":[\"value::all\"],\"showDefault\":false},\"timeContext\":{\"durationMs\":172800000},\"timeContextFromParameter\":\"time_picker\",\"defaultValue\":\"value::all\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"{log_table:value}\\n| where rule_label_s in ({categories:value})\\n| where status_s in ({status:value}) \\n| where priority_s in ({priority:value})\\n| distinct id_s, rule_label_s, updated_date_t\\n| summarize alert_count = count() by rule_label_s\\n| project alert_count, Alert = rule_label_s\",\"size\":0,\"title\":\"Top Categories Triggered\",\"timeContextFromParameter\":\"time_picker\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"50\",\"name\":\"query - 2\",\"styleSettings\":{\"maxWidth\":\"30\"}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"{log_table:value}\\n| where rule_label_s in ({categories:value})\\n| where status_s in ({status:value}) \\n| where priority_s in ({priority:value})\\n| distinct id_s, rule_label_s, updated_date_t\\n| summarize Alert=count() by bin(updated_date_t, 1h)\\n\",\"size\":0,\"title\":\"Playbook Alerts triggered over time\",\"timeContextFromParameter\":\"time_picker\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"categoricalbar\"},\"customWidth\":\"50\",\"name\":\"query - 2 - Copy\",\"styleSettings\":{\"maxWidth\":\"70\"}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"{log_table:value}\\n| where rule_label_s in ({categories:value})\\n| where status_s in ({status:value}) \\n| where priority_s in ({priority:value})\\n| distinct updated_date_t, title_s, rule_label_s, status_s, priority_s, link_s, evidence_summary_s, targets_s, created_date_t, id_s\\n| project-rename Updated=updated_date_t, Title=title_s, Category=rule_label_s, Status=status_s, Priority=priority_s, Created=created_date_t, Targets=targets_s, [\\\"Evidence\\\"]=evidence_summary_s, [\\\"External Link\\\"]=link_s, ID=id_s\\n\\n\",\"size\":0,\"title\":\"Triggered Playbook Alerts\",\"noDataMessage\":\"No data in Playbook Alert custom log. Check that playbook/logic apps is running without errors and rules for playbook alerts is setup in Recorded Future Portal.\",\"timeContextFromParameter\":\"time_picker\",\"exportFieldName\":\"id_s\",\"exportParameterName\":\"exported_alert_id\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Title\",\"formatter\":7,\"formatOptions\":{\"linkTarget\":\"GenericDetails\",\"linkIsContextBlade\":true}},{\"columnMatch\":\"Link\",\"formatter\":7,\"formatOptions\":{\"linkTarget\":\"Url\",\"linkLabel\":\"Recorded Future\"}},{\"columnMatch\":\"ID\",\"formatter\":5}],\"sortBy\":[{\"itemKey\":\"Updated\",\"sortOrder\":2}]},\"sortBy\":[{\"itemKey\":\"Updated\",\"sortOrder\":2}]},\"name\":\"query - 8\"}],\"fromTemplateId\":\"sentinel-RecordedFuturePlaybookAlertOverview\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\r\n", + "version": "1.0", + "sourceId": "[variables('workspaceResourceId')]", + "category": "sentinel" + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", + "apiVersion": "2022-01-01-preview", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Workbook-', last(split(variables('workbookId1'),'/'))))]", + "properties": { + "description": "@{workbookKey=RecordedFuturePlaybookAlertOverviewWorkbook; logoFileName=RecordedFuture.svg; description=Recorded Future Playbook Alerts Overview Workbook. This workbook will visualize playbook alerts imported via the RecordedFuture-Playbook-Alert-Importer.; dataTypesDependencies=System.Object[]; dataConnectorsDependencies=System.Object[]; previewImagesFileNames=System.Object[]; version=1.0.0; title=Recorded Future - Playbook Alerts Overview; templateRelativePath=RecordedFuturePlaybookAlertOverview.json; subtitle=; provider=Recorded Future}.description", + "parentId": "[variables('workbookId1')]", + "contentId": "[variables('_workbookContentId1')]", + "kind": "Workbook", + "version": "[variables('workbookVersion1')]", + "source": { + "kind": "Solution", + "name": "Recorded Future", + "sourceId": "[variables('_solutionId')]" + }, + "author": { + "name": "Recorded Future Premier Integrations", + "email": "[variables('_email')]" + }, + "support": { + "name": "Recorded Future Support Team", + "email": "support@recordedfuture.com", + "tier": "Partner", + "link": "http://support.recordedfuture.com/" + }, + "dependencies": { + "operator": "AND", + "criteria": [ + { + "contentId": "RecordedFuturePlaybookAlerts_CL", + "kind": "DataType" + } + ] + } + } + } + ] + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_workbookContentId1')]", + "contentKind": "Workbook", + "displayName": "[parameters('workbook1-name')]", + "contentProductId": "[variables('_workbookcontentProductId1')]", + "id": "[variables('_workbookcontentProductId1')]", + "version": "[variables('workbookVersion1')]" + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", + "name": "[variables('workbookTemplateSpecName2')]", + "location": "[parameters('workspace-location')]", + "dependsOn": [ + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" + ], + "properties": { + "description": "RecordedFutureAlertOverviewWorkbook Workbook with template version 3.0.0", + "mainTemplate": { + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "[variables('workbookVersion2')]", + "parameters": {}, + "variables": {}, + "resources": [ + { + "type": "Microsoft.Insights/workbooks", + "name": "[variables('workbookContentId2')]", + "location": "[parameters('workspace-location')]", + "kind": "shared", + "apiVersion": "2021-08-01", + "metadata": { + "description": "Recorded Future Alerts Overview Workbook. This workbook will visualize playbook alerts imported via the RecordedFuture-Alert-Importer." }, - "apiVersion": "2017-07-01", - "dependsOn": [ - "[[resourceId('Microsoft.Web/connections', variables('MicrosoftSentinelConnectionName'))]", - "[[resourceId('Microsoft.Web/connections', variables('RecordedfutureConnectionName'))]" - ] + "properties": { + "displayName": "[parameters('workbook2-name')]", + "serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":1,\"content\":{\"json\":\"## Recorded Future Alerts\\n---\\n\\nWorkbook to display and analyze Recorded Future Alerts. This workbook visualize data that is retrived by the ```Recorded Future Alerts Importer``` Logic app. First run the Logic app once and then select the RecordedFuturePortalAlerts_CL table.\",\"style\":\"info\"},\"name\":\"text - 2\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"8e8c2f1a-d25d-49d1-a217-9831dbc4f919\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"time_picker\",\"label\":\"Time Picker\",\"type\":4,\"isRequired\":true,\"typeSettings\":{\"selectableValues\":[{\"durationMs\":300000},{\"durationMs\":900000},{\"durationMs\":1800000},{\"durationMs\":3600000},{\"durationMs\":14400000},{\"durationMs\":43200000},{\"durationMs\":86400000},{\"durationMs\":172800000},{\"durationMs\":259200000},{\"durationMs\":604800000},{\"durationMs\":1209600000},{\"durationMs\":2419200000},{\"durationMs\":2592000000},{\"durationMs\":5184000000},{\"durationMs\":7776000000}]},\"timeContext\":{\"durationMs\":86400000},\"value\":{\"durationMs\":86400000}},{\"id\":\"f8d34a51-ba10-4241-abff-cb6c14b50a55\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"log_table\",\"label\":\"Alerts Log Table\",\"type\":2,\"isRequired\":true,\"query\":\"search \\\"*\\\" | summarize count() by $table | sort by count_ desc | where $table endswith \\\"CL\\\" | project $table\",\"timeContext\":{\"durationMs\":0},\"timeContextFromParameter\":\"time_picker\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"value\":\"RecordedFuturePortalAlerts_CL\"},{\"id\":\"89279a9c-af9e-4734-8a98-21aa1f2fa545\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"alert_rules\",\"label\":\"Alert Rules\",\"type\":2,\"description\":\"Filter alert rules you're looking at\",\"isRequired\":true,\"multiSelect\":true,\"quote\":\"'\",\"delimiter\":\",\",\"query\":\"{log_table}\\n| distinct RuleName_s\",\"typeSettings\":{\"additionalResourceOptions\":[\"value::all\"],\"showDefault\":false},\"timeContext\":{\"durationMs\":0},\"timeContextFromParameter\":\"time_picker\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"value\":[\"value::all\"]}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"{log_table:value}\\n| where RuleName_s in ({alert_rules:value})\\n| distinct AlertID_s, RuleName_s, Triggered_t\\n| summarize alert_count = count() by RuleName_s\\n| project alert_count, Alert = RuleName_s\\n\",\"size\":0,\"title\":\"Top Rules Triggered\",\"noDataMessage\":\"There are no alerts within this time frame.\",\"timeContextFromParameter\":\"time_picker\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"piechart\"},\"customWidth\":\"50\",\"name\":\"query - 2\",\"styleSettings\":{\"maxWidth\":\"30\"}},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"{log_table:value}\\n| where RuleName_s in ({alert_rules:value})\\n| distinct AlertID_s, RuleName_s, Triggered_t\\n| summarize Alert=count() by bin(Triggered_t, 1h)\\n\",\"size\":0,\"title\":\"Alerts triggered over time\",\"timeContextFromParameter\":\"time_picker\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"visualization\":\"categoricalbar\"},\"customWidth\":\"50\",\"name\":\"query - 2 - Copy\",\"styleSettings\":{\"maxWidth\":\"70\"}},{\"type\":11,\"content\":{\"version\":\"LinkItem/1.0\",\"style\":\"tabs\",\"links\":[{\"id\":\"20edde78-9485-4056-8eca-6ef7cd86c8b5\",\"cellValue\":\"TAB\",\"linkTarget\":\"parameter\",\"linkLabel\":\"Alert\",\"subTarget\":\"Reference\",\"preText\":\"Some thing\",\"postText\":\"Some thing\",\"style\":\"link\"}]},\"name\":\"links - 5\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"{log_table:value}\\n| where RuleName_s in ({alert_rules:value})\\n//| where Documents_s != \\\"[]\\\"\\n//| distinct AlertID_s, AlertName_s, Documents_s, Entity_description_s, Entity_id_s, Entity_name_s, Entity_type_s, Risk_criticalityLabel_s, \\n//Risk_criticality_d, Risk_documents_s, Risk_evidence_s, RuleName_s, Trend_documents_s, Trend_name_s, Trend_strengthLabel_s, Trend_strength_d, Triggered_t\\n| distinct Triggered = Triggered_t, [\\\"Alert ID\\\"]=AlertID_s, [\\\"Alert Name\\\"]=AlertName_s, [\\\"Rule Name\\\"]=RuleName_s, [\\\"External Link\\\"]= URL_s\\n\\n\\n\\n\",\"size\":0,\"timeContextFromParameter\":\"time_picker\",\"exportFieldName\":\"Alert ID\",\"exportParameterName\":\"Ref_AlertID\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"External Link\",\"formatter\":7,\"formatOptions\":{\"linkTarget\":\"Url\",\"linkLabel\":\"Recorded Future\"}},{\"columnMatch\":\"Recorded Future Portal\",\"formatter\":7,\"formatOptions\":{\"linkTarget\":\"Url\"}},{\"columnMatch\":\"URL\",\"formatter\":7,\"formatOptions\":{\"linkTarget\":\"Url\",\"linkLabel\":\"Recorded Future\"}}],\"sortBy\":[{\"itemKey\":\"Triggered\",\"sortOrder\":2}]},\"sortBy\":[{\"itemKey\":\"Triggered\",\"sortOrder\":2}]},\"name\":\"query - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"{log_table:value}\\n| where AlertID_s == \\\"{Ref_AlertID}\\\"\\n| project Fragment=Fragment_s, Source=Documents_source_name_s, Title=Documents_title_s, URL=Document_url_s, AlertName = RuleName_s, AlertID=AlertID_s, entities=parse_json(Entity_s)\\n| mv-apply with_itemindex=i entities on (\\n extend p = pack(strcat(\\\"Entity \\\", i+1), strcat(entities.type, \\\", \\\", entities.name, \\\", id:\\\", entities.id))\\n | summarize b = make_bag(p)\\n)\\n| evaluate bag_unpack(b)\\n| project-reorder Fragment, Source, Title, URL, Entity*\\n\\n\",\"size\":0,\"timeContextFromParameter\":\"time_picker\",\"exportedParameters\":[{\"fieldName\":\"Fragment\",\"parameterName\":\"FragmentRef\",\"parameterType\":1},{\"fieldName\":\"Title\",\"parameterName\":\"TitleRef\",\"parameterType\":1}],\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Fragment\",\"formatter\":7,\"formatOptions\":{\"linkTarget\":\"GenericDetails\",\"linkIsContextBlade\":true},\"tooltipFormat\":{\"tooltip\":\"{0}\"}}]}},\"conditionalVisibility\":{\"parameterName\":\"TAB\",\"comparison\":\"isEqualTo\",\"value\":\"Reference\"},\"name\":\"Reference View\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"**Document Title**\\r\\n{TitleRef}\"},\"name\":\"text - 3\"},{\"type\":1,\"content\":{\"json\":\"**Fragment**\\r\\n{FragmentRef}\\r\\n\\r\\n\\r\\n\"},\"showPin\":false,\"name\":\"Fragment\"}]},\"name\":\"group - 4\"}]},\"conditionalVisibility\":{\"parameterName\":\"TAB\",\"comparison\":\"isEqualTo\",\"value\":\"Reference\"},\"name\":\"Reference Alerts\"}],\"fromTemplateId\":\"sentinel-RecordedFutureAlertOverviewWorkbook\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\r\n", + "version": "1.0", + "sourceId": "[variables('workspaceResourceId')]", + "category": "sentinel" + } }, { - "type": "Microsoft.Web/connections", - "apiVersion": "2016-06-01", - "name": "[[variables('RecordedfutureConnectionName')]", - "location": "[[variables('workspace-location-inline')]", - "kind": "V1", + "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", + "apiVersion": "2022-01-01-preview", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Workbook-', last(split(variables('workbookId2'),'/'))))]", "properties": { - "displayName": "[[variables('RecordedfutureConnectionName')]", - "api": { - "id": "[[variables('_connection-2')]" + "description": "@{workbookKey=RecordedFutureAlertOverviewWorkbook; logoFileName=RecordedFuture.svg; description=Recorded Future Alerts Overview Workbook. This workbook will visualize playbook alerts imported via the RecordedFuture-Alert-Importer.; dataTypesDependencies=System.Object[]; dataConnectorsDependencies=System.Object[]; previewImagesFileNames=System.Object[]; version=1.0.0; title=Recorded Future - Alerts Overview; templateRelativePath=RecordedFutureAlertOverview.json; subtitle=; provider=Recorded Future}.description", + "parentId": "[variables('workbookId2')]", + "contentId": "[variables('_workbookContentId2')]", + "kind": "Workbook", + "version": "[variables('workbookVersion2')]", + "source": { + "kind": "Solution", + "name": "Recorded Future", + "sourceId": "[variables('_solutionId')]" + }, + "author": { + "name": "Recorded Future Premier Integrations", + "email": "[variables('_email')]" + }, + "support": { + "name": "Recorded Future Support Team", + "email": "support@recordedfuture.com", + "tier": "Partner", + "link": "http://support.recordedfuture.com/" + }, + "dependencies": { + "operator": "AND", + "criteria": [ + { + "contentId": "RecordedFuturePortalAlerts_CL", + "kind": "DataType" + } + ] } } - }, + } + ] + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_workbookContentId2')]", + "contentKind": "Workbook", + "displayName": "[parameters('workbook2-name')]", + "contentProductId": "[variables('_workbookcontentProductId2')]", + "id": "[variables('_workbookcontentProductId2')]", + "version": "[variables('workbookVersion2')]" + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", + "name": "[variables('workbookTemplateSpecName3')]", + "location": "[parameters('workspace-location')]", + "dependsOn": [ + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" + ], + "properties": { + "description": "RecordedFutureDomainCorrelationWorkbook Workbook with template version 3.0.0", + "mainTemplate": { + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "[variables('workbookVersion3')]", + "parameters": {}, + "variables": {}, + "resources": [ { - "type": "Microsoft.Web/connections", - "apiVersion": "2016-06-01", - "name": "[[variables('MicrosoftSentinelConnectionName')]", - "location": "[[variables('workspace-location-inline')]", - "kind": "V1", + "type": "Microsoft.Insights/workbooks", + "name": "[variables('workbookContentId3')]", + "location": "[parameters('workspace-location')]", + "kind": "shared", + "apiVersion": "2021-08-01", + "metadata": { + "description": "Recorded Future Domain Correlation Workbook. This workbook will visualize Recorded Future threat intelligence data together with infrastructure logs ingested in to Sentinel." + }, "properties": { - "displayName": "[[variables('MicrosoftSentinelConnectionName')]", - "parameterValueType": "Alternative", - "api": { - "id": "[[variables('_connection-3')]" - } + "displayName": "[parameters('workbook3-name')]", + "serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"d7ccc5ca-c8ec-458f-ab0d-564a7ef1d217\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Help\",\"label\":\"Show Guide\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[\\n {\\\"value\\\": \\\"Yes\\\", \\\"label\\\": \\\"Yes\\\", \\\"selected\\\":true},\\n {\\\"value\\\": \\\"No\\\", \\\"label\\\": \\\"No\\\"}\\n]\",\"timeContext\":{\"durationMs\":86400000},\"value\":\"No\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 7\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"### Guide: Domain Correlation \\n\\nRecorded Future’s Domain Correlation Workbook helps you detect malicious domains within your environment by correlating your logs with Recorded Future Domain Risk Lists.\\n\\n### How to Correlate Domains\\n\\nTo correlate domains, follow the steps below:\\n\\n1. In the **Domain Logs Table** dropdown, select a log table that contains domain logs.\\n\\t* If a particular log table is not listed in the dropdown, ensure it is enabled in your environment.\\n2. In the **Log field with domains** dropdown, select the log field that holds the domains to be correlated.\\n\\t* The workbook can correlate domains in the format: `domainName.net`.\\n3. Select a Recorded Future Domain Risk List for correlation.\\n4. If necessary, adjust the values in the **Logs from** and **Data from** dropdowns to match your requirements.\\n5. Done\\n\\n---\\n\\n#### Log table with examples of correlatable log fields\\n\\n| Table \\t | Field |\\n| ----------- \\t | ----------- |\\n| DNSEvents | Name |\\n| _Im_Dns \\t | DnsQuery |\",\"style\":\"info\"},\"name\":\"text - 0\"}]},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"group - 15\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"### Domains (from logs)\"},\"customWidth\":\"50\",\"name\":\"text - 2\"},{\"type\":1,\"content\":{\"json\":\"### Recorded Future Risk List\"},\"customWidth\":\"50\",\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"b91b8b5b-10cf-4106-99e2-793eb0d72dce\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Domain_Logs_Time_Range\",\"label\":\"Logs from\",\"type\":4,\"isRequired\":true,\"typeSettings\":{\"selectableValues\":[{\"durationMs\":300000},{\"durationMs\":900000},{\"durationMs\":1800000},{\"durationMs\":3600000},{\"durationMs\":14400000},{\"durationMs\":43200000},{\"durationMs\":86400000},{\"durationMs\":172800000},{\"durationMs\":259200000},{\"durationMs\":604800000},{\"durationMs\":1209600000},{\"durationMs\":2419200000},{\"durationMs\":2592000000},{\"durationMs\":5184000000},{\"durationMs\":7776000000}]},\"timeContext\":{\"durationMs\":86400000},\"value\":{\"durationMs\":604800000}},{\"id\":\"3300ad41-acbc-4ebd-900a-c6ab250b7c73\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Domain_Logs_Table\",\"label\":\"Domain Logs Table\",\"type\":2,\"description\":\"Log Table to correlate Domains Against\",\"isRequired\":true,\"query\":\"search \\\"*\\\" \\n| where TimeGenerated {Domain_Logs_Time_Range:query}\\n| summarize count() by $table \\n| sort by count_ desc \\n| where $table != \\\"ThreatIntelligenceIndicator\\\" \\n| project $table\\n\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"value\":\"Squid_Proxy_URL_CL\"},{\"id\":\"f4f77ada-b97c-4a82-9421-20a58fb7ce26\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Domain_Logs_Field\",\"label\":\"Log Field with Domains\",\"type\":2,\"description\":\"Select the field containing the Domain Name that you want to correlate against\",\"isRequired\":true,\"query\":\"{Domain_Logs_Table:value}\\n| getschema\\n| where DataType == \\\"System.String\\\"\\n| project ColumnName\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"value\":\"Domain_s\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"customWidth\":\"50\",\"name\":\"parameters - 0\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"95e78560-1e69-437c-8226-7b0f8c4dc199\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Threat_Intelligence_Time_Range\",\"label\":\"Data from\",\"type\":4,\"isRequired\":true,\"typeSettings\":{\"selectableValues\":[{\"durationMs\":300000},{\"durationMs\":900000},{\"durationMs\":1800000},{\"durationMs\":3600000},{\"durationMs\":14400000},{\"durationMs\":43200000},{\"durationMs\":86400000},{\"durationMs\":172800000},{\"durationMs\":259200000},{\"durationMs\":604800000},{\"durationMs\":1209600000},{\"durationMs\":2419200000},{\"durationMs\":2592000000},{\"durationMs\":5184000000},{\"durationMs\":7776000000}]},\"value\":{\"durationMs\":604800000}},{\"id\":\"e7c7e2ea-f5b3-4505-b64c-b18ca8561168\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RF_Risk_list\",\"label\":\"Risk List\",\"type\":2,\"description\":\"Which Domain Risk List do you want to correlate against\",\"isRequired\":true,\"query\":\"ThreatIntelligenceIndicator\\n| where isnotempty(DomainName)\\n| where Description contains \\\"Recorded Future\\\"\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\n| summarize count() by Description\\n| project output = strcat('\\\"', Description, '\\\"')\\n\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"value\":\"\\\"Recorded Future - DOMAIN - Default RiskList\\\"\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"customWidth\":\"50\",\"name\":\"parameters - 1\"}],\"exportParameters\":true},\"name\":\"group - 10\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"\\n### Guide: Detected Domains Per Day\\n\\nThe chart displays the number of correlation detections per day between domain logs and Recorded Future's domain Risk lists.\",\"style\":\"info\"},\"customWidth\":\"100\",\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let list_tlds = ThreatIntelligenceIndicator\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\\n| where Description == {RF_Risk_list:value}\\n| where isnotempty(DomainName)\\n| where isnotempty(Tags)\\n| extend parts = split(DomainName, '.')\\n| extend tld = parts[(array_length(parts)-1)]\\n| summarize count() by tostring(tld)\\n| summarize make_list(tld);\\nThreatIntelligenceIndicator\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\n| where Active == true\\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\\n| where Description == {RF_Risk_list:value}\\n// Picking up only IOC's that contain the entities we want\\n| where isnotempty(DomainName)\\n| where isnotempty(Tags)\\n| join (\\n {Domain_Logs_Table:value}\\n | where TimeGenerated {Domain_Logs_Time_Range:query}\\n //Extract Domain patterns from syslog message\\n | where isnotempty({Domain_Logs_Field:value})\\n | extend parts = split({Domain_Logs_Field:value}, '.')\\n //Split out the TLD\\n | extend tld = parts[(array_length(parts)-1)]\\n //Validate parsed Domain by checking if the TLD is in the list of TLDs in our threat feed\\n | where tld in~ (list_tlds)\\n | extend DNS_TimeGenerated = TimeGenerated\\n) on $left.DomainName==$right.{Domain_Logs_Field:value}\\n| summarize Correlation_Matches=count() by bin(DNS_TimeGenerated, 1d)\\n| render barchart\",\"size\":0,\"title\":\"Detected Domains Per Day\",\"noDataMessage\":\"No detected domains\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"customWidth\":\"100\",\"name\":\"query - 1\"}]},\"customWidth\":\"100\",\"name\":\"group - 14\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"\\n### Guide: Detected Domains\\n\\nThe Detected Domains table lists domains from the correlated logs that have been matched with Recorded Future Domain Risk Lists.\\n\\n**Table Columns**\\n\\n* **Risk Score:** The Recorded Future Risk Score for the domain (IOC), ranging from 1 to 99, with 99 being the highest level of severity.\\n* **Domain:** The detected domain.\\n* **Detected:** The time when the log was correlated with a Risk List.\\n* **Log Created:** The time when the log event itself was created.\\n* **Threat Classification:** The type of threat associated with the domain (IOC).\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let list_tlds = ThreatIntelligenceIndicator\\r\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\r\\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\\r\\n| where Description == {RF_Risk_list:value}\\r\\n| where isnotempty(DomainName)\\r\\n| where isnotempty(Tags)\\r\\n| extend parts = split(DomainName, '.')\\r\\n| extend tld = parts[(array_length(parts)-1)]\\r\\n| summarize count() by tostring(tld)\\r\\n| summarize make_list(tld);\\r\\nThreatIntelligenceIndicator\\r\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\r\\n| where Active == true\\r\\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\\r\\n| where Description == {RF_Risk_list:value}\\r\\n// Picking up only IOC's that contain the entities we want\\r\\n| where isnotempty(DomainName)\\r\\n| join (\\r\\n {Domain_Logs_Table:value}\\r\\n | where TimeGenerated {Domain_Logs_Time_Range:query}\\r\\n //Extract Domain patterns from syslog message\\r\\n | where isnotempty({Domain_Logs_Field:value})\\r\\n | extend parts = split({Domain_Logs_Field:value}, '.')\\r\\n //Split out the TLD\\r\\n | extend tld = parts[(array_length(parts)-1)]\\r\\n //Validate parsed Domain by checking if the TLD is in the list of TLDs in our threat feed\\r\\n | where tld in~ (list_tlds)\\r\\n | extend DNS_TimeGenerated = TimeGenerated\\r\\n) on $left.DomainName==$right.{Domain_Logs_Field:value}\\r\\n| project [\\\"Risk Score\\\"]=ConfidenceScore, Domain=DomainName, Detected=format_datetime(TimeGenerated, 'yyyy-MM-dd HH:mm:ss'), [\\\"Log Created\\\"]=format_datetime(DNS_TimeGenerated, 'yyyy-MM-dd HH:mm:ss'), [\\\"Threat Classification\\\"]=ThreatType\\r\\n| summarize [\\\"Log Created\\\"]=max([\\\"Log Created\\\"]) by Domain, [\\\"Risk Score\\\"], Detected, [\\\"Threat Classification\\\"]\\r\\n| project [\\\"Risk Score\\\"], Domain, Detected, [\\\"Log Created\\\"], [\\\"Threat Classification\\\"]\\r\\n| sort by [\\\"Risk Score\\\"] desc\",\"size\":0,\"title\":\"Detected Domains\",\"noDataMessage\":\"No detected domains\",\"exportFieldName\":\"Domain\",\"exportParameterName\":\"MaliciousDomainMatch\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Risk\",\"formatter\":18,\"formatOptions\":{\"thresholdsOptions\":\"colors\",\"thresholdsGrid\":[{\"operator\":\">=\",\"thresholdValue\":\"90\",\"representation\":\"redBright\",\"text\":\"{0}{1}\"},{\"operator\":\">=\",\"thresholdValue\":\"65\",\"representation\":\"orange\",\"text\":\"{0}{1}\"},{\"operator\":\">=\",\"thresholdValue\":\"25\",\"representation\":\"yellow\",\"text\":\"{0}{1}\"},{\"operator\":\"Default\",\"representation\":\"blue\",\"text\":\"{0}{1}\"}]}}]}},\"customWidth\":\"70\",\"name\":\"query - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let list_tlds = ThreatIntelligenceIndicator\\r\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\r\\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\\r\\n| where Description == {RF_Risk_list:value}\\r\\n| where isnotempty(DomainName)\\r\\n| where isnotempty(Tags)\\r\\n| extend parts = split(DomainName, '.')\\r\\n| extend tld = parts[(array_length(parts)-1)]\\r\\n| summarize count() by tostring(tld)\\r\\n| summarize make_list(tld);\\r\\nThreatIntelligenceIndicator\\r\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\r\\n| where Active == true\\r\\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\\r\\n| where Description == {RF_Risk_list:value}\\r\\n// Picking up only IOC's that contain the entities we want\\r\\n| where isnotempty(DomainName)\\r\\n| where isnotempty(Tags)\\r\\n| join (\\r\\n {Domain_Logs_Table:value}\\r\\n | where TimeGenerated {Domain_Logs_Time_Range:query}\\r\\n //Extract Domain patterns from syslog message\\r\\n | where isnotempty({Domain_Logs_Field:value})\\r\\n | extend parts = split({Domain_Logs_Field:value}, '.')\\r\\n //Split out the TLD\\r\\n | extend tld = parts[(array_length(parts)-1)]\\r\\n //Validate parsed Domain by checking if the TLD is in the list of TLDs in our threat feed\\r\\n | where tld in~ (list_tlds)\\r\\n | extend DNS_TimeGenerated = TimeGenerated\\r\\n) on $left.DomainName==$right.{Domain_Logs_Field:value}\\r\\n| project Risk=ConfidenceScore, DomainName, ThreatType, Tags\\r\\n| extend Evidence=parse_json(Tags)[0]\\r\\n| mv-expand Evidence = parse_json(tostring(Evidence))\\r\\n| extend Rule=Evidence['Rule']\\r\\n| summarize count() by tostring(Rule)\\r\\n| sort by count_ desc\\r\\n\\r\\n\",\"size\":0,\"title\":\"Top Triggered Risk Rules\",\"noDataMessage\":\"No triggered Risk Rules\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"count_\",\"formatter\":8,\"formatOptions\":{\"palette\":\"orange\"}}],\"labelSettings\":[{\"columnId\":\"count_\",\"label\":\"Count\"}]}},\"customWidth\":\"30\",\"name\":\"query - 2\"},{\"type\":1,\"content\":{\"json\":\"### Detected Domains: Evidence Details\\n\\nTo view evidence details, click a row (domain) in the Detected Domains table.\"},\"name\":\"text - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ThreatIntelligenceIndicator\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\n| where Description contains {RF_Risk_list:value}\\n| where DomainName == \\\"{MaliciousDomainMatch}\\\"\\n| where isnotempty(Tags)\\n//| where ExpirationDateTime > now()\\n| extend Evidence=parse_json(Tags)[0]\\n| take 1\\n| mv-expand Evidence = parse_json(tostring(Evidence))\\n| project Rules = Evidence['Rule'], Criticality = Evidence['Criticality'], Evidence_String = Evidence['EvidenceString'] \\n| sort by toint(Criticality) desc\",\"size\":1,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Evidence_String\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"70%\"}}]}},\"conditionalVisibility\":{\"parameterName\":\"MaliciousDomainMatch\",\"comparison\":\"isNotEqualTo\"},\"name\":\"query - 3\"},{\"type\":1,\"content\":{\"json\":\"\\n### Source data from {Domain_Logs_Table:value}\\nTo view source data of correlated domain, click a row (domain) in the Detected Domains table.\"},\"name\":\"text - 5\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"{Domain_Logs_Table:value}\\n| where TimeGenerated {Domain_Logs_Time_Range:query}\\n| where {Domain_Logs_Field:value} == \\\"{MaliciousDomainMatch}\\\"\\n\",\"size\":1,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"conditionalVisibility\":{\"parameterName\":\"MaliciousDomainMatch\",\"comparison\":\"isNotEqualTo\",\"value\":\"\"},\"name\":\"query - 1\"}]},\"name\":\"group - 8\"}],\"styleSettings\":{\"paddingStyle\":\"wide\"},\"fromTemplateId\":\"sentinel-RecordedFutureDomainCorrelationWorkbook\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\r\n", + "version": "1.0", + "sourceId": "[variables('workspaceResourceId')]", + "category": "sentinel" } }, { "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", "apiVersion": "2022-01-01-preview", - "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Playbook-', last(split(variables('playbookId8'),'/'))))]", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Workbook-', last(split(variables('workbookId3'),'/'))))]", "properties": { - "parentId": "[variables('playbookId8')]", - "contentId": "[variables('_playbookContentId8')]", - "kind": "Playbook", - "version": "[variables('playbookVersion8')]", + "description": "@{workbookKey=RecordedFutureDomainCorrelationWorkbook; logoFileName=RecordedFuture.svg; description=Recorded Future Domain Correlation Workbook. This workbook will visualize Recorded Future threat intelligence data together with infrastructure logs ingested in to Sentinel.; dataTypesDependencies=System.Object[]; dataConnectorsDependencies=System.Object[]; previewImagesFileNames=System.Object[]; version=1.0.1; title=Recorded Future - Domain Correlation; templateRelativePath=RecordedFutureDomainCorrelation.json; subtitle=; provider=Recorded Future}.description", + "parentId": "[variables('workbookId3')]", + "contentId": "[variables('_workbookContentId3')]", + "kind": "Workbook", + "version": "[variables('workbookVersion3')]", "source": { "kind": "Solution", "name": "Recorded Future", @@ -4373,81 +6472,61 @@ "email": "support@recordedfuture.com", "tier": "Partner", "link": "http://support.recordedfuture.com/" + }, + "dependencies": { + "operator": "AND", + "criteria": [ + { + "contentId": "ThreatIntelligenceIndicator", + "kind": "DataType" + } + ] } } } - ], - "metadata": { - "title": "RecordedFuture-Sandbox_Enrichment-Url", - "description": "This playbook will enrich url entities in an incident and send them to Recorded Future Sandbox. The result will be written as a incident comment.", - "prerequisites": "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials", - "postDeployment": [ - "After deployment you have to open the playbook to configure all connections and press save." - ], - "lastUpdateTime": "2023-03-24T00:00:00Z", - "entities": [ - "url" - ], - "tags": [ - "Enrichment" - ], - "releaseNotes": { - "version": "1.0", - "title": "[variables('blanks')]", - "notes": [ - "Initial version" - ] - } - } - } - } - }, - { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", - "name": "[variables('workbookTemplateSpecName1')]", - "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Workbook" - }, - "properties": { - "description": "Recorded Future Workbook with template", - "displayName": "Recorded Future workbook template" + ] + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_workbookContentId3')]", + "contentKind": "Workbook", + "displayName": "[parameters('workbook3-name')]", + "contentProductId": "[variables('_workbookcontentProductId3')]", + "id": "[variables('_workbookcontentProductId3')]", + "version": "[variables('workbookVersion3')]" } }, { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('workbookTemplateSpecName1'),'/',variables('workbookVersion1'))]", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", + "name": "[variables('workbookTemplateSpecName4')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Workbook" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('workbookTemplateSpecName1'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "Recorded Future - C&C DNS Name to DNS Events - Correlation&Threat HuntingWorkbook with template version 2.4.0", + "description": "RecordedFutureHashCorrelationWorkbook Workbook with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", - "contentVersion": "[variables('workbookVersion1')]", + "contentVersion": "[variables('workbookVersion4')]", "parameters": {}, "variables": {}, "resources": [ { "type": "Microsoft.Insights/workbooks", - "name": "[variables('workbookContentId1')]", + "name": "[variables('workbookContentId4')]", "location": "[parameters('workspace-location')]", "kind": "shared", "apiVersion": "2021-08-01", "metadata": { - "description": "Sets the time name for DNS Events and Threat Intelligence Time Range" + "description": "Recorded Future Hash Correlation Workbook. This workbook will visualize Recorded Future threat intelligence data together with infrastructure logs ingested in to Sentinel." }, "properties": { - "displayName": "[parameters('workbook1-name')]", - "serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":1,\"content\":{\"json\":\"## Recorded Future - C&C DNS Name to DNS Events - Correlation/Threat Hunting\\n\\n\"},\"name\":\"text - 0\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"5aaf92cc-3c1e-43f0-8a2f-18a79d7c1d5d\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"DNS_Events_Time_Range\",\"label\":\"DNS Events Time Range\",\"type\":4,\"isRequired\":true,\"value\":{\"durationMs\":7776000000},\"typeSettings\":{\"selectableValues\":[{\"durationMs\":300000},{\"durationMs\":900000},{\"durationMs\":1800000},{\"durationMs\":3600000},{\"durationMs\":14400000},{\"durationMs\":43200000},{\"durationMs\":86400000},{\"durationMs\":172800000},{\"durationMs\":259200000},{\"durationMs\":604800000},{\"durationMs\":1209600000},{\"durationMs\":2419200000},{\"durationMs\":2592000000},{\"durationMs\":5184000000},{\"durationMs\":7776000000}]}},{\"id\":\"eea9b6a5-76f4-4d3b-b62d-4f5e1c4173b6\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Threat_Intelligence_Time_Range\",\"label\":\"Threat Intelligence Time Range\",\"type\":4,\"isRequired\":true,\"value\":{\"durationMs\":7776000000},\"typeSettings\":{\"selectableValues\":[{\"durationMs\":300000},{\"durationMs\":900000},{\"durationMs\":1800000},{\"durationMs\":3600000},{\"durationMs\":14400000},{\"durationMs\":43200000},{\"durationMs\":86400000},{\"durationMs\":172800000},{\"durationMs\":259200000},{\"durationMs\":604800000},{\"durationMs\":1209600000},{\"durationMs\":2419200000},{\"durationMs\":2592000000},{\"durationMs\":5184000000},{\"durationMs\":7776000000}]}}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 4\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let list_tlds = ThreatIntelligenceIndicator\\r\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\r\\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\\r\\n| where Description == 'Recorded Future - DOMAIN - C2 DNS Name'\\r\\n| where isnotempty(DomainName)\\r\\n| extend parts = split(DomainName, '.')\\r\\n| extend tld = parts[(array_length(parts)-1)]\\r\\n| summarize count() by tostring(tld)\\r\\n| summarize make_list(tld);\\r\\nThreatIntelligenceIndicator\\r\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\r\\n| where Active == true\\r\\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\\r\\n| where Description == 'Recorded Future - DOMAIN - C2 DNS Name'\\r\\n// Picking up only IOC's that contain the entities we want\\r\\n| where isnotempty(DomainName)\\r\\n| join (\\r\\n DnsEvents\\r\\n | where TimeGenerated {DNS_Events_Time_Range:query}\\r\\n //Extract Domain patterns from syslog message\\r\\n | where isnotempty(Name)\\r\\n | extend parts = split(Name, '.')\\r\\n //Split out the TLD\\r\\n | extend tld = parts[(array_length(parts)-1)]\\r\\n //Validate parsed Domain by checking if the TLD is in the list of TLDs in our threat feed\\r\\n | where tld in~ (list_tlds)\\r\\n | extend DNS_TimeGenerated = TimeGenerated\\r\\n) on $left.DomainName==$right.Name\\r\\n| summarize Correlation_Matches=count() by bin(DNS_TimeGenerated, 1d)\\r\\n| render barchart\",\"size\":0,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let list_tlds = ThreatIntelligenceIndicator\\r\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\r\\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\\r\\n| where Description == 'Recorded Future - DOMAIN - C2 DNS Name'\\r\\n| where isnotempty(DomainName)\\r\\n| extend parts = split(DomainName, '.')\\r\\n| extend tld = parts[(array_length(parts)-1)]\\r\\n| summarize count() by tostring(tld)\\r\\n| summarize make_list(tld);\\r\\nThreatIntelligenceIndicator\\r\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\r\\n| where Active == true\\r\\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\\r\\n| where Description == 'Recorded Future - DOMAIN - C2 DNS Name'\\r\\n// Picking up only IOC's that contain the entities we want\\r\\n| where isnotempty(DomainName)\\r\\n| join (\\r\\n DnsEvents\\r\\n | where TimeGenerated {DNS_Events_Time_Range:query}\\r\\n //Extract Domain patterns from syslog message\\r\\n | where isnotempty(Name)\\r\\n | extend parts = split(Name, '.')\\r\\n //Split out the TLD\\r\\n | extend tld = parts[(array_length(parts)-1)]\\r\\n //Validate parsed Domain by checking if the TLD is in the list of TLDs in our threat feed\\r\\n | where tld in~ (list_tlds)\\r\\n | extend DNS_TimeGenerated = TimeGenerated\\r\\n) on $left.DomainName==$right.Name\\r\\n| project Risk=ConfidenceScore, DomainName, ThreatType, AdditionalInformation\\r\\n| extend Evidence=parse_json(AdditionalInformation)['EvidenceDetails']\\r\\n| mv-expand Evidence\\r\\n| extend Rule=Evidence['Rule']\\r\\n| summarize count() by tostring(Rule)\\r\\n| sort by count_ desc\\r\\n\\r\\n\",\"size\":0,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"count_\",\"formatter\":8,\"formatOptions\":{\"palette\":\"orange\"}}],\"labelSettings\":[{\"columnId\":\"Rule\"},{\"columnId\":\"count_\",\"label\":\"Count\"}]}},\"customWidth\":\"30\",\"name\":\"query - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"let list_tlds = ThreatIntelligenceIndicator\\r\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\r\\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\\r\\n| where Description == 'Recorded Future - DOMAIN - C2 DNS Name'\\r\\n| where isnotempty(DomainName)\\r\\n| extend parts = split(DomainName, '.')\\r\\n| extend tld = parts[(array_length(parts)-1)]\\r\\n| summarize count() by tostring(tld)\\r\\n| summarize make_list(tld);\\r\\nThreatIntelligenceIndicator\\r\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\r\\n| where Active == true\\r\\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\\r\\n| where Description == 'Recorded Future - DOMAIN - C2 DNS Name'\\r\\n// Picking up only IOC's that contain the entities we want\\r\\n| where isnotempty(DomainName)\\r\\n| join (\\r\\n DnsEvents\\r\\n | where TimeGenerated {DNS_Events_Time_Range:query}\\r\\n //Extract Domain patterns from syslog message\\r\\n | where isnotempty(Name)\\r\\n | extend parts = split(Name, '.')\\r\\n //Split out the TLD\\r\\n | extend tld = parts[(array_length(parts)-1)]\\r\\n //Validate parsed Domain by checking if the TLD is in the list of TLDs in our threat feed\\r\\n | where tld in~ (list_tlds)\\r\\n | extend DNS_TimeGenerated = TimeGenerated\\r\\n) on $left.DomainName==$right.Name\\r\\n| project Risk=ConfidenceScore, DomainName, Threat_Intelligence_IOC_Date = TimeGenerated, SourceIP=ClientIP, DNS_Event_Time = DNS_TimeGenerated, ThreatType, Device=Computer, AdditionalInformation\\r\\n| sort by Risk desc\\r\\n\",\"size\":0,\"exportFieldName\":\"DomainName\",\"exportParameterName\":\"IOC\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Risk\",\"formatter\":18,\"formatOptions\":{\"thresholdsOptions\":\"colors\",\"thresholdsGrid\":[{\"operator\":\">=\",\"thresholdValue\":\"90\",\"representation\":\"redBright\",\"text\":\"{0}{1}\"},{\"operator\":\">=\",\"thresholdValue\":\"65\",\"representation\":\"orange\",\"text\":\"{0}{1}\"},{\"operator\":\">=\",\"thresholdValue\":\"25\",\"representation\":\"yellow\",\"text\":\"{0}{1}\"},{\"operator\":\"Default\",\"thresholdValue\":\"[variables('blanks')]\",\"representation\":\"blue\",\"text\":\"{0}{1}\"}]}}]},\"sortBy\":\"[variables('TemplateEmptyArray')]\"},\"customWidth\":\"70\",\"name\":\"query - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ThreatIntelligenceIndicator\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\n| where Description contains 'Recorded Future - DOMAIN - C2 DNS Name'\\n| where DomainName == \\\"{IOC}\\\"\\n| where ExpirationDateTime > now()\\n| extend Evidence=parse_json(AdditionalInformation)['EvidenceDetails']\\n| take 1\\n| mv-expand Evidence\\n| project Rules = Evidence['Rule'], Evidence_String = Evidence['EvidenceString'], Criticality = Evidence['Criticality']\\n| sort by toint(Criticality) desc\",\"size\":0,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 5\"}],\"fromTemplateId\":\"sentinel-RecordedFuture-Domain-C2DNS-Workbook\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\r\n", + "displayName": "[parameters('workbook4-name')]", + "serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"d7ccc5ca-c8ec-458f-ab0d-564a7ef1d217\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Help\",\"label\":\"🔎 Guide\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[\\n {\\\"value\\\": \\\"Yes\\\", \\\"label\\\": \\\"Yes\\\", \\\"selected\\\":true},\\n {\\\"value\\\": \\\"No\\\", \\\"label\\\": \\\"No\\\"}\\n]\",\"timeContext\":{\"durationMs\":86400000},\"value\":\"No\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 7\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"### Guide: Hash Correlation \\n\\nRecorded Future’s Hash Correlation Workbook helps you detect malicious hashes within your environment by correlating your logs with Recorded Future Hash Risk Lists.\\n\\n### How to Correlate hashs\\n\\nTo correlate hashes, follow the steps below:\\n\\n1. In the **Hash Logs Table** dropdown, select a log table that contains hash logs.\\n\\t* If a particular log table is not listed in the dropdown, ensure it is enabled in your environment.\\n2. In the **Log field with hashes** dropdown, select the log field that holds the hashs to be correlated.\\n\\t* The workbook can correlate hashes in the format: `b0a0c7ae387c00161f4cc26405600b1a`.\\n3. Select a Recorded Future Hash Risk List for correlation.\\n4. If necessary, adjust the values in the **Logs from** and **Data from** dropdowns to match your requirements.\\n5. Done\\n\\n---\\n\\n#### Log table with examples of correlatable log fields\\n| Table \\t \\t| Field |\\n| ----------- \\t \\t| ----------- |\\n| CommonSecurityLog | FileHash |\\n| SecurityEvent \\t| FileHash |\",\"style\":\"info\"},\"name\":\"text - 0\"}]},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"group - 15\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"### Hashes (from logs)\"},\"customWidth\":\"50\",\"name\":\"text - 2\"},{\"type\":1,\"content\":{\"json\":\"### Recorded Future Risk List\"},\"customWidth\":\"50\",\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"b91b8b5b-10cf-4106-99e2-793eb0d72dce\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Hash_Logs_Time_Range\",\"label\":\"Logs from\",\"type\":4,\"isRequired\":true,\"typeSettings\":{\"selectableValues\":[{\"durationMs\":300000},{\"durationMs\":900000},{\"durationMs\":1800000},{\"durationMs\":3600000},{\"durationMs\":14400000},{\"durationMs\":43200000},{\"durationMs\":86400000},{\"durationMs\":172800000},{\"durationMs\":259200000},{\"durationMs\":604800000},{\"durationMs\":1209600000},{\"durationMs\":2419200000},{\"durationMs\":2592000000},{\"durationMs\":5184000000},{\"durationMs\":7776000000}]},\"timeContext\":{\"durationMs\":86400000},\"value\":{\"durationMs\":1209600000}},{\"id\":\"3300ad41-acbc-4ebd-900a-c6ab250b7c73\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Hash_Logs_Table\",\"label\":\"Hash Logs Table\",\"type\":2,\"description\":\"Log Table to correlate Domains Against\",\"isRequired\":true,\"query\":\"search \\\"*\\\" \\n| where TimeGenerated {Hash_Logs_Time_Range:query}\\n| summarize count() by $table | sort by count_ desc | where $table != \\\"ThreatIntelligenceIndicator\\\" | project $table\\n\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"value\":\"EndpointProtection_HASH_CL\"},{\"id\":\"f4f77ada-b97c-4a82-9421-20a58fb7ce26\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Hash_Logs_Field\",\"label\":\"Log Field with Hashes\",\"type\":2,\"description\":\"Select the field containing the Domain Name that you want to correlate against\",\"isRequired\":true,\"query\":\"{Hash_Logs_Table:value}\\n| getschema\\n| where DataType == \\\"System.String\\\"\\n| project ColumnName\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"value\":\"Hash_s\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"customWidth\":\"50\",\"name\":\"parameters - 0\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"95e78560-1e69-437c-8226-7b0f8c4dc199\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Threat_Intelligence_Time_Range\",\"label\":\"Data from\",\"type\":4,\"isRequired\":true,\"typeSettings\":{\"selectableValues\":[{\"durationMs\":300000},{\"durationMs\":900000},{\"durationMs\":1800000},{\"durationMs\":3600000},{\"durationMs\":14400000},{\"durationMs\":43200000},{\"durationMs\":86400000},{\"durationMs\":172800000},{\"durationMs\":259200000},{\"durationMs\":604800000},{\"durationMs\":1209600000},{\"durationMs\":2419200000},{\"durationMs\":2592000000},{\"durationMs\":5184000000},{\"durationMs\":7776000000}]},\"value\":{\"durationMs\":1209600000}},{\"id\":\"e7c7e2ea-f5b3-4505-b64c-b18ca8561168\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RF_Risk_list\",\"label\":\"Risk List\",\"type\":2,\"description\":\"Which Domain Risk List do you want to correlate against\",\"isRequired\":true,\"query\":\"ThreatIntelligenceIndicator\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\n| where isnotempty(FileHashValue)\\n| where Description contains \\\"Recorded Future\\\"\\n| summarize count() by Description\\n| project output = strcat('\\\"', Description, '\\\"')\\n\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"value\":\"\\\"Recorded Future - HASH - Observed in Underground Virus Testing Sites\\\"\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"customWidth\":\"50\",\"name\":\"parameters - 1\"}],\"exportParameters\":true},\"name\":\"group - 10\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"\\n### Guide: Detected Domains Per Day\\n\\nThe chart displays the number of correlation detections per day between domain logs and Recorded Future's domain Risk lists.\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ThreatIntelligenceIndicator\\r\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query} \\r\\n| where Description == {RF_Risk_list:value}\\r\\n| where isnotempty(Tags)\\r\\n| extend FileHashValue = tolower(FileHashValue)\\r\\n| join (\\r\\n {Hash_Logs_Table:value}\\r\\n | where TimeGenerated {Hash_Logs_Time_Range:query}\\r\\n // renaming time column so it is clear the log this came from\\r\\n | extend Hash_TimeGenerated = TimeGenerated\\r\\n)\\r\\non $left.FileHashValue == $right.{Hash_Logs_Field:value}\\r\\n| summarize Correlation_Matches=count() by bin(Hash_TimeGenerated, 1d)\\r\\n| render barchart\",\"size\":0,\"title\":\"Detected File Hashes Per Day\",\"noDataMessage\":\"No detected hashes\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\"}]},\"name\":\"group - 11\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"\\n### Guide: Detected Hashs\\n\\nThe Detected Hashs table lists hashs from the correlated logs that have been matched with Recorded Future Hash Risk Lists.\\n\\n**Table Columns**\\n\\n* **Risk Score:** The Recorded Future Risk Score for the Hashe (IOC), ranging from 1 to 99, with 99 being the highest level of severity.\\n* **Hash:** The detected hash.\\n* **Detected:** The time when the log was correlated with a Risk List.\\n* **Log Created:** The time when the log event itself was created.\\n* **Threat Classification:** The type of threat associated with the hash (IOC).\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ThreatIntelligenceIndicator\\r\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\r\\n| where Description contains {RF_Risk_list:value}\\r\\n| where isnotempty(Tags)\\r\\n| extend FileHashValue = tolower(FileHashValue)\\r\\n| join (\\r\\n {Hash_Logs_Table:value}\\r\\n | where TimeGenerated {Hash_Logs_Time_Range:query}\\r\\n // renaming time column so it is clear the log this came from\\r\\n | extend Hash_TimeGenerated = TimeGenerated\\r\\n)\\r\\non $left.FileHashValue == $right.{Hash_Logs_Field:value}\\r\\n| project [\\\"Risk Score\\\"]=ConfidenceScore, Hash=FileHashValue, Detected = format_datetime(TimeGenerated, 'yyyy-MM-dd HH:mm:ss'), [\\\"Log Created\\\"] = format_datetime(Hash_TimeGenerated, 'yyyy-MM-dd HH:mm:ss'), [\\\"Threat Classification\\\"]=ThreatType\\r\\n| summarize [\\\"Log Created\\\"]=max([\\\"Log Created\\\"]) by Hash, [\\\"Risk Score\\\"], Detected, [\\\"Threat Classification\\\"]\\r\\n| project [\\\"Risk Score\\\"], Hash, Detected, [\\\"Log Created\\\"], [\\\"Threat Classification\\\"]\\r\\n| sort by [\\\"Risk Score\\\"] desc\\r\\n\",\"size\":0,\"title\":\"Detected Hashes\",\"noDataMessage\":\"No detected hashes\",\"exportedParameters\":[{\"fieldName\":\"Hash\",\"parameterName\":\"MaliciousHashMatch\",\"parameterType\":5}],\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Risk\",\"formatter\":18,\"formatOptions\":{\"thresholdsOptions\":\"colors\",\"thresholdsGrid\":[{\"operator\":\">=\",\"thresholdValue\":\"90\",\"representation\":\"redBright\",\"text\":\"{0}{1}\"},{\"operator\":\">=\",\"thresholdValue\":\"65\",\"representation\":\"orange\",\"text\":\"{0}{1}\"},{\"operator\":\">=\",\"thresholdValue\":\"25\",\"representation\":\"yellow\",\"text\":\"{0}{1}\"},{\"operator\":\"Default\",\"representation\":\"blue\",\"text\":\"{0}{1}\"}]}}]}},\"customWidth\":\"70\",\"name\":\"query - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ThreatIntelligenceIndicator\\r\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\r\\n| where Description contains {RF_Risk_list:value}\\r\\n| where isnotempty(Tags)\\r\\n| extend FileHashValue = tolower(FileHashValue)\\r\\n| join (\\r\\n {Hash_Logs_Table:value}\\r\\n | where TimeGenerated {Hash_Logs_Time_Range:query}\\r\\n // renaming time column so it is clear the log this came from\\r\\n | extend Hash_TimeGenerated = TimeGenerated\\r\\n)\\r\\non $left.FileHashValue == $right.{Hash_Logs_Field:value}\\r\\n| project Risk=ConfidenceScore, FileHashValue, ThreatType, Tags\\r\\n| extend Evidence=parse_json(Tags)[0]\\r\\n| mv-expand Evidence = parse_json(tostring(Evidence))\\r\\n| extend Rule=Evidence['Rule']\\r\\n| summarize count() by tostring(Rule)\\r\\n| sort by count_ desc\\r\\n\\r\\n\",\"size\":0,\"title\":\"Top Triggered Risk Rules\",\"noDataMessage\":\"No triggered Risk Rules\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"count_\",\"formatter\":8,\"formatOptions\":{\"palette\":\"orange\"}}],\"labelSettings\":[{\"columnId\":\"count_\",\"label\":\"Count\"}]}},\"customWidth\":\"30\",\"name\":\"query - 2\"},{\"type\":1,\"content\":{\"json\":\"### Detected Hashes: Evidence Details\\n\\nTo view evidence details, click a row (hash) in the Detected Hashes table.\"},\"name\":\"text - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ThreatIntelligenceIndicator\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\n| where Description contains {RF_Risk_list:value}\\n| extend FileHashValue = tolower(FileHashValue)\\n| where FileHashValue == \\\"{MaliciousHashMatch}\\\"\\n| where isnotempty(Tags)\\n//| where ExpirationDateTime > now()\\n| extend Evidence=parse_json(Tags)[0]\\n| take 1\\n| mv-expand Evidence = parse_json(tostring(Evidence))\\n| project Rules = Evidence['Rule'], Criticality = Evidence['Criticality'], Evidence_String = Evidence['EvidenceString']\\n| sort by toint(Criticality) desc\",\"size\":1,\"noDataMessage\":\"No evidence details to show\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"conditionalVisibility\":{\"parameterName\":\"MaliciousHashMatch\",\"comparison\":\"isNotEqualTo\"},\"name\":\"query - 5\"},{\"type\":1,\"content\":{\"json\":\"\\n### Source data from {Hash_Logs_Table:value}\\n\\nTo view source data of correlated hash, click a row (hash) in the Detected Hashes table.\"},\"name\":\"text - 5\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"{Hash_Logs_Table:value}\\n| where TimeGenerated {Hash_Logs_Time_Range:query}\\n| where {Hash_Logs_Field:value} == \\\"{MaliciousHashMatch}\\\"\\n\",\"size\":1,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"conditionalVisibility\":{\"parameterName\":\"MaliciousHashMatch\",\"comparison\":\"isNotEqualTo\"},\"name\":\"query - 6\"}]},\"name\":\"group - 8\"}],\"styleSettings\":{\"paddingStyle\":\"wide\"},\"fromTemplateId\":\"sentinel-RecordedFutureHashCorrelationWorkbook\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\r\n", "version": "1.0", "sourceId": "[variables('workspaceResourceId')]", "category": "sentinel" @@ -4456,13 +6535,13 @@ { "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", "apiVersion": "2022-01-01-preview", - "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Workbook-', last(split(variables('workbookId1'),'/'))))]", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Workbook-', last(split(variables('workbookId4'),'/'))))]", "properties": { - "description": "@{workbookKey=RecordedFutureDomainC2DNSWorkbook; logoFileName=RecordedFuture.svg; description=Sets the time name for DNS Events and Threat Intelligence Time Range; dataTypesDependencies=System.Object[]; dataConnectorsDependencies=System.Object[]; previewImagesFileNames=System.Object[]; version=1.0.0; title=Recorded Future - C&C DNS Name to DNS Events - Correlation&Threat Hunting; templateRelativePath=Recorded Future - C&C DNS Name to DNS Events - Correlation&Threat Hunting.json; subtitle=; provider=Recorded Future}.description", - "parentId": "[variables('workbookId1')]", - "contentId": "[variables('_workbookContentId1')]", + "description": "@{workbookKey=RecordedFutureHashCorrelationWorkbook; logoFileName=RecordedFuture.svg; description=Recorded Future Hash Correlation Workbook. This workbook will visualize Recorded Future threat intelligence data together with infrastructure logs ingested in to Sentinel.; dataTypesDependencies=System.Object[]; dataConnectorsDependencies=System.Object[]; previewImagesFileNames=System.Object[]; version=1.0.1; title=Recorded Future - Hash Correlation; templateRelativePath=RecordedFutureHashCorrelation.json; subtitle=; provider=Recorded Future}.description", + "parentId": "[variables('workbookId4')]", + "contentId": "[variables('_workbookContentId4')]", "kind": "Workbook", - "version": "[variables('workbookVersion1')]", + "version": "[variables('workbookVersion4')]", "source": { "kind": "Solution", "name": "Recorded Future", @@ -4490,55 +6569,132 @@ } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_workbookContentId4')]", + "contentKind": "Workbook", + "displayName": "[parameters('workbook4-name')]", + "contentProductId": "[variables('_workbookcontentProductId4')]", + "id": "[variables('_workbookcontentProductId4')]", + "version": "[variables('workbookVersion4')]" } }, { - "type": "Microsoft.Resources/templateSpecs", - "apiVersion": "2022-02-01", - "name": "[variables('workbookTemplateSpecName2')]", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", + "name": "[variables('workbookTemplateSpecName5')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Workbook" - }, + "dependsOn": [ + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" + ], "properties": { - "description": "Recorded Future Workbook with template", - "displayName": "Recorded Future workbook template" + "description": "RecordedFutureIPCorrelationWorkbook Workbook with template version 3.0.0", + "mainTemplate": { + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "[variables('workbookVersion5')]", + "parameters": {}, + "variables": {}, + "resources": [ + { + "type": "Microsoft.Insights/workbooks", + "name": "[variables('workbookContentId5')]", + "location": "[parameters('workspace-location')]", + "kind": "shared", + "apiVersion": "2021-08-01", + "metadata": { + "description": "Recorded Future IP Correlation Workbook. This workbook will visualize Recorded Future threat intelligence data together with infrastructure logs ingested in to Sentinel." + }, + "properties": { + "displayName": "[parameters('workbook5-name')]", + "serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"041885bf-2e2c-42ae-ad35-2e12272b4dc4\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Help\",\"label\":\"Show Guide\",\"type\":10,\"isRequired\":true,\"typeSettings\":{\"additionalResourceOptions\":\"[variables('TemplateEmptyArray')]\"},\"jsonData\":\"[\\n {\\\"value\\\": \\\"Yes\\\", \\\"label\\\": \\\"Yes\\\", \\\"selected\\\":true},\\n {\\\"value\\\": \\\"No\\\", \\\"label\\\": \\\"No\\\"}\\n]\",\"timeContext\":{\"durationMs\":86400000},\"value\":\"No\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 6\"},{\"type\":1,\"content\":{\"json\":\"### Guide: IP Correlation \\n\\nRecorded Future’s IP Correlation Workbook helps you detect malicious IPs within your environment by correlating your logs with Recorded Future IP Risk Lists.\\n\\n### How to Correlate IPs\\n\\nTo correlate IPs, follow the steps below:\\n\\n1. In the **IP Logs Table** dropdown, select a log table that contains IP logs.\\n\\t* If a particular log table is not listed in the dropdown, ensure it is enabled in your environment.\\n2. In the **Log field with IPs** dropdown, select the log field that holds the IPs to be correlated.\\n\\t* The workbook can correlate IPs in the format: `5.56.61.62`.\\n3. Select a Recorded Future IP Risk List for correlation.\\n4. If necessary, adjust the values in the **Logs from** and **Data from** dropdowns to match your requirements.\\n5. Done\\n\\n---\\n\\n#### Log table with examples of correlatable log fields\\n\\n\\n| Table | Field | Table | Field |\\n|------------------------------|--------------------|---------------------------------|-----------|\\n| AzureActivity | CallerIpAddress | VMConnection | RemoteIp |\\n| AzureDiagnostics | CallerIPAddress | W3CIISLog | cIP |\\n| AWSCloudTrail | SourceIpAddress | _Im_NetworkSession | SrcIpAddr |\\n| AppServiceHTTPLogs | CIp | _Im_NetworkSession | DstIpAddr |\\n| AzureDiagnostics | client_ip_s | _Im_WebSession | SrcIpAddr |\\n| CommonSecurityLog | SourceIpAddress | SigninLogs | IPAddress |\\n| CommonSecurityLog | DestinationIP | AADNonInteractiveUserSignInLogs | IPAddress |\\n| DuoSecurityAuthentication_CL | access_device_ip_s | | |\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 11\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"### IP (from logs)\"},\"customWidth\":\"50\",\"name\":\"text - 2\"},{\"type\":1,\"content\":{\"json\":\"### Recorded Future Risk List\"},\"customWidth\":\"50\",\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"b91b8b5b-10cf-4106-99e2-793eb0d72dce\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"IP_Logs_Time_Range\",\"label\":\"Logs from\",\"type\":4,\"isRequired\":true,\"typeSettings\":{\"selectableValues\":[{\"durationMs\":300000},{\"durationMs\":900000},{\"durationMs\":1800000},{\"durationMs\":3600000},{\"durationMs\":14400000},{\"durationMs\":43200000},{\"durationMs\":86400000},{\"durationMs\":172800000},{\"durationMs\":259200000},{\"durationMs\":604800000},{\"durationMs\":1209600000},{\"durationMs\":2419200000},{\"durationMs\":2592000000},{\"durationMs\":5184000000},{\"durationMs\":7776000000}]},\"timeContext\":{\"durationMs\":86400000},\"value\":{\"durationMs\":7776000000}},{\"id\":\"3300ad41-acbc-4ebd-900a-c6ab250b7c73\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"IP_Logs_Table\",\"label\":\"IP Logs Table\",\"type\":2,\"description\":\"Log Table to correlate IPs Against\",\"isRequired\":true,\"query\":\"search * \\n| where TimeGenerated {IP_Logs_Time_Range:query}\\n| summarize count() by $table \\n| sort by count_ desc \\n| where $table != \\\"ThreatIntelligenceIndicator\\\" \\n| project $table\\n\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"value\":\"NetScreen_Firewall_CL\"},{\"id\":\"f4f77ada-b97c-4a82-9421-20a58fb7ce26\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"IP_Logs_Field\",\"label\":\"Log Field with IPs\",\"type\":2,\"description\":\"Select the field containing the IP that you want to correlate against\",\"isRequired\":true,\"query\":\"{IP_Logs_Table:value}\\n| where TimeGenerated {IP_Logs_Time_Range:query}\\n| getschema\\n| where DataType == \\\"System.String\\\"\\n| project ColumnName\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"value\":\"Dst_IPv4_s\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"customWidth\":\"50\",\"name\":\"parameters - 0\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"95e78560-1e69-437c-8226-7b0f8c4dc199\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Threat_Intelligence_Time_Range\",\"label\":\"Data from\",\"type\":4,\"isRequired\":true,\"typeSettings\":{\"selectableValues\":[{\"durationMs\":300000},{\"durationMs\":900000},{\"durationMs\":1800000},{\"durationMs\":3600000},{\"durationMs\":14400000},{\"durationMs\":43200000},{\"durationMs\":86400000},{\"durationMs\":172800000},{\"durationMs\":259200000},{\"durationMs\":604800000},{\"durationMs\":1209600000},{\"durationMs\":2419200000},{\"durationMs\":2592000000},{\"durationMs\":5184000000},{\"durationMs\":7776000000}]},\"value\":{\"durationMs\":5184000000}},{\"id\":\"e7c7e2ea-f5b3-4505-b64c-b18ca8561168\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RF_Risk_list\",\"label\":\"Risk List\",\"type\":2,\"description\":\"Which IP Risk List do you want to correlate against\",\"isRequired\":true,\"query\":\"ThreatIntelligenceIndicator\\n| where isnotempty(NetworkIP)\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\n| where Description contains \\\"Recorded Future\\\"\\n//| summarize count() by Description\\n| distinct Description\\n| project output = strcat('\\\"', Description, '\\\"')\\n\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"value\":\"\\\"Recorded Future - IP - Actively Communicating C&C Server\\\"\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"customWidth\":\"50\",\"name\":\"parameters - 1\"}],\"exportParameters\":true},\"name\":\"group - 10\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"\\n### Guide: Detected IPs Per Day\\n\\nThe chart displays the number of correlation detections per day between IP logs and Recorded Future's IP Risk lists.\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ThreatIntelligenceIndicator\\r\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\r\\n| where Description contains {RF_Risk_list:value}\\r\\n| where isnotempty(Tags)\\r\\n| join (\\r\\n {IP_Logs_Table:value}\\r\\n | where TimeGenerated {IP_Logs_Time_Range:query}\\r\\n // renaming time column so it is clear the log this came from\\r\\n | extend IP_TimeGenerated = TimeGenerated\\r\\n)\\r\\non $left.NetworkIP == $right.{IP_Logs_Field:value}\\r\\n| summarize Correlation_Matches=count() by bin(IP_TimeGenerated, 1d)\\r\\n| render barchart\",\"size\":0,\"title\":\"Detected IPs Per Day\",\"noDataMessage\":\"No detected IPs\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\"}]},\"name\":\"group - 11\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"\\n### Guide: Detected IPs\\n\\nThe Detected IPs table lists IPs from the correlated logs that have been matched with Recorded Future IP Risk Lists.\\n\\n**Table Columns**\\n\\n* **Risk Score:** The Recorded Future Risk Score for the IP (IOC), ranging from 1 to 99, with 99 being the highest level of severity.\\n* **IP:** The detected IP.\\n* **Detected:** The time when the log was correlated with a Risk List.\\n* **Log Created:** The time when the log event itself was created.\\n* **Threat Classification:** The type of threat associated with the IP (IOC).\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ThreatIntelligenceIndicator\\r\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\r\\n| where Description contains {RF_Risk_list:value}\\r\\n| where isnotempty(Tags)\\r\\n| join (\\r\\n {IP_Logs_Table:value}\\r\\n | where TimeGenerated {IP_Logs_Time_Range:query}\\r\\n // renaming time column so it is clear the log this came from\\r\\n | extend IP_TimeGenerated = TimeGenerated\\r\\n)\\r\\non $left.NetworkIP == $right.{IP_Logs_Field:value}\\r\\n| project [\\\"Risk Score\\\"]=ConfidenceScore, IP=NetworkIP, Detected=format_datetime(TimeGenerated, 'yyyy-MM-dd HH:mm:ss'), [\\\"Log Created\\\"]=format_datetime(IP_TimeGenerated, 'yyyy-MM-dd HH:mm:ss'), [\\\"Threat Classification\\\"]=ThreatType\\r\\n| summarize [\\\"Log Created\\\"]=max([\\\"Log Created\\\"]) by IP, [\\\"Risk Score\\\"], Detected, [\\\"Threat Classification\\\"]\\r\\n| project [\\\"Risk Score\\\"], IP, Detected, [\\\"Log Created\\\"], [\\\"Threat Classification\\\"]\\r\\n| sort by [\\\"Risk Score\\\"] desc\",\"size\":0,\"title\":\"Detected IPs\",\"noDataMessage\":\"No detected IPs\",\"exportedParameters\":[{\"fieldName\":\"IP\",\"parameterName\":\"MaliciousIPMatch\",\"parameterType\":5}],\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Risk\",\"formatter\":18,\"formatOptions\":{\"thresholdsOptions\":\"colors\",\"thresholdsGrid\":[{\"operator\":\">=\",\"thresholdValue\":\"90\",\"representation\":\"redBright\",\"text\":\"{0}{1}\"},{\"operator\":\">=\",\"thresholdValue\":\"65\",\"representation\":\"orange\",\"text\":\"{0}{1}\"},{\"operator\":\">=\",\"thresholdValue\":\"25\",\"representation\":\"yellow\",\"text\":\"{0}{1}\"},{\"operator\":\"Default\",\"representation\":\"blue\",\"text\":\"{0}{1}\"}]}},{\"columnMatch\":\"AdditionalInformation\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"100%\"}}],\"sortBy\":[{\"itemKey\":\"$gen_thresholds_Risk_0\",\"sortOrder\":2}]},\"sortBy\":[{\"itemKey\":\"$gen_thresholds_Risk_0\",\"sortOrder\":2}]},\"customWidth\":\"70\",\"name\":\"query - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ThreatIntelligenceIndicator\\r\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\r\\n| where Description contains {RF_Risk_list:value}\\r\\n| where isnotempty(Tags)\\r\\n| join (\\r\\n {IP_Logs_Table:value}\\r\\n | where TimeGenerated {IP_Logs_Time_Range:query}\\r\\n // renaming time column so it is clear the log this came from\\r\\n | extend IP_TimeGenerated = TimeGenerated\\r\\n)\\r\\non $left.NetworkIP == $right.{IP_Logs_Field:value}\\r\\n| project Risk=ConfidenceScore, NetworkIP, ThreatType, Tags\\r\\n| extend Evidence=parse_json(Tags)[0]\\r\\n| mv-expand Evidence = parse_json(tostring(Evidence))\\r\\n| extend Rule=Evidence['Rule']\\r\\n| summarize count() by tostring(Rule)\\r\\n| sort by count_ desc\",\"size\":0,\"title\":\"Top Triggered Risk Rules\",\"noDataMessage\":\"No triggered Risk Rules\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"count_\",\"formatter\":8,\"formatOptions\":{\"palette\":\"orange\"}}]}},\"customWidth\":\"30\",\"name\":\"query - 2\"},{\"type\":1,\"content\":{\"json\":\"### Detected IPs: Evidence Details\\n\\nTo view evidence details, click a row (IP) in the Detected IPs table.\"},\"name\":\"text - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ThreatIntelligenceIndicator\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\n| where Description contains {RF_Risk_list:value}\\n| where NetworkIP == \\\"{MaliciousIPMatch}\\\"\\n| where isnotempty(Tags)\\n//| where ExpirationDateTime > now()\\n| extend Evidence=parse_json(Tags)[0]\\n| take 1\\n| mv-expand Evidence = parse_json(tostring(Evidence))\\n| project Rules = Evidence['Rule'], Criticality = Evidence['Criticality'], Evidence_String = Evidence['EvidenceString']\\n| sort by toint(Criticality) desc\",\"size\":1,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Evidence_String\",\"formatter\":0,\"formatOptions\":{\"customColumnWidthSetting\":\"100%\"}}]}},\"conditionalVisibility\":{\"parameterName\":\"MaliciousIPMatch\",\"comparison\":\"isNotEqualTo\"},\"name\":\"query - 5\"},{\"type\":1,\"content\":{\"json\":\"\\n### Source data from {IP_Logs_Table:value}\\nTo view source data of correlated IP, click a row (IP) in the Detected IPs table.\"},\"name\":\"text - 5\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"{IP_Logs_Table:value}\\n| where TimeGenerated {IP_Logs_Time_Range:query}\\n| where {IP_Logs_Field:value} == \\\"{MaliciousIPMatch}\\\"\\n\",\"size\":1,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"conditionalVisibility\":{\"parameterName\":\"MaliciousIPMatch\",\"comparison\":\"isNotEqualTo\"},\"name\":\"query - 9\"}]},\"name\":\"group - 11\"}],\"styleSettings\":{\"paddingStyle\":\"wide\"},\"fromTemplateId\":\"sentinel-RecordedFutureIPCorrelationWorkbook\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\r\n", + "version": "1.0", + "sourceId": "[variables('workspaceResourceId')]", + "category": "sentinel" + } + }, + { + "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", + "apiVersion": "2022-01-01-preview", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Workbook-', last(split(variables('workbookId5'),'/'))))]", + "properties": { + "description": "@{workbookKey=RecordedFutureIPCorrelationWorkbook; logoFileName=RecordedFuture.svg; description=Recorded Future IP Correlation Workbook. This workbook will visualize Recorded Future threat intelligence data together with infrastructure logs ingested in to Sentinel.; dataTypesDependencies=System.Object[]; dataConnectorsDependencies=System.Object[]; previewImagesFileNames=System.Object[]; version=1.0.1; title=Recorded Future - IP Correlation; templateRelativePath=RecordedFutureIPCorrelation.json; subtitle=; provider=Recorded Future}.description", + "parentId": "[variables('workbookId5')]", + "contentId": "[variables('_workbookContentId5')]", + "kind": "Workbook", + "version": "[variables('workbookVersion5')]", + "source": { + "kind": "Solution", + "name": "Recorded Future", + "sourceId": "[variables('_solutionId')]" + }, + "author": { + "name": "Recorded Future Premier Integrations", + "email": "[variables('_email')]" + }, + "support": { + "name": "Recorded Future Support Team", + "email": "support@recordedfuture.com", + "tier": "Partner", + "link": "http://support.recordedfuture.com/" + }, + "dependencies": { + "operator": "AND", + "criteria": [ + { + "contentId": "ThreatIntelligenceIndicator", + "kind": "DataType" + } + ] + } + } + } + ] + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_workbookContentId5')]", + "contentKind": "Workbook", + "displayName": "[parameters('workbook5-name')]", + "contentProductId": "[variables('_workbookcontentProductId5')]", + "id": "[variables('_workbookcontentProductId5')]", + "version": "[variables('workbookVersion5')]" } }, { - "type": "Microsoft.Resources/templateSpecs/versions", - "apiVersion": "2022-02-01", - "name": "[concat(variables('workbookTemplateSpecName2'),'/',variables('workbookVersion2'))]", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", + "apiVersion": "2023-04-01-preview", + "name": "[variables('workbookTemplateSpecName6')]", "location": "[parameters('workspace-location')]", - "tags": { - "hidden-sentinelWorkspaceId": "[variables('workspaceResourceId')]", - "hidden-sentinelContentType": "Workbook" - }, "dependsOn": [ - "[resourceId('Microsoft.Resources/templateSpecs', variables('workbookTemplateSpecName2'))]" + "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "Recorded Future - Actively Communicating C&C IPs to DNS Events - Correlation&Threat HuntingWorkbook with template version 2.4.0", + "description": "RecordedFutureURLCorrelationWorkbook Workbook with template version 3.0.0", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", - "contentVersion": "[variables('workbookVersion2')]", + "contentVersion": "[variables('workbookVersion6')]", "parameters": {}, "variables": {}, "resources": [ { "type": "Microsoft.Insights/workbooks", - "name": "[variables('workbookContentId2')]", + "name": "[variables('workbookContentId6')]", "location": "[parameters('workspace-location')]", "kind": "shared", "apiVersion": "2021-08-01", "metadata": { - "description": "Sets the time name for DNS Events and Threat Intelligence Time Range" + "description": "Recorded Future URL Correlation Workbook. This workbook will visualize Recorded Future threat intelligence data together with infrastructure logs ingested in to Sentinel." }, "properties": { - "displayName": "[parameters('workbook2-name')]", - "serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":1,\"content\":{\"json\":\"## Recorded Future - Actively Communicating C&C IPs to DNS Events - Correlation/Threat Hunting\\n\\n\"},\"name\":\"text - 0\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"5aaf92cc-3c1e-43f0-8a2f-18a79d7c1d5d\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"DNS_Events_Time_Range\",\"label\":\"DNS Events Time Range\",\"type\":4,\"isRequired\":true,\"value\":{\"durationMs\":7776000000},\"typeSettings\":{\"selectableValues\":[{\"durationMs\":300000},{\"durationMs\":900000},{\"durationMs\":1800000},{\"durationMs\":3600000},{\"durationMs\":14400000},{\"durationMs\":43200000},{\"durationMs\":86400000},{\"durationMs\":172800000},{\"durationMs\":259200000},{\"durationMs\":604800000},{\"durationMs\":1209600000},{\"durationMs\":2419200000},{\"durationMs\":2592000000},{\"durationMs\":5184000000},{\"durationMs\":7776000000}]}},{\"id\":\"eea9b6a5-76f4-4d3b-b62d-4f5e1c4173b6\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Threat_Intelligence_Time_Range\",\"label\":\"Threat Intelligence Time Range\",\"type\":4,\"isRequired\":true,\"value\":{\"durationMs\":7776000000},\"typeSettings\":{\"selectableValues\":[{\"durationMs\":300000},{\"durationMs\":900000},{\"durationMs\":1800000},{\"durationMs\":3600000},{\"durationMs\":14400000},{\"durationMs\":43200000},{\"durationMs\":86400000},{\"durationMs\":172800000},{\"durationMs\":259200000},{\"durationMs\":604800000},{\"durationMs\":1209600000},{\"durationMs\":2419200000},{\"durationMs\":2592000000},{\"durationMs\":5184000000},{\"durationMs\":7776000000}]}}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 4\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ThreatIntelligenceIndicator\\r\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\r\\n| where Description contains 'Recorded Future - IP - Actively Communicating C&C Server'\\r\\n| join (\\r\\n DnsEvents | where TimeGenerated {DNS_Events_Time_Range:query}\\r\\n | where SubType =~ \\\"LookupQuery\\\" and isnotempty(IPAddresses)\\r\\n | extend SingleIP = split(IPAddresses, \\\",\\\")\\r\\n | mvexpand SingleIP\\r\\n | extend SingleIP = tostring(SingleIP)\\r\\n // renaming time column so it is clear the log this came from\\r\\n | extend DNS_TimeGenerated = TimeGenerated\\r\\n)\\r\\non $left.NetworkIP == $right.SingleIP\\r\\n| summarize Correlation_Matches=count() by bin(DNS_TimeGenerated, 1d)\\r\\n| render barchart\",\"size\":0,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ThreatIntelligenceIndicator\\r\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\r\\n| where Description contains 'Recorded Future - IP - Actively Communicating C&C Server'\\r\\n| join (\\r\\n DnsEvents | where TimeGenerated {DNS_Events_Time_Range:query}\\r\\n | where SubType =~ \\\"LookupQuery\\\" and isnotempty(IPAddresses)\\r\\n | extend SingleIP = split(IPAddresses, \\\",\\\")\\r\\n | mvexpand SingleIP\\r\\n | extend SingleIP = tostring(SingleIP)\\r\\n // renaming time column so it is clear the log this came from\\r\\n | extend DNS_TimeGenerated = TimeGenerated\\r\\n)\\r\\non $left.NetworkIP == $right.SingleIP\\r\\n| project Risk=ConfidenceScore, NetworkIP, ThreatType, AdditionalInformation\\r\\n| extend Evidence=parse_json(AdditionalInformation)['EvidenceDetails']\\r\\n| mv-expand Evidence\\r\\n| extend Rule=Evidence['Rule']\\r\\n| summarize count() by tostring(Rule)\\r\\n| sort by count_ desc\\r\\n\\r\\n\",\"size\":0,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"count_\",\"formatter\":8,\"formatOptions\":{\"palette\":\"orange\"}}],\"labelSettings\":[{\"columnId\":\"Rule\"},{\"columnId\":\"count_\",\"label\":\"Count\"}]}},\"customWidth\":\"30\",\"name\":\"query - 2\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ThreatIntelligenceIndicator\\r\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\r\\n| where Description contains 'Recorded Future - IP - Actively Communicating C&C Server'\\r\\n| join (\\r\\n DnsEvents | where TimeGenerated {DNS_Events_Time_Range:query}\\r\\n | where SubType =~ \\\"LookupQuery\\\" and isnotempty(IPAddresses)\\r\\n | extend SingleIP = split(IPAddresses, \\\",\\\")\\r\\n | mvexpand SingleIP\\r\\n | extend SingleIP = tostring(SingleIP)\\r\\n // renaming time column so it is clear the log this came from\\r\\n | extend DNS_TimeGenerated = TimeGenerated\\r\\n)\\r\\non $left.NetworkIP == $right.SingleIP\\r\\n| project Risk=ConfidenceScore, DestinationIP=NetworkIP, Threat_Intelligence_IOC_Date = TimeGenerated, SourceIP=ClientIP, DNS_Event_Time = DNS_TimeGenerated, ThreatType, Device=Computer, AdditionalInformation\\r\\n| sort by Risk desc\\r\\n\",\"size\":0,\"exportFieldName\":\"DestinationIP\",\"exportParameterName\":\"IOC\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Risk\",\"formatter\":18,\"formatOptions\":{\"thresholdsOptions\":\"colors\",\"thresholdsGrid\":[{\"operator\":\">=\",\"thresholdValue\":\"90\",\"representation\":\"redBright\",\"text\":\"{0}{1}\"},{\"operator\":\">=\",\"thresholdValue\":\"65\",\"representation\":\"orange\",\"text\":\"{0}{1}\"},{\"operator\":\">=\",\"thresholdValue\":\"25\",\"representation\":\"yellow\",\"text\":\"{0}{1}\"},{\"operator\":\"Default\",\"thresholdValue\":\"[variables('blanks')]\",\"representation\":\"blue\",\"text\":\"{0}{1}\"}]}}]},\"sortBy\":\"[variables('TemplateEmptyArray')]\"},\"customWidth\":\"70\",\"name\":\"query - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ThreatIntelligenceIndicator\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\n| where Description contains 'Recorded Future - IP - Actively Communicating C&C Server'\\n| where NetworkIP == \\\"{IOC}\\\"\\n| where ExpirationDateTime > now()\\n| extend Evidence=parse_json(AdditionalInformation)['EvidenceDetails']\\n| take 1\\n| mv-expand Evidence\\n| project Rules = Evidence['Rule'], Evidence_String = Evidence['EvidenceString'], Criticality = Evidence['Criticality']\\n| sort by toint(Criticality) desc\",\"size\":0,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 5\"}],\"fromTemplateId\":\"sentinel-RecordedFuture-IP-ActiveC2-Workbook\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\r\n", + "displayName": "[parameters('workbook6-name')]", + "serializedData": "{\"version\":\"Notebook/1.0\",\"items\":[{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"d7ccc5ca-c8ec-458f-ab0d-564a7ef1d217\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Help\",\"label\":\"Show Guide\",\"type\":10,\"isRequired\":true,\"jsonData\":\"[\\n {\\\"value\\\": \\\"Yes\\\", \\\"label\\\": \\\"Yes\\\", \\\"selected\\\":true},\\n {\\\"value\\\": \\\"No\\\", \\\"label\\\": \\\"No\\\"}\\n]\",\"timeContext\":{\"durationMs\":86400000},\"value\":\"No\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"parameters - 7\"},{\"type\":1,\"content\":{\"json\":\"### Guide: URL Correlation \\n\\nRecorded Future’s URL Correlation Workbook helps you detect malicious URLs within your environment by correlating your logs with Recorded Future URL Risk Lists.\\n\\n### How to Correlate URLs\\n\\nTo correlate URLs, follow the steps below:\\n\\n1. In the **URL Logs Table** dropdown, select a log table that contains URL logs.\\n\\t* If a particular log table is not listed in the dropdown, ensure it is enabled in your environment.\\n2. In the **Log field with URLs** dropdown, select the log field that holds the URLs to be correlated.\\n\\t* The workbook can correlate URLs in the format: `https://testurl.here.net`.\\n3. Select a Recorded Future URL Risk List for correlation.\\n4. If necessary, adjust the values in the **Logs from** and **Data from** dropdowns to match your requirements.\\n5. Done\\n\\n---\\n\\n#### Log table with examples of correlatable log fields\\n\\n| Table | Field |\\n|-------------------|------------|\\n| CommonSecurityLog | RequestURL |\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 11\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"### URL (from logs)\"},\"customWidth\":\"50\",\"name\":\"text - 2\"},{\"type\":1,\"content\":{\"json\":\"### Recorded Future Risk List\"},\"customWidth\":\"50\",\"name\":\"text - 3\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"b91b8b5b-10cf-4106-99e2-793eb0d72dce\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"URL_Logs_Time_Range\",\"label\":\"Logs from\",\"type\":4,\"isRequired\":true,\"typeSettings\":{\"selectableValues\":[{\"durationMs\":300000},{\"durationMs\":900000},{\"durationMs\":1800000},{\"durationMs\":3600000},{\"durationMs\":14400000},{\"durationMs\":43200000},{\"durationMs\":86400000},{\"durationMs\":172800000},{\"durationMs\":259200000},{\"durationMs\":604800000},{\"durationMs\":1209600000},{\"durationMs\":2419200000},{\"durationMs\":2592000000},{\"durationMs\":5184000000},{\"durationMs\":7776000000}]},\"timeContext\":{\"durationMs\":86400000},\"value\":{\"durationMs\":7776000000}},{\"id\":\"3300ad41-acbc-4ebd-900a-c6ab250b7c73\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"URL_Logs_Table\",\"label\":\"URL Logs Table\",\"type\":2,\"description\":\"Log Table to correlate URLs Against\",\"isRequired\":true,\"query\":\"search \\\"*\\\" \\n| where TimeGenerated {URL_Logs_Time_Range:query}\\n| summarize count() by $table | sort by count_ desc | where $table != \\\"ThreatIntelligenceIndicator\\\" | project $table\\n\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"value\":\"Squid_Proxy_URL_CL\"},{\"id\":\"f4f77ada-b97c-4a82-9421-20a58fb7ce26\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"URL_Logs_Field\",\"label\":\"Log Field with URLs\",\"type\":2,\"description\":\"Select the field containing the URL that you want to correlate against\",\"isRequired\":true,\"query\":\"{URL_Logs_Table:value}\\n| getschema\\n| where DataType == \\\"System.String\\\"\\n| project ColumnName\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"value\":\"URL_s\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"customWidth\":\"50\",\"name\":\"parameters - 0\"},{\"type\":9,\"content\":{\"version\":\"KqlParameterItem/1.0\",\"parameters\":[{\"id\":\"95e78560-1e69-437c-8226-7b0f8c4dc199\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"Threat_Intelligence_Time_Range\",\"label\":\"Data from\",\"type\":4,\"isRequired\":true,\"typeSettings\":{\"selectableValues\":[{\"durationMs\":300000},{\"durationMs\":900000},{\"durationMs\":1800000},{\"durationMs\":3600000},{\"durationMs\":14400000},{\"durationMs\":43200000},{\"durationMs\":86400000},{\"durationMs\":172800000},{\"durationMs\":259200000},{\"durationMs\":604800000},{\"durationMs\":1209600000},{\"durationMs\":2419200000},{\"durationMs\":2592000000},{\"durationMs\":5184000000},{\"durationMs\":7776000000}]},\"value\":{\"durationMs\":7776000000}},{\"id\":\"e7c7e2ea-f5b3-4505-b64c-b18ca8561168\",\"version\":\"KqlParameterItem/1.0\",\"name\":\"RF_Risk_list\",\"label\":\"Risk List\",\"type\":2,\"description\":\"Which Domain Risk List do you want to correlate against\",\"isRequired\":true,\"query\":\"ThreatIntelligenceIndicator\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\n| where isnotempty(Url)\\n| where Description contains \\\"Recorded Future\\\"\\n| summarize count() by Description\\n| project output = strcat('\\\"', Description, '\\\"')\\n\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"value\":\"\\\"Recorded Future - URL - Recently Reported by Insikt Group\\\"\"}],\"style\":\"pills\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"customWidth\":\"50\",\"name\":\"parameters - 1\"}],\"exportParameters\":true},\"name\":\"group - 10\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"\\n### Guide: Detected URLs Per Day\\n\\nThe chart displays the number of correlation detections per day between URL logs and Recorded Future's URL Risk lists.\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ThreatIntelligenceIndicator\\r\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\r\\n| where Description contains {RF_Risk_list:value}\\r\\n| where isnotempty(Tags)\\r\\n| join (\\r\\n {URL_Logs_Table:value}\\r\\n | where TimeGenerated {URL_Logs_Time_Range:query}\\r\\n // renaming time column so it is clear the log this came from\\r\\n | extend URL_TimeGenerated = TimeGenerated\\r\\n)\\r\\non $left.Url == $right.{URL_Logs_Field:value}\\r\\n| summarize Correlation_Matches=count() by bin(URL_TimeGenerated, 1d)\\r\\n| render barchart\",\"size\":0,\"title\":\"Detected URLs Per Day\",\"noDataMessage\":\"No detected URLs\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"name\":\"query - 1\"}]},\"name\":\"group - 11\"},{\"type\":12,\"content\":{\"version\":\"NotebookGroup/1.0\",\"groupType\":\"editable\",\"items\":[{\"type\":1,\"content\":{\"json\":\"\\n### Guide: Detected URLs\\n\\nThe Detected URLs table lists URLs from the correlated logs that have been matched with Recorded Future URL Risk Lists.\\n\\n**Table Columns**\\n\\n* **Risk Score:** The Recorded Future Risk Score for the URL (IOC), ranging from 1 to 99, with 99 being the highest level of severity.\\n* **URL:** The detected URL.\\n* **Detected:** The time when the log was correlated with a Risk List.\\n* **Log Created:** The time when the log event itself was created.\\n* **Threat Classification:** The type of threat associated with the URL (IOC).\",\"style\":\"info\"},\"conditionalVisibility\":{\"parameterName\":\"Help\",\"comparison\":\"isEqualTo\",\"value\":\"Yes\"},\"name\":\"text - 0\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ThreatIntelligenceIndicator\\r\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\r\\n| where Description contains {RF_Risk_list:value}\\r\\n| where isnotempty(Tags)\\r\\n| join (\\r\\n {URL_Logs_Table:value}\\r\\n | where TimeGenerated {URL_Logs_Time_Range:query}\\r\\n // renaming time column so it is clear the log this came from\\r\\n | extend IP_TimeGenerated = TimeGenerated\\r\\n)\\r\\non $left.Url == $right.{URL_Logs_Field:value}\\r\\n| project [\\\"Risk Score\\\"]=ConfidenceScore, URL=Url, Detected = format_datetime(TimeGenerated, 'yyyy-MM-dd HH:mm:ss'), [\\\"Log Created\\\"] = IP_TimeGenerated, [\\\"Threat Classification\\\"]=ThreatType\\r\\n| summarize [\\\"Log Created\\\"]=max([\\\"Log Created\\\"]) by URL, [\\\"Risk Score\\\"], Detected, [\\\"Threat Classification\\\"]\\r\\n| project [\\\"Risk Score\\\"], URL, Detected, [\\\"Log Created\\\"], [\\\"Threat Classification\\\"]\\r\\n| sort by [\\\"Risk Score\\\"] desc\\r\\n\",\"size\":0,\"title\":\"Detected URLs\",\"noDataMessage\":\"No detected URLs\",\"exportFieldName\":\"URL\",\"exportParameterName\":\"MaliciousURLMatch\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"Risk\",\"formatter\":18,\"formatOptions\":{\"thresholdsOptions\":\"colors\",\"thresholdsGrid\":[{\"operator\":\">=\",\"thresholdValue\":\"90\",\"representation\":\"redBright\",\"text\":\"{0}{1}\"},{\"operator\":\">=\",\"thresholdValue\":\"65\",\"representation\":\"orange\",\"text\":\"{0}{1}\"},{\"operator\":\">=\",\"thresholdValue\":\"25\",\"representation\":\"yellow\",\"text\":\"{0}{1}\"},{\"operator\":\"Default\",\"representation\":\"blue\",\"text\":\"{0}{1}\"}]}}]}},\"customWidth\":\"70\",\"name\":\"query - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ThreatIntelligenceIndicator\\r\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\r\\n| where Description contains {RF_Risk_list:value}\\r\\n| where isnotempty(Tags)\\r\\n| join (\\r\\n {URL_Logs_Table:value}\\r\\n | where TimeGenerated {URL_Logs_Time_Range:query}\\r\\n // renaming time column so it is clear the log this came from\\r\\n | extend URL_TimeGenerated = TimeGenerated\\r\\n)\\r\\non $left.Url == $right.{URL_Logs_Field:value}\\r\\n| project Risk=ConfidenceScore, Url, ThreatType, Tags\\r\\n| extend Evidence=parse_json(Tags)[0]\\r\\n| mv-expand Evidence = parse_json(tostring(Evidence))\\r\\n| extend Rule=Evidence['Rule']\\r\\n| summarize count() by tostring(Rule)\\r\\n| sort by count_ desc\\r\\n\\r\\n\",\"size\":0,\"title\":\"Top Triggered Risk Rules\",\"noDataMessage\":\"No triggered Risk Rules\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\",\"gridSettings\":{\"formatters\":[{\"columnMatch\":\"count_\",\"formatter\":8,\"formatOptions\":{\"palette\":\"orange\"}}]}},\"customWidth\":\"30\",\"name\":\"query - 2\"},{\"type\":1,\"content\":{\"json\":\"### Detected URLs: Evidence Details\\n\\nTo view evidence details, click a row (URL) in the Detected URLs table.\"},\"name\":\"text - 3\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"ThreatIntelligenceIndicator\\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\\n| where Description contains {RF_Risk_list}\\n| where Url == \\\"{MaliciousURLMatch}\\\"\\n| where isnotempty(Tags)\\n//| where ExpirationDateTime > now()\\n| extend Evidence=parse_json(Tags)[0]\\n| take 1\\n| mv-expand Evidence = parse_json(tostring(Evidence))\\n| project Rules = Evidence['Rule'], Criticality = Evidence['Criticality'], Evidence_String = Evidence['EvidenceString']\\n| sort by toint(Criticality) desc\",\"size\":1,\"noDataMessage\":\"ExpirationDateTime\",\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"conditionalVisibility\":{\"parameterName\":\"MaliciousURLMatch\",\"comparison\":\"isNotEqualTo\"},\"name\":\"query - 5\"},{\"type\":1,\"content\":{\"json\":\"\\n### Source data from {URL_Logs_Table:value}\\nTo view source data of correlated URL, click a row (URL) in the Detected URLs table.\"},\"name\":\"text - 5\"},{\"type\":3,\"content\":{\"version\":\"KqlItem/1.0\",\"query\":\"{URL_Logs_Table:value}\\n| where TimeGenerated {URL_Logs_Time_Range:query}\\n| where {URL_Logs_Field:value} == \\\"{MaliciousURLMatch}\\\"\\n\",\"size\":1,\"queryType\":0,\"resourceType\":\"microsoft.operationalinsights/workspaces\"},\"conditionalVisibility\":{\"parameterName\":\"MaliciousURLMatch\",\"comparison\":\"isNotEqualTo\"},\"name\":\"query - 6\"}]},\"name\":\"group - 10\"}],\"styleSettings\":{\"paddingStyle\":\"wide\"},\"fromTemplateId\":\"sentinel-RecordedFutureURLCorrelationWorkbook\",\"$schema\":\"https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json\"}\r\n", "version": "1.0", "sourceId": "[variables('workspaceResourceId')]", "category": "sentinel" @@ -4547,13 +6703,13 @@ { "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", "apiVersion": "2022-01-01-preview", - "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Workbook-', last(split(variables('workbookId2'),'/'))))]", + "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('Workbook-', last(split(variables('workbookId6'),'/'))))]", "properties": { - "description": "@{workbookKey=RecordedFutureIPActiveC2Workbook; logoFileName=RecordedFuture.svg; description=Sets the time name for DNS Events and Threat Intelligence Time Range; dataTypesDependencies=System.Object[]; dataConnectorsDependencies=System.Object[]; previewImagesFileNames=System.Object[]; version=1.0.0; title=Recorded Future - Actively Communicating C&C IPs to DNS Events - Correlation&Threat Hunting; templateRelativePath=Recorded Future - Actively Communicating C&C IPs to DNS Events - Correlation&Threat Hunting.json; subtitle=; provider=Recorded Future}.description", - "parentId": "[variables('workbookId2')]", - "contentId": "[variables('_workbookContentId2')]", + "description": "@{workbookKey=RecordedFutureURLCorrelationWorkbook; logoFileName=RecordedFuture.svg; description=Recorded Future URL Correlation Workbook. This workbook will visualize Recorded Future threat intelligence data together with infrastructure logs ingested in to Sentinel.; dataTypesDependencies=System.Object[]; dataConnectorsDependencies=System.Object[]; previewImagesFileNames=System.Object[]; version=1.0.1; title=Recorded Future - URL Correlation; templateRelativePath=RecordedFutureURLCorrelation.json; subtitle=; provider=Recorded Future}.description", + "parentId": "[variables('workbookId6')]", + "contentId": "[variables('_workbookContentId6')]", "kind": "Workbook", - "version": "[variables('workbookVersion2')]", + "version": "[variables('workbookVersion6')]", "source": { "kind": "Solution", "name": "Recorded Future", @@ -4581,17 +6737,35 @@ } } ] - } + }, + "packageKind": "Solution", + "packageVersion": "[variables('_solutionVersion')]", + "packageName": "[variables('_solutionName')]", + "packageId": "[variables('_solutionId')]", + "contentSchemaVersion": "3.0.0", + "contentId": "[variables('_workbookContentId6')]", + "contentKind": "Workbook", + "displayName": "[parameters('workbook6-name')]", + "contentProductId": "[variables('_workbookcontentProductId6')]", + "id": "[variables('_workbookcontentProductId6')]", + "version": "[variables('workbookVersion6')]" } }, { - "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2022-01-01-preview", + "type": "Microsoft.OperationalInsights/workspaces/providers/contentPackages", + "apiVersion": "2023-04-01-preview", "location": "[parameters('workspace-location')]", "properties": { - "version": "2.4.0", + "version": "3.0.0", "kind": "Solution", - "contentSchemaVersion": "2.0.0", + "contentSchemaVersion": "3.0.0", + "displayName": "Recorded Future", + "publisherDisplayName": "Recorded Future Support Team", + "descriptionHtml": "

Note: There may be known issues pertaining to this Solution, please refer to them before installing.

\n

Recorded Future is the worlds largest provider of intelligence for enterprise security. By combining persistent and pervasive automated data collection and analytics with human analysis, Recorded Future delivers intelligence that is timely, accurate, and actionable.

\n

Playbooks have internal dependencies to RecordedFuture-ImportToSentinel so install the RecordedFuture-ImportToSentinel playbook before any of the others.

\n

This solution takes a dependency on functionality like Azure Logic Apps, Azure Monitor Logs. Some of these dependencies might result in additional ingestion or operational costs.

\n\n

Workbooks: 6, Analytic Rules: 6, Playbooks: 15

\n

Learn more about Microsoft Sentinel | Learn more about Solutions

\n", + "contentKind": "Solution", + "contentProductId": "[variables('_solutioncontentProductId')]", + "id": "[variables('_solutioncontentProductId')]", + "icon": "", "contentId": "[variables('_solutionId')]", "parentId": "[variables('_solutionId')]", "source": { @@ -4644,44 +6818,79 @@ }, { "kind": "Playbook", - "contentId": "[variables('_RecordedFuture-ImportToSentinel')]", + "contentId": "[variables('_RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash')]", "version": "[variables('playbookVersion1')]" }, { "kind": "Playbook", - "contentId": "[variables('_RecordedFuture-DOMAIN-C2_DNS_Name-IndicatorProcessor')]", + "contentId": "[variables('_RecordedFuture-Sandbox_Enrichment-Url')]", "version": "[variables('playbookVersion2')]" }, { "kind": "Playbook", - "contentId": "[variables('_RecordedFuture-HASH-Observed_in_Underground_Virus_Test_Sites-IndicatorProcessor')]", + "contentId": "[variables('_RecordedFuture-Playbook-Alert-Importer')]", "version": "[variables('playbookVersion3')]" }, { "kind": "Playbook", - "contentId": "[variables('_RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash')]", + "contentId": "[variables('_RecordedFuture-Alert-Importer')]", "version": "[variables('playbookVersion4')]" }, { "kind": "Playbook", - "contentId": "[variables('_RecordedFuture-IP-Actively_Comm_C2_Server-IndicatorProcessor')]", + "contentId": "[variables('_RecordedFuture-ThreatIntelligenceImport')]", "version": "[variables('playbookVersion5')]" }, { "kind": "Playbook", - "contentId": "[variables('_RecordedFuture-URL-Recent_Rep_by_Insikt_Group-IndicatorProcessor')]", + "contentId": "[variables('_RecordedFuture-Domain-IndicatorImport')]", "version": "[variables('playbookVersion6')]" }, { "kind": "Playbook", - "contentId": "[variables('_RecordedFuture-Ukraine-IndicatorProcessor')]", + "contentId": "[variables('_RecordedFuture-Hash-IndicatorImport')]", "version": "[variables('playbookVersion7')]" }, { "kind": "Playbook", - "contentId": "[variables('_RecordedFuture-Sandbox_Enrichment-Url')]", + "contentId": "[variables('_RecordedFuture-IP-IndicatorImport')]", "version": "[variables('playbookVersion8')]" }, + { + "kind": "Playbook", + "contentId": "[variables('_RecordedFuture-URL-IndicatorImport')]", + "version": "[variables('playbookVersion9')]" + }, + { + "kind": "Playbook", + "contentId": "[variables('_RecordedFuture-ImportToSentinel')]", + "version": "[variables('playbookVersion10')]" + }, + { + "kind": "Playbook", + "contentId": "[variables('_RecordedFuture-DOMAIN-C2_DNS_Name-IndicatorProcessor')]", + "version": "[variables('playbookVersion11')]" + }, + { + "kind": "Playbook", + "contentId": "[variables('_RecordedFuture-HASH-Observed_in_Underground_Virus_Test_Sites-IndicatorProcessor')]", + "version": "[variables('playbookVersion12')]" + }, + { + "kind": "Playbook", + "contentId": "[variables('_RecordedFuture-IP-Actively_Comm_C2_Server-IndicatorProcessor')]", + "version": "[variables('playbookVersion13')]" + }, + { + "kind": "Playbook", + "contentId": "[variables('_RecordedFuture-URL-Recent_Rep_by_Insikt_Group-IndicatorProcessor')]", + "version": "[variables('playbookVersion14')]" + }, + { + "kind": "Playbook", + "contentId": "[variables('_RecordedFuture-Ukraine-IndicatorProcessor')]", + "version": "[variables('playbookVersion15')]" + }, { "kind": "Workbook", "contentId": "[variables('_workbookContentId1')]", @@ -4691,10 +6900,31 @@ "kind": "Workbook", "contentId": "[variables('_workbookContentId2')]", "version": "[variables('workbookVersion2')]" + }, + { + "kind": "Workbook", + "contentId": "[variables('_workbookContentId3')]", + "version": "[variables('workbookVersion3')]" + }, + { + "kind": "Workbook", + "contentId": "[variables('_workbookContentId4')]", + "version": "[variables('workbookVersion4')]" + }, + { + "kind": "Workbook", + "contentId": "[variables('_workbookContentId5')]", + "version": "[variables('workbookVersion5')]" + }, + { + "kind": "Workbook", + "contentId": "[variables('_workbookContentId6')]", + "version": "[variables('workbookVersion6')]" } ] }, "firstPublishDate": "2021-11-01", + "lastPublishDate": "2023-09-19", "providers": [ "Recorded Future" ], diff --git a/Solutions/Recorded Future/Playbooks/Images/2023-06-26-10-04-42.png b/Solutions/Recorded Future/Playbooks/Images/2023-06-26-10-04-42.png new file mode 100644 index 00000000000..26b2cc2c862 Binary files /dev/null and b/Solutions/Recorded Future/Playbooks/Images/2023-06-26-10-04-42.png differ diff --git a/Solutions/Recorded Future/Playbooks/Images/2023-06-26-10-59-49.png b/Solutions/Recorded Future/Playbooks/Images/2023-06-26-10-59-49.png new file mode 100644 index 00000000000..6d351d4b0e2 Binary files /dev/null and b/Solutions/Recorded Future/Playbooks/Images/2023-06-26-10-59-49.png differ diff --git a/Solutions/Recorded Future/Playbooks/Images/2023-08-09-18-05-46.png b/Solutions/Recorded Future/Playbooks/Images/2023-08-09-18-05-46.png new file mode 100644 index 00000000000..99f9a201a45 Binary files /dev/null and b/Solutions/Recorded Future/Playbooks/Images/2023-08-09-18-05-46.png differ diff --git a/Solutions/Recorded Future/Playbooks/Images/2023-09-07-11-11-09.png b/Solutions/Recorded Future/Playbooks/Images/2023-09-07-11-11-09.png new file mode 100644 index 00000000000..52c6ee0d532 Binary files /dev/null and b/Solutions/Recorded Future/Playbooks/Images/2023-09-07-11-11-09.png differ diff --git a/Solutions/Recorded Future/Playbooks/Images/2023-09-08-12-01-37.png b/Solutions/Recorded Future/Playbooks/Images/2023-09-08-12-01-37.png new file mode 100644 index 00000000000..bb272c2f8c9 Binary files /dev/null and b/Solutions/Recorded Future/Playbooks/Images/2023-09-08-12-01-37.png differ diff --git a/Solutions/Recorded Future/Playbooks/Images/2023-09-08-12-13-06.png b/Solutions/Recorded Future/Playbooks/Images/2023-09-08-12-13-06.png new file mode 100644 index 00000000000..62de3a8c529 Binary files /dev/null and b/Solutions/Recorded Future/Playbooks/Images/2023-09-08-12-13-06.png differ diff --git a/Solutions/Recorded Future/Playbooks/Images/2023-09-08-12-13-54.png b/Solutions/Recorded Future/Playbooks/Images/2023-09-08-12-13-54.png new file mode 100644 index 00000000000..4b81caeb67f Binary files /dev/null and b/Solutions/Recorded Future/Playbooks/Images/2023-09-08-12-13-54.png differ diff --git a/Solutions/Recorded Future/Playbooks/Images/2023-09-13-15-51-44.png b/Solutions/Recorded Future/Playbooks/Images/2023-09-13-15-51-44.png new file mode 100644 index 00000000000..18d24deeb2d Binary files /dev/null and b/Solutions/Recorded Future/Playbooks/Images/2023-09-13-15-51-44.png differ diff --git a/Solutions/Recorded Future/Playbooks/Images/2023-09-13-19-16-24.png b/Solutions/Recorded Future/Playbooks/Images/2023-09-13-19-16-24.png new file mode 100644 index 00000000000..fae768a5c15 Binary files /dev/null and b/Solutions/Recorded Future/Playbooks/Images/2023-09-13-19-16-24.png differ diff --git a/Solutions/Recorded Future/Playbooks/Images/2023-09-13-19-24-54.png b/Solutions/Recorded Future/Playbooks/Images/2023-09-13-19-24-54.png new file mode 100644 index 00000000000..f476287777b Binary files /dev/null and b/Solutions/Recorded Future/Playbooks/Images/2023-09-13-19-24-54.png differ diff --git a/Solutions/Recorded Future/Playbooks/RecordedFuture-Alert-Importer/azuredeploy.json b/Solutions/Recorded Future/Playbooks/RecordedFuture-Alert-Importer/azuredeploy.json new file mode 100644 index 00000000000..b1283a95729 --- /dev/null +++ b/Solutions/Recorded Future/Playbooks/RecordedFuture-Alert-Importer/azuredeploy.json @@ -0,0 +1,560 @@ +{ + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "1.0.0.0", + "metadata": { + "title": "RecordedFuture-Alert-Importer", + "description": "This playbook imports alerts from Recorded Future and stores them in a custom log in the log analytics workspace. It can create alerts dependant on the parameter: create_incident. ", + "prerequisites": [ + "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials" + ], + "postDeployment": [ + "After deployment, open the playbook to configure all connections and press save." + ], + "prerequisitesDeployTemplateFile": "../RecordedFuture-ThreatIntelligenceImport/azuredeploy.json", + "lastUpdateTime": "2023-09-13T00:00:00.000Z", + "entities": [], + "tags": [ "Alert" ], + "support": { + "tier": "Partner", + "armtemplate": "Generated from https://github.com/Azure/Azure-Sentinel/tree/master/Tools/Playbook-ARM-Template-Generator" + }, + "author": { + "name": "Recorded Future" + }, + "releaseNotes": [ + { + "version": "1.0", + "title": "RecordedFuture-Alert-Importer", + "notes": [ "Initial version" ] + } + ] + }, + "parameters": { + "PlaybookName": { + "defaultValue": "RecordedFuture-AlertImporter", + "type": "string" + }, + "create_incident": { + "type": "string", + "metadata": { + "description": "Create Microsoft Sentinel incidents (possible values true/false)" + } + }, + "workspace_name": { + "type": "string", + "defaultValue": "", + "metadata": { + "description" : "Microsoft Sentinel Workspace name" + } + } + }, + "variables": { + "AzureloganalyticsdatacollectorConnectionName": "[concat('Azureloganalyticsdatacollector-', parameters('PlaybookName'))]", + "AzuremonitorlogsConnectionName": "[concat('Azuremonitorlogs-', parameters('PlaybookName'))]", + "MicrosoftSentinelConnectionName": "[concat('MicrosoftSentinel-', parameters('PlaybookName'))]", + "Recordedfuturev2ConnectionName": "[concat('Recordedfuturev2-', parameters('PlaybookName'))]" + }, + "resources": [ + { + "properties": { + "provisioningState": "Succeeded", + "state": "Enabled", + "definition": { + "$schema": "https://schema.management.azure.com/providers/Microsoft.Logic/schemas/2016-06-01/workflowdefinition.json#", + "contentVersion": "1.0.0.0", + "parameters": { + "$connections": { + "defaultValue": {}, + "type": "Object" + }, + "create_incident": { + "type": "string", + "defaultValue": "[parameters('create_incident')]" + } + }, + "triggers": { + "Recurrence": { + "recurrence": { + "frequency": "Hour", + "interval": 1 + }, + "evaluatedRecurrence": { + "frequency": "Hour", + "interval": 1 + }, + "type": "Recurrence" + } + }, + "actions": { + "For_each_triggered_alert": { + "foreach": "@body('Search_Triggered_Alerts')?['data']", + "actions": { + "Create_incident_if_parameter_is_set": { + "actions": { + "Add_comment_to_incident_(V3)": { + "runAfter": { + "Parse_JSON_2": [ + "Succeeded" + ] + }, + "type": "ApiConnection", + "inputs": { + "body": { + "incidentArmId": "@body('Create_incident')?['id']", + "message": "

@{items('For_each_triggered_alert')?['title']}
\nAlert ID: @{items('For_each_triggered_alert')?['id']}
\nTriggered: @{items('For_each_triggered_alert')?['log']?['triggered']}
\n[Open Recorded Future portal](@{items('For_each_triggered_alert')?['url']?['portal']})
\nAI Summary: @{items('For_each_triggered_alert')?['ai_insights']?['text']}

" + }, + "host": { + "connection": { + "name": "@parameters('$connections')['azuresentinel']['connectionId']" + } + }, + "method": "post", + "path": "/Incidents/Comment" + } + }, + "Create_incident": { + "runAfter": {}, + "type": "ApiConnection", + "inputs": { + "body": { + "description": "**Recorded Future Alert**\n@{items('For_each_triggered_alert')?['title']}\nAlert ID: @{items('For_each_triggered_alert')?['id']}\nTriggered: @{items('For_each_triggered_alert')?['log']?['triggered']}\n[Open Recorded Future portal](@{items('For_each_triggered_alert')?['url']?['portal']})\nAI summary: @{items('For_each_triggered_alert')?['ai_insights']?['text']}", + "severity": "Medium", + "status": "New", + "tagsToAdd": { + "TagsToAdd": [ + { + "Tag": "Recorded Future Alert" + } + ] + }, + "title": "@items('For_each_triggered_alert')?['title']" + }, + "host": { + "connection": { + "name": "@parameters('$connections')['azuresentinel']['connectionId']" + } + }, + "method": "put", + "path": "[concat('/Incidents/subscriptions/', subscription().subscriptionId,'/resourceGroups/',resourceGroup().name,'/workspaces/',parameters('workspace_name') ) ]" + } + }, + "Parse_JSON_2": { + "runAfter": { + "Create_incident": [ + "Succeeded" + ] + }, + "type": "ParseJson", + "inputs": { + "content": "@items('For_each_triggered_alert')?['hits']", + "schema": { + "items": { + "properties": { + "analyst_note": {}, + "document": { + "properties": { + "authors": { + "type": "array" + }, + "source": { + "properties": { + "id": { + "type": "string" + }, + "name": { + "type": "string" + }, + "type": { + "type": "string" + } + }, + "type": "object" + }, + "title": { + "type": [ + "string", + "null" + ] + }, + "url": {} + }, + "type": "object" + }, + "entities": { + "items": { + "properties": { + "id": { + "type": "string" + }, + "name": { + "type": "string" + }, + "type": { + "type": "string" + } + }, + "required": [ + "id", + "name", + "type" + ], + "type": "object" + }, + "type": "array" + }, + "fragment": { + "type": "string" + }, + "id": { + "type": "string" + }, + "language": { + "type": "string" + }, + "primary_entity": {} + }, + "required": [ + "entities", + "document", + "fragment", + "id", + "language", + "primary_entity", + "analyst_note" + ], + "type": "object" + }, + "type": "array" + } + } + } + }, + "runAfter": { + "For_each_hit": [ + "Succeeded" + ] + }, + "expression": { + "and": [ + { + "equals": [ + "@parameters('create_incident')", + "true" + ] + } + ] + }, + "type": "If" + }, + "For_each_hit": { + "foreach": "@items('For_each_triggered_alert')['hits']", + "actions": { + "Parse_JSON": { + "runAfter": {}, + "type": "ParseJson", + "inputs": { + "content": "@items('For_each_hit')", + "schema": { + "properties": { + "analyst_note": {}, + "document": { + "properties": { + "authors": { + "items": { + "properties": { + "id": { + "type": "string" + }, + "name": { + "type": "string" + }, + "type": { + "type": "string" + } + }, + "required": [ + "id", + "name", + "type" + ], + "type": "object" + }, + "type": "array" + }, + "source": { + "properties": { + "id": { + "type": "string" + }, + "name": { + "type": "string" + }, + "type": { + "type": "string" + } + }, + "type": "object" + }, + "title": { + "type": [ + "string", + "null" + ] + }, + "url": {} + }, + "type": "object" + }, + "entities": { + "items": { + "properties": { + "id": { + "type": "string" + }, + "name": { + "type": "string" + }, + "type": { + "type": "string" + } + }, + "required": [ + "id", + "name", + "type" + ], + "type": "object" + }, + "type": "array" + }, + "fragment": { + "type": "string" + }, + "id": { + "type": "string" + }, + "language": { + "type": "string" + }, + "primary_entity": {} + }, + "type": "object" + } + } + }, + "Send_Data_2": { + "runAfter": { + "Parse_JSON": [ + "Succeeded" + ] + }, + "type": "ApiConnection", + "inputs": { + "body": "{\n\"RuleName\": \"@{items('For_each_triggered_alert')?['rule']?['name']}\",\n\"Triggered\": \"@{items('For_each_triggered_alert')?['log']?['triggered']}\",\n\"AlertName\": \"@{items('For_each_triggered_alert')?['title']}\",\n\"AlertID\": \"@{items('For_each_triggered_alert')?['id']}\", \n\"Entity\": @{items('For_each_hit')?['entities']},\n\"Documents\": @{items('For_each_hit')?['document']},\n\"URL\": \"@{items('For_each_triggered_alert')?['rule']?['url']?['portal']}\",\n\"Document_url\": \"@{items('For_each_hit')?['document']?['url']}\",\n\"AISummary\": \"@{items('For_each_triggered_alert')?['ai_insights']?['text']}\",\n\"Fragment\": \"@{replace(replace(body('Parse_JSON')?['fragment'], '\\', '\\\\'), '\"', '\\\"')}\"}", + "headers": { + "Log-Type": "RecordedFuturePortalAlerts" + }, + "host": { + "connection": { + "name": "@parameters('$connections')['azureloganalyticsdatacollector']['connectionId']" + } + }, + "method": "post", + "path": "/api/logs" + } + } + }, + "runAfter": {}, + "type": "Foreach" + } + }, + "runAfter": { + "Search_Triggered_Alerts": [ + "Succeeded" + ] + }, + "type": "Foreach" + }, + "Initialize_variable": { + "runAfter": {}, + "type": "InitializeVariable", + "inputs": { + "variables": [ + { + "name": "latest_event_date", + "type": "string", + "value": "@{addHours(utcNow(), -24)}" + } + ] + } + }, + "Run_query_and_list_results": { + "runAfter": { + "Initialize_variable": [ + "Succeeded" + ] + }, + "type": "ApiConnection", + "inputs": { + "body": "RecordedFuturePortalAlerts_CL\n| summarize LatestEvent=max(Triggered_t)", + "host": { + "connection": { + "name": "@parameters('$connections')['azuremonitorlogs_1']['connectionId']" + } + }, + "method": "post", + "path": "/queryData", + "queries": { + "resourcegroups": "[resourceGroup().name]", + "resourcename": "[parameters('workspace_name')]", + "resourcetype": "Log Analytics Workspace", + "subscriptions": "[subscription().subscriptionId]", + "timerange": "Last 7 days" + } + } + }, + "Search_Triggered_Alerts": { + "runAfter": { + "Set_variable": [ + "Succeeded", + "Skipped" + ] + }, + "type": "ApiConnection", + "inputs": { + "host": { + "connection": { + "name": "@parameters('$connections')['recordedfuturev2']['connectionId']" + } + }, + "method": "get", + "path": "/v2/alerts", + "queries": { + "triggered": "[@{addSeconds(variables('latest_event_date'),1)},@{utcNow()}]" + } + } + }, + "Set_variable": { + "runAfter": { + "Run_query_and_list_results": [ + "Succeeded" + ] + }, + "type": "SetVariable", + "inputs": { + "name": "latest_event_date", + "value": "@string(body('Run_query_and_list_results')?['value'][0]['LatestEvent'])" + } + } + }, + "outputs": {} + }, + "parameters": { + "$connections": { + "value": { + "azureloganalyticsdatacollector": { + "connectionId": "[resourceId('Microsoft.Web/connections', variables('AzureloganalyticsdatacollectorConnectionName'))]", + "connectionName": "[variables('AzureloganalyticsdatacollectorConnectionName')]", + "id": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', resourceGroup().location, '/managedApis/Azureloganalyticsdatacollector')]" + }, + "azuremonitorlogs_1": { + "connectionId": "[resourceId('Microsoft.Web/connections', variables('AzuremonitorlogsConnectionName'))]", + "connectionName": "[variables('AzuremonitorlogsConnectionName')]", + "id": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', resourceGroup().location, '/managedApis/Azuremonitorlogs')]" + }, + "azuresentinel": { + "connectionId": "[resourceId('Microsoft.Web/connections', variables('MicrosoftSentinelConnectionName'))]", + "connectionName": "[variables('MicrosoftSentinelConnectionName')]", + "id": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', resourceGroup().location, '/managedApis/Azuresentinel')]", + "connectionProperties": { + "authentication": { + "type": "ManagedServiceIdentity" + } + } + }, + "recordedfuturev2": { + "connectionId": "[resourceId('Microsoft.Web/connections', variables('Recordedfuturev2ConnectionName'))]", + "connectionName": "[variables('Recordedfuturev2ConnectionName')]", + "id": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', resourceGroup().location, '/managedApis/Recordedfuturev2')]" + } + } + } + } + }, + "name": "[parameters('PlaybookName')]", + "type": "Microsoft.Logic/workflows", + "location": "[resourceGroup().location]", + "tags": { + "hidden-SentinelTemplateName": "RecordedFuture-AlertImporter", + "hidden-SentinelTemplateVersion": "1.0" + }, + "identity": { + "type": "SystemAssigned" + }, + "apiVersion": "2017-07-01", + "dependsOn": [ + "[resourceId('Microsoft.Web/connections', variables('AzureloganalyticsdatacollectorConnectionName'))]", + "[resourceId('Microsoft.Web/connections', variables('AzuremonitorlogsConnectionName'))]", + "[resourceId('Microsoft.Web/connections', variables('MicrosoftSentinelConnectionName'))]", + "[resourceId('Microsoft.Web/connections', variables('Recordedfuturev2ConnectionName'))]" + ] + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "name": "[variables('AzureloganalyticsdatacollectorConnectionName')]", + "location": "[resourceGroup().location]", + "kind": "V1", + "properties": { + "displayName": "[variables('AzureloganalyticsdatacollectorConnectionName')]", + "customParameterValues": {}, + "api": { + "id": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', resourceGroup().location, '/managedApis/Azureloganalyticsdatacollector')]" + } + } + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "name": "[variables('AzuremonitorlogsConnectionName')]", + "location": "[resourceGroup().location]", + "kind": "V1", + "properties": { + "displayName": "[variables('AzuremonitorlogsConnectionName')]", + "customParameterValues": {}, + "api": { + "id": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', resourceGroup().location, '/managedApis/Azuremonitorlogs')]" + } + } + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "name": "[variables('MicrosoftSentinelConnectionName')]", + "location": "[resourceGroup().location]", + "kind": "V1", + "properties": { + "displayName": "[variables('MicrosoftSentinelConnectionName')]", + "customParameterValues": {}, + "parameterValueType": "Alternative", + "api": { + "id": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', resourceGroup().location, '/managedApis/Azuresentinel')]" + } + } + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "name": "[variables('Recordedfuturev2ConnectionName')]", + "location": "[resourceGroup().location]", + "kind": "V1", + "properties": { + "displayName": "[variables('Recordedfuturev2ConnectionName')]", + "customParameterValues": {}, + "api": { + "id": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', resourceGroup().location, '/managedApis/Recordedfuturev2')]" + } + } + } + ] +} diff --git a/Solutions/Recorded Future/Playbooks/RecordedFuture-DOMAIN-C2_DNS_Name-IndicatorProcessor/azuredeploy.json b/Solutions/Recorded Future/Playbooks/RecordedFuture-DOMAIN-C2_DNS_Name-IndicatorProcessor/azuredeploy.json index 8da4275e062..4cd549b9485 100644 --- a/Solutions/Recorded Future/Playbooks/RecordedFuture-DOMAIN-C2_DNS_Name-IndicatorProcessor/azuredeploy.json +++ b/Solutions/Recorded Future/Playbooks/RecordedFuture-DOMAIN-C2_DNS_Name-IndicatorProcessor/azuredeploy.json @@ -3,7 +3,7 @@ "contentVersion": "1.0.0.0", "metadata": { "title": "RecordedFuture-DOMAIN-C2_DNS_Name-TIProcessor", - "description": "This playbook leverages the Recorded Future API and automatically imports the C&C DNS Name Domain RiskList, as Threat Intelligence Indicators, for detection purposes in Microsoft Sentinel.\n\nThis playbook depends on RecordedFuture-ImportToSentinel that need to be installed **manually** before installing current playbook.", + "description": "**[Deprecated]**\nDeprecated due to changes in the Threat Intelligence Platform. Use the new IndicatorImport playbooks that is provided in this Solution.\n\nThis playbook leverages the Recorded Future API and automatically imports the C&C DNS Name Domain RiskList, as Threat Intelligence Indicators, for detection purposes in Microsoft Sentinel.\n\nThis playbook depends on RecordedFuture-ImportToSentinel that need to be installed **manually** before installing current playbook.", "prerequisites": [ "First install the RecordedFuture-ImportToSentinel playbook.", "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials" @@ -11,10 +11,10 @@ "postDeployment": [ "After deployment you have to open the playbook to configure all connections and press save." ], - "prerequisitesDeployTemplateFile": "../RecordedFuture-ImportToSentinel/RecordedFuture-ImportToSentinel.json", - "lastUpdateTime": "2022-08-01T00:00:00.000Z", + "prerequisitesDeployTemplateFile": "../RecordedFuture-ImportToSentinel/azuredeploy.json", + "lastUpdateTime": "2023-08-07T00:00:00.000Z", "entities": [], - "tags": [ "Threat Intelligence" ], + "tags": ["Deprecated","Threat Intelligence"], "support": { "tier": "Partner" }, @@ -23,9 +23,17 @@ }, "releaseNotes": [ { - "version": "1.0.0", + "version": "1.0", "title": "RecordedFuture-DOMAIN-C2_DNS_Name-IndicatorProcessor", "notes": [ "Initial version" ] + }, + { + "version": "1.1", + "title": "Deprecated", + "notes": [ + "Deprecated in favor for the new IndicatorImport playbooks. More information can be found in the readme on Github https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Recorded%20Future/Playbooks/readme.md", + "Once a new IndicatorImport playbook is installed downloading the same risk list. Deactivate or delete this playbook." + ] } ] }, @@ -48,6 +56,10 @@ "apiVersion": "2019-05-01", "name": "[parameters('PlaybookName')]", "location": "[resourceGroup().location]", + "tags": { + "hidden-SentinelTemplateName": "RecordedFuture-DOMAIN-C2_DNS_Name-TIProcessor", + "hidden-SentinelTemplateVersion": "1.1" + }, "dependsOn": [ "[resourceId('Microsoft.Web/connections', variables('RecordedFutureConnectionName'))]" ], diff --git a/Solutions/Recorded Future/Playbooks/RecordedFuture-Domain-IndicatorImport/azuredeploy.json b/Solutions/Recorded Future/Playbooks/RecordedFuture-Domain-IndicatorImport/azuredeploy.json new file mode 100644 index 00000000000..730a1ff82ea --- /dev/null +++ b/Solutions/Recorded Future/Playbooks/RecordedFuture-Domain-IndicatorImport/azuredeploy.json @@ -0,0 +1,239 @@ +{ + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "1.0.0.0", + "metadata": { + "title": "RecordedFuture-Domain-IndicatorImport", + "description": "This playbook imports Domain risk lists from Recorded Future and stores them as Threat Intelligence Indicators in Microsoft Sentinel, for detection purposes.\n\nThis playbook depends on RecordedFuture-ThreatIntelligenceImport that need to be installed **manually** before installing this playbook.", + "prerequisites": [ + "First install the RecordedFuture-ThreatIntelligenceImport playbook.", + "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials" + ], + "postDeployment": [ + "After deployment, open the playbook to configure all connections and press save." + ], + "prerequisitesDeployTemplateFile": "../RecordedFuture-ThreatIntelligenceImport/azuredeploy.json", + "lastUpdateTime": "2023-07-06T00:00:00.000Z", + "entities": [], + "tags": [ "Threat Intelligence" ], + "support": { + "tier": "Partner", + "armtemplate": "Generated from https://github.com/Azure/Azure-Sentinel/tree/master/Tools/Playbook-ARM-Template-Generator" + }, + "author": { + "name": "Recorded Future" + }, + "releaseNotes": [ + { + "version": "1.0", + "title": "RecordedFuture-Domain-IndicatorImport", + "notes": [ "Initial version" ] + } + ] + }, + "parameters": { + "PlaybookName": { + "defaultValue": "RecordedFuture-Domain-IndicatorImport", + "type": "string" + }, + "PlaybookNameBatching": { + "defaultValue": "RecordedFuture-ThreatIntelligenceImport", + "type": "String" + } + }, + "variables": { + "RecordedfutureConnectionName": "[concat('Recordedfuture-', parameters('PlaybookName'))]" + }, + "resources": [ + { + "properties": { + "provisioningState": "Succeeded", + "state": "Enabled", + "definition": { + "$schema": "https://schema.management.azure.com/providers/Microsoft.Logic/schemas/2016-06-01/workflowdefinition.json#", + "contentVersion": "1.0.0.0", + "parameters": { + "$connections": { + "defaultValue": {}, + "type": "Object" + } + }, + "triggers": { + "Recurrence": { + "recurrence": { + "frequency": "Hour", + "interval": 2 + }, + "evaluatedRecurrence": { + "frequency": "Hour", + "interval": 24 + }, + "type": "Recurrence" + } + }, + "actions": { + "For_each": { + "foreach": "@body('Recorded_Future_RiskLists_and_SCF_Download')", + "actions": { + "Parse_JSON": { + "runAfter": {}, + "type": "ParseJson", + "inputs": { + "content": "@items('For_each')", + "schema": { + "properties": { + "EvidenceDetails": { + "properties": { + "EvidenceDetails": { + "items": { + "properties": { + "Criticality": { + "type": "integer" + }, + "CriticalityLabel": { + "type": "string" + }, + "EvidenceString": { + "type": "string" + }, + "Rule": { + "type": "string" + }, + "Timestamp": { + "type": "integer" + } + }, + "required": [ + "Rule", + "EvidenceString", + "CriticalityLabel", + "Timestamp", + "Criticality" + ], + "type": "object" + }, + "type": "array" + } + }, + "type": "object" + }, + "Name": { + "type": "string" + }, + "Risk": { + "type": "integer" + }, + "riskString": { + "type": "string" + } + }, + "type": "object" + } + } + }, + "RecordedFuture-ImportToSentinel": { + "runAfter": { + "Parse_JSON": [ + "Succeeded" + ] + }, + "type": "SendToBatch", + "inputs": { + "batchName": "RFImportToSentinel", + "content": { + "confidence": "@int(body('Parse_JSON')?['Risk'])", + "created": "@{utcNow()}", + "description": "Recorded Future - Domains - Command and Control Activity", + "id": "indicator--@{guid()}", + "indicator_types": [ + "malicious-activity" + ], + "labels": [ + "@{body('Parse_JSON')?['EvidenceDetails']?['EvidenceDetails']}" + ], + "modified": "@{utcNow()}", + "name": "@{body('Parse_JSON')?['Name']}", + "pattern": "[[domain-name:value = '@{body('Parse_JSON')?['Name']}']", + "pattern_type": "stix", + "spec_version": "2.1", + "type": "indicator", + "valid_from": "@{utcNow()}", + "valid_until": "@{addHours(utcNow(),2)}" + }, + "host": { + "triggerName": "Batch_messages", + "workflow": { + "id": "[concat('/subscriptions/', subscription().subscriptionId, '/resourceGroups/', resourceGroup().name, '/providers/Microsoft.Logic/workflows/', parameters('PlaybookNameBatching'))]" + } + } + } + } + }, + "runAfter": { + "Recorded_Future_RiskLists_and_SCF_Download": [ + "Succeeded" + ] + }, + "type": "Foreach" + }, + "Recorded_Future_RiskLists_and_SCF_Download": { + "runAfter": {}, + "type": "ApiConnection", + "inputs": { + "host": { + "connection": { + "name": "@parameters('$connections')['recordedfuture']['connectionId']" + } + }, + "method": "get", + "path": "/fusion/files", + "queries": { + "path": "/public/MicrosoftAzure/domain_c2_dns.json" + } + } + } + }, + "outputs": {} + }, + "parameters": { + "$connections": { + "value": { + "recordedfuture": { + "connectionId": "[resourceId('Microsoft.Web/connections', variables('RecordedfutureConnectionName'))]", + "connectionName": "[variables('RecordedfutureConnectionName')]", + "id": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', resourceGroup().location, '/managedApis/Recordedfuturev2')]" + } + } + } + } + }, + "name": "[parameters('PlaybookName')]", + "type": "Microsoft.Logic/workflows", + "location": "[resourceGroup().location]", + "identity": { + "type": "SystemAssigned" + }, + "apiVersion": "2017-07-01", + "tags": { + "hidden-SentinelTemplateName": "RecordedFuture-Domain-IndicatorImport", + "hidden-SentinelTemplateVersion": "1.0" + }, + "dependsOn": [ + "[resourceId('Microsoft.Web/connections', variables('RecordedfutureConnectionName'))]" + ] + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "name": "[variables('RecordedfutureConnectionName')]", + "location": "[resourceGroup().location]", + "kind": "V1", + "properties": { + "displayName": "[variables('RecordedfutureConnectionName')]", + "customParameterValues": {}, + "api": { + "id": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', resourceGroup().location, '/managedApis/Recordedfuturev2')]" + } + } + } + ] +} diff --git a/Solutions/Recorded Future/Playbooks/RecordedFuture-HASH-Observed_in_Underground_Virus_Test_Sites-IndicatorProcessor/azuredeploy.json b/Solutions/Recorded Future/Playbooks/RecordedFuture-HASH-Observed_in_Underground_Virus_Test_Sites-IndicatorProcessor/azuredeploy.json index 7622826e1c9..c94b5652e8e 100644 --- a/Solutions/Recorded Future/Playbooks/RecordedFuture-HASH-Observed_in_Underground_Virus_Test_Sites-IndicatorProcessor/azuredeploy.json +++ b/Solutions/Recorded Future/Playbooks/RecordedFuture-HASH-Observed_in_Underground_Virus_Test_Sites-IndicatorProcessor/azuredeploy.json @@ -3,7 +3,7 @@ "contentVersion": "1.0.0.0", "metadata": { "title": "RecordedFuture-HASH-Obs_in_Underground-TIProcessor", - "description": "This playbook leverages the Recorded Future API and automatically imports the Observed in Underground Virus Testing Sites Hash RiskList, as Threat Intelligence Indicators, for detection purposes in Microsoft Sentinel.\n\nThis playbook depends on RecordedFuture-ImportToSentinel that need to be installed **manually** before installing current playbook.", + "description": "**[Deprecated]**\nDeprecated due to changes in the Threat Intelligence Platform. Use the new IndicatorImport playbooks that is provided in this Solution.\n\nThis playbook leverages the Recorded Future API and automatically imports the Observed in Underground Virus Testing Sites Hash RiskList, as Threat Intelligence Indicators, for detection purposes in Microsoft Sentinel.\n\nThis playbook depends on RecordedFuture-ImportToSentinel that need to be installed **manually** before installing current playbook.", "prerequisites": [ "First install the RecordedFuture-ImportToSentinel playbook.", "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials" @@ -11,10 +11,9 @@ "postDeployment": [ "After deployment you have to open the playbook to configure all connections and press save." ], - "prerequisitesDeployTemplateFile": "../RecordedFuture-ImportToSentinel/RecordedFuture-ImportToSentinel.json", - "lastUpdateTime": "2022-08-01T00:00:00.000Z", + "lastUpdateTime": "2023-08-09T00:00:00.000Z", "entities": [], - "tags": [ "Threat Intelligence" ], + "tags": [ "Deprecated", "Threat Intelligence" ], "support": { "tier": "Partner" }, @@ -23,7 +22,15 @@ }, "releaseNotes": [ { - "version": "1.0.0", + "version": "1.1", + "title": "Deprecated", + "notes": [ + "Deprecated in favor for the new IndicatorImport playbooks. More information can be found in the readme on Github https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Recorded%20Future/Playbooks/readme.md", + "Once a new IndicatorImport playbook is installed downloading the same risk list. Deactivate or delete this playbook." + ] + }, + { + "version": "1.0", "title": "RecordedFuture-HASH-Obs_in_Underground-TIProcessor", "notes": [ "Initial version" ] } @@ -48,6 +55,10 @@ "apiVersion": "2019-05-01", "name": "[parameters('PlaybookName')]", "location": "[resourceGroup().location]", + "tags": { + "hidden-SentinelTemplateName": "RecordedFuture-HASH-Obs_in_Underground-TIProcessor", + "hidden-SentinelTemplateVersion": "1.1" + }, "dependsOn": [ "[resourceId('Microsoft.Web/connections', variables('RecordedFutureConnectionName'))]" ], diff --git a/Solutions/Recorded Future/Playbooks/RecordedFuture-Hash-IndicatorImport/azuredeploy.json b/Solutions/Recorded Future/Playbooks/RecordedFuture-Hash-IndicatorImport/azuredeploy.json new file mode 100644 index 00000000000..f2abc59b204 --- /dev/null +++ b/Solutions/Recorded Future/Playbooks/RecordedFuture-Hash-IndicatorImport/azuredeploy.json @@ -0,0 +1,240 @@ +{ + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "1.0.0.0", + "metadata": { + "title": "RecordedFuture-Hash-IndicatorImport", + "description": "This playbook imports Hash risk lists from Recorded Future and stores them as Threat Intelligence Indicators in Microsoft Sentinel, for detection purposes.\n\nThis playbook depends on RecordedFuture-ThreatIntelligenceImport that need to be installed **manually** before installing this playbook.", + "prerequisites": [ + "First install the RecordedFuture-ThreatIntelligenceImport playbook.", + "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials" + ], + "postDeployment": [ + "After deployment, open the playbook to configure all connections and press save." + ], + "prerequisitesDeployTemplateFile": "../RecordedFuture-ThreatIntelligenceImport/azuredeploy.json", + "lastUpdateTime": "2023-07-06T00:00:00.000Z", + "entities": [], + "tags": [ "Threat Intelligence" ], + "support": { + "tier": "Partner", + "armtemplate": "Generated from https://github.com/Azure/Azure-Sentinel/tree/master/Tools/Playbook-ARM-Template-Generator" + }, + "author": { + "name": "Recorded Future" + }, + "releaseNotes": [ + { + "version": "1.0", + "title": "RecordedFuture-Hash-IndicatorImport", + "notes": [ "Initial version" ] + } + ] + }, + "parameters": { + "PlaybookName": { + "defaultValue": "RecordedFuture-Hash-IndicatorImport", + "type": "string" + }, + "PlaybookNameBatching": { + "defaultValue": "RecordedFuture-ThreatIntelligenceImport", + "type": "String" + } + }, + "variables": { + "RecordedfutureConnectionName": "[concat('Recordedfuture-', parameters('PlaybookName'))]" + }, + "resources": [ + { + "properties": { + "provisioningState": "Succeeded", + "state": "Enabled", + "definition": { + "$schema": "https://schema.management.azure.com/providers/Microsoft.Logic/schemas/2016-06-01/workflowdefinition.json#", + "contentVersion": "1.0.0.0", + "parameters": { + "$connections": { + "defaultValue": {}, + "type": "Object" + } + }, + "triggers": { + "Recurrence": { + "recurrence": { + "frequency": "Hour", + "interval": 24 + }, + "evaluatedRecurrence": { + "frequency": "Hour", + "interval": 24 + }, + "type": "Recurrence" + } + }, + "actions": { + "For_each": { + "foreach": "@body('Recorded_Future_RiskLists_and_SCF_Download')", + "actions": { + "Parse_JSON": { + "runAfter": {}, + "type": "ParseJson", + "inputs": { + "content": "@items('For_each')", + "schema": { + "properties": { + "Algorithm": {}, + "EvidenceDetails": { + "properties": { + "EvidenceDetails": { + "items": { + "properties": { + "Criticality": { + "type": "integer" + }, + "CriticalityLabel": { + "type": "string" + }, + "EvidenceString": { + "type": "string" + }, + "Rule": { + "type": "string" + }, + "Timestamp": { + "type": "integer" + } + }, + "required": [ + "Rule", + "EvidenceString", + "CriticalityLabel", + "Timestamp", + "Criticality" + ], + "type": "object" + }, + "type": "array" + } + }, + "type": "object" + }, + "Name": { + "type": "string" + }, + "Risk": { + "type": "integer" + }, + "riskString": { + "type": "string" + } + }, + "type": "object" + } + } + }, + "RecordedFuture-ImportToSentinel": { + "runAfter": { + "Parse_JSON": [ + "Succeeded" + ] + }, + "type": "SendToBatch", + "inputs": { + "batchName": "RFImportToSentinel", + "content": { + "confidence": "@int(body('Parse_JSON')?['Risk'])", + "created": "@{utcNow()}", + "description": "Recorded Future - HASH - Observed in Underground Virus Testing Sites", + "id": "indicator--@{guid()}", + "indicator_types": [ + "malicious-activity" + ], + "labels": [ + "@{body('Parse_JSON')?['EvidenceDetails']?['EvidenceDetails']}" + ], + "modified": "@{utcNow()}", + "name": "@{body('Parse_JSON')?['Name']}", + "pattern": "[[file:hashes.'@{body('Parse_JSON')?['Algorithm']}' = '@{body('Parse_JSON')?['Name']}']", + "pattern_type": "stix", + "spec_version": "2.1", + "type": "indicator", + "valid_from": "@{utcNow()}", + "valid_until": "@{addHours(utcNow(),24)}" + }, + "host": { + "triggerName": "Batch_messages", + "workflow": { + "id": "[concat('/subscriptions/', subscription().subscriptionId, '/resourceGroups/', resourceGroup().name, '/providers/Microsoft.Logic/workflows/', parameters('PlaybookNameBatching'))]" + } + } + } + } + }, + "runAfter": { + "Recorded_Future_RiskLists_and_SCF_Download": [ + "Succeeded" + ] + }, + "type": "Foreach" + }, + "Recorded_Future_RiskLists_and_SCF_Download": { + "runAfter": {}, + "type": "ApiConnection", + "inputs": { + "host": { + "connection": { + "name": "@parameters('$connections')['recordedfuture']['connectionId']" + } + }, + "method": "get", + "path": "/fusion/files", + "queries": { + "path": "/public/MicrosoftAzure/hash_observed_testing.json" + } + } + } + }, + "outputs": {} + }, + "parameters": { + "$connections": { + "value": { + "recordedfuture": { + "connectionId": "[resourceId('Microsoft.Web/connections', variables('RecordedfutureConnectionName'))]", + "connectionName": "[variables('RecordedfutureConnectionName')]", + "id": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', resourceGroup().location, '/managedApis/Recordedfuturev2')]" + } + } + } + } + }, + "name": "[parameters('PlaybookName')]", + "type": "Microsoft.Logic/workflows", + "location": "[resourceGroup().location]", + "identity": { + "type": "SystemAssigned" + }, + "apiVersion": "2017-07-01", + "tags": { + "hidden-SentinelTemplateName": "RecordedFuture-Hash-IndicatorImport", + "hidden-SentinelTemplateVersion": "1.0" + }, + "dependsOn": [ + "[resourceId('Microsoft.Web/connections', variables('RecordedfutureConnectionName'))]" + ] + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "name": "[variables('RecordedfutureConnectionName')]", + "location": "[resourceGroup().location]", + "kind": "V1", + "properties": { + "displayName": "[variables('RecordedfutureConnectionName')]", + "customParameterValues": {}, + "api": { + "id": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', resourceGroup().location, '/managedApis/Recordedfuturev2')]" + } + } + } + ] +} diff --git a/Solutions/Recorded Future/Playbooks/RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash/azuredeploy.json b/Solutions/Recorded Future/Playbooks/RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash/azuredeploy.json index 98b00e5807e..4e05f0233b7 100644 --- a/Solutions/Recorded Future/Playbooks/RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash/azuredeploy.json +++ b/Solutions/Recorded Future/Playbooks/RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash/azuredeploy.json @@ -3,7 +3,7 @@ "contentVersion": "1.0.0.0", "metadata": { "title": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash", - "description": "This playbook leverages the Recorded Future API to enrich IP, Domain, Url & Hash indicators, found in Sentinel incidents, with the following context: Risk Score, Risk Rules and Link to Intelligence Card. The enrichment content will be posted as a comment in the Sentinel incident \"Sentinel.", + "description": "This playbook leverages the Recorded Future API to enrich IP, Domain, Url & Hash indicators, found in Microsoft Sentinel incidents, with the following context: Risk Score, Risk Rules and Link to Intelligence Card. The enrichment content will be posted as a comment in the Microsoft Sentinel incident \"Microsoft.", "prerequisites": [ "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials" ], @@ -26,31 +26,36 @@ "name": "Recorded Future" }, "releaseNotes": [ + { + "version": "1.0", + "title": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash", + "notes": [ "Initial version" ] + }, { - "version": "2.3.1", + "version": "1.1", "title": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash", - "notes": [ "Handle 404 result from enrichment." ] + "notes": [ "Improved layout and added Recorded Future Collective Insights." ] }, { - "version": "2.3.0", + "version": "1.2", "title": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash", - "notes": [ "Added detections, updated readme and improved layout." ] + "notes": [ "Fixed risk rule severity and correct image url." ] }, { - "version": "1.1.1", + "version": "2.3", "title": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash", - "notes": [ "Fixed riskrule severity and correct image url." ] + "notes": [ "Updated readme and improved layout." ] }, { - "version": "1.1.0", + "version": "2.4", "title": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash", - "notes": [ "Improved layout and added consent for intelligence Recorded Future cloud sharing." ] + "notes": [ "Handle 404 result from enrichment." ] }, { - "version": "1.0.0", + "version": "2.5", "title": "RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash", - "notes": [ "Initial version" ] - } + "notes": [ "Backend rendered markdown/html to increse performance and reduce cost of enrichment." ] + } ] }, "parameters": { @@ -69,6 +74,9 @@ "apiVersion": "2019-05-01", "name": "[parameters('PlaybookName')]", "location": "[resourceGroup().location]", + "tags": { + "hidden-SentinelTemplateVersion": "2.5" + }, "dependsOn": [ "[resourceId('Microsoft.Web/connections', variables('AzureSentinelConnectionName'))]", "[resourceId('Microsoft.Web/connections', variables('RecordedFutureConnectionName'))]" @@ -111,7 +119,7 @@ "inputs": { "body": { "incidentArmId": "@triggerBody()?['object']?['id']", - "message": "


\nEnrichmed Domain: @{body('Parse_JSON_-_DNS_Resolution')?['domainName']}
\nRisk Score: @{body('Domain_Enrichment')?['data']?['risk']?['score']} of 99
\n@{concat('Open IOC Intelligence Card (Portal)


')}
\nInfrastructure Detections: @{body('Domain_Observed_ioc_HTML_table')}
\nRisk Rules: @{body('Domain_Evidence_Details_HTML_table')}
\nTechnical Links: @{body('Domain_Technical_Links_HTML_table')}
\nResearch Links: @{body('Domain_Research_Links_HTML_table')}

" + "message": "

@{body('Domain_Enrichment')?['data']?['html_response']}

" }, "host": { "connection": { @@ -122,7 +130,7 @@ "path": "/Incidents/Comment" }, "runAfter": { - "Domain_Observed_ioc_HTML_table": [ + "Domain_Enrichment": [ "Succeeded" ] }, @@ -144,7 +152,7 @@ }, "runAfter": { "Add_comment_to_incident_(V3)_-_Domain": [ - "SKIPPED" + "Skipped" ] }, "type": "ApiConnection" @@ -163,7 +171,8 @@ "RFIncidentId": "@variables('RFIncidentId')", "Techniques": "@string(triggerBody()?['object']?['properties']?['additionalData']?['techniques'])", "WorkspaceId": "@triggerBody()?['workspaceInfo']?['WorkspaceName']", - "fields": "intelCard,risk,links" + "fields": "intelCard,risk,links", + "htmlresponse": "True" } }, "runAfter": { @@ -173,118 +182,6 @@ }, "type": "ApiConnection" }, - "Domain_Evidence_Details_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Risk_Rules", - "value": "@item()?['rule']" - }, - { - "header": "Severity", - "value": "@item()?['criticalityLabel']" - }, - { - "header": "Evidence_Details", - "value": "@item()?['evidenceString']" - } - ], - "format": "HTML", - "from": "@body('Domain_Enrichment')?['data']?['risk']?['evidenceDetails']" - }, - "runAfter": { - "Domain_Enrichment": [ - "Succeeded" - ] - }, - "type": "Table" - }, - "Domain_Research_Links_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Entity", - "value": "@replace(item()?['name'],'.','[.]')" - }, - { - "header": "Entity_Type", - "value": "@item()?['type']" - }, - { - "header": "Category", - "value": "@item()?['category']" - }, - { - "header": "Risk_Score", - "value": "@item()?['score']" - } - ], - "format": "HTML", - "from": "@if(empty(body('Domain_Enrichment')?['data']?['links']?['research']),variables('EmptyArray'),body('Domain_Enrichment')?['data']?['links']?['research']?['entities'])" - }, - "runAfter": { - "Domain_Technical_Links_HTML_table": [ - "Succeeded" - ] - }, - "type": "Table" - }, - "Domain_Technical_Links_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Entity", - "value": "@replace(item()?['name'],'.','[.]')" - }, - { - "header": "Entity_Type", - "value": "@item()?['type']" - }, - { - "header": "Category", - "value": "@item()?['category']" - }, - { - "header": "Risk_Score", - "value": "@item()?['score']" - } - ], - "format": "HTML", - "from": "@if(empty(body('Domain_Enrichment')?['data']?['links']?['technical']),variables('EmptyArray'),body('Domain_Enrichment')?['data']?['links']?['technical']?['entities'])" - }, - "runAfter": { - "Domain_Evidence_Details_HTML_table": [ - "Succeeded" - ] - }, - "type": "Table" - }, - "Domain_Observed_ioc_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Timestamp", - "value": "@item()?['timestamp']" - }, - { - "header": "Integration_Type", - "value": "@item()?['integration_type']" - }, - { - "header": "Instance_Id", - "value": "@item()?['integration_instance_id']" - } - ], - "format": "HTML", - "from": "@if(empty(body('Domain_Enrichment')?['observed_iocs_history']),variables('EmptyArray'),body('Domain_Enrichment')?['observed_iocs_history'])" - }, - "runAfter": { - "DOMAIN_Research_Links_HTML_table": [ - "Succeeded" - ] - }, - "type": "Table" - }, "Parse_JSON_-_DNS_Resolution": { "inputs": { "content": "@body('Parse_JSON_2')?['properties']", @@ -312,7 +209,7 @@ "inputs": { "body": { "incidentArmId": "@triggerBody()?['object']?['id']", - "message": "


\nEnriched Hash: @{body('Parse_JSON_-_File_Hash')?['hashValue']}
\nRisk Score: @{body('Hash_Enrichment')?['data']?['risk']?['score']} of 99
\n@{concat('Open Intelligence Card (Portal)


')}
\nInfrastructure Detections: @{body('Hash_Observed_ioc_HTML_table')}
\nRisk Rules: @{body('Hash_Evidence_Details_HTML_table')}
\nTechnical Links: @{body('Hash_Technical_Links_HTML_table')}
\nResearch Links: @{body('Hash_Research_Links_HTML_table')}

" + "message": "

@{body('Hash_Enrichment')?['data']?['html_response']}

" }, "host": { "connection": { @@ -323,7 +220,7 @@ "path": "/Incidents/Comment" }, "runAfter": { - "Hash_Observed_ioc_HTML_table": [ + "Hash_Enrichment": [ "Succeeded" ] }, @@ -345,7 +242,7 @@ }, "runAfter": { "Add_comment_to_incident_(V3)_-_Hash": [ - "SKIPPED" + "Skipped" ] }, "type": "ApiConnection" @@ -364,7 +261,8 @@ "RFIncidentId": "@variables('RFIncidentId')", "Techniques": "@string(triggerBody()?['object']?['properties']?['additionalData']?['techniques'])", "WorkspaceId": "@triggerBody()?['workspaceInfo']?['WorkspaceName']", - "fields": "intelCard,risk,links" + "fields": "intelCard,risk,links", + "htmlresponse": "True" } }, "runAfter": { @@ -374,118 +272,6 @@ }, "type": "ApiConnection" }, - "Hash_Evidence_Details_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Risk_Rules", - "value": "@item()?['rule']" - }, - { - "header": "Severity", - "value": "@item()?['criticalityLabel']" - }, - { - "header": "Evidence_Details", - "value": "@item()?['evidenceString']" - } - ], - "format": "HTML", - "from": "@body('Hash_Enrichment')?['data']?['risk']?['evidenceDetails']" - }, - "runAfter": { - "Hash_Enrichment": [ - "Succeeded" - ] - }, - "type": "Table" - }, - "Hash_Research_Links_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Entity", - "value": "@replace(item()?['name'],'.','[.]')" - }, - { - "header": "Entity_Type", - "value": "@item()?['type']" - }, - { - "header": "Category", - "value": "@item()?['category']" - }, - { - "header": "Risk_Score", - "value": "@item()?['score']" - } - ], - "format": "HTML", - "from": "@if(empty(body('Hash_Enrichment')?['data']?['links']?['research']),variables('EmptyArray'),body('Hash_Enrichment')?['data']?['links']?['research']?['entities'])" - }, - "runAfter": { - "Hash_Evidence_Details_HTML_table": [ - "Succeeded" - ] - }, - "type": "Table" - }, - "Hash_Technical_Links_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Entity", - "value": "@replace(item()?['name'],'.','[.]')" - }, - { - "header": "Entity_Type", - "value": "@item()?['type']" - }, - { - "header": "Category", - "value": "@item()?['category']" - }, - { - "header": "Risk_Score", - "value": "@item()?['score']" - } - ], - "format": "HTML", - "from": "@if(empty(body('Hash_Enrichment')?['data']?['links']?['technical']),variables('EmptyArray'),body('Hash_Enrichment')?['data']?['links']?['technical']?['entities'])" - }, - "runAfter": { - "Hash_Research_Links_HTML_table": [ - "Succeeded" - ] - }, - "type": "Table" - }, - "Hash_Observed_ioc_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Timestamp", - "value": "@item()?['timestamp']" - }, - { - "header": "Integration_Type", - "value": "@item()?['integration_type']" - }, - { - "header": "Instance_Id", - "value": "@item()?['integration_instance_id']" - } - ], - "format": "HTML", - "from": "@if(empty(body('Hash_Enrichment')?['observed_iocs_history']),variables('EmptyArray'),body('Hash_Enrichment')?['observed_iocs_history'])" - }, - "runAfter": { - "Hash_Technical_Links_HTML_table": [ - "Succeeded" - ] - }, - "type": "Table" - }, "Parse_JSON_-_File_Hash": { "inputs": { "content": "@body('Parse_JSON_2')?['properties']", @@ -516,7 +302,7 @@ "inputs": { "body": { "incidentArmId": "@triggerBody()?['object']?['id']", - "message": "


\nEnriched URL: @{replace(body('Parse_JSON_-_Url')?['url'], '.', '[.]')}
\nRisk Score: @{body('URL_Enrichment')?['data']?['risk']?['score']} of 99@{concat('


')}
\nInfrastructure Detections: @{body('Url_Observed_ioc_HTML_table')}
\nRisk Rules: @{body('URL_Evidence_Details_HTML_table')}
\nTechnical Links: @{body('URL_Technical_Links_HTML_table')}
\nResearch Links: @{body('URL_Research_Links_HTML_table')}

" + "message": "

@{body('URL_Enrichment')?['data']?['html_response']}

" }, "host": { "connection": { @@ -527,7 +313,7 @@ "path": "/Incidents/Comment" }, "runAfter": { - "Url_Observed_ioc_HTML_table": [ + "URL_Enrichment": [ "Succeeded" ] }, @@ -549,7 +335,7 @@ }, "runAfter": { "Add_comment_to_incident_(V3)_-_URL": [ - "SKIPPED" + "Skipped" ] }, "type": "ApiConnection" @@ -586,7 +372,8 @@ "RFIncidentId": "@variables('RFIncidentId')", "Techniques": "@string(triggerBody()?['object']?['properties']?['additionalData']?['techniques'])", "WorkspaceId": "@triggerBody()?['workspaceInfo']?['WorkspaceName']", - "fields": "intelCard,risk,links" + "fields": "intelCard,risk,links", + "htmlresponse": "True" } }, "runAfter": { @@ -595,118 +382,6 @@ ] }, "type": "ApiConnection" - }, - "URL_Evidence_Details_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Risk_Rules", - "value": "@item()?['rule']" - }, - { - "header": "Severity", - "value": "@item()?['criticalityLabel']" - }, - { - "header": "Evidence_Details", - "value": "@item()?['evidenceString']" - } - ], - "format": "HTML", - "from": "@body('URL_Enrichment')?['data']?['risk']?['evidenceDetails']" - }, - "runAfter": { - "URL_Enrichment": [ - "Succeeded" - ] - }, - "type": "Table" - }, - "URL_Research_Links_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Entity", - "value": "@replace(item()?['name'],'.','[.]')" - }, - { - "header": "Entity_Type", - "value": "@item()?['type']" - }, - { - "header": "Category", - "value": "@item()?['category']" - }, - { - "header": "Risk_Score", - "value": "@item()?['score']" - } - ], - "format": "HTML", - "from": "@if(empty(body('URL_Enrichment')?['data']?['links']?['research']),variables('EmptyArray'),body('URL_Enrichment')?['data']?['links']?['research']?['entities'])" - }, - "runAfter": { - "URL_Technical_Links_HTML_table": [ - "Succeeded" - ] - }, - "type": "Table" - }, - "URL_Technical_Links_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Entity", - "value": "@replace(item()?['name'],'.','[.]')" - }, - { - "header": "Entity_Type", - "value": "@item()?['type']" - }, - { - "header": "Category", - "value": "@item()?['category']" - }, - { - "header": "Risk_Score", - "value": "@item()?['score']" - } - ], - "format": "HTML", - "from": "@if(empty(body('URL_Enrichment')?['data']?['links']?['technical']),variables('EmptyArray'),body('URL_Enrichment')?['data']?['links']?['technical']?['entities'])" - }, - "runAfter": { - "URL_Evidence_Details_HTML_table": [ - "Succeeded" - ] - }, - "type": "Table" - }, - "Url_Observed_ioc_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Timestamp", - "value": "@item()?['timestamp']" - }, - { - "header": "Integration_Type", - "value": "@item()?['integration_type']" - }, - { - "header": "Instance_Id", - "value": "@item()?['integration_instance_id']" - } - ], - "format": "HTML", - "from": "@if(empty(body('URL_Enrichment')?['observed_iocs_history']),variables('EmptyArray'),body('URL_Enrichment')?['observed_iocs_history'])" - }, - "runAfter": { - "URL_Research_Links_HTML_table": [ - "Succeeded" - ] - }, - "type": "Table" } }, "case": "Url" @@ -738,7 +413,7 @@ "inputs": { "body": { "incidentArmId": "@triggerBody()?['object']?['id']", - "message": "


\nEnriched IP: @{body('Parse_JSON_-_Ip')?['address']}
\nRisk Score: @{body('IP_Enrichment')?['data']?['risk']?['score']} of 99
\n@{concat('Open Intelligence Card (Portal)


')}
\nInfrastructure Detections: @{body('IP_Observed_ioc_HTML_table')}
\nRisk Rules: @{body('IP_Evidence_Details_HTML_table')}
\nTechnical Links: @{body('IP_Technical_Links_HTML_table')}
\nResearch Links: @{body('IP_Research_Links_HTML_table')}

" + "message": "

@{body('IP_Enrichment')?['data']?['html_response']}

" }, "host": { "connection": { @@ -749,7 +424,7 @@ "path": "/Incidents/Comment" }, "runAfter": { - "IP_Observed_ioc_HTML_table": [ + "IP_Enrichment": [ "Succeeded" ] }, @@ -769,7 +444,8 @@ "RFIncidentId": "@variables('RFIncidentId')", "Techniques": "@string(triggerBody()?['object']?['properties']?['additionalData']?['techniques'])", "WorkspaceId": "@triggerBody()?['workspaceInfo']?['WorkspaceName']", - "fields": "intelCard,risk,links" + "fields": "intelCard,risk,links", + "htmlresponse": "True" } }, "runAfter": { @@ -779,118 +455,6 @@ }, "type": "ApiConnection" }, - "IP_Evidence_Details_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Risk_Rules", - "value": "@item()?['rule']" - }, - { - "header": "Severity", - "value": "@item()?['criticalityLabel']" - }, - { - "header": "Evidence_Details", - "value": "@item()?['evidenceString']" - } - ], - "format": "HTML", - "from": "@body('IP_Enrichment')?['data']?['risk']?['evidenceDetails']" - }, - "runAfter": { - "IP_Enrichment": [ - "Succeeded" - ] - }, - "type": "Table" - }, - "IP_Research_Links_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Entity", - "value": "@replace(item()?['name'],'.','[.]')" - }, - { - "header": "Entity_Type", - "value": "@item()?['type']" - }, - { - "header": "Category", - "value": "@item()?['category']" - }, - { - "header": "Risk_Score", - "value": "@item()?['score']" - } - ], - "format": "HTML", - "from": "@if(empty(body('IP_Enrichment')?['data']?['links']?['research']),variables('EmptyArray'),body('IP_Enrichment')?['data']?['links']?['research']?['entities'])" - }, - "runAfter": { - "IP_Technical_Links_HTML_table": [ - "Succeeded" - ] - }, - "type": "Table" - }, - "IP_Technical_Links_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Entity", - "value": "@replace(item()?['name'],'.','[.]')" - }, - { - "header": "Entity_Type", - "value": "@item()?['type']" - }, - { - "header": "Category", - "value": "@item()?['category']" - }, - { - "header": "Risk_Score", - "value": "@item()?['score']" - } - ], - "format": "HTML", - "from": "@if(empty(body('IP_Enrichment')?['data']?['links']?['technical']),variables('EmptyArray'),body('IP_Enrichment')?['data']?['links']?['technical']?['entities'])" - }, - "runAfter": { - "IP_Evidence_Details_HTML_table": [ - "Succeeded" - ] - }, - "type": "Table" - }, - "IP_Observed_ioc_HTML_table": { - "inputs": { - "columns": [ - { - "header": "Timestamp", - "value": "@item()?['timestamp']" - }, - { - "header": "Integration_Type", - "value": "@item()?['integration_type']" - }, - { - "header": "Instance_Id", - "value": "@item()?['integration_instance_id']" - } - ], - "format": "HTML", - "from": "@if(empty(body('IP_Enrichment')?['observed_iocs_history']),variables('EmptyArray'),body('IP_Enrichment')?['observed_iocs_history'])" - }, - "runAfter": { - "IP_Research_Links_HTML_table": [ - "Succeeded" - ] - }, - "type": "Table" - }, "Parse_JSON_-_Ip": { "inputs": { "content": "@body('Parse_JSON_2')?['properties']", @@ -930,18 +494,6 @@ }, "type": "Foreach" }, - "Initialize_variable": { - "inputs": { - "variables": [ - { - "name": "EmptyArray", - "type": "array" - } - ] - }, - "runAfter": {}, - "type": "InitializeVariable" - }, "RFIncidentId": { "inputs": { "variables": [ @@ -952,11 +504,7 @@ } ] }, - "runAfter": { - "Initialize_variable": [ - "Succeeded" - ] - }, + "runAfter": {}, "type": "InitializeVariable" } }, diff --git a/Solutions/Recorded Future/Playbooks/RecordedFuture-IP-Actively_Comm_C2_Server-IndicatorProcessor/azuredeploy.json b/Solutions/Recorded Future/Playbooks/RecordedFuture-IP-Actively_Comm_C2_Server-IndicatorProcessor/azuredeploy.json index a14bbca2c6c..857a4cb33bc 100644 --- a/Solutions/Recorded Future/Playbooks/RecordedFuture-IP-Actively_Comm_C2_Server-IndicatorProcessor/azuredeploy.json +++ b/Solutions/Recorded Future/Playbooks/RecordedFuture-IP-Actively_Comm_C2_Server-IndicatorProcessor/azuredeploy.json @@ -3,7 +3,7 @@ "contentVersion": "1.0.0.0", "metadata": { "title": "RecordedFuture-IP-Actively_Comm_C2_Server-TIProcessor", - "description": "This playbook leverages the Recorded Future API and automatically imports the Actively Communicating C&C Server IP RiskList, as Threat Intelligence Indicators, for detection purposes in Microsoft Sentinel.\n\nThis playbook depends on RecordedFuture-ImportToSentinel that need to be installed **manually** before installing current playbook.", + "description": "**[Deprecated]**\nDeprecated due to changes in the Threat Intelligence Platform. Use the new IndicatorImport playbooks that is provided in this Solution.\n\nThis playbook leverages the Recorded Future API and automatically imports the Actively Communicating C&C Server IP RiskList, as Threat Intelligence Indicators, for detection purposes in Microsoft Sentinel.\n\nThis playbook depends on RecordedFuture-ImportToSentinel that need to be installed **manually** before installing current playbook.", "prerequisites": [ "First install the RecordedFuture-ImportToSentinel playbook.", "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials" @@ -11,10 +11,9 @@ "postDeployment": [ "After deployment you have to open the playbook to configure all connections and press save." ], - "prerequisitesDeployTemplateFile": "../RecordedFuture-ImportToSentinel/RecordedFuture-ImportToSentinel.json", - "lastUpdateTime": "2022-08-01T00:00:00.000Z", + "lastUpdateTime": "2023-08-09T00:00:00.000Z", "entities": [], - "tags": [ "Threat Intelligence" ], + "tags": ["Deprecated","Threat Intelligence"], "support": { "tier": "Partner" }, @@ -23,7 +22,15 @@ }, "releaseNotes": [ { - "version": "1.0.0", + "version": "1.1", + "title": "Deprecated", + "notes": [ + "Deprecated in favor for the new IndicatorImport playbooks. More information can be found in the readme on Github https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Recorded%20Future/Playbooks/readme.md", + "Once a new IndicatorImport playbook is installed downloading the same risk list. Deactivate or delete this playbook." + ] + }, + { + "version": "1.0", "title": "RecordedFuture-IP-Actively_Comm_C2_Server-IndicatorProcessor", "notes": [ "Initial version" ] } @@ -48,6 +55,10 @@ "apiVersion": "2019-05-01", "name": "[parameters('PlaybookName')]", "location": "[resourceGroup().location]", + "tags": { + "hidden-SentinelTemplateName": "RecordedFuture-IP-Actively_Comm_C2_Server-TIProcessor", + "hidden-SentinelTemplateVersion": "1.1" + }, "dependsOn": [ "[resourceId('Microsoft.Web/connections', variables('RecordedFutureConnectionName'))]" ], diff --git a/Solutions/Recorded Future/Playbooks/RecordedFuture-IP-IndicatorImport/azuredeploy.json b/Solutions/Recorded Future/Playbooks/RecordedFuture-IP-IndicatorImport/azuredeploy.json new file mode 100644 index 00000000000..f31616ef599 --- /dev/null +++ b/Solutions/Recorded Future/Playbooks/RecordedFuture-IP-IndicatorImport/azuredeploy.json @@ -0,0 +1,239 @@ +{ + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "1.0.0.0", + "metadata": { + "title": "RecordedFuture-IP-IndicatorImport", + "description": "This playbook imports IP risk lists from Recorded Future and stores them as Threat Intelligence Indicators in Microsoft Sentinel, for detection purposes.\n\nThis playbook depends on RecordedFuture-ThreatIntelligenceImport that need to be installed **manually** before installing this playbook.", + "prerequisites": [ + "First install the RecordedFuture-ThreatIntelligenceImport playbook.", + "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials" + ], + "postDeployment": [ + "After deployment, open the playbook to configure all connections and press save." + ], + "prerequisitesDeployTemplateFile": "../RecordedFuture-ThreatIntelligenceImport/azuredeploy.json", + "lastUpdateTime": "2023-07-06T00:00:00.000Z", + "entities": [], + "tags": [ "Threat Intelligence" ], + "support": { + "tier": "Partner", + "armtemplate": "Generated from https://github.com/Azure/Azure-Sentinel/tree/master/Tools/Playbook-ARM-Template-Generator" + }, + "author": { + "name": "Recorded Future" + }, + "releaseNotes": [ + { + "version": "1.0", + "title": "RecordedFuture-IP-IndicatorImport", + "notes": [ "Initial version" ] + } + ] + }, + "parameters": { + "PlaybookName": { + "defaultValue": "RecordedFuture-IP-IndicatorImport", + "type": "string" + }, + "PlaybookNameBatching": { + "defaultValue": "RecordedFuture-ThreatIntelligenceImport", + "type": "String" + } + }, + "variables": { + "RecordedfutureConnectionName": "[concat('Recordedfuture-', parameters('PlaybookName'))]" + }, + "resources": [ + { + "properties": { + "provisioningState": "Succeeded", + "state": "Enabled", + "definition": { + "$schema": "https://schema.management.azure.com/providers/Microsoft.Logic/schemas/2016-06-01/workflowdefinition.json#", + "contentVersion": "1.0.0.0", + "parameters": { + "$connections": { + "defaultValue": {}, + "type": "Object" + } + }, + "triggers": { + "Recurrence": { + "recurrence": { + "frequency": "Hour", + "interval": 1 + }, + "evaluatedRecurrence": { + "frequency": "Hour", + "interval": 24 + }, + "type": "Recurrence" + } + }, + "actions": { + "For_each": { + "foreach": "@body('Recorded_Future_RiskLists_and_SCF_Download')", + "actions": { + "Parse_JSON": { + "runAfter": {}, + "type": "ParseJson", + "inputs": { + "content": "@items('For_each')", + "schema": { + "properties": { + "EvidenceDetails": { + "properties": { + "EvidenceDetails": { + "items": { + "properties": { + "Criticality": { + "type": "integer" + }, + "CriticalityLabel": { + "type": "string" + }, + "EvidenceString": { + "type": "string" + }, + "Rule": { + "type": "string" + }, + "Timestamp": { + "type": "integer" + } + }, + "required": [ + "Rule", + "EvidenceString", + "CriticalityLabel", + "Timestamp", + "Criticality" + ], + "type": "object" + }, + "type": "array" + } + }, + "type": "object" + }, + "Name": { + "type": "string" + }, + "Risk": { + "type": "integer" + }, + "riskString": { + "type": "string" + } + }, + "type": "object" + } + } + }, + "RecordedFuture-ThreatIntelligenceImport": { + "runAfter": { + "Parse_JSON": [ + "Succeeded" + ] + }, + "type": "SendToBatch", + "inputs": { + "batchName": "RFImportToSentinel", + "content": { + "confidence": "@int(body('Parse_JSON')?['Risk'])", + "created": "@{utcNow()}", + "description": "Recorded Future - IP - Actively Communicating C&C Server", + "id": "indicator--@{guid()}", + "indicator_types": [ + "malicious-activity" + ], + "labels": [ + "@{body('Parse_JSON')?['EvidenceDetails']?['EvidenceDetails']}" + ], + "modified": "@{utcNow()}", + "name": "@{body('Parse_JSON')?['Name']}", + "pattern": "[[ipv4-addr:value = '@{body('Parse_JSON')?['Name']}']", + "pattern_type": "stix", + "spec_version": "2.1", + "type": "indicator", + "valid_from": "@{utcNow()}", + "valid_until": "@{addHours(utcNow(),1)}" + }, + "host": { + "triggerName": "Batch_messages", + "workflow": { + "id": "[concat('/subscriptions/', subscription().subscriptionId, '/resourceGroups/', resourceGroup().name, '/providers/Microsoft.Logic/workflows/', parameters('PlaybookNameBatching'))]" + } + } + } + } + }, + "runAfter": { + "Recorded_Future_RiskLists_and_SCF_Download": [ + "Succeeded" + ] + }, + "type": "Foreach" + }, + "Recorded_Future_RiskLists_and_SCF_Download": { + "runAfter": {}, + "type": "ApiConnection", + "inputs": { + "host": { + "connection": { + "name": "@parameters('$connections')['recordedfuture']['connectionId']" + } + }, + "method": "get", + "path": "/fusion/files", + "queries": { + "path": "/public/MicrosoftAzure/ip_active_c2.json" + } + } + } + }, + "outputs": {} + }, + "parameters": { + "$connections": { + "value": { + "recordedfuture": { + "connectionId": "[resourceId('Microsoft.Web/connections', variables('RecordedfutureConnectionName'))]", + "connectionName": "[variables('RecordedfutureConnectionName')]", + "id": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', resourceGroup().location, '/managedApis/Recordedfuturev2')]" + } + } + } + } + }, + "name": "[parameters('PlaybookName')]", + "type": "Microsoft.Logic/workflows", + "location": "[resourceGroup().location]", + "identity": { + "type": "SystemAssigned" + }, + "apiVersion": "2017-07-01", + "tags": { + "hidden-SentinelTemplateName": "RecordedFuture-IP-IndicatorImport", + "hidden-SentinelTemplateVersion": "1.0" + }, + "dependsOn": [ + "[resourceId('Microsoft.Web/connections', variables('RecordedfutureConnectionName'))]" + ] + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "name": "[variables('RecordedfutureConnectionName')]", + "location": "[resourceGroup().location]", + "kind": "V1", + "properties": { + "displayName": "[variables('RecordedfutureConnectionName')]", + "customParameterValues": {}, + "api": { + "id": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', resourceGroup().location, '/managedApis/Recordedfuturev2')]" + } + } + } + ] +} diff --git a/Solutions/Recorded Future/Playbooks/RecordedFuture-ImportToSentinel/azuredeploy.json b/Solutions/Recorded Future/Playbooks/RecordedFuture-ImportToSentinel/azuredeploy.json index b193c02a19f..f1a2c105a6b 100644 --- a/Solutions/Recorded Future/Playbooks/RecordedFuture-ImportToSentinel/azuredeploy.json +++ b/Solutions/Recorded Future/Playbooks/RecordedFuture-ImportToSentinel/azuredeploy.json @@ -1,50 +1,62 @@ { - "$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#", - "contentVersion": "1.0.0.0", + "$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#", + "contentVersion": "1.0.0.0", "metadata": { "title": "RecordedFuture-ImportToSentinel", - "description": "This playbook is purposed to listen (via batching mechanism provided by Microsoft Azure) for incoming messages from the IndicatorProcessor Playbooks and create submit the indicators for creation", + "description": "**[Deprecated]**\nDeprecated due to changes in the Threat Intelligence Platform. Use the new IndicatorImport playbooks that is provided in this Solution.\n\nThis playbook is purposed to listen (via batching mechanism provided by Microsoft Azure) for incoming messages from the IndicatorProcessor Playbooks and create submit the indicators for creation", "postDeployment": [ "After deployment you have to open the playbook to configure all connections and press save." ], "prerequisites": [ "None" ], - "lastUpdateTime": "2022-08-01T00:00:00.000Z", + "lastUpdateTime": "2023-08-09T00:00:00.000Z", "entities": [], - "tags": ["Threat Intelligence"], + "tags": [ "Deprecated", "Threat Intelligence" ], "support": { "tier": "Partner" }, "author": { - "name": "Adrian Porcescu, Recorded Future" + "name": "Recorded Future" }, "releaseNotes": [ { - "version": "1.0.0", + "version": "1.1", + "title": "Deprecated", + "notes": [ + "Deprecated in favor for the new IndicatorImport playbooks. More information can be found in the readme on Github https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Recorded%20Future/Playbooks/readme.md", + "Once a new IndicatorImport playbook is installed downloading the same risk list. Deactivate or delete this playbook." + ] + }, + { + "version": "1.0", "title": "RecordedFuture-ImportToSentinel", "notes": [ "Initial version" ] } ] }, - "parameters": { - "PlaybookName": { - "type": "string", - "defaultValue": "RecordedFuture-ImportToSentinel" - } - }, - "variables": { - "GraphSecurityConnectionName": "[concat('microsoftgraphsecurity-', parameters('PlaybookName'))]" - }, - "resources": [ - { - "type": "Microsoft.Logic/workflows", - "apiVersion": "2019-05-01", - "name": "[parameters('PlaybookName')]", - "location": "[resourceGroup().location]", - "dependsOn": [ - "[resourceId('Microsoft.Web/connections', variables('GraphSecurityConnectionName'))]" - ], - "properties": { - "definition": { + "parameters": { + "PlaybookName": { + "type": "string", + "defaultValue": "RecordedFuture-ImportToSentinel" + } + }, + "variables": { + "GraphSecurityConnectionName": "[concat('microsoftgraphsecurity-', parameters('PlaybookName'))]" + }, + "resources": [ + { + "type": "Microsoft.Logic/workflows", + "apiVersion": "2019-05-01", + "name": "[parameters('PlaybookName')]", + "location": "[resourceGroup().location]", + "tags": { + "hidden-SentinelTemplateName": "RecordedFuture-ImportToSentinel", + "hidden-SentinelTemplateVersion": "1.1" + }, + "dependsOn": [ + "[resourceId('Microsoft.Web/connections', variables('GraphSecurityConnectionName'))]" + ], + "properties": { + "definition": { "$schema": "https://schema.management.azure.com/providers/Microsoft.Logic/schemas/2016-06-01/workflowdefinition.json#", "actions": { "Select": { @@ -104,30 +116,30 @@ } } }, - "parameters": { - "$connections": { - "value": { - "microsoftgraphsecurity": { - "id": "[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/',resourceGroup().location,'/managedApis/microsoftgraphsecurity')]", - "connectionId": "[resourceId('Microsoft.Web/connections', variables('GraphSecurityConnectionName'))]", - "connectionName": "[variables('GraphSecurityConnectionName')]" - } - } - } - } - } - }, - { - "type": "Microsoft.Web/connections", - "apiVersion": "2016-06-01", - "location": "[resourceGroup().location]", - "name": "[variables('GraphSecurityConnectionName')]", - "properties": { - "api": { - "id": "[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/',resourceGroup().location,'/managedApis/microsoftgraphsecurity')]" - } - } - } - ], - "outputs": {} + "parameters": { + "$connections": { + "value": { + "microsoftgraphsecurity": { + "id": "[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/',resourceGroup().location,'/managedApis/microsoftgraphsecurity')]", + "connectionId": "[resourceId('Microsoft.Web/connections', variables('GraphSecurityConnectionName'))]", + "connectionName": "[variables('GraphSecurityConnectionName')]" + } + } + } + } + } + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "location": "[resourceGroup().location]", + "name": "[variables('GraphSecurityConnectionName')]", + "properties": { + "api": { + "id": "[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/',resourceGroup().location,'/managedApis/microsoftgraphsecurity')]" + } + } + } + ], + "outputs": {} } diff --git a/Solutions/Recorded Future/Playbooks/RecordedFuture-Playbook-Alert-Importer/azuredeploy.json b/Solutions/Recorded Future/Playbooks/RecordedFuture-Playbook-Alert-Importer/azuredeploy.json new file mode 100644 index 00000000000..92647d7a218 --- /dev/null +++ b/Solutions/Recorded Future/Playbooks/RecordedFuture-Playbook-Alert-Importer/azuredeploy.json @@ -0,0 +1,198 @@ +{ + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "1.0.0.0", + "metadata": { + "title": "RecordedFuture-Playbook-Alert-Importer", + "description": "This playbook imports alerts from Recorded Future and stores them in a custom log in the log analytics workspace.", + "prerequisites": [ + "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials" + ], + "postDeployment": [ + "After deployment, open the playbook to configure all connections and press save." + ], + "prerequisitesDeployTemplateFile": "", + "lastUpdateTime": "2023-07-06T00:00:00.000Z", + "entities": [], + "tags": [ "Alert" ], + "support": { + "tier": "Partner", + "armtemplate": "Generated from https://github.com/Azure/Azure-Sentinel/tree/master/Tools/Playbook-ARM-Template-Generator" + }, + "author": { + "name": "Recorded Future" + }, + "releaseNotes": [ + { + "version": "1.0", + "title": "RecordedFuture-Playbook-Alert-Importer", + "notes": [ "Initial version" ] + } + ] + }, + "parameters": { + "PlaybookName": { + "defaultValue": "RecordedFuture-Playbook-Alert-Importer", + "type": "string" + } + }, + "variables": { + "AzureloganalyticsdatacollectorConnectionName": "[concat('Azureloganalyticsdatacollector-', parameters('PlaybookName'))]", + "RecordedFutureConnectionName": "recordedfuture-connectorv2" + }, + "resources": [ + { + "properties": { + "provisioningState": "Succeeded", + "state": "Enabled", + "definition": { + "$schema": "https://schema.management.azure.com/providers/Microsoft.Logic/schemas/2016-06-01/workflowdefinition.json#", + "contentVersion": "1.0.0.0", + "parameters": { + "$connections": { + "defaultValue": {}, + "type": "Object" + } + }, + "triggers": { + "Recurrence": { + "recurrence": { + "frequency": "Hour", + "interval": 1 + }, + "evaluatedRecurrence": { + "frequency": "Hour", + "interval": 1 + }, + "type": "Recurrence" + } + }, + "actions": { + "For_each": { + "foreach": "@body('Search_Playbook_Alerts')", + "actions": { + "Get_Playbook_Alert_by_ID": { + "runAfter": {}, + "type": "ApiConnection", + "inputs": { + "host": { + "connection": { + "name": "@parameters('$connections')['recordedfuturev2']['connectionId']" + } + }, + "method": "get", + "path": "/playbook-alert/@{encodeURIComponent(items('For_each')?['playbook_alert_id'])}" + } + }, + "Send_Data": { + "runAfter": { + "Get_Playbook_Alert_by_ID": [ + "Succeeded" + ] + }, + "type": "ApiConnection", + "inputs": { + "body": "{\n\"title\": \"@{body('Get_Playbook_Alert_by_ID')?['title']}\",\n\"id\": \"@{body('Get_Playbook_Alert_by_ID')?['id']}\",\n\"category\":\"@{body('Get_Playbook_Alert_by_ID')?['category']}\",\n\"rule_label\":\"@{body('Get_Playbook_Alert_by_ID')?['rule_label']}\",\n\"status\": \"@{body('Get_Playbook_Alert_by_ID')?['status']}\", \n\"priority\": \"@{body('Get_Playbook_Alert_by_ID')?['priority']}\",\n\"created_date\": \"@{body('Get_Playbook_Alert_by_ID')?['created_date']}\",\n\"updated_date\": \"@{body('Get_Playbook_Alert_by_ID')?['updated_date']}\",\n\"targets\":\"@{body('Get_Playbook_Alert_by_ID')?['targets']}\",\n\"evidence_summary\": \"@{body('Get_Playbook_Alert_by_ID')?['evidence_summary']}\",\n\"link\": \"@{body('Get_Playbook_Alert_by_ID')?['link']}\"\n}", + "headers": { + "Log-Type": "RecordedFuturePlaybookAlerts" + }, + "host": { + "connection": { + "name": "@parameters('$connections')['azureloganalyticsdatacollector']['connectionId']" + } + }, + "method": "post", + "path": "/api/logs" + } + } + }, + "runAfter": { + "Search_Playbook_Alerts": [ + "Succeeded" + ] + }, + "type": "Foreach" + }, + "Search_Playbook_Alerts": { + "runAfter": {}, + "type": "ApiConnection", + "inputs": { + "body": { + "categories": [ + "domain_abuse", + "cyber_vulnerability", + "code_repo_leakage" + ], + "created_from_relative": "-1" + }, + "host": { + "connection": { + "name": "@parameters('$connections')['recordedfuturev2']['connectionId']" + } + }, + "method": "post", + "path": "/playbook-alert/search" + } + } + }, + "outputs": {} + }, + "parameters": { + "$connections": { + "value": { + "azureloganalyticsdatacollector": { + "connectionId": "[resourceId('Microsoft.Web/connections', variables('AzureloganalyticsdatacollectorConnectionName'))]", + "connectionName": "[variables('AzureloganalyticsdatacollectorConnectionName')]", + "id": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', resourceGroup().location, '/managedApis/Azureloganalyticsdatacollector')]" + }, + "recordedfuturev2": { + "id": "[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/',resourceGroup().location,'/managedApis/recordedfuturev2')]", + "connectionId": "[resourceId('Microsoft.Web/connections', variables('RecordedFutureConnectionName'))]", + "connectionName": "[variables('RecordedFutureConnectionName')]" + } + } + } + } + }, + "name": "[parameters('PlaybookName')]", + "type": "Microsoft.Logic/workflows", + "location": "[resourceGroup().location]", + "tags": { + "hidden-SentinelTemplateName": "PlaybookAlert-Import", + "hidden-SentinelTemplateVersion": "1.0" + }, + "identity": { + "type": "SystemAssigned" + }, + "apiVersion": "2017-07-01", + "dependsOn": [ + "[resourceId('Microsoft.Web/connections', variables('AzureloganalyticsdatacollectorConnectionName'))]", + "[resourceId('Microsoft.Web/connections', variables('RecordedFutureConnectionName'))]" + ] + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "name": "[variables('AzureloganalyticsdatacollectorConnectionName')]", + "location": "[resourceGroup().location]", + "kind": "V1", + "properties": { + "displayName": "[variables('AzureloganalyticsdatacollectorConnectionName')]", + "customParameterValues": {}, + "api": { + "id": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', resourceGroup().location, '/managedApis/Azureloganalyticsdatacollector')]" + } + } + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "name": "[variables('RecordedFutureConnectionName')]", + "location": "[resourceGroup().location]", + "properties": { + "api": { + "id": "[concat('/subscriptions/',subscription().subscriptionId,'/providers/Microsoft.Web/locations/',resourceGroup().location,'/managedApis/recordedfuturev2')]" + } + } + } + ] +} diff --git a/Solutions/Recorded Future/Playbooks/RecordedFuture-Sandbox_Enrichment-Url/azuredeploy.json b/Solutions/Recorded Future/Playbooks/RecordedFuture-Sandbox_Enrichment-Url/azuredeploy.json index 1262135f5ec..6b274d23f2d 100644 --- a/Solutions/Recorded Future/Playbooks/RecordedFuture-Sandbox_Enrichment-Url/azuredeploy.json +++ b/Solutions/Recorded Future/Playbooks/RecordedFuture-Sandbox_Enrichment-Url/azuredeploy.json @@ -20,7 +20,14 @@ }, "author": { "name": "Recorded Future" - } + }, + "releaseNotes": [ + { + "version": "1.0", + "title": "RecordedFuture-Sandbox_Enrichment-Url", + "notes": [ "Initial version" ] + } + ] }, "parameters": { "PlaybookName": { diff --git a/Solutions/Recorded Future/Playbooks/RecordedFuture-Sandbox_Outlook_Attachment/azuredeploy.json b/Solutions/Recorded Future/Playbooks/RecordedFuture-Sandbox_Outlook_Attachment/azuredeploy.json index 09285212031..63305a9f3c1 100644 --- a/Solutions/Recorded Future/Playbooks/RecordedFuture-Sandbox_Outlook_Attachment/azuredeploy.json +++ b/Solutions/Recorded Future/Playbooks/RecordedFuture-Sandbox_Outlook_Attachment/azuredeploy.json @@ -10,9 +10,7 @@ ], "prerequisitesDeployTemplateFile": "", "lastUpdateTime": "2023-04-28T00:00:00.000Z", - "entities": [ - "url" - ], + "entities": [], "tags": [ "Enrichment" ], "support": { "tier": "Partner", @@ -20,7 +18,14 @@ }, "author": { "name": "Recorded Future" - } + }, + "releaseNotes": [ + { + "version": "1.0", + "title": "RecordedFuture-Sandbox_Outlook_Attachment", + "notes": [ "Initial version" ] + } + ] }, "parameters": { "PlaybookName": { diff --git a/Solutions/Recorded Future/Playbooks/RecordedFuture-Sandbox_StorageAccount/azuredeploy.json b/Solutions/Recorded Future/Playbooks/RecordedFuture-Sandbox_StorageAccount/azuredeploy.json index a9bb7661606..96cb9de9873 100644 --- a/Solutions/Recorded Future/Playbooks/RecordedFuture-Sandbox_StorageAccount/azuredeploy.json +++ b/Solutions/Recorded Future/Playbooks/RecordedFuture-Sandbox_StorageAccount/azuredeploy.json @@ -10,9 +10,7 @@ ], "prerequisitesDeployTemplateFile": "", "lastUpdateTime": "2023-04-28T00:00:00.000Z", - "entities": [ - "url" - ], + "entities": [], "tags": [ "Enrichment" ], "support": { "tier": "Partner", @@ -20,11 +18,18 @@ }, "author": { "name": "Recorded Future" - } + }, + "releaseNotes": [ + { + "version": "1.0", + "title": "RecordedFuture-Sandbox_StorageAccount", + "notes": [ "Initial version" ] + } + ] }, "parameters": { "PlaybookName": { - "defaultValue": "TestAppFileSandbox", + "defaultValue": "RecordedFuture-Sandbox_StorageAccount", "type": "string" }, "sandbox_api_key": { diff --git a/Solutions/Recorded Future/Playbooks/RecordedFuture-ThreatIntelligenceImport/azuredeploy.json b/Solutions/Recorded Future/Playbooks/RecordedFuture-ThreatIntelligenceImport/azuredeploy.json new file mode 100644 index 00000000000..ec0182d8cc4 --- /dev/null +++ b/Solutions/Recorded Future/Playbooks/RecordedFuture-ThreatIntelligenceImport/azuredeploy.json @@ -0,0 +1,169 @@ +{ + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "1.0.0.0", + "metadata": { + "title": "RecordedFuture-ThreatIntelligenceImport", + "description": "This playbook will write indicators in batch to ThreatIntelligenceIndicator log analytics table.", + "prerequisites": [ + "Microsoft Sentinel Threat Intelligence active" + ], + "postDeployment": [ + "After deployment, open the playbook to configure all connections and press save." + ], + "lastUpdateTime": "2023-07-06T00:00:00.000Z", + "entities": [], + "tags": [ "Threat Intelligence" ], + "support": { + "tier": "Partner", + "armtemplate": "Generated from https://github.com/Azure/Azure-Sentinel/tree/master/Tools/Playbook-ARM-Template-Generator" + }, + "author": { + "name": "Recorded Future" + }, + "releaseNotes": [ + { + "version": "1.0", + "title": "RecordedFuture-ThreatIntelligenceImport", + "notes": [ "Initial version" ] + } + ] + }, + "parameters": { + "PlaybookName": { + "defaultValue": "RecordedFuture-ThreatIntelligenceImport", + "type": "string" + }, + "workspace": { + "type": "string", + "defaultValue": "", + "metadata": { + "description" : "Microsoft Sentinel Workspace name" + } + } + }, + "variables": { + "MicrosoftSentinelConnectionName": "[concat('MicrosoftSentinel-', parameters('PlaybookName'))]" + }, + "resources": [ + { + "properties": { + "provisioningState": "Succeeded", + "state": "Enabled", + "definition": { + "$schema": "https://schema.management.azure.com/providers/Microsoft.Logic/schemas/2016-06-01/workflowdefinition.json#", + "contentVersion": "1.0.0.0", + "parameters": { + "$connections": { + "defaultValue": {}, + "type": "Object" + } + }, + "triggers": { + "Batch_messages": { + "type": "Batch", + "inputs": { + "configurations": { + "RFImportToSentinel": { + "releaseCriteria": { + "messageCount": 100, + "recurrence": { + "frequency": "Minute", + "interval": 10 + } + } + } + }, + "mode": "Inline" + } + } + }, + "actions": { + "Compose": { + "runAfter": { + "Select": [ + "Succeeded" + ] + }, + "type": "Compose", + "inputs": { + "sourcesystem": "Recorded Future", + "value": "@body('Select')" + } + }, + "Select": { + "runAfter": {}, + "type": "Select", + "inputs": { + "from": "@triggerBody()['items']", + "select": "@item()['content']" + } + }, + "Threat_Intelligence_-_Upload_Indicators_of_Compromise_(Private_Preview)": { + "runAfter": { + "Compose": [ + "Succeeded" + ] + }, + "type": "ApiConnection", + "inputs": { + "body": "@outputs('Compose')", + "host": { + "connection": { + "name": "@parameters('$connections')['azuresentinel']['connectionId']" + } + }, + "method": "post", + "path": "[concat('/ThreatIntelligence/', reference(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace'))).customerId,'/UploadIndicators')]" + } + } + } + }, + "parameters": { + "$connections": { + "value": { + "azuresentinel": { + "connectionId": "[resourceId('Microsoft.Web/connections', variables('MicrosoftSentinelConnectionName'))]", + "connectionName": "[variables('MicrosoftSentinelConnectionName')]", + "id": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', resourceGroup().location, '/managedApis/Azuresentinel')]", + "connectionProperties": { + "authentication": { + "type": "ManagedServiceIdentity" + } + } + } + } + } + } + }, + "name": "[parameters('PlaybookName')]", + "type": "Microsoft.Logic/workflows", + "location": "[resourceGroup().location]", + "identity": { + "type": "SystemAssigned" + }, + "apiVersion": "2017-07-01", + "tags": { + "hidden-SentinelTemplateName": "RecordedFuture-ThreatIntelligenceImport", + "hidden-SentinelTemplateVersion": "1.0" + }, + "dependsOn": [ + "[resourceId('Microsoft.Web/connections', variables('MicrosoftSentinelConnectionName'))]" + ] + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "name": "[variables('MicrosoftSentinelConnectionName')]", + "location": "[resourceGroup().location]", + "kind": "V1", + "properties": { + "displayName": "[variables('MicrosoftSentinelConnectionName')]", + "customParameterValues": {}, + "parameterValueType": "Alternative", + "api": { + "id": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', resourceGroup().location, '/managedApis/Azuresentinel')]" + } + } + } + ] +} diff --git a/Solutions/Recorded Future/Playbooks/RecordedFuture-URL-IndicatorImport/azuredeploy.json b/Solutions/Recorded Future/Playbooks/RecordedFuture-URL-IndicatorImport/azuredeploy.json new file mode 100644 index 00000000000..920011141b8 --- /dev/null +++ b/Solutions/Recorded Future/Playbooks/RecordedFuture-URL-IndicatorImport/azuredeploy.json @@ -0,0 +1,239 @@ +{ + "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "contentVersion": "1.0.0.0", + "metadata": { + "title": "RecordedFuture-URL-IndicatorImport", + "description": "This playbook imports URL risk lists from Recorded Future and stores them as Threat Intelligence Indicators in Microsoft Sentinel, for detection purposes.\n\nThis playbook depends on RecordedFuture-ThreatIntelligenceImport that need to be installed **manually** before installing this playbook.", + "prerequisites": [ + "First install the RecordedFuture-ThreatIntelligenceImport playbook.", + "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials" + ], + "postDeployment": [ + "After deployment, open the playbook to configure all connections and press save." + ], + "prerequisitesDeployTemplateFile": "../RecordedFuture-ThreatIntelligenceImport/azuredeploy.json", + "lastUpdateTime": "2023-07-06T00:00:00.000Z", + "entities": [], + "tags": [ "Threat Intelligence" ], + "support": { + "tier": "Partner", + "armtemplate": "Generated from https://github.com/Azure/Azure-Sentinel/tree/master/Tools/Playbook-ARM-Template-Generator" + }, + "author": { + "name": "Recorded Future" + }, + "releaseNotes": [ + { + "version": "1.0", + "title": "RecordedFuture-URL-IndicatorImport", + "notes": [ "Initial version" ] + } + ] + }, + "parameters": { + "PlaybookName": { + "defaultValue": "RecordedFuture-URL-IndicatorImport", + "type": "string" + }, + "PlaybookNameBatching": { + "defaultValue": "RecordedFuture-ThreatIntelligenceImport", + "type": "String" + } + }, + "variables": { + "RecordedfutureConnectionName": "[concat('Recordedfuture-', parameters('PlaybookName'))]" + }, + "resources": [ + { + "properties": { + "provisioningState": "Succeeded", + "state": "Enabled", + "definition": { + "$schema": "https://schema.management.azure.com/providers/Microsoft.Logic/schemas/2016-06-01/workflowdefinition.json#", + "contentVersion": "1.0.0.0", + "parameters": { + "$connections": { + "defaultValue": {}, + "type": "Object" + } + }, + "triggers": { + "Recurrence": { + "recurrence": { + "frequency": "Hour", + "interval": 2 + }, + "evaluatedRecurrence": { + "frequency": "Hour", + "interval": 24 + }, + "type": "Recurrence" + } + }, + "actions": { + "For_each": { + "foreach": "@body('Recorded_Future_RiskLists_and_SCF_Download')", + "actions": { + "Parse_JSON": { + "runAfter": {}, + "type": "ParseJson", + "inputs": { + "content": "@items('For_each')", + "schema": { + "properties": { + "EvidenceDetails": { + "properties": { + "EvidenceDetails": { + "items": { + "properties": { + "Criticality": { + "type": "integer" + }, + "CriticalityLabel": { + "type": "string" + }, + "EvidenceString": { + "type": "string" + }, + "Rule": { + "type": "string" + }, + "Timestamp": { + "type": "integer" + } + }, + "required": [ + "Rule", + "EvidenceString", + "CriticalityLabel", + "Timestamp", + "Criticality" + ], + "type": "object" + }, + "type": "array" + } + }, + "type": "object" + }, + "Name": { + "type": "string" + }, + "Risk": { + "type": "integer" + }, + "riskString": { + "type": "string" + } + }, + "type": "object" + } + } + }, + "RecordedFuture-ImportToSentinel": { + "runAfter": { + "Parse_JSON": [ + "Succeeded" + ] + }, + "type": "SendToBatch", + "inputs": { + "batchName": "RFImportToSentinel", + "content": { + "confidence": "@int(body('Parse_JSON')?['Risk'])", + "created": "@{utcNow()}", + "description": "Recorded Future - URL - Recently Reported by Insikt Group", + "id": "indicator--@{guid()}", + "indicator_types": [ + "malicious-activity" + ], + "labels": [ + "@{body('Parse_JSON')?['EvidenceDetails']?['EvidenceDetails']}" + ], + "modified": "@{utcNow()}", + "name": "@{body('Parse_JSON')?['Name']}", + "pattern": "[[url:value = '@{body('Parse_JSON')?['Name']}']", + "pattern_type": "stix", + "spec_version": "2.1", + "type": "indicator", + "valid_from": "@{utcNow()}", + "valid_until": "@{addHours(utcNow(),2)}" + }, + "host": { + "triggerName": "Batch_messages", + "workflow": { + "id": "[concat('/subscriptions/', subscription().subscriptionId, '/resourceGroups/', resourceGroup().name, '/providers/Microsoft.Logic/workflows/', parameters('PlaybookNameBatching'))]" + } + } + } + } + }, + "runAfter": { + "Recorded_Future_RiskLists_and_SCF_Download": [ + "Succeeded" + ] + }, + "type": "Foreach" + }, + "Recorded_Future_RiskLists_and_SCF_Download": { + "runAfter": {}, + "type": "ApiConnection", + "inputs": { + "host": { + "connection": { + "name": "@parameters('$connections')['recordedfuture']['connectionId']" + } + }, + "method": "get", + "path": "/fusion/files", + "queries": { + "path": "/public/MicrosoftAzure/url_insikt.json" + } + } + } + }, + "outputs": {} + }, + "parameters": { + "$connections": { + "value": { + "recordedfuture": { + "connectionId": "[resourceId('Microsoft.Web/connections', variables('RecordedfutureConnectionName'))]", + "connectionName": "[variables('RecordedfutureConnectionName')]", + "id": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', resourceGroup().location, '/managedApis/Recordedfuturev2')]" + } + } + } + } + }, + "name": "[parameters('PlaybookName')]", + "type": "Microsoft.Logic/workflows", + "location": "[resourceGroup().location]", + "identity": { + "type": "SystemAssigned" + }, + "apiVersion": "2017-07-01", + "tags": { + "hidden-SentinelTemplateName": "RecordedFuture-URL-IndicatorImport", + "hidden-SentinelTemplateVersion": "1.0" + }, + "dependsOn": [ + "[resourceId('Microsoft.Web/connections', variables('RecordedfutureConnectionName'))]" + ] + }, + { + "type": "Microsoft.Web/connections", + "apiVersion": "2016-06-01", + "name": "[variables('RecordedfutureConnectionName')]", + "location": "[resourceGroup().location]", + "kind": "V1", + "properties": { + "displayName": "[variables('RecordedfutureConnectionName')]", + "customParameterValues": {}, + "api": { + "id": "[concat('/subscriptions/', subscription().subscriptionId, '/providers/Microsoft.Web/locations/', resourceGroup().location, '/managedApis/Recordedfuturev2')]" + } + } + } + ] +} diff --git a/Solutions/Recorded Future/Playbooks/RecordedFuture-URL-Recent_Rep_by_Insikt_Group-IndicatorProcessor/azuredeploy.json b/Solutions/Recorded Future/Playbooks/RecordedFuture-URL-Recent_Rep_by_Insikt_Group-IndicatorProcessor/azuredeploy.json index 477dbb7bf0b..5387d286c52 100644 --- a/Solutions/Recorded Future/Playbooks/RecordedFuture-URL-Recent_Rep_by_Insikt_Group-IndicatorProcessor/azuredeploy.json +++ b/Solutions/Recorded Future/Playbooks/RecordedFuture-URL-Recent_Rep_by_Insikt_Group-IndicatorProcessor/azuredeploy.json @@ -3,7 +3,7 @@ "contentVersion": "1.0.0.0", "metadata": { "title": "RecordedFuture-URL-Recent_Rep_by_Insikt-TIProcessor", - "description": "This playbook leverages the Recorded Future API and automatically imports the Recently Reported by Insikt Group URL RiskList, as Threat Intelligence Indicators, for detection purposes in Microsoft Sentinel.\n\nThis playbook depends on RecordedFuture-ImportToSentinel that need to be installed **manually** before installing current playbook.", + "description": "**[Deprecated]**\nDeprecated due to changes in the Threat Intelligence Platform. Use the new IndicatorImport playbooks that is provided in this Solution.\n\nThis playbook leverages the Recorded Future API and automatically imports the Recently Reported by Insikt Group URL RiskList, as Threat Intelligence Indicators, for detection purposes in Microsoft Sentinel.\n\nThis playbook depends on RecordedFuture-ImportToSentinel that need to be installed **manually** before installing current playbook.", "prerequisites": [ "First install the RecordedFuture-ImportToSentinel playbook.", "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials" @@ -11,10 +11,9 @@ "postDeployment": [ "After deployment you have to open the playbook to configure all connections and press save." ], - "prerequisitesDeployTemplateFile": "../RecordedFuture-ImportToSentinel/RecordedFuture-ImportToSentinel.json", - "lastUpdateTime": "2022-08-01T00:00:00.000Z", + "lastUpdateTime": "2022-08-09T00:00:00.000Z", "entities": [], - "tags": [ "Threat Intelligence" ], + "tags": [ "Deprecated", "Threat Intelligence" ], "support": { "tier": "Partner" }, @@ -23,7 +22,15 @@ }, "releaseNotes": [ { - "version": "1.0.0", + "version": "1.1", + "title": "Deprecated", + "notes": [ + "Deprecated in favor for the new IndicatorImport playbooks. More information can be found in the readme on Github https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Recorded%20Future/Playbooks/readme.md", + "Once a new IndicatorImport playbook is installed downloading the same risk list. Deactivate or delete this playbook." + ] + }, + { + "version": "1.0", "title": "RecordedFuture-URL-Recent_Rep_by_Insikt_Group-IndicatorProcessor", "notes": [ "Initial version" ] } @@ -48,6 +55,10 @@ "apiVersion": "2019-05-01", "name": "[parameters('PlaybookName')]", "location": "[resourceGroup().location]", + "tags": { + "hidden-SentinelTemplateName": "RecordedFuture-URL-Recent_Rep_by_Insikt-TIProcessor", + "hidden-SentinelTemplateVersion": "1.1" + }, "dependsOn": [ "[resourceId('Microsoft.Web/connections', variables('RecordedFutureConnectionName'))]" ], diff --git a/Solutions/Recorded Future/Playbooks/RecordedFuture-Ukraine-IndicatorProcessor/azuredeploy.json b/Solutions/Recorded Future/Playbooks/RecordedFuture-Ukraine-IndicatorProcessor/azuredeploy.json index 5c55c7f833f..2141e8054b4 100644 --- a/Solutions/Recorded Future/Playbooks/RecordedFuture-Ukraine-IndicatorProcessor/azuredeploy.json +++ b/Solutions/Recorded Future/Playbooks/RecordedFuture-Ukraine-IndicatorProcessor/azuredeploy.json @@ -1,9 +1,9 @@ { - "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", + "$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#", "contentVersion": "1.0.0.0", "metadata": { "title": "RecordedFuture-Ukraine-IndicatorProcessor", - "description": "This playbook leverages the Recorded Future API and automatically imports the Ukraine RiskLists, as Threat Intelligence Indicators, for detection purposes in Microsoft Sentinel.\n\nThis playbook depends on RecordedFuture-ImportToSentinel that need to be installed **manually** before installing current playbook.", + "description": "**[Deprecated]**\nDeprecated due to changes in the Threat Intelligence Platform. Use the new IndicatorImport playbooks that is provided in this Solution.\n\nThis playbook leverages the Recorded Future API and automatically imports the Ukraine RiskLists, as Threat Intelligence Indicators, for detection purposes in Microsoft Sentinel.\n\nThis playbook depends on RecordedFuture-ImportToSentinel that need to be installed **manually** before installing current playbook.", "prerequisites": [ "First install the RecordedFuture-ImportToSentinel playbook.", "To use the Recorded Future for Azure connector, you will need a valid API token from Recorded Future as described in the documentation https://learn.microsoft.com/en-us/connectors/recordedfuturev2/#how-to-get-credentials" @@ -11,18 +11,31 @@ "postDeployment": [ "After deployment you have to open the playbook to configure all connections and press save." ], - "prerequisitesDeployTemplateFile": "../RecordedFuture-ImportToSentinel/RecordedFuture-ImportToSentinel.json", - "lastUpdateTime": "2022-09-20T00:00:00.000Z", - "entities": [ - ], - "tags": [ "Threat Intelligence" ], + "lastUpdateTime": "2023-09-13T00:00:00.000Z", + "entities": [], + "tags": ["Deprecated","Threat Intelligence"], "support": { "tier": "Partner", "armtemplate": "Generated from https://github.com/Azure/Azure-Sentinel/tree/master/Tools/Playbook-ARM-Template-Generator" }, "author": { - "name": "" - } + "name": "Recorded Future" + }, + "releaseNotes": [ + { + "version": "1.1", + "title": "Deprecated", + "notes": [ + "Deprecated in favor for the new IndicatorImport playbooks. More information can be found in the readme on Github https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Recorded%20Future/Playbooks/readme.md", + "Once a new IndicatorImport playbook is installed downloading the same risk list. Deactivate or delete this playbook." + ] + }, + { + "version": "1.0", + "title": "RecordedFuture-Ukraine-IndicatorProcessor", + "notes": [ "Initial version" ] + } + ] }, "parameters": { "PlaybookName": { @@ -47,8 +60,7 @@ "contentVersion": "1.0.0.0", "parameters": { "$connections": { - "defaultValue": { - }, + "defaultValue": {}, "type": "Object" } }, @@ -638,13 +650,13 @@ "type": "Microsoft.Logic/workflows", "location": "[resourceGroup().location]", "tags": { - "hidden-SentinelTemplateName": "RecordedFuture_Ukraine_Detection_IndicatorProcessor", - "hidden-SentinelTemplateVersion": "1.0" + "hidden-SentinelTemplateName": "RecordedFuture-Ukraine-IndicatorProcessor", + "hidden-SentinelTemplateVersion": "1.1" }, "identity": { "type": "SystemAssigned" }, - "apiVersion": "2017-07-01", + "apiVersion": "2019-05-01", "dependsOn": [ "[resourceId('Microsoft.Web/connections', variables('RecordedfutureConnectionName'))]" ] diff --git a/Solutions/Recorded Future/Playbooks/readme.md b/Solutions/Recorded Future/Playbooks/readme.md index 702bf62c510..a00d17704d4 100644 --- a/Solutions/Recorded Future/Playbooks/readme.md +++ b/Solutions/Recorded Future/Playbooks/readme.md @@ -3,62 +3,87 @@ # Overview -Recorded Future are the world’s largest provider of intelligence for enterprise security. By combining persistent and pervasive automated data collection and analytics with human analysis, Recorded Future delivers intelligence that is timely, accurate, and actionable. +This guide provides instructions on how to install, update and configure Recorded Future Intelligence for Microsoft Sentinel. -The Recorded Future Microsoft Sentinel Integration will supercharge Sentinel by integrating intelligence from Recorded Future. +Recorded Future is the world's largest provider of intelligence for enterprise security. By seamlessly combining automated data collection, pervasive analytics, and expert human analysis, Recorded Future delivers timely, accurate, and actionable intelligence. -**Benefits** -- Detect risky indicators of compromise (IOCs) in your environment. +**Benefits of Recorded Future integrations** +- Detect indicators of compromise (IOCs) in your environment. - Triage alerts faster with elite, real-time intelligence. - Respond quickly with transparency and context around internal telemetry data. - Maximize your investment in Microsoft Sentinel. -For more information see: [How to Apply Elite Intelligence to Microsoft Azure Sentinel](https://www.recordedfuture.com/microsoft-azure-sentinel-integration) +[Learn more about Recorded Future for Microsoft Sentinel](https://www.recordedfuture.com/microsoft-azure-sentinel-integration) -# Use cases -The playbooks provided in the Recorded Future Solution support use cases for detection and incident response. Automation of a complete use case will require installation of playbooks, creation of analytic rules, and configuration of automation rules. -## Detection - Risk list +# Key Features +Recorded Future for Microsoft Sentinel offers a range of powerful intelligence capabilities, some of the key features include: +## **IOC Detection (Detect)** -The TI-Processor pulls configured risk lists from Recorded Future and writes the contained indicators to Sentinels ThreatIntelligenceIndicator table in batches via the RecordedFuture-ImportToSentinel playbook. +The TI-Processor playbooks pulls risk lists from Recorded Future and writes the contained indicators to the Sentinel ThreatIntelligenceIndicator table via the RecordedFuture-ImportToSentinel playbook. ![](Images/2023-04-19-17-08-46.png) -Analytic rules correlates threat intelligence indicators with logs provided to Sentinel and creates incidents for any matches found. +Microsoft Sentinel analytic rules correlates threat intelligence indicators with logs provided to Sentinel and creates alerts/incidents for matches found. + ![](Images/2023-04-19-17-46-32.png) -## Response - Enrichment +## **IOC Enrichment (Respond)** -Automation rules trigger on each incident and enriches the incidents with Recorded Future intelligence. +Automation rules triggers on each incident and enriches incidents with Recorded Future intelligence. ![](Images/2023-04-19-17-46-13.png) -# Risk lists -Risk lists are lists of high risk indicators matching some specific criteria. We use these lists to transfer accurate and current threat intelligence to Microsoft Sentinel as ThreatIntelligenceIndicators. Connect logs from your infrastructure in order to detect, prevent and triage security vulnerabilities. +## **Malware Sandbox Analysis** + +Uploads and detonate samples in Recorded Future's Malware Analysis Sandbox. The sandbox provides safe and immediate behavioral analysis, helping contextualize key artifacts in an investigation, leading to faster triage. +![](Images/2023-06-26-10-04-42.png) + +## **Import Alerts** (SOC Efficiency) + +To increase the visibility and availability of Recorded Future Alerts. Import Recorded Future Alerts and Playbook Alerts from Recorded Future Portal into Sentinel. -Read more about risk lists by following the links below: -- https://www.recordedfuture.com/support/install-configure-manage-risk-lists --[Recorded Future Risk Lists](https://support.recordedfuture.com/hc/en-us/articles/115000897248-Recorded-Future-Risk-Lists) (Require Recorded Future Login) -- [Risk List Download Recommendations](https://support.recordedfuture.com/hc/en-us/articles/115010401968-Risk-List-Download-Recommendations) (Require Recorded Future Login) +## Risk lists +Risk lists are curated lists that contain Indicators of Compromise (IOCs), such as IP addresses, domains, file hashes, or URLs associated with malicious activity. These lists are generated based on a wide array of Recorded Future intelligence sources, including open web, dark web, and other technical sources. -# Prerequisites +* [Manage Risk Lists](https://www.recordedfuture.com/support/install-configure-manage-risk-lists) +* [About Risk Lists](https://support.recordedfuture.com/hc/en-us/articles/115000897248-Recorded-Future-Risk-Lists) (requires login) +* [Risk List Download Recommendations](https://support.recordedfuture.com/hc/en-us/articles/115010401968-Risk-List-Download-Recommendations) (requires login) +# Before You Begin ## Roles and Permissions The following article describes roles and permissions in Microsoft Sentinel [Roles and permissions in Microsoft Sentinel](https://learn.microsoft.com/en-us/azure/sentinel/roles). -To install and manage Playbooks/Logic Apps, the following permissions are required on the resource group [Microsoft Sentinel Contributor](https://learn.microsoft.com/en-us/azure/role-based-access-control/built-in-roles#microsoft-sentinel-contributor) + [Logic App Contributor](https://learn.microsoft.com/en-us/azure/role-based-access-control/built-in-roles#logic-app-contributor). +To install and manage Playbooks/Logic Apps, the following permissions are required on the resource group [Microsoft Sentinel Contributor](https://learn.microsoft.com/en-us/azure/role-based-access-control/built-in-roles#microsoft-sentinel-contributor) and [Logic App Contributor](https://learn.microsoft.com/en-us/azure/role-based-access-control/built-in-roles#logic-app-contributor). -The Threat Intelligence Platforms Data Connector in Sentinel must be enabled in order for indicators to be forwarded from the Graph Security API to Sentinel. +The **Threat Intelligence Upload Indicators API** in Sentinel must be enabled in order for indicators to be forwarded to Sentinel ThreatIntelligenceIndicator table. + +![](Images/2023-09-13-15-51-44.png) + +DEPRECATED! The **Threat Intelligence Platforms Data Connector** in Sentinel must be enabled in order for indicators to be forwarded from the Graph Security API to Sentinel. (This connector is being deprecated by Microsoft and future updates of this solution will use the Threat Intelligence Upload Indicators API). ![](Images/2023-04-19-16-28-20.png) -## Connector authorization +## Connectors Authorization Each connector need to be authorized after playbook/logic app installation. Expand all nodes in the logic app after installation and look for blocks marked with a warning sign. Open and authorize all connections. +Recorded Future requires API keys to communicate with our API. To obtain API keys, please visit [Recorded Future Requesting API Tokens](https://support.recordedfuture.com/hc/en-us/articles/4411077373587-Requesting-API-Tokens) (Require Recorded Future Login) and request API token for ```Recorded Future for Microsoft Sentinel``` or/and ```Recorded Future Sandbox for Microsoft Sentinel```. +![](Images/2023-09-08-12-13-06.png) \ +or + +![](Images/2023-09-08-12-13-54.png) + + The Recorded Future solution uses the following connectors: -- **/recordedfuturev2** - [Microsoft power platform connectors](https://learn.microsoft.com/en-us/connectors/recordedfuturev2/). All logic apps require APIKeys to communicate with the Recorded Future API. To obtain APIKeys, please visit [Recorded Future Requesting API Tokens](https://support.recordedfuture.com/hc/en-us/articles/4411077373587-Requesting-API-Tokens)(Require Recorded Future Login) and request API token for Recorded Future for Microsoft Sentinel. -- **/microsoftgraphsecurity** - [Documenation on Microsoft power platform connectors](https://learn.microsoft.com/en-us/connectors/microsoftgraphsecurity/) +- **/recordedfuturev2** - [Microsoft power platform connector](https://learn.microsoft.com/en-us/connectors/recordedfuturev2/). + + +- **/recordedfuturesandbo** - [Microsoft power platform connector](https://learn.microsoft.com/en-us/connectors/recordedfuturesandbo/). + + - **/azuresentinel** - [Documentation on Microsoft power platform connectors](https://learn.microsoft.com/en-us/connectors/azuresentinel/) -- **/recordedfuturesandbo** - [Microsoft power platform connectors](https://learn.microsoft.com/en-us/connectors/recordedfuturesandbo/). All logic apps require APIKeys to communicate with the Recorded Future API. To obtain APIKeys, please visit [Recorded Future Requesting API Tokens](https://support.recordedfuture.com/hc/en-us/articles/4411077373587-Requesting-API-Tokens) (Require Recorded Future Login) and request API Token for Recorded Future Sandbox for Microsoft Sentinel. + + +- **/microsoftgraphsecurity** - [Documenation on Microsoft power platform connectors](https://learn.microsoft.com/en-us/connectors/microsoftgraphsecurity/). The playbooks using this API is being DEPRECATED and will transition to new playbooks using azuresentinel api. ## Ingestion and Operational costs Playbook(Logic apps) may result in additional ingestion or operational costs: @@ -71,13 +96,11 @@ Recorded Futures risk lists are generated at different cadences as described in # Installation -There are two options for installing playbooks and starting automated threat response: +There are two options for installing playbooks and starting automate threat response: - Installing the solution from [Content Hub](https://portal.azure.com/#view/Microsoft_Azure_Marketplace/GalleryItemDetailsBladeNopdl/dontDiscardJourney~/true/id/recordedfuture1605638642586.recorded_future_sentinel_solution). (Recommended) -- Installing the playbooks one by one by from this Readme. - -> **Due to internal dependencies, please deploy and activate the ImportToSentinel playbook before any of the IndicatorProcessor/TIProcessor playbooks.** +- Installing the playbooks one by one by from this Readme further down in this document. ## Content Hub Installation @@ -92,24 +115,42 @@ To use the workbooks, playbooks and analytic rules, install them inside of Senti ## Playbooks one by one installation To install individual playbooks one by one, use the buttons next to the descriptions of the individual playbooks further down in this document. +> **Due to internal dependencies, please deploy and activate the ThreatIntelligenceImport playbook before any of the IndicatorProcessor/TIProcessor playbooks.** + +# Upgrade from previous versions + +### From version 2.4 +We are deprecating the RecordedFuture-ImportToSentinel and all *-TIProcessor playbooks. You need to install the new IndicatorImport playbooks and configure them to download you selection of risk lists. Investigate the risk lists being downloaded and the cadence and use the same configuration using the TIProcessor playbooks. Use the same description for threat indicators if you have analytic rules set up for alerting. +### From version 1 +If you have a version 1 installation you need to first acquire a V2 APi key from Recorded Future. Install the new all IndicatorImport and enrichment -playbooks. Select a different name than the once already installed and reauthenticate them. Configure the IndicatorImport playbooks to pull your selection of risk lists. After validating that the new playbooks works as expected you can deactivate the V1 versions. + # Configuration ## Risk list configuration -Verify that the **ImportToSentinel** logic app is installed and active in your environment before installing the TIProcessing risk lists. -![](Images/2023-04-18-11-00-01.png) +Verify that the **ThreatIntelligenceImport** logic app is installed and active in your environment before installing the TIProcessing risk lists. -From Automation -> Playbook Template -> Select any Recorded Future playbook that ends with TIProcessor, like **RecordedFuture-IP-Actively_Comm_C2_Server-TIProcessor**, press create playbook. -Note that it is possible to deploy several instances of the same template by giving them unique names. +From ```Automation -> Playbook Template``` Select any Recorded Future playbook that ends with IndicatorImport, like **RecordedFuture-IP-IndicatorImport**, press create playbook. +Note that it is possible to deploy several instances of the same template by giving them unique names. This is how you can pull several risk lists of the same type. ![](Images/2023-04-19-16-49-53.png) -The parameter PlaybookNameBatching is the name of the ImportToSentinel playbook that will handle batch processing of indicators into Sentinel. In the last step press **Create and continue to designer**. +The parameter PlaybookNameBatching is the name of the ThreatIntelligenceImport playbook that will handle batch processing of indicators into Sentinel. In the last step press **Create and continue to designer**. ![](Images/2023-04-19-16-51-12.png) In the designer, locate all steps that show a warning and authenticate these steps. Authentication looks different for each connection. More information on this can be found in the chapter above called Connector Authorization. ![](Images/2023-04-18-14-39-40.png) -## Configure cadence of Risk list ingestion +## Change risk list +You can change risk list to pull in to your environment. This can be done in the default playbook or you can install several instances of one playbook. +Example: You would like to use both ```Actively Communicating Validated C&C Server``` and ```Recent Phishing Host``` ip risk lists. +Select the **RecordedFuture-IP-IndicatorImport** template from ```Automation -> Playbook``` twice and save with different names like ```Recorded Future - Actively Communicating Validated C&C Server - IndicatorImport``` and ```Recorded Future - Phishing Host - IndicatorImport```. + +Change the risk list to download and modify the description in the ```RecordedFuture-Threatlntelligencelmport``` step in the logic app. +![](Images/2023-09-08-12-01-37.png) + +## Configure Cadence of Risk List Ingestion +Its possible to adjust the cadence of risk list download to reduce traffic and cost. Recorded Future have the following recommendations [Risk-List-Download-Recommendations](https://support.recordedfuture.com/hc/en-us/articles/115010401968-Risk-List-Download-Recommendations) (Require Recorded Future Login). + The first step of all TIProcessing Playbooks is a recurrence step, it is possible to adjust the cadence by modifying the interval and frequency parameters. ![](Images/2023-04-18-14-52-32.png) @@ -118,20 +159,24 @@ If you do so however, it is critical that you also adjust the expirationDateTime * Having no active Recorded Future indicators the majority of the time. If you are unsure of how to do this, please consult Recorded Future Professional Services. - +![](Images/2023-06-26-10-59-49.png) ## Query Risk lists -After successfully importing one or more risk lists it is possible to query the imported data in your Log Analytics Workspace. +After successfully running and importing one or more risk lists it is possible to query the imported data in your Log Analytics Workspace. Example queries: ``` sql +// List 10 rows from ThreatIntelligenceIndicator log imported from Recorded Future ThreatIntelligenceIndicator | where Description contains "Recorded Future" | take 10 +// List 10 rows from ThreatIntelligenceIndicator log imported from the +// IP - Actively Communicating C&C Server risk list ThreatIntelligenceIndicator |where Description == "Recorded Future - IP - Actively Communicating C&C Server" | take 10 +// List 10 rows from ThreatIntelligenceIndicator log imported from Recorded Future ThreatIntelligenceIndicator |where Description == "Recorded Future - IP - Actively Communicating C&C Server" and AdditionalInformation contains "Cobalt Strike" | take 10 @@ -139,90 +184,139 @@ ThreatIntelligenceIndicator ![](Images/2023-04-18-16-39-00.png) -## Configure Analytic Rules for detection -The Solution contains examples of how to build Analytic Rules based on Recorded Future Risk Lists. -![](Images/2023-04-18-16-46-44.png) +## Activate Analytic Rules for IoC detection +Automatically enrich IOCs in incidents by following the steps below: + +1. Open Microsoft Sentinel. +2. Go to Automation and select *Create Automation rule* +3. Name the rule +4. Select the following options: + * Trigger: **When an incident is created** + * Action: **Run playbook** + * Playbook (successfully configured): + - **RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash** or + - **RecordedFuture-Sandbox_Enrichment-Url** +5. Done -Provided the example you have to adjust the KQL query to match Threat Intelligence indicators with logs from your infrastructure. -![](Images/2023-04-18-17-36-48.png) +The Recorded Future playbook is now configured to run when incidents are triggered, and it will enrich the following IOC types: IP, Domain, URL, or Hash. # Playbooks -The following playbooks are provided by Recorded Future. +This section lists all available Recorded Future Playbooks. -## RecordedFuture-ImportToSentinel -Type: Detection -Included in Recorded Future Intelligence Solution: Yes +## RecordedFuture-ThreatIntelligenceImport +Type: Detection\ +Included in Recorded Future Intelligence Solution: Yes\ +Requires **/recordedfuturev2** API keys as described in the [Connector authorization](#connector-authorization) section. -This playbook will serve all the TIProcessor playbooks with batch import of threat intelligence indicators into the ThreatIntelligenceIndicator table. +Retrieves Indicators Of Compromise (IoCs) from one of the indicator import logic apps, and store them in the ThreatIntelligenceIndicator table. All IndicatorImport playbooks use this playbook for batching. -[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-ImportToSentinel%2Fazuredeploy.json) -[![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-ImportToSentinel%2Fazuredeploy.json) +[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-ThreatIntelligenceImport%2Fazuredeploy.json) +[![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-ThreatIntelligenceImport%2Fazuredeploy.json) -## RecordedFuture-IP-Actively_Comm_C2_Server-TIProcessor -Type: Detection -Included in Recorded Future Intelligence Solution: Yes +## RecordedFuture-Domain-IndicatorImport +Type: Detection\ +Included in Recorded Future Intelligence Solution: Yes\ +Requires **/recordedfuturev2** API keys as described in the [Connector authorization](#connector-authorization) section. -This playbook leverages the Recorded Future API to automate the ingestion of Recorded Future [Actively Communicating C&C Server IP RiskList](https://support.recordedfuture.com/hc/en-us/articles/115000894448-IP-Address-Risk-Rules) (Require Recorded Future Login), into the ThreatIntelligenceIndicator table, for detection (alert) actions in Microsoft Sentinel. For additional information please visit [Recorded Future](https://www.recordedfuture.com/integrations/microsoft). -[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-IP-Actively_Comm_C2_Server-IndicatorProcessor%2Fazuredeploy.json) -[![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-IP-Actively_Comm_C2_Server-IndicatorProcessor%2Fazuredeploy.json) +Retrieves the [Microsoft Sentinel Domain Default Risk List ](https://support.recordedfuture.com/hc/en-us/articles/115003793388-Domain-Risk-Rules) (requires login), Domain IOC with risk greater than 65 and adds the IOCs to the ThreatIntelligenceIndicator table. -## RecordedFuture-DOMAIN-C2_DNS_Name-TIProcessor -Type: Detection -Included in Recorded Future Intelligence Solution: Yes +[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FDomain-IndicatorImport%2Fazuredeploy.json) +[![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FDomain-IndicatorImport%2Fazuredeploy.json) -This playbook leverages the Recorded Future API to automate the ingestion of Recorded Future [C&C DNS Name Domain RiskList](https://support.recordedfuture.com/hc/en-us/articles/115003793388-Domain-Risk-Rules) (Require Recorded Future Login), into the ThreatIntelligenceIndicator table, for detection (alert) actions in Microsoft Sentinel. For additional information please visit [Recorded Future](https://www.recordedfuture.com/integrations/microsoft). -[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-DOMAIN-C2_DNS_Name-IndicatorProcessor%2Fazuredeploy.json) -[![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-DOMAIN-C2_DNS_Name-IndicatorProcessor%2Fazuredeploy.json) +## RecordedFuture-Hash-IndicatorImport +Type: Detection\ +Included in Recorded Future Intelligence Solution: Yes\ +Requires **/recordedfuturev2** API keys as described in the [Connector authorization](#connector-authorization) section. -## RecordedFuture-URL-Recent_Rep_by_Insikt-TIProcessor -Type: Detection -Included in Recorded Future Intelligence Solution: Yes +Retrieves the [Microsoft Sentinel Hash Observed in Underground Testing Risk List ](https://support.recordedfuture.com/hc/en-us/articles/115000846167-Hash-Risk-Rules) (requires login), Hashes based on the observedMalwareTesting Risk Rule and adds the IOCs to the ThreatIntelligenceIndicator table. -This playbook leverages the Recorded Future API to automate the ingestion of Recorded Future [Recently Reported by Insikt Group URL RiskList](https://support.recordedfuture.com/hc/en-us/articles/115010052768-URL-Risk-Rules) (Require Recorded Future Login), into the ThreatIntelligenceIndicator table, for detection (alert) actions in Microsoft Sentinel. For additional information please visit [Recorded Future](https://www.recordedfuture.com/integrations/microsoft). +[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-Hash-IndicatorImport%2Fazuredeploy.json) +[![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-Hash-IndicatorImport%2Fazuredeploy.json) -[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-URL-Recent_Rep_by_Insikt_Group-IndicatorProcessor%2Fazuredeploy.json) -[![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-URL-Recent_Rep_by_Insikt_Group-IndicatorProcessor%2Fazuredeploy.json) +## RecordedFuture-IP-IndicatorImport +Type: Detection\ +Included in Recorded Future Intelligence Solution: Yes\ +Requires **/recordedfuturev2** API keys as described in the [Connector authorization](#connector-authorization) section. -## RecordedFuture-HASH-Obs_in_Underground-TIProcessor -Type: Detection -Included in Recorded Future Intelligence Solution: Yes +Retrieves the [Actively Communicating Validated C&C Server Risk List ](https://support.recordedfuture.com/hc/en-us/articles/115000894448-IP-Address-Risk-Rules) (requires login), Observing C2 communications with infected machines or adversary control by Recorded Future Network Traffic Analysis. -This playbook leverages the Recorded Future API to automate the ingestion of Recorded Future [Observed in Underground Virus Testing Sites Hash RiskList](https://support.recordedfuture.com/hc/en-us/articles/115000846167-Hash-Risk-Rules) (Require Recorded Future Login), into the ThreatIntelligenceIndicator table, for detection (alert) actions in Microsoft Sentinel. For additional information please visit [Recorded Future](https://www.recordedfuture.com/integrations/microsoft). +[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-IP-IndicatorImport%2Fazuredeploy.json) +[![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-IP-IndicatorImport%2Fazuredeploy.json) -[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-HASH-Observed_in_Underground_Virus_Test_Sites-IndicatorProcessor%2Fazuredeploy.json) -[![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-HASH-Observed_in_Underground_Virus_Test_Sites-IndicatorProcessor%2Fazuredeploy.json) +## RecordedFuture-URL-IndicatorImport +Type: Detection\ +Included in Recorded Future Intelligence Solution: Yes\ +Requires **/recordedfuturev2** API keys as described in the [Connector authorization](#connector-authorization) section. -## RecordedFuture-Ukraine-IndicatorProcessor -Type: Detection -Included in Recorded Future Intelligence Solution: Yes +Retrieves the [Microsoft Sentinel URL Recently Reported by Insikt Group Risk List ](https://support.recordedfuture.com/hc/en-us/articles/115000894448-IP-Address-Risk-Rules) (requires login), URLs based on the Recently Reported by Insikt Group rule and adds the IOCs to the ThreatIntelligenceIndicator table. -This playbook leverages the Recorded Future API to automate the ingestion of Recorded Future [Ukraine Threat List of Related IOCs](https://support.recordedfuture.com/hc/en-us/articles/4484981411475-Resource-Center-on-the-Ukraine-Conflict) (Require Recorded Future Login), into the ThreatIntelligenceIndicator table, for detection (alert) actions in Microsoft Sentinel. For additional information please visit [Recorded Future](https://www.recordedfuture.com/integrations/microsoft). +[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-URL-IndicatorImport%2Fazuredeploy.json) +[![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-URL-IndicatorImport%2Fazuredeploy.json) -[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%20Future%2FPlaybooks%2FRecordedFuture-Ukraine-IndicatorProcessor%2Fazuredeploy.json) -[![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%20Future%2FPlaybooks%2FRecordedFuture-Ukraine-IndicatorProcessor%2Fazuredeploy.json) +## RecordedFuture-Alert-Importer +Type: Alerting\ +Included in Recorded Future Intelligence Solution: Yes\ +Requires **/recordedfuturev2** API keys as described in the [Connector authorization](#connector-authorization) section. + +Retrieves Alerts and stores them in a custom log in the Log Analytic Workspace. More information on [Alerts](https://support.recordedfuture.com/hc/en-us/articles/115002151327-Setting-up-Event-Alerts) (requires login) + +The Alert importer playbook also creates incidents when receiving alerts. Its possible to turn off incident generation by setting the logic app parameter create_incident to false + +![](Images/2023-08-09-18-05-46.png) + +[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-Alert-Importer%2Fazuredeploy.json) +[![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-Alert-Importer%2Fazuredeploy.json) + + +## RecordedFuture-Playbook-Alert-Importer +Type: Alerting\ +Included in Recorded Future Intelligence Solution: Yes\ +Requires **/recordedfuturev2** API keys as described in the [Connector authorization](#connector-authorization) section. + +Retrieves Playbook Alerts and stores them in a custom log in the Log Analytic Workspace. More information on [Playbook Alerts](https://support.recordedfuture.com/hc/en-us/articles/13152506878739-Playbook-Alerting-Rules-) (requires login) + +[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-Playbook-Alert-Importer%2Fazuredeploy.json) +[![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-Playbook-Alert-Importer%2Fazuredeploy.json) + +__________________________________________________________ ## RecordedFuture-Sandbox_Enrichment-Url -Type: Response -Included in Recorded Future Intelligence Solution: Yes +Type: Response\ +Included in Recorded Future Intelligence Solution: Yes\ +Requires **/recordedfuturesanbo** API keys as described in the [Connector authorization](#connector-authorization) section. + +Enables URL submission to Recorded Future's Malware Analysis Sandbox, the playbook will also create a Sentinel incident with the following information from the analysis report: + +* Severity Score +* signatures +* A link to the complete analysis report -The Recorded Future Sandbox Playbook enables security and IT teams to analyze and understand URLs, which provides safe and immediate behavioral analysis, helping contextualize key artifacts in an investigation, leading to faster triage. Through this playbook, organizations can incorporate the malware analysis sandbox into automated workflows with applications. Incidents will be enriched with the following Recorded Future context: Sandbox Analysis Score, Signatures and a link to the full Recorded Future Sandbox report. The sandbox enrichment will be posted as a comment in the Microsoft Sentinel incident. For additional information please visit [Recorded Future Sandbox](https://go.recordedfuture.com/hubfs/data-sheets/A4/sandbox.pdf). +File submission requires a storage account. + +To set up automatic enrichment, map alerts to a [custom analytic rule](https://learn.microsoft.com/en-us/azure/sentinel/detect-threats-custom#alert-enrichment). -The automatic enrichments works on known entities of type Url mapped to alerts via analytic rules as described here [Create custom analytics rules to detect threats](https://learn.microsoft.com/en-us/azure/sentinel/detect-threats-custom#alert-enrichment). How to setup automatic enrichment is described in the next section. [![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-Sandbox_Enrichment-Url%2Fazuredeploy.json) [![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-Sandbox_Enrichment-Url%2Fazuredeploy.json) ## RecordedFuture-Sandbox_Outlook_Attachment -Type: Response -Included in Recorded Future Intelligence Solution: No +Type: Response\ +Included in Recorded Future Intelligence Solution: No\ +Requires **/recordedfuturesanbo** API keys as described in the [Connector authorization](#connector-authorization) section. + +Enables submission of file attachments, from Microsoft Outlook emails, to Recorded to Future's Malware Analysis Sandbox. The playbook also creates a Sentinel incident with a summary of the analysis report. -> This playbook is in preview and not part of the Recorded Future Sentinel Solution. It's provided as an example how to build sandbox playbooks. +The email address that received the attachment will also receive an email with the summary. -The Recorded Future Sandbox Playbook enables security and IT teams to analyze and understand Outlook attachments, which provides safe and immediate behavioral analysis, helping contextualize key artifacts in an investigation, leading to faster triage. Through this playbook, organizations can incorporate the malware analysis sandbox into automated workflows with outlook. Attachments will be enriched with the following Recorded Future context: Sandbox Analysis Score, Signatures and a link to the full Recorded Future Sandbox report. The sandbox enrichment will be sent as a reply to the originating mailbox and a Microsoft Sentinel incident. For additional information about Recorded Future sandbox please visit [Recorded Future Sandbox](https://go.recordedfuture.com/hubfs/data-sheets/A4/sandbox.pdf). +**Information in summary** +* Severity Score +* signatures +* A link to the complete analysis report. + +To set up automatic enrichment, map alerts to a [custom analytic rule](https://learn.microsoft.com/en-us/azure/sentinel/detect-threats-custom#alert-enrichment). -The automatic enrichments works on known entities of type Url mapped to alerts via analytic rules as described here [Create custom analytics rules to detect threats](https://learn.microsoft.com/en-us/azure/sentinel/detect-threats-custom#alert-enrichment). How to setup automatic enrichment is described in the next section. [![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-Sandbox_Outlook_Attachment%2Fazuredeploy.json) [![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-Sandbox_Outlook_Attachment%2Fazuredeploy.json) @@ -230,14 +324,20 @@ The automatic enrichments works on known entities of type Url mapped to alerts v ![](Images/2023-05-05-15-37-58.png) ## RecordedFuture-Sandbox_StorageAccount -Type: Response -Included in Recorded Future Intelligence Solution: No +Type: Response\ +Included in Recorded Future Intelligence Solution: No\ +Requires **/recordedfuturesanbo** API keys as described in the [Connector authorization](#connector-authorization) section. + +Enables security and IT teams to submit files to Recorded Future's Malware Analysis Sandbox. The playbook will generate an Sentinel incident, and add a comment with a the following data from the analysis report: -> This playbook is in preview state not part of the Recorded Future Sentinel Solution. It's provided as an example how to build sandbox playbooks. +* Severity Score +* signatures +* A link to the complete Sandbox report -The Recorded Future Sandbox Playbook enables security and IT teams to upload and detonate files in Recorded Future Sandbox from a storage accounts. Recorded Future Sandbox provides safe and immediate behavioral analysis, helping contextualize key artifacts in an investigation, leading to faster triage. Through this playbook, organizations can incorporate the malware analysis sandbox into automated workflows with storage accounts. Files will be enriched with the following Recorded Future context: Sandbox Analysis Score, Signatures and a link to the full Recorded Future Sandbox report. The sandbox enrichment will create a Microsoft Sentinel incident. For additional information about Recorded Future sandbox please visit [Recorded Future Sandbox](https://go.recordedfuture.com/hubfs/data-sheets/A4/sandbox.pdf). +This playbook is for file Submission with a storage account. + +To set up automatic enrichment, map alerts to a [custom analytic rule](https://learn.microsoft.com/en-us/azure/sentinel/detect-threats-custom#alert-enrichment). -The automatic enrichments works on known entities of type Url mapped to alerts via analytic rules as described here [Create custom analytics rules to detect threats](https://learn.microsoft.com/en-us/azure/sentinel/detect-threats-custom#alert-enrichment). How to setup automatic enrichment is described in the next section. [![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-Sandbox_StorageAccount%2Fazuredeploy.json) [![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-Sandbox_StorageAccount%2Fazuredeploy.json) @@ -246,11 +346,21 @@ The automatic enrichments works on known entities of type Url mapped to alerts v --- ## RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash -Type: Response +Type: Response\ +Requires **/recordedfuturev2** API keys as described in the [Connector authorization](#connector-authorization) section. + +Enriches IOCs (IPs, Domains, URLs and hashes) in Sentinel incidents with Recorded Future Intelligence. The Playbook adds the following data for all IOCs an incident: -This playbook leverages the Recorded Future API to automatically enrich the IP, Domain, Url and Hash indicators, found in incidents. Incidents will be enriched with the following Recorded Future context: Risk Score, Risk Rules, Research links, Technical links, Previous detections and a link to the Recorded Future Intelligence Card. The enrichment will be posted as a comment in the Microsoft Sentinel incident. For additional information please visit [Recorded Future](https://www.recordedfuture.com/integrations/microsoft). +* Recorded Future Risk Score +* Triggered Risk Rules +* Research Links +* Technical links +* Previous detections +* Link to the IOC Intelligence Card in the Recorded Future portal. + +Data is added as a comment in the incident. -The automatic enrichments works on known entity type (IP, Domain, Url or File Hash) mapped to alerts via analytic rules as described here [Create custom analytics rules to detect threats](https://learn.microsoft.com/en-us/azure/sentinel/detect-threats-custom#alert-enrichment). How to setup automatic enrichment is described in the next section. +Enable automatic enrichment by mapping enrichments to alerts using a [custom analytics rule](https://learn.microsoft.com/en-us/azure/sentinel/detect-threats-custom#alert-enrichment) [![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash%2Fazuredeploy.json) @@ -271,4 +381,76 @@ This will trigger the Recorded Future playbook to run when any incident is creat The Recorded Future Intelligence Cloud aggregates data related to Sigma Rules and other indicators, driving collective insights to better identify threats. Anonymized, unattributable data is collected for analytical purposes to identify trends and insights with the Intelligence Cloud. The **RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash** playbook gives end users the ability to contribute collective insights to the Intelligence Cloud. [Click here to learn more](https://support.recordedfuture.com/hc/en-us/articles/11633413141779) (Require Recorded Future Login) -![](./RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash/images/IntelligenceCloudParameter.png) \ No newline at end of file +![](./RecordedFuture-IOC_Enrichment-IP_Domain_URL_Hash/images/IntelligenceCloudParameter.png) + + +# DEPRECATED Playbooks +These playbooks will be removed in future version on Recorder Future Solution. +## RecordedFuture-ImportToSentinel +[DEPRECATED]: Use the new RecordedFuture-ThreatIntelligenceImport playbook. +Type: Detection +Included in Recorded Future Intelligence Solution: Yes + +Retrieves all Risk Lists (IOCs), and adds them to the ThreatIntelligenceIndicator table. All TIProcessor playbooks use this playbook. + +[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-ImportToSentinel%2Fazuredeploy.json) +[![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-ImportToSentinel%2Fazuredeploy.json) + +## RecordedFuture-IP-Actively_Comm_C2_Server-TIProcessor +[DEPRECATED]: Use the new RecordedFuture-ThreatIntelligenceImport playbook. +Type: Detection +Included in Recorded Future Intelligence Solution: Yes + +Retrieves the [ Risk List - Actively Communicating C&C IPs](https://support.recordedfuture.com/hc/en-us/articles/115000894448-IP-Address-Risk-Rules) (requires login), and adds the IOCs to the ThreatIntelligenceIndicator table. + +[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-IP-Actively_Comm_C2_Server-IndicatorProcessor%2Fazuredeploy.json) +[![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-IP-Actively_Comm_C2_Server-IndicatorProcessor%2Fazuredeploy.json) + +## RecordedFuture-DOMAIN-C2_DNS_Name-TIProcessor +[DEPRECATED]: Use the new RecordedFuture-ThreatIntelligenceImport playbook. +Type: Detection +Included in Recorded Future Intelligence Solution: Yes + +Retrieves the [Risk List - C&C DNS Name Domain](https://support.recordedfuture.com/hc/en-us/articles/115003793388-Domain-Risk-Rules) (requires login), and adds the IOCs to the ThreatIntelligenceIndicator table. + +[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-DOMAIN-C2_DNS_Name-IndicatorProcessor%2Fazuredeploy.json) +[![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-DOMAIN-C2_DNS_Name-IndicatorProcessor%2Fazuredeploy.json) + +## RecordedFuture-URL-Recent_Rep_by_Insikt-TIProcessor +[DEPRECATED]: Use the new RecordedFuture-ThreatIntelligenceImport playbook. +Type: Detection +Included in Recorded Future Intelligence Solution: Yes + +Retrieves the [ Risk List - Recently Reported by Insikt Group URL](https://support.recordedfuture.com/hc/en-us/articles/115010052768-URL-Risk-Rules) (requires login) and adds the IOCs to the ThreatIntelligenceIndicator table. + +[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-URL-Recent_Rep_by_Insikt_Group-IndicatorProcessor%2Fazuredeploy.json) +[![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-URL-Recent_Rep_by_Insikt_Group-IndicatorProcessor%2Fazuredeploy.json) + +## RecordedFuture-HASH-Obs_in_Underground-TIProcessor +[DEPRECATED]: Use the new RecordedFuture-ThreatIntelligenceImport playbook. +Type: Detection +Included in Recorded Future Intelligence Solution: Yes + +Retrieves the[ Risk List - Observed in Underground Virus Testing Sites Hash](https://support.recordedfuture.com/hc/en-us/articles/115000846167-Hash-Risk-Rules) (requires login), and adds the IOCs to the ThreatIntelligenceIndicator table. + +[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-HASH-Observed_in_Underground_Virus_Test_Sites-IndicatorProcessor%2Fazuredeploy.json) +[![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%2520Future%2FPlaybooks%2FRecordedFuture-HASH-Observed_in_Underground_Virus_Test_Sites-IndicatorProcessor%2Fazuredeploy.json) + +## RecordedFuture-Ukraine-IndicatorProcessor +[DEPRECATED]: Use the new RecordedFuture-ThreatIntelligenceImport playbook. +Type: Detection +Included in Recorded Future Intelligence Solution: Yes + +Retrieves the [Risk List - Ukraine Threat List of Related IOCs](https://support.recordedfuture.com/hc/en-us/articles/4484981411475-Resource-Center-on-the-Ukraine-Conflict) (requires login), and adds the IOCs to the ThreatIntelligenceIndicator table. + +[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%20Future%2FPlaybooks%2FRecordedFuture-Ukraine-IndicatorProcessor%2Fazuredeploy.json) +[![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FRecorded%20Future%2FPlaybooks%2FRecordedFuture-Ukraine-IndicatorProcessor%2Fazuredeploy.json) + + +# Known Issues +## Version 2.5 +Sentinel playbook upgrade experience can result in the following error: ```Cannot read properties of null (reading 'parameters')``` +![](Images/2023-09-13-19-16-24.png) + +A workaround is to reinstall and overwrite the playbooks from the template in Playbook Template tab and not using the upgrade wizard. Before overwriting an active playbook make note of the risk list downloaded, the description, cadence of downloading. +![](Images/2023-09-13-19-24-54.png) diff --git a/Solutions/Recorded Future/ReleaseNotes.md b/Solutions/Recorded Future/ReleaseNotes.md new file mode 100644 index 00000000000..644f41118cb --- /dev/null +++ b/Solutions/Recorded Future/ReleaseNotes.md @@ -0,0 +1,9 @@ +| **Version** | **Date Modified (DD-MM-YYYY)** | **Change History** | +|-------------|--------------------------------|---------------------------------------------| +| 3.0.0 | 20-09-2023 | Added workbooks for correlating Recorded Future and logs containing IoC of type IP, DNS, URL and Hash
Generate Markdown/HTML response for enrichment comments.
Recorded Future Playbook Alerts playbook and workbook for visualization.
Recorded Future Classic Alerts playbook and workbook for visualization.
Leveraging ner API for importing threat indicators and deprecating old playbooks. | +| 2.4.0 | 29-05-2023 | Sandbox URL enrichment playbook included in the solution
Sandbox of outlook attachment playbook provided as an example outside the solution.
Sandbox of files in Azure storage accounts provided as example outside the solution.
Fix to IOC enrichment playbook don’t report 404 (not found) as an error. | +|2.3.0 | 13-02-2023 | Layout improvements to the incident enrichment playbook.
Added detections from collective insights to enrichment playbooks.
IncidentId and MITRE Att&ck code added to collective insights.
Fix for image in incident comment. | +| 2.2.2 | 23-01-2023 | Fixes for all risk list import playbooks. | +| 2.2.1 | 23-12-2022 | Display severity for risk rules in enrichment of IOCs.
Sorting of risk rules, showing very malicious rules first. | +| 2.2.0 | 14-12-2022 | Improvements to the incident enrichment playbook.
Added Recorded Future links to enrichment comment.
Improved layout of the enrichment, adding Recorded Future logo, table layout. | +| 2.1.0 | 20-09-2022 | Updated all playbooks to use RecordedFutureV2 connector, which requires new API keys.
Added playbooks for importing Ukraine Russia conflict risk lists. | diff --git a/Solutions/Recorded Future/SolutionMetadata.json b/Solutions/Recorded Future/SolutionMetadata.json index 2d4e41a6d1c..9bb1c83780a 100644 --- a/Solutions/Recorded Future/SolutionMetadata.json +++ b/Solutions/Recorded Future/SolutionMetadata.json @@ -2,7 +2,7 @@ "publisherId": "recordedfuture1605638642586", "offerId": "recorded_future_sentinel_solution", "firstPublishDate": "2021-11-01", - "lastPublishDate": "2023-05-08", + "lastPublishDate": "2023-09-19", "providers": ["Recorded Future"], "categories": { "domains": ["Security - Threat Intelligence"] diff --git a/Solutions/Recorded Future/Workbooks/Recorded Future - C&C DNS Name to DNS Events - Correlation&Threat Hunting.json b/Solutions/Recorded Future/Workbooks/Recorded Future - C&C DNS Name to DNS Events - Correlation&Threat Hunting.json deleted file mode 100644 index 50f76ea68ef..00000000000 --- a/Solutions/Recorded Future/Workbooks/Recorded Future - C&C DNS Name to DNS Events - Correlation&Threat Hunting.json +++ /dev/null @@ -1,252 +0,0 @@ -{ - "version": "Notebook/1.0", - "items": [ - { - "type": 1, - "content": { - "json": "## Recorded Future - C&C DNS Name to DNS Events - Correlation/Threat Hunting\n\n" - }, - "name": "text - 0" - }, - { - "type": 9, - "content": { - "version": "KqlParameterItem/1.0", - "parameters": [ - { - "id": "5aaf92cc-3c1e-43f0-8a2f-18a79d7c1d5d", - "version": "KqlParameterItem/1.0", - "name": "DNS_Events_Time_Range", - "label": "DNS Events Time Range", - "type": 4, - "isRequired": true, - "value": { - "durationMs": 7776000000 - }, - "typeSettings": { - "selectableValues": [ - { - "durationMs": 300000 - }, - { - "durationMs": 900000 - }, - { - "durationMs": 1800000 - }, - { - "durationMs": 3600000 - }, - { - "durationMs": 14400000 - }, - { - "durationMs": 43200000 - }, - { - "durationMs": 86400000 - }, - { - "durationMs": 172800000 - }, - { - "durationMs": 259200000 - }, - { - "durationMs": 604800000 - }, - { - "durationMs": 1209600000 - }, - { - "durationMs": 2419200000 - }, - { - "durationMs": 2592000000 - }, - { - "durationMs": 5184000000 - }, - { - "durationMs": 7776000000 - } - ] - } - }, - { - "id": "eea9b6a5-76f4-4d3b-b62d-4f5e1c4173b6", - "version": "KqlParameterItem/1.0", - "name": "Threat_Intelligence_Time_Range", - "label": "Threat Intelligence Time Range", - "type": 4, - "isRequired": true, - "value": { - "durationMs": 7776000000 - }, - "typeSettings": { - "selectableValues": [ - { - "durationMs": 300000 - }, - { - "durationMs": 900000 - }, - { - "durationMs": 1800000 - }, - { - "durationMs": 3600000 - }, - { - "durationMs": 14400000 - }, - { - "durationMs": 43200000 - }, - { - "durationMs": 86400000 - }, - { - "durationMs": 172800000 - }, - { - "durationMs": 259200000 - }, - { - "durationMs": 604800000 - }, - { - "durationMs": 1209600000 - }, - { - "durationMs": 2419200000 - }, - { - "durationMs": 2592000000 - }, - { - "durationMs": 5184000000 - }, - { - "durationMs": 7776000000 - } - ] - } - } - ], - "style": "pills", - "queryType": 0, - "resourceType": "microsoft.operationalinsights/workspaces" - }, - "name": "parameters - 4" - }, - { - "type": 3, - "content": { - "version": "KqlItem/1.0", - "query": "let list_tlds = ThreatIntelligenceIndicator\r\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\r\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\r\n| where Description == 'Recorded Future - DOMAIN - C2 DNS Name'\r\n| where isnotempty(DomainName)\r\n| extend parts = split(DomainName, '.')\r\n| extend tld = parts[(array_length(parts)-1)]\r\n| summarize count() by tostring(tld)\r\n| summarize make_list(tld);\r\nThreatIntelligenceIndicator\r\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\r\n| where Active == true\r\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\r\n| where Description == 'Recorded Future - DOMAIN - C2 DNS Name'\r\n// Picking up only IOC's that contain the entities we want\r\n| where isnotempty(DomainName)\r\n| join (\r\n DnsEvents\r\n | where TimeGenerated {DNS_Events_Time_Range:query}\r\n //Extract Domain patterns from syslog message\r\n | where isnotempty(Name)\r\n | extend parts = split(Name, '.')\r\n //Split out the TLD\r\n | extend tld = parts[(array_length(parts)-1)]\r\n //Validate parsed Domain by checking if the TLD is in the list of TLDs in our threat feed\r\n | where tld in~ (list_tlds)\r\n | extend DNS_TimeGenerated = TimeGenerated\r\n) on $left.DomainName==$right.Name\r\n| summarize Correlation_Matches=count() by bin(DNS_TimeGenerated, 1d)\r\n| render barchart", - "size": 0, - "queryType": 0, - "resourceType": "microsoft.operationalinsights/workspaces" - }, - "name": "query - 1" - }, - { - "type": 3, - "content": { - "version": "KqlItem/1.0", - "query": "let list_tlds = ThreatIntelligenceIndicator\r\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\r\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\r\n| where Description == 'Recorded Future - DOMAIN - C2 DNS Name'\r\n| where isnotempty(DomainName)\r\n| extend parts = split(DomainName, '.')\r\n| extend tld = parts[(array_length(parts)-1)]\r\n| summarize count() by tostring(tld)\r\n| summarize make_list(tld);\r\nThreatIntelligenceIndicator\r\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\r\n| where Active == true\r\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\r\n| where Description == 'Recorded Future - DOMAIN - C2 DNS Name'\r\n// Picking up only IOC's that contain the entities we want\r\n| where isnotempty(DomainName)\r\n| join (\r\n DnsEvents\r\n | where TimeGenerated {DNS_Events_Time_Range:query}\r\n //Extract Domain patterns from syslog message\r\n | where isnotempty(Name)\r\n | extend parts = split(Name, '.')\r\n //Split out the TLD\r\n | extend tld = parts[(array_length(parts)-1)]\r\n //Validate parsed Domain by checking if the TLD is in the list of TLDs in our threat feed\r\n | where tld in~ (list_tlds)\r\n | extend DNS_TimeGenerated = TimeGenerated\r\n) on $left.DomainName==$right.Name\r\n| project Risk=ConfidenceScore, DomainName, ThreatType, AdditionalInformation\r\n| extend Evidence=parse_json(AdditionalInformation)['EvidenceDetails']\r\n| mv-expand Evidence\r\n| extend Rule=Evidence['Rule']\r\n| summarize count() by tostring(Rule)\r\n| sort by count_ desc\r\n\r\n", - "size": 0, - "queryType": 0, - "resourceType": "microsoft.operationalinsights/workspaces", - "gridSettings": { - "formatters": [ - { - "columnMatch": "count_", - "formatter": 8, - "formatOptions": { - "palette": "orange" - } - } - ], - "labelSettings": [ - { - "columnId": "Rule" - }, - { - "columnId": "count_", - "label": "Count" - } - ] - } - }, - "customWidth": "30", - "name": "query - 2" - }, - { - "type": 3, - "content": { - "version": "KqlItem/1.0", - "query": "let list_tlds = ThreatIntelligenceIndicator\r\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\r\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\r\n| where Description == 'Recorded Future - DOMAIN - C2 DNS Name'\r\n| where isnotempty(DomainName)\r\n| extend parts = split(DomainName, '.')\r\n| extend tld = parts[(array_length(parts)-1)]\r\n| summarize count() by tostring(tld)\r\n| summarize make_list(tld);\r\nThreatIntelligenceIndicator\r\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\r\n| where Active == true\r\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\r\n| where Description == 'Recorded Future - DOMAIN - C2 DNS Name'\r\n// Picking up only IOC's that contain the entities we want\r\n| where isnotempty(DomainName)\r\n| join (\r\n DnsEvents\r\n | where TimeGenerated {DNS_Events_Time_Range:query}\r\n //Extract Domain patterns from syslog message\r\n | where isnotempty(Name)\r\n | extend parts = split(Name, '.')\r\n //Split out the TLD\r\n | extend tld = parts[(array_length(parts)-1)]\r\n //Validate parsed Domain by checking if the TLD is in the list of TLDs in our threat feed\r\n | where tld in~ (list_tlds)\r\n | extend DNS_TimeGenerated = TimeGenerated\r\n) on $left.DomainName==$right.Name\r\n| project Risk=ConfidenceScore, DomainName, Threat_Intelligence_IOC_Date = TimeGenerated, SourceIP=ClientIP, DNS_Event_Time = DNS_TimeGenerated, ThreatType, Device=Computer, AdditionalInformation\r\n| sort by Risk desc\r\n", - "size": 0, - "exportFieldName": "DomainName", - "exportParameterName": "IOC", - "queryType": 0, - "resourceType": "microsoft.operationalinsights/workspaces", - "gridSettings": { - "formatters": [ - { - "columnMatch": "Risk", - "formatter": 18, - "formatOptions": { - "thresholdsOptions": "colors", - "thresholdsGrid": [ - { - "operator": ">=", - "thresholdValue": "90", - "representation": "redBright", - "text": "{0}{1}" - }, - { - "operator": ">=", - "thresholdValue": "65", - "representation": "orange", - "text": "{0}{1}" - }, - { - "operator": ">=", - "thresholdValue": "25", - "representation": "yellow", - "text": "{0}{1}" - }, - { - "operator": "Default", - "thresholdValue": null, - "representation": "blue", - "text": "{0}{1}" - } - ] - } - } - ] - }, - "sortBy": [] - }, - "customWidth": "70", - "name": "query - 3" - }, - { - "type": 3, - "content": { - "version": "KqlItem/1.0", - "query": "ThreatIntelligenceIndicator\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\n| where Description contains 'Recorded Future - DOMAIN - C2 DNS Name'\n| where DomainName == \"{IOC}\"\n| where ExpirationDateTime > now()\n| extend Evidence=parse_json(AdditionalInformation)['EvidenceDetails']\n| take 1\n| mv-expand Evidence\n| project Rules = Evidence['Rule'], Evidence_String = Evidence['EvidenceString'], Criticality = Evidence['Criticality']\n| sort by toint(Criticality) desc", - "size": 0, - "queryType": 0, - "resourceType": "microsoft.operationalinsights/workspaces" - }, - "name": "query - 5" - } - ], - "fromTemplateId": "sentinel-RecordedFuture-Domain-C2DNS-Workbook", - "$schema": "https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json" -} \ No newline at end of file diff --git a/Solutions/Recorded Future/Workbooks/Recorded Future - Actively Communicating C&C IPs to DNS Events - Correlation&Threat Hunting.json b/Solutions/Recorded Future/Workbooks/Recorded Future - Actively Communicating C&C IPs to DNS Events - Correlation&Threat Hunting.json deleted file mode 100644 index 5ba062225f8..00000000000 --- a/Solutions/Recorded Future/Workbooks/Recorded Future - Actively Communicating C&C IPs to DNS Events - Correlation&Threat Hunting.json +++ /dev/null @@ -1,252 +0,0 @@ -{ - "version": "Notebook/1.0", - "items": [ - { - "type": 1, - "content": { - "json": "## Recorded Future - Actively Communicating C&C IPs to DNS Events - Correlation/Threat Hunting\n\n" - }, - "name": "text - 0" - }, - { - "type": 9, - "content": { - "version": "KqlParameterItem/1.0", - "parameters": [ - { - "id": "5aaf92cc-3c1e-43f0-8a2f-18a79d7c1d5d", - "version": "KqlParameterItem/1.0", - "name": "DNS_Events_Time_Range", - "label": "DNS Events Time Range", - "type": 4, - "isRequired": true, - "value": { - "durationMs": 7776000000 - }, - "typeSettings": { - "selectableValues": [ - { - "durationMs": 300000 - }, - { - "durationMs": 900000 - }, - { - "durationMs": 1800000 - }, - { - "durationMs": 3600000 - }, - { - "durationMs": 14400000 - }, - { - "durationMs": 43200000 - }, - { - "durationMs": 86400000 - }, - { - "durationMs": 172800000 - }, - { - "durationMs": 259200000 - }, - { - "durationMs": 604800000 - }, - { - "durationMs": 1209600000 - }, - { - "durationMs": 2419200000 - }, - { - "durationMs": 2592000000 - }, - { - "durationMs": 5184000000 - }, - { - "durationMs": 7776000000 - } - ] - } - }, - { - "id": "eea9b6a5-76f4-4d3b-b62d-4f5e1c4173b6", - "version": "KqlParameterItem/1.0", - "name": "Threat_Intelligence_Time_Range", - "label": "Threat Intelligence Time Range", - "type": 4, - "isRequired": true, - "value": { - "durationMs": 7776000000 - }, - "typeSettings": { - "selectableValues": [ - { - "durationMs": 300000 - }, - { - "durationMs": 900000 - }, - { - "durationMs": 1800000 - }, - { - "durationMs": 3600000 - }, - { - "durationMs": 14400000 - }, - { - "durationMs": 43200000 - }, - { - "durationMs": 86400000 - }, - { - "durationMs": 172800000 - }, - { - "durationMs": 259200000 - }, - { - "durationMs": 604800000 - }, - { - "durationMs": 1209600000 - }, - { - "durationMs": 2419200000 - }, - { - "durationMs": 2592000000 - }, - { - "durationMs": 5184000000 - }, - { - "durationMs": 7776000000 - } - ] - } - } - ], - "style": "pills", - "queryType": 0, - "resourceType": "microsoft.operationalinsights/workspaces" - }, - "name": "parameters - 4" - }, - { - "type": 3, - "content": { - "version": "KqlItem/1.0", - "query": "ThreatIntelligenceIndicator\r\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\r\n| where Description contains 'Recorded Future - IP - Actively Communicating C&C Server'\r\n| join (\r\n DnsEvents | where TimeGenerated {DNS_Events_Time_Range:query}\r\n | where SubType =~ \"LookupQuery\" and isnotempty(IPAddresses)\r\n | extend SingleIP = split(IPAddresses, \",\")\r\n | mvexpand SingleIP\r\n | extend SingleIP = tostring(SingleIP)\r\n // renaming time column so it is clear the log this came from\r\n | extend DNS_TimeGenerated = TimeGenerated\r\n)\r\non $left.NetworkIP == $right.SingleIP\r\n| summarize Correlation_Matches=count() by bin(DNS_TimeGenerated, 1d)\r\n| render barchart", - "size": 0, - "queryType": 0, - "resourceType": "microsoft.operationalinsights/workspaces" - }, - "name": "query - 1" - }, - { - "type": 3, - "content": { - "version": "KqlItem/1.0", - "query": "ThreatIntelligenceIndicator\r\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\r\n| where Description contains 'Recorded Future - IP - Actively Communicating C&C Server'\r\n| join (\r\n DnsEvents | where TimeGenerated {DNS_Events_Time_Range:query}\r\n | where SubType =~ \"LookupQuery\" and isnotempty(IPAddresses)\r\n | extend SingleIP = split(IPAddresses, \",\")\r\n | mvexpand SingleIP\r\n | extend SingleIP = tostring(SingleIP)\r\n // renaming time column so it is clear the log this came from\r\n | extend DNS_TimeGenerated = TimeGenerated\r\n)\r\non $left.NetworkIP == $right.SingleIP\r\n| project Risk=ConfidenceScore, NetworkIP, ThreatType, AdditionalInformation\r\n| extend Evidence=parse_json(AdditionalInformation)['EvidenceDetails']\r\n| mv-expand Evidence\r\n| extend Rule=Evidence['Rule']\r\n| summarize count() by tostring(Rule)\r\n| sort by count_ desc\r\n\r\n", - "size": 0, - "queryType": 0, - "resourceType": "microsoft.operationalinsights/workspaces", - "gridSettings": { - "formatters": [ - { - "columnMatch": "count_", - "formatter": 8, - "formatOptions": { - "palette": "orange" - } - } - ], - "labelSettings": [ - { - "columnId": "Rule" - }, - { - "columnId": "count_", - "label": "Count" - } - ] - } - }, - "customWidth": "30", - "name": "query - 2" - }, - { - "type": 3, - "content": { - "version": "KqlItem/1.0", - "query": "ThreatIntelligenceIndicator\r\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\r\n| where Description contains 'Recorded Future - IP - Actively Communicating C&C Server'\r\n| join (\r\n DnsEvents | where TimeGenerated {DNS_Events_Time_Range:query}\r\n | where SubType =~ \"LookupQuery\" and isnotempty(IPAddresses)\r\n | extend SingleIP = split(IPAddresses, \",\")\r\n | mvexpand SingleIP\r\n | extend SingleIP = tostring(SingleIP)\r\n // renaming time column so it is clear the log this came from\r\n | extend DNS_TimeGenerated = TimeGenerated\r\n)\r\non $left.NetworkIP == $right.SingleIP\r\n| project Risk=ConfidenceScore, DestinationIP=NetworkIP, Threat_Intelligence_IOC_Date = TimeGenerated, SourceIP=ClientIP, DNS_Event_Time = DNS_TimeGenerated, ThreatType, Device=Computer, AdditionalInformation\r\n| sort by Risk desc\r\n", - "size": 0, - "exportFieldName": "DestinationIP", - "exportParameterName": "IOC", - "queryType": 0, - "resourceType": "microsoft.operationalinsights/workspaces", - "gridSettings": { - "formatters": [ - { - "columnMatch": "Risk", - "formatter": 18, - "formatOptions": { - "thresholdsOptions": "colors", - "thresholdsGrid": [ - { - "operator": ">=", - "thresholdValue": "90", - "representation": "redBright", - "text": "{0}{1}" - }, - { - "operator": ">=", - "thresholdValue": "65", - "representation": "orange", - "text": "{0}{1}" - }, - { - "operator": ">=", - "thresholdValue": "25", - "representation": "yellow", - "text": "{0}{1}" - }, - { - "operator": "Default", - "thresholdValue": null, - "representation": "blue", - "text": "{0}{1}" - } - ] - } - } - ] - }, - "sortBy": [] - }, - "customWidth": "70", - "name": "query - 3" - }, - { - "type": 3, - "content": { - "version": "KqlItem/1.0", - "query": "ThreatIntelligenceIndicator\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\n| where Description contains 'Recorded Future - IP - Actively Communicating C&C Server'\n| where NetworkIP == \"{IOC}\"\n| where ExpirationDateTime > now()\n| extend Evidence=parse_json(AdditionalInformation)['EvidenceDetails']\n| take 1\n| mv-expand Evidence\n| project Rules = Evidence['Rule'], Evidence_String = Evidence['EvidenceString'], Criticality = Evidence['Criticality']\n| sort by toint(Criticality) desc", - "size": 0, - "queryType": 0, - "resourceType": "microsoft.operationalinsights/workspaces" - }, - "name": "query - 5" - } - ], - "fromTemplateId": "sentinel-RecordedFuture-IP-ActiveC2-Workbook", - "$schema": "https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json" -} diff --git a/Solutions/Recorded Future/Workbooks/RecordedFutureAlertOverview.json b/Solutions/Recorded Future/Workbooks/RecordedFutureAlertOverview.json new file mode 100644 index 00000000000..6e5f253630e --- /dev/null +++ b/Solutions/Recorded Future/Workbooks/RecordedFutureAlertOverview.json @@ -0,0 +1,328 @@ +{ + "version": "Notebook/1.0", + "items": [ + { + "type": 1, + "content": { + "json": "## Recorded Future Alerts\n---\n\nWorkbook to display and analyze Recorded Future Alerts. This workbook visualize data that is retrived by the ```Recorded Future Alerts Importer``` Logic app. First run the Logic app once and then select the RecordedFuturePortalAlerts_CL table.", + "style": "info" + }, + "name": "text - 2" + }, + { + "type": 9, + "content": { + "version": "KqlParameterItem/1.0", + "parameters": [ + { + "id": "8e8c2f1a-d25d-49d1-a217-9831dbc4f919", + "version": "KqlParameterItem/1.0", + "name": "time_picker", + "label": "Time Picker", + "type": 4, + "isRequired": true, + "typeSettings": { + "selectableValues": [ + { + "durationMs": 300000 + }, + { + "durationMs": 900000 + }, + { + "durationMs": 1800000 + }, + { + "durationMs": 3600000 + }, + { + "durationMs": 14400000 + }, + { + "durationMs": 43200000 + }, + { + "durationMs": 86400000 + }, + { + "durationMs": 172800000 + }, + { + "durationMs": 259200000 + }, + { + "durationMs": 604800000 + }, + { + "durationMs": 1209600000 + }, + { + "durationMs": 2419200000 + }, + { + "durationMs": 2592000000 + }, + { + "durationMs": 5184000000 + }, + { + "durationMs": 7776000000 + } + ] + }, + "timeContext": { + "durationMs": 86400000 + }, + "value": { + "durationMs": 86400000 + } + }, + { + "id": "f8d34a51-ba10-4241-abff-cb6c14b50a55", + "version": "KqlParameterItem/1.0", + "name": "log_table", + "label": "Alerts Log Table", + "type": 2, + "isRequired": true, + "query": "search \"*\" | summarize count() by $table | sort by count_ desc | where $table endswith \"CL\" | project $table", + "timeContext": { + "durationMs": 0 + }, + "timeContextFromParameter": "time_picker", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "value": "RecordedFuturePortalAlerts_CL" + }, + { + "id": "89279a9c-af9e-4734-8a98-21aa1f2fa545", + "version": "KqlParameterItem/1.0", + "name": "alert_rules", + "label": "Alert Rules", + "type": 2, + "description": "Filter alert rules you're looking at", + "isRequired": true, + "multiSelect": true, + "quote": "'", + "delimiter": ",", + "query": "{log_table}\n| distinct RuleName_s", + "typeSettings": { + "additionalResourceOptions": [ + "value::all" + ], + "showDefault": false + }, + "timeContext": { + "durationMs": 0 + }, + "timeContextFromParameter": "time_picker", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "value": [ + "value::all" + ] + } + ], + "style": "pills", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + }, + "name": "parameters - 2" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "{log_table:value}\n| where RuleName_s in ({alert_rules:value})\n| distinct AlertID_s, RuleName_s, Triggered_t\n| summarize alert_count = count() by RuleName_s\n| project alert_count, Alert = RuleName_s\n", + "size": 0, + "title": "Top Rules Triggered", + "noDataMessage": "There are no alerts within this time frame.", + "timeContextFromParameter": "time_picker", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "visualization": "piechart" + }, + "customWidth": "50", + "name": "query - 2", + "styleSettings": { + "maxWidth": "30" + } + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "{log_table:value}\n| where RuleName_s in ({alert_rules:value})\n| distinct AlertID_s, RuleName_s, Triggered_t\n| summarize Alert=count() by bin(Triggered_t, 1h)\n", + "size": 0, + "title": "Alerts triggered over time", + "timeContextFromParameter": "time_picker", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "visualization": "categoricalbar" + }, + "customWidth": "50", + "name": "query - 2 - Copy", + "styleSettings": { + "maxWidth": "70" + } + }, + { + "type": 11, + "content": { + "version": "LinkItem/1.0", + "style": "tabs", + "links": [ + { + "id": "20edde78-9485-4056-8eca-6ef7cd86c8b5", + "cellValue": "TAB", + "linkTarget": "parameter", + "linkLabel": "Alert", + "subTarget": "Reference", + "preText": "Some thing", + "postText": "Some thing", + "style": "link" + } + ] + }, + "name": "links - 5" + }, + { + "type": 12, + "content": { + "version": "NotebookGroup/1.0", + "groupType": "editable", + "items": [ + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "{log_table:value}\n| where RuleName_s in ({alert_rules:value})\n//| where Documents_s != \"[]\"\n//| distinct AlertID_s, AlertName_s, Documents_s, Entity_description_s, Entity_id_s, Entity_name_s, Entity_type_s, Risk_criticalityLabel_s, \n//Risk_criticality_d, Risk_documents_s, Risk_evidence_s, RuleName_s, Trend_documents_s, Trend_name_s, Trend_strengthLabel_s, Trend_strength_d, Triggered_t\n| distinct Triggered = Triggered_t, [\"Alert ID\"]=AlertID_s, [\"Alert Name\"]=AlertName_s, [\"Rule Name\"]=RuleName_s, [\"External Link\"]= URL_s\n\n\n\n", + "size": 0, + "timeContextFromParameter": "time_picker", + "exportFieldName": "Alert ID", + "exportParameterName": "Ref_AlertID", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "gridSettings": { + "formatters": [ + { + "columnMatch": "External Link", + "formatter": 7, + "formatOptions": { + "linkTarget": "Url", + "linkLabel": "Recorded Future" + } + }, + { + "columnMatch": "Recorded Future Portal", + "formatter": 7, + "formatOptions": { + "linkTarget": "Url" + } + }, + { + "columnMatch": "URL", + "formatter": 7, + "formatOptions": { + "linkTarget": "Url", + "linkLabel": "Recorded Future" + } + } + ], + "sortBy": [ + { + "itemKey": "Triggered", + "sortOrder": 2 + } + ] + }, + "sortBy": [ + { + "itemKey": "Triggered", + "sortOrder": 2 + } + ] + }, + "name": "query - 1" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "{log_table:value}\n| where AlertID_s == \"{Ref_AlertID}\"\n| project Fragment=Fragment_s, Source=Documents_source_name_s, Title=Documents_title_s, URL=Document_url_s, AlertName = RuleName_s, AlertID=AlertID_s, entities=parse_json(Entity_s)\n| mv-apply with_itemindex=i entities on (\n extend p = pack(strcat(\"Entity \", i+1), strcat(entities.type, \", \", entities.name, \", id:\", entities.id))\n | summarize b = make_bag(p)\n)\n| evaluate bag_unpack(b)\n| project-reorder Fragment, Source, Title, URL, Entity*\n\n", + "size": 0, + "timeContextFromParameter": "time_picker", + "exportedParameters": [ + { + "fieldName": "Fragment", + "parameterName": "FragmentRef", + "parameterType": 1 + }, + { + "fieldName": "Title", + "parameterName": "TitleRef", + "parameterType": 1 + } + ], + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "gridSettings": { + "formatters": [ + { + "columnMatch": "Fragment", + "formatter": 7, + "formatOptions": { + "linkTarget": "GenericDetails", + "linkIsContextBlade": true + }, + "tooltipFormat": { + "tooltip": "{0}" + } + } + ] + } + }, + "conditionalVisibility": { + "parameterName": "TAB", + "comparison": "isEqualTo", + "value": "Reference" + }, + "name": "Reference View" + }, + { + "type": 12, + "content": { + "version": "NotebookGroup/1.0", + "groupType": "editable", + "items": [ + { + "type": 1, + "content": { + "json": "**Document Title**\r\n{TitleRef}" + }, + "name": "text - 3" + }, + { + "type": 1, + "content": { + "json": "**Fragment**\r\n{FragmentRef}\r\n\r\n\r\n" + }, + "showPin": false, + "name": "Fragment" + } + ] + }, + "name": "group - 4" + } + ] + }, + "conditionalVisibility": { + "parameterName": "TAB", + "comparison": "isEqualTo", + "value": "Reference" + }, + "name": "Reference Alerts" + } + ], + "fromTemplateId": "sentinel-RecordedFutureAlertOverviewWorkbook", + "$schema": "https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json" +} \ No newline at end of file diff --git a/Solutions/Recorded Future/Workbooks/RecordedFutureDomainCorrelation.json b/Solutions/Recorded Future/Workbooks/RecordedFutureDomainCorrelation.json new file mode 100644 index 00000000000..dc50bc748d0 --- /dev/null +++ b/Solutions/Recorded Future/Workbooks/RecordedFutureDomainCorrelation.json @@ -0,0 +1,473 @@ +{ + "version": "Notebook/1.0", + "items": [ + { + "type": 9, + "content": { + "version": "KqlParameterItem/1.0", + "parameters": [ + { + "id": "d7ccc5ca-c8ec-458f-ab0d-564a7ef1d217", + "version": "KqlParameterItem/1.0", + "name": "Help", + "label": "Show Guide", + "type": 10, + "isRequired": true, + "jsonData": "[\n {\"value\": \"Yes\", \"label\": \"Yes\", \"selected\":true},\n {\"value\": \"No\", \"label\": \"No\"}\n]", + "timeContext": { + "durationMs": 86400000 + }, + "value": "No" + } + ], + "style": "pills", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + }, + "name": "parameters - 7" + }, + { + "type": 12, + "content": { + "version": "NotebookGroup/1.0", + "groupType": "editable", + "items": [ + { + "type": 1, + "content": { + "json": "### Guide: Domain Correlation \n\nRecorded Future’s Domain Correlation Workbook helps you detect malicious domains within your environment by correlating your logs with Recorded Future Domain Risk Lists.\n\n### How to Correlate Domains\n\nTo correlate domains, follow the steps below:\n\n1. In the **Domain Logs Table** dropdown, select a log table that contains domain logs.\n\t* If a particular log table is not listed in the dropdown, ensure it is enabled in your environment.\n2. In the **Log field with domains** dropdown, select the log field that holds the domains to be correlated.\n\t* The workbook can correlate domains in the format: `domainName.net`.\n3. Select a Recorded Future Domain Risk List for correlation.\n4. If necessary, adjust the values in the **Logs from** and **Data from** dropdowns to match your requirements.\n5. Done\n\n---\n\n#### Log table with examples of correlatable log fields\n\n| Table \t | Field |\n| ----------- \t | ----------- |\n| DNSEvents | Name |\n| _Im_Dns \t | DnsQuery |", + "style": "info" + }, + "name": "text - 0" + } + ] + }, + "conditionalVisibility": { + "parameterName": "Help", + "comparison": "isEqualTo", + "value": "Yes" + }, + "name": "group - 15" + }, + { + "type": 12, + "content": { + "version": "NotebookGroup/1.0", + "groupType": "editable", + "items": [ + { + "type": 1, + "content": { + "json": "### Domains (from logs)" + }, + "customWidth": "50", + "name": "text - 2" + }, + { + "type": 1, + "content": { + "json": "### Recorded Future Risk List" + }, + "customWidth": "50", + "name": "text - 3" + }, + { + "type": 9, + "content": { + "version": "KqlParameterItem/1.0", + "parameters": [ + { + "id": "b91b8b5b-10cf-4106-99e2-793eb0d72dce", + "version": "KqlParameterItem/1.0", + "name": "Domain_Logs_Time_Range", + "label": "Logs from", + "type": 4, + "isRequired": true, + "typeSettings": { + "selectableValues": [ + { + "durationMs": 300000 + }, + { + "durationMs": 900000 + }, + { + "durationMs": 1800000 + }, + { + "durationMs": 3600000 + }, + { + "durationMs": 14400000 + }, + { + "durationMs": 43200000 + }, + { + "durationMs": 86400000 + }, + { + "durationMs": 172800000 + }, + { + "durationMs": 259200000 + }, + { + "durationMs": 604800000 + }, + { + "durationMs": 1209600000 + }, + { + "durationMs": 2419200000 + }, + { + "durationMs": 2592000000 + }, + { + "durationMs": 5184000000 + }, + { + "durationMs": 7776000000 + } + ] + }, + "timeContext": { + "durationMs": 86400000 + }, + "value": { + "durationMs": 604800000 + } + }, + { + "id": "3300ad41-acbc-4ebd-900a-c6ab250b7c73", + "version": "KqlParameterItem/1.0", + "name": "Domain_Logs_Table", + "label": "Domain Logs Table", + "type": 2, + "description": "Log Table to correlate Domains Against", + "isRequired": true, + "query": "search \"*\" \n| where TimeGenerated {Domain_Logs_Time_Range:query}\n| summarize count() by $table \n| sort by count_ desc \n| where $table != \"ThreatIntelligenceIndicator\" \n| project $table\n", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "value": "Squid_Proxy_URL_CL" + }, + { + "id": "f4f77ada-b97c-4a82-9421-20a58fb7ce26", + "version": "KqlParameterItem/1.0", + "name": "Domain_Logs_Field", + "label": "Log Field with Domains", + "type": 2, + "description": "Select the field containing the Domain Name that you want to correlate against", + "isRequired": true, + "query": "{Domain_Logs_Table:value}\n| getschema\n| where DataType == \"System.String\"\n| project ColumnName", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "value": "Domain_s" + } + ], + "style": "pills", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + }, + "customWidth": "50", + "name": "parameters - 0" + }, + { + "type": 9, + "content": { + "version": "KqlParameterItem/1.0", + "parameters": [ + { + "id": "95e78560-1e69-437c-8226-7b0f8c4dc199", + "version": "KqlParameterItem/1.0", + "name": "Threat_Intelligence_Time_Range", + "label": "Data from", + "type": 4, + "isRequired": true, + "typeSettings": { + "selectableValues": [ + { + "durationMs": 300000 + }, + { + "durationMs": 900000 + }, + { + "durationMs": 1800000 + }, + { + "durationMs": 3600000 + }, + { + "durationMs": 14400000 + }, + { + "durationMs": 43200000 + }, + { + "durationMs": 86400000 + }, + { + "durationMs": 172800000 + }, + { + "durationMs": 259200000 + }, + { + "durationMs": 604800000 + }, + { + "durationMs": 1209600000 + }, + { + "durationMs": 2419200000 + }, + { + "durationMs": 2592000000 + }, + { + "durationMs": 5184000000 + }, + { + "durationMs": 7776000000 + } + ] + }, + "value": { + "durationMs": 604800000 + } + }, + { + "id": "e7c7e2ea-f5b3-4505-b64c-b18ca8561168", + "version": "KqlParameterItem/1.0", + "name": "RF_Risk_list", + "label": "Risk List", + "type": 2, + "description": "Which Domain Risk List do you want to correlate against", + "isRequired": true, + "query": "ThreatIntelligenceIndicator\n| where isnotempty(DomainName)\n| where Description contains \"Recorded Future\"\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\n| summarize count() by Description\n| project output = strcat('\"', Description, '\"')\n", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "value": "\"Recorded Future - DOMAIN - Default RiskList\"" + } + ], + "style": "pills", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + }, + "customWidth": "50", + "name": "parameters - 1" + } + ], + "exportParameters": true + }, + "name": "group - 10" + }, + { + "type": 12, + "content": { + "version": "NotebookGroup/1.0", + "groupType": "editable", + "items": [ + { + "type": 1, + "content": { + "json": "\n### Guide: Detected Domains Per Day\n\nThe chart displays the number of correlation detections per day between domain logs and Recorded Future's domain Risk lists.", + "style": "info" + }, + "customWidth": "100", + "conditionalVisibility": { + "parameterName": "Help", + "comparison": "isEqualTo", + "value": "Yes" + }, + "name": "text - 0" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "let list_tlds = ThreatIntelligenceIndicator\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\n| where Description == {RF_Risk_list:value}\n| where isnotempty(DomainName)\n| where isnotempty(Tags)\n| extend parts = split(DomainName, '.')\n| extend tld = parts[(array_length(parts)-1)]\n| summarize count() by tostring(tld)\n| summarize make_list(tld);\nThreatIntelligenceIndicator\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\n| where Active == true\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\n| where Description == {RF_Risk_list:value}\n// Picking up only IOC's that contain the entities we want\n| where isnotempty(DomainName)\n| where isnotempty(Tags)\n| join (\n {Domain_Logs_Table:value}\n | where TimeGenerated {Domain_Logs_Time_Range:query}\n //Extract Domain patterns from syslog message\n | where isnotempty({Domain_Logs_Field:value})\n | extend parts = split({Domain_Logs_Field:value}, '.')\n //Split out the TLD\n | extend tld = parts[(array_length(parts)-1)]\n //Validate parsed Domain by checking if the TLD is in the list of TLDs in our threat feed\n | where tld in~ (list_tlds)\n | extend DNS_TimeGenerated = TimeGenerated\n) on $left.DomainName==$right.{Domain_Logs_Field:value}\n| summarize Correlation_Matches=count() by bin(DNS_TimeGenerated, 1d)\n| render barchart", + "size": 0, + "title": "Detected Domains Per Day", + "noDataMessage": "No detected domains", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + }, + "customWidth": "100", + "name": "query - 1" + } + ] + }, + "customWidth": "100", + "name": "group - 14" + }, + { + "type": 12, + "content": { + "version": "NotebookGroup/1.0", + "groupType": "editable", + "items": [ + { + "type": 1, + "content": { + "json": "\n### Guide: Detected Domains\n\nThe Detected Domains table lists domains from the correlated logs that have been matched with Recorded Future Domain Risk Lists.\n\n**Table Columns**\n\n* **Risk Score:** The Recorded Future Risk Score for the domain (IOC), ranging from 1 to 99, with 99 being the highest level of severity.\n* **Domain:** The detected domain.\n* **Detected:** The time when the log was correlated with a Risk List.\n* **Log Created:** The time when the log event itself was created.\n* **Threat Classification:** The type of threat associated with the domain (IOC).", + "style": "info" + }, + "conditionalVisibility": { + "parameterName": "Help", + "comparison": "isEqualTo", + "value": "Yes" + }, + "name": "text - 1" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "let list_tlds = ThreatIntelligenceIndicator\r\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\r\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\r\n| where Description == {RF_Risk_list:value}\r\n| where isnotempty(DomainName)\r\n| where isnotempty(Tags)\r\n| extend parts = split(DomainName, '.')\r\n| extend tld = parts[(array_length(parts)-1)]\r\n| summarize count() by tostring(tld)\r\n| summarize make_list(tld);\r\nThreatIntelligenceIndicator\r\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\r\n| where Active == true\r\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\r\n| where Description == {RF_Risk_list:value}\r\n// Picking up only IOC's that contain the entities we want\r\n| where isnotempty(DomainName)\r\n| join (\r\n {Domain_Logs_Table:value}\r\n | where TimeGenerated {Domain_Logs_Time_Range:query}\r\n //Extract Domain patterns from syslog message\r\n | where isnotempty({Domain_Logs_Field:value})\r\n | extend parts = split({Domain_Logs_Field:value}, '.')\r\n //Split out the TLD\r\n | extend tld = parts[(array_length(parts)-1)]\r\n //Validate parsed Domain by checking if the TLD is in the list of TLDs in our threat feed\r\n | where tld in~ (list_tlds)\r\n | extend DNS_TimeGenerated = TimeGenerated\r\n) on $left.DomainName==$right.{Domain_Logs_Field:value}\r\n| project [\"Risk Score\"]=ConfidenceScore, Domain=DomainName, Detected=format_datetime(TimeGenerated, 'yyyy-MM-dd HH:mm:ss'), [\"Log Created\"]=format_datetime(DNS_TimeGenerated, 'yyyy-MM-dd HH:mm:ss'), [\"Threat Classification\"]=ThreatType\r\n| summarize [\"Log Created\"]=max([\"Log Created\"]) by Domain, [\"Risk Score\"], Detected, [\"Threat Classification\"]\r\n| project [\"Risk Score\"], Domain, Detected, [\"Log Created\"], [\"Threat Classification\"]\r\n| sort by [\"Risk Score\"] desc", + "size": 0, + "title": "Detected Domains", + "noDataMessage": "No detected domains", + "exportFieldName": "Domain", + "exportParameterName": "MaliciousDomainMatch", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "gridSettings": { + "formatters": [ + { + "columnMatch": "Risk", + "formatter": 18, + "formatOptions": { + "thresholdsOptions": "colors", + "thresholdsGrid": [ + { + "operator": ">=", + "thresholdValue": "90", + "representation": "redBright", + "text": "{0}{1}" + }, + { + "operator": ">=", + "thresholdValue": "65", + "representation": "orange", + "text": "{0}{1}" + }, + { + "operator": ">=", + "thresholdValue": "25", + "representation": "yellow", + "text": "{0}{1}" + }, + { + "operator": "Default", + "representation": "blue", + "text": "{0}{1}" + } + ] + } + } + ] + } }, + "customWidth": "70", + "name": "query - 3" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "let list_tlds = ThreatIntelligenceIndicator\r\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\r\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\r\n| where Description == {RF_Risk_list:value}\r\n| where isnotempty(DomainName)\r\n| where isnotempty(Tags)\r\n| extend parts = split(DomainName, '.')\r\n| extend tld = parts[(array_length(parts)-1)]\r\n| summarize count() by tostring(tld)\r\n| summarize make_list(tld);\r\nThreatIntelligenceIndicator\r\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\r\n| where Active == true\r\n// Picking up only Recorded Future IOC's that are pertinent to the use case (Malware C2 Detection)\r\n| where Description == {RF_Risk_list:value}\r\n// Picking up only IOC's that contain the entities we want\r\n| where isnotempty(DomainName)\r\n| where isnotempty(Tags)\r\n| join (\r\n {Domain_Logs_Table:value}\r\n | where TimeGenerated {Domain_Logs_Time_Range:query}\r\n //Extract Domain patterns from syslog message\r\n | where isnotempty({Domain_Logs_Field:value})\r\n | extend parts = split({Domain_Logs_Field:value}, '.')\r\n //Split out the TLD\r\n | extend tld = parts[(array_length(parts)-1)]\r\n //Validate parsed Domain by checking if the TLD is in the list of TLDs in our threat feed\r\n | where tld in~ (list_tlds)\r\n | extend DNS_TimeGenerated = TimeGenerated\r\n) on $left.DomainName==$right.{Domain_Logs_Field:value}\r\n| project Risk=ConfidenceScore, DomainName, ThreatType, Tags\r\n| extend Evidence=parse_json(Tags)[0]\r\n| mv-expand Evidence = parse_json(tostring(Evidence))\r\n| extend Rule=Evidence['Rule']\r\n| summarize count() by tostring(Rule)\r\n| sort by count_ desc\r\n\r\n", + "size": 0, + "title": "Top Triggered Risk Rules", + "noDataMessage": "No triggered Risk Rules", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "gridSettings": { + "formatters": [ + { + "columnMatch": "count_", + "formatter": 8, + "formatOptions": { + "palette": "orange" + } + } + ], + "labelSettings": [ + { + "columnId": "count_", + "label": "Count" + } + ] + } + }, + "customWidth": "30", + "name": "query - 2" + }, + { + "type": 1, + "content": { + "json": "### Detected Domains: Evidence Details\n\nTo view evidence details, click a row (domain) in the Detected Domains table." + }, + "name": "text - 3" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "ThreatIntelligenceIndicator\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\n| where Description contains {RF_Risk_list:value}\n| where DomainName == \"{MaliciousDomainMatch}\"\n| where isnotempty(Tags)\n//| where ExpirationDateTime > now()\n| extend Evidence=parse_json(Tags)[0]\n| take 1\n| mv-expand Evidence = parse_json(tostring(Evidence))\n| project Rules = Evidence['Rule'], Criticality = Evidence['Criticality'], Evidence_String = Evidence['EvidenceString'] \n| sort by toint(Criticality) desc", + "size": 1, + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "gridSettings": { + "formatters": [ + { + "columnMatch": "Evidence_String", + "formatter": 0, + "formatOptions": { + "customColumnWidthSetting": "70%" + } + } + ] + } + }, + "conditionalVisibility": { + "parameterName": "MaliciousDomainMatch", + "comparison": "isNotEqualTo" + }, + "name": "query - 3" + }, + { + "type": 1, + "content": { + "json": "\n### Source data from {Domain_Logs_Table:value}\nTo view source data of correlated domain, click a row (domain) in the Detected Domains table." + }, + "name": "text - 5" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "{Domain_Logs_Table:value}\n| where TimeGenerated {Domain_Logs_Time_Range:query}\n| where {Domain_Logs_Field:value} == \"{MaliciousDomainMatch}\"\n", + "size": 1, + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + }, + "conditionalVisibility": { + "parameterName": "MaliciousDomainMatch", + "comparison": "isNotEqualTo", + "value": "" + }, + "name": "query - 1" + } + ] + }, + "name": "group - 8" + } + ], + "styleSettings": { + "paddingStyle": "wide" + }, + "fromTemplateId": "sentinel-RecordedFutureDomainCorrelationWorkbook", + "$schema": "https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json" +} \ No newline at end of file diff --git a/Solutions/Recorded Future/Workbooks/RecordedFutureHashCorrelation.json b/Solutions/Recorded Future/Workbooks/RecordedFutureHashCorrelation.json new file mode 100644 index 00000000000..060f2dce248 --- /dev/null +++ b/Solutions/Recorded Future/Workbooks/RecordedFutureHashCorrelation.json @@ -0,0 +1,465 @@ +{ + "version": "Notebook/1.0", + "items": [ + { + "type": 9, + "content": { + "version": "KqlParameterItem/1.0", + "parameters": [ + { + "id": "d7ccc5ca-c8ec-458f-ab0d-564a7ef1d217", + "version": "KqlParameterItem/1.0", + "name": "Help", + "label": "🔎 Guide", + "type": 10, + "isRequired": true, + "jsonData": "[\n {\"value\": \"Yes\", \"label\": \"Yes\", \"selected\":true},\n {\"value\": \"No\", \"label\": \"No\"}\n]", + "timeContext": { + "durationMs": 86400000 + }, + "value": "No" + } + ], + "style": "pills", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + }, + "name": "parameters - 7" + }, + { + "type": 12, + "content": { + "version": "NotebookGroup/1.0", + "groupType": "editable", + "items": [ + { + "type": 1, + "content": { + "json": "### Guide: Hash Correlation \n\nRecorded Future’s Hash Correlation Workbook helps you detect malicious hashes within your environment by correlating your logs with Recorded Future Hash Risk Lists.\n\n### How to Correlate hashs\n\nTo correlate hashes, follow the steps below:\n\n1. In the **Hash Logs Table** dropdown, select a log table that contains hash logs.\n\t* If a particular log table is not listed in the dropdown, ensure it is enabled in your environment.\n2. In the **Log field with hashes** dropdown, select the log field that holds the hashs to be correlated.\n\t* The workbook can correlate hashes in the format: `b0a0c7ae387c00161f4cc26405600b1a`.\n3. Select a Recorded Future Hash Risk List for correlation.\n4. If necessary, adjust the values in the **Logs from** and **Data from** dropdowns to match your requirements.\n5. Done\n\n---\n\n#### Log table with examples of correlatable log fields\n| Table \t \t| Field |\n| ----------- \t \t| ----------- |\n| CommonSecurityLog | FileHash |\n| SecurityEvent \t| FileHash |", + "style": "info" + }, + "name": "text - 0" + } + ] + }, + "conditionalVisibility": { + "parameterName": "Help", + "comparison": "isEqualTo", + "value": "Yes" + }, + "name": "group - 15" + }, + { + "type": 12, + "content": { + "version": "NotebookGroup/1.0", + "groupType": "editable", + "items": [ + { + "type": 1, + "content": { + "json": "### Hashes (from logs)" + }, + "customWidth": "50", + "name": "text - 2" + }, + { + "type": 1, + "content": { + "json": "### Recorded Future Risk List" + }, + "customWidth": "50", + "name": "text - 3" + }, + { + "type": 9, + "content": { + "version": "KqlParameterItem/1.0", + "parameters": [ + { + "id": "b91b8b5b-10cf-4106-99e2-793eb0d72dce", + "version": "KqlParameterItem/1.0", + "name": "Hash_Logs_Time_Range", + "label": "Logs from", + "type": 4, + "isRequired": true, + "typeSettings": { + "selectableValues": [ + { + "durationMs": 300000 + }, + { + "durationMs": 900000 + }, + { + "durationMs": 1800000 + }, + { + "durationMs": 3600000 + }, + { + "durationMs": 14400000 + }, + { + "durationMs": 43200000 + }, + { + "durationMs": 86400000 + }, + { + "durationMs": 172800000 + }, + { + "durationMs": 259200000 + }, + { + "durationMs": 604800000 + }, + { + "durationMs": 1209600000 + }, + { + "durationMs": 2419200000 + }, + { + "durationMs": 2592000000 + }, + { + "durationMs": 5184000000 + }, + { + "durationMs": 7776000000 + } + ] + }, + "timeContext": { + "durationMs": 86400000 + }, + "value": { + "durationMs": 1209600000 + } + }, + { + "id": "3300ad41-acbc-4ebd-900a-c6ab250b7c73", + "version": "KqlParameterItem/1.0", + "name": "Hash_Logs_Table", + "label": "Hash Logs Table", + "type": 2, + "description": "Log Table to correlate Domains Against", + "isRequired": true, + "query": "search \"*\" \n| where TimeGenerated {Hash_Logs_Time_Range:query}\n| summarize count() by $table | sort by count_ desc | where $table != \"ThreatIntelligenceIndicator\" | project $table\n", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "value": "EndpointProtection_HASH_CL" + }, + { + "id": "f4f77ada-b97c-4a82-9421-20a58fb7ce26", + "version": "KqlParameterItem/1.0", + "name": "Hash_Logs_Field", + "label": "Log Field with Hashes", + "type": 2, + "description": "Select the field containing the Domain Name that you want to correlate against", + "isRequired": true, + "query": "{Hash_Logs_Table:value}\n| getschema\n| where DataType == \"System.String\"\n| project ColumnName", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "value": "Hash_s" + } + ], + "style": "pills", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + }, + "customWidth": "50", + "name": "parameters - 0" + }, + { + "type": 9, + "content": { + "version": "KqlParameterItem/1.0", + "parameters": [ + { + "id": "95e78560-1e69-437c-8226-7b0f8c4dc199", + "version": "KqlParameterItem/1.0", + "name": "Threat_Intelligence_Time_Range", + "label": "Data from", + "type": 4, + "isRequired": true, + "typeSettings": { + "selectableValues": [ + { + "durationMs": 300000 + }, + { + "durationMs": 900000 + }, + { + "durationMs": 1800000 + }, + { + "durationMs": 3600000 + }, + { + "durationMs": 14400000 + }, + { + "durationMs": 43200000 + }, + { + "durationMs": 86400000 + }, + { + "durationMs": 172800000 + }, + { + "durationMs": 259200000 + }, + { + "durationMs": 604800000 + }, + { + "durationMs": 1209600000 + }, + { + "durationMs": 2419200000 + }, + { + "durationMs": 2592000000 + }, + { + "durationMs": 5184000000 + }, + { + "durationMs": 7776000000 + } + ] + }, + "value": { + "durationMs": 1209600000 + } + }, + { + "id": "e7c7e2ea-f5b3-4505-b64c-b18ca8561168", + "version": "KqlParameterItem/1.0", + "name": "RF_Risk_list", + "label": "Risk List", + "type": 2, + "description": "Which Domain Risk List do you want to correlate against", + "isRequired": true, + "query": "ThreatIntelligenceIndicator\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\n| where isnotempty(FileHashValue)\n| where Description contains \"Recorded Future\"\n| summarize count() by Description\n| project output = strcat('\"', Description, '\"')\n", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "value": "\"Recorded Future - HASH - Observed in Underground Virus Testing Sites\"" + } + ], + "style": "pills", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + }, + "customWidth": "50", + "name": "parameters - 1" + } + ], + "exportParameters": true + }, + "name": "group - 10" + }, + { + "type": 12, + "content": { + "version": "NotebookGroup/1.0", + "groupType": "editable", + "items": [ + { + "type": 1, + "content": { + "json": "\n### Guide: Detected Domains Per Day\n\nThe chart displays the number of correlation detections per day between domain logs and Recorded Future's domain Risk lists.", + "style": "info" + }, + "conditionalVisibility": { + "parameterName": "Help", + "comparison": "isEqualTo", + "value": "Yes" + }, + "name": "text - 0" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "ThreatIntelligenceIndicator\r\n| where TimeGenerated {Threat_Intelligence_Time_Range:query} \r\n| where Description == {RF_Risk_list:value}\r\n| where isnotempty(Tags)\r\n| extend FileHashValue = tolower(FileHashValue)\r\n| join (\r\n {Hash_Logs_Table:value}\r\n | where TimeGenerated {Hash_Logs_Time_Range:query}\r\n // renaming time column so it is clear the log this came from\r\n | extend Hash_TimeGenerated = TimeGenerated\r\n)\r\non $left.FileHashValue == $right.{Hash_Logs_Field:value}\r\n| summarize Correlation_Matches=count() by bin(Hash_TimeGenerated, 1d)\r\n| render barchart", + "size": 0, + "title": "Detected File Hashes Per Day", + "noDataMessage": "No detected hashes", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + }, + "name": "query - 1" + } + ] + }, + "name": "group - 11" + }, + { + "type": 12, + "content": { + "version": "NotebookGroup/1.0", + "groupType": "editable", + "items": [ + { + "type": 1, + "content": { + "json": "\n### Guide: Detected Hashs\n\nThe Detected Hashs table lists hashs from the correlated logs that have been matched with Recorded Future Hash Risk Lists.\n\n**Table Columns**\n\n* **Risk Score:** The Recorded Future Risk Score for the Hashe (IOC), ranging from 1 to 99, with 99 being the highest level of severity.\n* **Hash:** The detected hash.\n* **Detected:** The time when the log was correlated with a Risk List.\n* **Log Created:** The time when the log event itself was created.\n* **Threat Classification:** The type of threat associated with the hash (IOC).", + "style": "info" + }, + "conditionalVisibility": { + "parameterName": "Help", + "comparison": "isEqualTo", + "value": "Yes" + }, + "name": "text - 1" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "ThreatIntelligenceIndicator\r\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\r\n| where Description contains {RF_Risk_list:value}\r\n| where isnotempty(Tags)\r\n| extend FileHashValue = tolower(FileHashValue)\r\n| join (\r\n {Hash_Logs_Table:value}\r\n | where TimeGenerated {Hash_Logs_Time_Range:query}\r\n // renaming time column so it is clear the log this came from\r\n | extend Hash_TimeGenerated = TimeGenerated\r\n)\r\non $left.FileHashValue == $right.{Hash_Logs_Field:value}\r\n| project [\"Risk Score\"]=ConfidenceScore, Hash=FileHashValue, Detected = format_datetime(TimeGenerated, 'yyyy-MM-dd HH:mm:ss'), [\"Log Created\"] = format_datetime(Hash_TimeGenerated, 'yyyy-MM-dd HH:mm:ss'), [\"Threat Classification\"]=ThreatType\r\n| summarize [\"Log Created\"]=max([\"Log Created\"]) by Hash, [\"Risk Score\"], Detected, [\"Threat Classification\"]\r\n| project [\"Risk Score\"], Hash, Detected, [\"Log Created\"], [\"Threat Classification\"]\r\n| sort by [\"Risk Score\"] desc\r\n", + "size": 0, + "title": "Detected Hashes", + "noDataMessage": "No detected hashes", + "exportedParameters": [ + { + "fieldName": "Hash", + "parameterName": "MaliciousHashMatch", + "parameterType": 5 + } + ], + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "gridSettings": { + "formatters": [ + { + "columnMatch": "Risk", + "formatter": 18, + "formatOptions": { + "thresholdsOptions": "colors", + "thresholdsGrid": [ + { + "operator": ">=", + "thresholdValue": "90", + "representation": "redBright", + "text": "{0}{1}" + }, + { + "operator": ">=", + "thresholdValue": "65", + "representation": "orange", + "text": "{0}{1}" + }, + { + "operator": ">=", + "thresholdValue": "25", + "representation": "yellow", + "text": "{0}{1}" + }, + { + "operator": "Default", + "representation": "blue", + "text": "{0}{1}" + } + ] + } + } + ] + } + }, + "customWidth": "70", + "name": "query - 3" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "ThreatIntelligenceIndicator\r\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\r\n| where Description contains {RF_Risk_list:value}\r\n| where isnotempty(Tags)\r\n| extend FileHashValue = tolower(FileHashValue)\r\n| join (\r\n {Hash_Logs_Table:value}\r\n | where TimeGenerated {Hash_Logs_Time_Range:query}\r\n // renaming time column so it is clear the log this came from\r\n | extend Hash_TimeGenerated = TimeGenerated\r\n)\r\non $left.FileHashValue == $right.{Hash_Logs_Field:value}\r\n| project Risk=ConfidenceScore, FileHashValue, ThreatType, Tags\r\n| extend Evidence=parse_json(Tags)[0]\r\n| mv-expand Evidence = parse_json(tostring(Evidence))\r\n| extend Rule=Evidence['Rule']\r\n| summarize count() by tostring(Rule)\r\n| sort by count_ desc\r\n\r\n", + "size": 0, + "title": "Top Triggered Risk Rules", + "noDataMessage": "No triggered Risk Rules", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "gridSettings": { + "formatters": [ + { + "columnMatch": "count_", + "formatter": 8, + "formatOptions": { + "palette": "orange" + } + } + ], + "labelSettings": [ + { + "columnId": "count_", + "label": "Count" + } + ] + } + }, + "customWidth": "30", + "name": "query - 2" + }, + { + "type": 1, + "content": { + "json": "### Detected Hashes: Evidence Details\n\nTo view evidence details, click a row (hash) in the Detected Hashes table." + }, + "name": "text - 3" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "ThreatIntelligenceIndicator\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\n| where Description contains {RF_Risk_list:value}\n| extend FileHashValue = tolower(FileHashValue)\n| where FileHashValue == \"{MaliciousHashMatch}\"\n| where isnotempty(Tags)\n//| where ExpirationDateTime > now()\n| extend Evidence=parse_json(Tags)[0]\n| take 1\n| mv-expand Evidence = parse_json(tostring(Evidence))\n| project Rules = Evidence['Rule'], Criticality = Evidence['Criticality'], Evidence_String = Evidence['EvidenceString']\n| sort by toint(Criticality) desc", + "size": 1, + "noDataMessage": "No evidence details to show", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + }, + "conditionalVisibility": { + "parameterName": "MaliciousHashMatch", + "comparison": "isNotEqualTo" + }, + "name": "query - 5" + }, + { + "type": 1, + "content": { + "json": "\n### Source data from {Hash_Logs_Table:value}\n\nTo view source data of correlated hash, click a row (hash) in the Detected Hashes table." + }, + "name": "text - 5" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "{Hash_Logs_Table:value}\n| where TimeGenerated {Hash_Logs_Time_Range:query}\n| where {Hash_Logs_Field:value} == \"{MaliciousHashMatch}\"\n", + "size": 1, + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + }, + "conditionalVisibility": { + "parameterName": "MaliciousHashMatch", + "comparison": "isNotEqualTo" + }, + "name": "query - 6" + } + ] + }, + "name": "group - 8" + } + ], + "styleSettings": { + "paddingStyle": "wide" + }, + "fromTemplateId": "sentinel-RecordedFutureHashCorrelationWorkbook", + "$schema": "https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json" +} \ No newline at end of file diff --git a/Solutions/Recorded Future/Workbooks/RecordedFutureIPCorrelation.json b/Solutions/Recorded Future/Workbooks/RecordedFutureIPCorrelation.json new file mode 100644 index 00000000000..213a79840be --- /dev/null +++ b/Solutions/Recorded Future/Workbooks/RecordedFutureIPCorrelation.json @@ -0,0 +1,481 @@ +{ + "version": "Notebook/1.0", + "items": [ + { + "type": 9, + "content": { + "version": "KqlParameterItem/1.0", + "parameters": [ + { + "id": "041885bf-2e2c-42ae-ad35-2e12272b4dc4", + "version": "KqlParameterItem/1.0", + "name": "Help", + "label": "Show Guide", + "type": 10, + "isRequired": true, + "typeSettings": { + "additionalResourceOptions": "[variables('TemplateEmptyArray')]" + }, + "jsonData": "[\n {\"value\": \"Yes\", \"label\": \"Yes\", \"selected\":true},\n {\"value\": \"No\", \"label\": \"No\"}\n]", + "timeContext": { + "durationMs": 86400000 + }, + "value": "No" + } + ], + "style": "pills", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + }, + "name": "parameters - 6" + }, + { + "type": 1, + "content": { + "json": "### Guide: IP Correlation \n\nRecorded Future’s IP Correlation Workbook helps you detect malicious IPs within your environment by correlating your logs with Recorded Future IP Risk Lists.\n\n### How to Correlate IPs\n\nTo correlate IPs, follow the steps below:\n\n1. In the **IP Logs Table** dropdown, select a log table that contains IP logs.\n\t* If a particular log table is not listed in the dropdown, ensure it is enabled in your environment.\n2. In the **Log field with IPs** dropdown, select the log field that holds the IPs to be correlated.\n\t* The workbook can correlate IPs in the format: `5.56.61.62`.\n3. Select a Recorded Future IP Risk List for correlation.\n4. If necessary, adjust the values in the **Logs from** and **Data from** dropdowns to match your requirements.\n5. Done\n\n---\n\n#### Log table with examples of correlatable log fields\n\n\n| Table | Field | Table | Field |\n|------------------------------|--------------------|---------------------------------|-----------|\n| AzureActivity | CallerIpAddress | VMConnection | RemoteIp |\n| AzureDiagnostics | CallerIPAddress | W3CIISLog | cIP |\n| AWSCloudTrail | SourceIpAddress | _Im_NetworkSession | SrcIpAddr |\n| AppServiceHTTPLogs | CIp | _Im_NetworkSession | DstIpAddr |\n| AzureDiagnostics | client_ip_s | _Im_WebSession | SrcIpAddr |\n| CommonSecurityLog | SourceIpAddress | SigninLogs | IPAddress |\n| CommonSecurityLog | DestinationIP | AADNonInteractiveUserSignInLogs | IPAddress |\n| DuoSecurityAuthentication_CL | access_device_ip_s | | |", + "style": "info" + }, + "conditionalVisibility": { + "parameterName": "Help", + "comparison": "isEqualTo", + "value": "Yes" + }, + "name": "text - 11" + }, + { + "type": 12, + "content": { + "version": "NotebookGroup/1.0", + "groupType": "editable", + "items": [ + { + "type": 1, + "content": { + "json": "### IP (from logs)" + }, + "customWidth": "50", + "name": "text - 2" + }, + { + "type": 1, + "content": { + "json": "### Recorded Future Risk List" + }, + "customWidth": "50", + "name": "text - 3" + }, + { + "type": 9, + "content": { + "version": "KqlParameterItem/1.0", + "parameters": [ + { + "id": "b91b8b5b-10cf-4106-99e2-793eb0d72dce", + "version": "KqlParameterItem/1.0", + "name": "IP_Logs_Time_Range", + "label": "Logs from", + "type": 4, + "isRequired": true, + "typeSettings": { + "selectableValues": [ + { + "durationMs": 300000 + }, + { + "durationMs": 900000 + }, + { + "durationMs": 1800000 + }, + { + "durationMs": 3600000 + }, + { + "durationMs": 14400000 + }, + { + "durationMs": 43200000 + }, + { + "durationMs": 86400000 + }, + { + "durationMs": 172800000 + }, + { + "durationMs": 259200000 + }, + { + "durationMs": 604800000 + }, + { + "durationMs": 1209600000 + }, + { + "durationMs": 2419200000 + }, + { + "durationMs": 2592000000 + }, + { + "durationMs": 5184000000 + }, + { + "durationMs": 7776000000 + } + ] + }, + "timeContext": { + "durationMs": 86400000 + }, + "value": { + "durationMs": 7776000000 + } + }, + { + "id": "3300ad41-acbc-4ebd-900a-c6ab250b7c73", + "version": "KqlParameterItem/1.0", + "name": "IP_Logs_Table", + "label": "IP Logs Table", + "type": 2, + "description": "Log Table to correlate IPs Against", + "isRequired": true, + "query": "search * \n| where TimeGenerated {IP_Logs_Time_Range:query}\n| summarize count() by $table \n| sort by count_ desc \n| where $table != \"ThreatIntelligenceIndicator\" \n| project $table\n", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "value": "NetScreen_Firewall_CL" + }, + { + "id": "f4f77ada-b97c-4a82-9421-20a58fb7ce26", + "version": "KqlParameterItem/1.0", + "name": "IP_Logs_Field", + "label": "Log Field with IPs", + "type": 2, + "description": "Select the field containing the IP that you want to correlate against", + "isRequired": true, + "query": "{IP_Logs_Table:value}\n| where TimeGenerated {IP_Logs_Time_Range:query}\n| getschema\n| where DataType == \"System.String\"\n| project ColumnName", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "value": "Dst_IPv4_s" + } + ], + "style": "pills", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + }, + "customWidth": "50", + "name": "parameters - 0" + }, + { + "type": 9, + "content": { + "version": "KqlParameterItem/1.0", + "parameters": [ + { + "id": "95e78560-1e69-437c-8226-7b0f8c4dc199", + "version": "KqlParameterItem/1.0", + "name": "Threat_Intelligence_Time_Range", + "label": "Data from", + "type": 4, + "isRequired": true, + "typeSettings": { + "selectableValues": [ + { + "durationMs": 300000 + }, + { + "durationMs": 900000 + }, + { + "durationMs": 1800000 + }, + { + "durationMs": 3600000 + }, + { + "durationMs": 14400000 + }, + { + "durationMs": 43200000 + }, + { + "durationMs": 86400000 + }, + { + "durationMs": 172800000 + }, + { + "durationMs": 259200000 + }, + { + "durationMs": 604800000 + }, + { + "durationMs": 1209600000 + }, + { + "durationMs": 2419200000 + }, + { + "durationMs": 2592000000 + }, + { + "durationMs": 5184000000 + }, + { + "durationMs": 7776000000 + } + ] + }, + "value": { + "durationMs": 5184000000 + } + }, + { + "id": "e7c7e2ea-f5b3-4505-b64c-b18ca8561168", + "version": "KqlParameterItem/1.0", + "name": "RF_Risk_list", + "label": "Risk List", + "type": 2, + "description": "Which IP Risk List do you want to correlate against", + "isRequired": true, + "query": "ThreatIntelligenceIndicator\n| where isnotempty(NetworkIP)\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\n| where Description contains \"Recorded Future\"\n//| summarize count() by Description\n| distinct Description\n| project output = strcat('\"', Description, '\"')\n", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "value": "\"Recorded Future - IP - Actively Communicating C&C Server\"" + } + ], + "style": "pills", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + }, + "customWidth": "50", + "name": "parameters - 1" + } + ], + "exportParameters": true + }, + "name": "group - 10" + }, + { + "type": 12, + "content": { + "version": "NotebookGroup/1.0", + "groupType": "editable", + "items": [ + { + "type": 1, + "content": { + "json": "\n### Guide: Detected IPs Per Day\n\nThe chart displays the number of correlation detections per day between IP logs and Recorded Future's IP Risk lists.", + "style": "info" + }, + "conditionalVisibility": { + "parameterName": "Help", + "comparison": "isEqualTo", + "value": "Yes" + }, + "name": "text - 0" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "ThreatIntelligenceIndicator\r\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\r\n| where Description contains {RF_Risk_list:value}\r\n| where isnotempty(Tags)\r\n| join (\r\n {IP_Logs_Table:value}\r\n | where TimeGenerated {IP_Logs_Time_Range:query}\r\n // renaming time column so it is clear the log this came from\r\n | extend IP_TimeGenerated = TimeGenerated\r\n)\r\non $left.NetworkIP == $right.{IP_Logs_Field:value}\r\n| summarize Correlation_Matches=count() by bin(IP_TimeGenerated, 1d)\r\n| render barchart", + "size": 0, + "title": "Detected IPs Per Day", + "noDataMessage": "No detected IPs", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + }, + "name": "query - 1" + } + ] + }, + "name": "group - 11" + }, + { + "type": 12, + "content": { + "version": "NotebookGroup/1.0", + "groupType": "editable", + "items": [ + { + "type": 1, + "content": { + "json": "\n### Guide: Detected IPs\n\nThe Detected IPs table lists IPs from the correlated logs that have been matched with Recorded Future IP Risk Lists.\n\n**Table Columns**\n\n* **Risk Score:** The Recorded Future Risk Score for the IP (IOC), ranging from 1 to 99, with 99 being the highest level of severity.\n* **IP:** The detected IP.\n* **Detected:** The time when the log was correlated with a Risk List.\n* **Log Created:** The time when the log event itself was created.\n* **Threat Classification:** The type of threat associated with the IP (IOC).", + "style": "info" + }, + "conditionalVisibility": { + "parameterName": "Help", + "comparison": "isEqualTo", + "value": "Yes" + }, + "name": "text - 0" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "ThreatIntelligenceIndicator\r\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\r\n| where Description contains {RF_Risk_list:value}\r\n| where isnotempty(Tags)\r\n| join (\r\n {IP_Logs_Table:value}\r\n | where TimeGenerated {IP_Logs_Time_Range:query}\r\n // renaming time column so it is clear the log this came from\r\n | extend IP_TimeGenerated = TimeGenerated\r\n)\r\non $left.NetworkIP == $right.{IP_Logs_Field:value}\r\n| project [\"Risk Score\"]=ConfidenceScore, IP=NetworkIP, Detected=format_datetime(TimeGenerated, 'yyyy-MM-dd HH:mm:ss'), [\"Log Created\"]=format_datetime(IP_TimeGenerated, 'yyyy-MM-dd HH:mm:ss'), [\"Threat Classification\"]=ThreatType\r\n| summarize [\"Log Created\"]=max([\"Log Created\"]) by IP, [\"Risk Score\"], Detected, [\"Threat Classification\"]\r\n| project [\"Risk Score\"], IP, Detected, [\"Log Created\"], [\"Threat Classification\"]\r\n| sort by [\"Risk Score\"] desc", + "size": 0, + "title": "Detected IPs", + "noDataMessage": "No detected IPs", + "exportedParameters": [ + { + "fieldName": "IP", + "parameterName": "MaliciousIPMatch", + "parameterType": 5 + } + ], + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "gridSettings": { + "formatters": [ + { + "columnMatch": "Risk", + "formatter": 18, + "formatOptions": { + "thresholdsOptions": "colors", + "thresholdsGrid": [ + { + "operator": ">=", + "thresholdValue": "90", + "representation": "redBright", + "text": "{0}{1}" + }, + { + "operator": ">=", + "thresholdValue": "65", + "representation": "orange", + "text": "{0}{1}" + }, + { + "operator": ">=", + "thresholdValue": "25", + "representation": "yellow", + "text": "{0}{1}" + }, + { + "operator": "Default", + "representation": "blue", + "text": "{0}{1}" + } + ] + } + }, + { + "columnMatch": "AdditionalInformation", + "formatter": 0, + "formatOptions": { + "customColumnWidthSetting": "100%" + } + } + ], + "sortBy": [ + { + "itemKey": "$gen_thresholds_Risk_0", + "sortOrder": 2 + } + ] + }, + "sortBy": [ + { + "itemKey": "$gen_thresholds_Risk_0", + "sortOrder": 2 + } + ] + }, + "customWidth": "70", + "name": "query - 3" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "ThreatIntelligenceIndicator\r\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\r\n| where Description contains {RF_Risk_list:value}\r\n| where isnotempty(Tags)\r\n| join (\r\n {IP_Logs_Table:value}\r\n | where TimeGenerated {IP_Logs_Time_Range:query}\r\n // renaming time column so it is clear the log this came from\r\n | extend IP_TimeGenerated = TimeGenerated\r\n)\r\non $left.NetworkIP == $right.{IP_Logs_Field:value}\r\n| project Risk=ConfidenceScore, NetworkIP, ThreatType, Tags\r\n| extend Evidence=parse_json(Tags)[0]\r\n| mv-expand Evidence = parse_json(tostring(Evidence))\r\n| extend Rule=Evidence['Rule']\r\n| summarize count() by tostring(Rule)\r\n| sort by count_ desc", + "size": 0, + "title": "Top Triggered Risk Rules", + "noDataMessage": "No triggered Risk Rules", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "gridSettings": { + "formatters": [ + { + "columnMatch": "count_", + "formatter": 8, + "formatOptions": { + "palette": "orange" + } + } + ] + } + }, + "customWidth": "30", + "name": "query - 2" + }, + { + "type": 1, + "content": { + "json": "### Detected IPs: Evidence Details\n\nTo view evidence details, click a row (IP) in the Detected IPs table." + }, + "name": "text - 3" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "ThreatIntelligenceIndicator\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\n| where Description contains {RF_Risk_list:value}\n| where NetworkIP == \"{MaliciousIPMatch}\"\n| where isnotempty(Tags)\n//| where ExpirationDateTime > now()\n| extend Evidence=parse_json(Tags)[0]\n| take 1\n| mv-expand Evidence = parse_json(tostring(Evidence))\n| project Rules = Evidence['Rule'], Criticality = Evidence['Criticality'], Evidence_String = Evidence['EvidenceString']\n| sort by toint(Criticality) desc", + "size": 1, + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "gridSettings": { + "formatters": [ + { + "columnMatch": "Evidence_String", + "formatter": 0, + "formatOptions": { + "customColumnWidthSetting": "100%" + } + } + ] + } + }, + "conditionalVisibility": { + "parameterName": "MaliciousIPMatch", + "comparison": "isNotEqualTo" + }, + "name": "query - 5" + }, + { + "type": 1, + "content": { + "json": "\n### Source data from {IP_Logs_Table:value}\nTo view source data of correlated IP, click a row (IP) in the Detected IPs table." + }, + "name": "text - 5" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "{IP_Logs_Table:value}\n| where TimeGenerated {IP_Logs_Time_Range:query}\n| where {IP_Logs_Field:value} == \"{MaliciousIPMatch}\"\n", + "size": 1, + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + }, + "conditionalVisibility": { + "parameterName": "MaliciousIPMatch", + "comparison": "isNotEqualTo" + }, + "name": "query - 9" + } + ] + }, + "name": "group - 11" + } + ], + "styleSettings": { + "paddingStyle": "wide" + }, + "fromTemplateId": "sentinel-RecordedFutureIPCorrelationWorkbook", + "$schema": "https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json" +} \ No newline at end of file diff --git a/Solutions/Recorded Future/Workbooks/RecordedFuturePlaybookAlertOverview.json b/Solutions/Recorded Future/Workbooks/RecordedFuturePlaybookAlertOverview.json new file mode 100644 index 00000000000..143c8adbb33 --- /dev/null +++ b/Solutions/Recorded Future/Workbooks/RecordedFuturePlaybookAlertOverview.json @@ -0,0 +1,263 @@ +{ + "version": "Notebook/1.0", + "items": [ + { + "type": 1, + "content": { + "json": "## Recorded Future Playbook Alerts\n---\n\nWorkbook to display and analyze Recorded Future Playbook Alerts. This workbook visualize data that is retrived by the ```Recorded Future Playbook Alerts Importer``` Logic app. First run the Logic app once and then select the RecordedFuturePlaybookAlerts_CL table.", + "style": "info" + }, + "name": "text - 2" + }, + { + "type": 9, + "content": { + "version": "KqlParameterItem/1.0", + "parameters": [ + { + "id": "8e8c2f1a-d25d-49d1-a217-9831dbc4f919", + "version": "KqlParameterItem/1.0", + "name": "time_picker", + "label": "Time Picker", + "type": 4, + "isRequired": true, + "typeSettings": { + "selectableValues": [ + { + "durationMs": 300000 + }, + { + "durationMs": 900000 + }, + { + "durationMs": 1800000 + }, + { + "durationMs": 3600000 + }, + { + "durationMs": 14400000 + }, + { + "durationMs": 43200000 + }, + { + "durationMs": 86400000 + }, + { + "durationMs": 172800000 + }, + { + "durationMs": 259200000 + }, + { + "durationMs": 604800000 + }, + { + "durationMs": 1209600000 + }, + { + "durationMs": 2419200000 + }, + { + "durationMs": 2592000000 + }, + { + "durationMs": 5184000000 + }, + { + "durationMs": 7776000000 + } + ] + }, + "timeContext": { + "durationMs": 86400000 + }, + "value": { + "durationMs": 259200000 + } + }, + { + "id": "f8d34a51-ba10-4241-abff-cb6c14b50a55", + "version": "KqlParameterItem/1.0", + "name": "log_table", + "label": "Playbook Alerts Log Table", + "type": 2, + "description": "Run the Recorded Future Playbook Alert Importer Playbook first.", + "isRequired": true, + "query": "search *\n| where $table endswith \"_CL\" \n| distinct $table\n", + "timeContext": { + "durationMs": 604800000 + }, + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "value": "RecordedFuturePlaybookAlerts_CL" + }, + { + "id": "89279a9c-af9e-4734-8a98-21aa1f2fa545", + "version": "KqlParameterItem/1.0", + "name": "categories", + "label": "Category", + "type": 2, + "description": "Filter categories you're looking at", + "multiSelect": true, + "quote": "'", + "delimiter": ",", + "query": "{log_table}\n| distinct rule_label_s", + "typeSettings": { + "additionalResourceOptions": [ + "value::all" + ], + "showDefault": false + }, + "timeContext": { + "durationMs": 0 + }, + "timeContextFromParameter": "time_picker", + "defaultValue": "value::all", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + }, + { + "id": "a0947450-1ebd-4dea-94d7-41a751c79237", + "version": "KqlParameterItem/1.0", + "name": "status", + "label": "Alert Status", + "type": 2, + "multiSelect": true, + "quote": "'", + "delimiter": ",", + "query": "{log_table}\n| distinct status_s", + "typeSettings": { + "additionalResourceOptions": [ + "value::all" + ], + "showDefault": false + }, + "defaultValue": "value::all", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + }, + { + "id": "25a82661-1700-43a6-ba7a-b3ae5d8fe7b9", + "version": "KqlParameterItem/1.0", + "name": "priority", + "label": "Alert Priority", + "type": 2, + "multiSelect": true, + "quote": "'", + "delimiter": ",", + "query": "{log_table}\n| distinct priority_s", + "typeSettings": { + "additionalResourceOptions": [ + "value::all" + ], + "showDefault": false + }, + "timeContext": { + "durationMs": 172800000 + }, + "timeContextFromParameter": "time_picker", + "defaultValue": "value::all", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + } + ], + "style": "pills", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + }, + "name": "parameters - 2" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "{log_table:value}\n| where rule_label_s in ({categories:value})\n| where status_s in ({status:value}) \n| where priority_s in ({priority:value})\n| distinct id_s, rule_label_s, updated_date_t\n| summarize alert_count = count() by rule_label_s\n| project alert_count, Alert = rule_label_s", + "size": 0, + "title": "Top Categories Triggered", + "timeContextFromParameter": "time_picker", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "visualization": "piechart" + }, + "customWidth": "50", + "name": "query - 2", + "styleSettings": { + "maxWidth": "30" + } + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "{log_table:value}\n| where rule_label_s in ({categories:value})\n| where status_s in ({status:value}) \n| where priority_s in ({priority:value})\n| distinct id_s, rule_label_s, updated_date_t\n| summarize Alert=count() by bin(updated_date_t, 1h)\n", + "size": 0, + "title": "Playbook Alerts triggered over time", + "timeContextFromParameter": "time_picker", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "visualization": "categoricalbar" + }, + "customWidth": "50", + "name": "query - 2 - Copy", + "styleSettings": { + "maxWidth": "70" + } + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "{log_table:value}\n| where rule_label_s in ({categories:value})\n| where status_s in ({status:value}) \n| where priority_s in ({priority:value})\n| distinct updated_date_t, title_s, rule_label_s, status_s, priority_s, link_s, evidence_summary_s, targets_s, created_date_t, id_s\n| project-rename Updated=updated_date_t, Title=title_s, Category=rule_label_s, Status=status_s, Priority=priority_s, Created=created_date_t, Targets=targets_s, [\"Evidence\"]=evidence_summary_s, [\"External Link\"]=link_s, ID=id_s\n\n", + "size": 0, + "title": "Triggered Playbook Alerts", + "noDataMessage": "No data in Playbook Alert custom log. Check that playbook/logic apps is running without errors and rules for playbook alerts is setup in Recorded Future Portal.", + "timeContextFromParameter": "time_picker", + "exportFieldName": "id_s", + "exportParameterName": "exported_alert_id", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "gridSettings": { + "formatters": [ + { + "columnMatch": "Title", + "formatter": 7, + "formatOptions": { + "linkTarget": "GenericDetails", + "linkIsContextBlade": true + } + }, + { + "columnMatch": "Link", + "formatter": 7, + "formatOptions": { + "linkTarget": "Url", + "linkLabel": "Recorded Future" + } + }, + { + "columnMatch": "ID", + "formatter": 5 + } + ], + "sortBy": [ + { + "itemKey": "Updated", + "sortOrder": 2 + } + ] + }, + "sortBy": [ + { + "itemKey": "Updated", + "sortOrder": 2 + } + ] + }, + "name": "query - 8" + } + ], + "fromTemplateId": "sentinel-RecordedFuturePlaybookAlertOverview", + "$schema": "https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json" +} \ No newline at end of file diff --git a/Solutions/Recorded Future/Workbooks/RecordedFutureURLCorrelation.json b/Solutions/Recorded Future/Workbooks/RecordedFutureURLCorrelation.json new file mode 100644 index 00000000000..bc64db21dd0 --- /dev/null +++ b/Solutions/Recorded Future/Workbooks/RecordedFutureURLCorrelation.json @@ -0,0 +1,444 @@ +{ + "version": "Notebook/1.0", + "items": [ + { + "type": 9, + "content": { + "version": "KqlParameterItem/1.0", + "parameters": [ + { + "id": "d7ccc5ca-c8ec-458f-ab0d-564a7ef1d217", + "version": "KqlParameterItem/1.0", + "name": "Help", + "label": "Show Guide", + "type": 10, + "isRequired": true, + "jsonData": "[\n {\"value\": \"Yes\", \"label\": \"Yes\", \"selected\":true},\n {\"value\": \"No\", \"label\": \"No\"}\n]", + "timeContext": { + "durationMs": 86400000 + }, + "value": "No" + } + ], + "style": "pills", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + }, + "name": "parameters - 7" + }, + { + "type": 1, + "content": { + "json": "### Guide: URL Correlation \n\nRecorded Future’s URL Correlation Workbook helps you detect malicious URLs within your environment by correlating your logs with Recorded Future URL Risk Lists.\n\n### How to Correlate URLs\n\nTo correlate URLs, follow the steps below:\n\n1. In the **URL Logs Table** dropdown, select a log table that contains URL logs.\n\t* If a particular log table is not listed in the dropdown, ensure it is enabled in your environment.\n2. In the **Log field with URLs** dropdown, select the log field that holds the URLs to be correlated.\n\t* The workbook can correlate URLs in the format: `https://testurl.here.net`.\n3. Select a Recorded Future URL Risk List for correlation.\n4. If necessary, adjust the values in the **Logs from** and **Data from** dropdowns to match your requirements.\n5. Done\n\n---\n\n#### Log table with examples of correlatable log fields\n\n| Table | Field |\n|-------------------|------------|\n| CommonSecurityLog | RequestURL |", + "style": "info" + }, + "conditionalVisibility": { + "parameterName": "Help", + "comparison": "isEqualTo", + "value": "Yes" + }, + "name": "text - 11" + }, + { + "type": 12, + "content": { + "version": "NotebookGroup/1.0", + "groupType": "editable", + "items": [ + { + "type": 1, + "content": { + "json": "### URL (from logs)" + }, + "customWidth": "50", + "name": "text - 2" + }, + { + "type": 1, + "content": { + "json": "### Recorded Future Risk List" + }, + "customWidth": "50", + "name": "text - 3" + }, + { + "type": 9, + "content": { + "version": "KqlParameterItem/1.0", + "parameters": [ + { + "id": "b91b8b5b-10cf-4106-99e2-793eb0d72dce", + "version": "KqlParameterItem/1.0", + "name": "URL_Logs_Time_Range", + "label": "Logs from", + "type": 4, + "isRequired": true, + "typeSettings": { + "selectableValues": [ + { + "durationMs": 300000 + }, + { + "durationMs": 900000 + }, + { + "durationMs": 1800000 + }, + { + "durationMs": 3600000 + }, + { + "durationMs": 14400000 + }, + { + "durationMs": 43200000 + }, + { + "durationMs": 86400000 + }, + { + "durationMs": 172800000 + }, + { + "durationMs": 259200000 + }, + { + "durationMs": 604800000 + }, + { + "durationMs": 1209600000 + }, + { + "durationMs": 2419200000 + }, + { + "durationMs": 2592000000 + }, + { + "durationMs": 5184000000 + }, + { + "durationMs": 7776000000 + } + ] + }, + "timeContext": { + "durationMs": 86400000 + }, + "value": { + "durationMs": 7776000000 + } + }, + { + "id": "3300ad41-acbc-4ebd-900a-c6ab250b7c73", + "version": "KqlParameterItem/1.0", + "name": "URL_Logs_Table", + "label": "URL Logs Table", + "type": 2, + "description": "Log Table to correlate URLs Against", + "isRequired": true, + "query": "search \"*\" \n| where TimeGenerated {URL_Logs_Time_Range:query}\n| summarize count() by $table | sort by count_ desc | where $table != \"ThreatIntelligenceIndicator\" | project $table\n", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "value": "Squid_Proxy_URL_CL" + }, + { + "id": "f4f77ada-b97c-4a82-9421-20a58fb7ce26", + "version": "KqlParameterItem/1.0", + "name": "URL_Logs_Field", + "label": "Log Field with URLs", + "type": 2, + "description": "Select the field containing the URL that you want to correlate against", + "isRequired": true, + "query": "{URL_Logs_Table:value}\n| getschema\n| where DataType == \"System.String\"\n| project ColumnName", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "value": "URL_s" + } + ], + "style": "pills", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + }, + "customWidth": "50", + "name": "parameters - 0" + }, + { + "type": 9, + "content": { + "version": "KqlParameterItem/1.0", + "parameters": [ + { + "id": "95e78560-1e69-437c-8226-7b0f8c4dc199", + "version": "KqlParameterItem/1.0", + "name": "Threat_Intelligence_Time_Range", + "label": "Data from", + "type": 4, + "isRequired": true, + "typeSettings": { + "selectableValues": [ + { + "durationMs": 300000 + }, + { + "durationMs": 900000 + }, + { + "durationMs": 1800000 + }, + { + "durationMs": 3600000 + }, + { + "durationMs": 14400000 + }, + { + "durationMs": 43200000 + }, + { + "durationMs": 86400000 + }, + { + "durationMs": 172800000 + }, + { + "durationMs": 259200000 + }, + { + "durationMs": 604800000 + }, + { + "durationMs": 1209600000 + }, + { + "durationMs": 2419200000 + }, + { + "durationMs": 2592000000 + }, + { + "durationMs": 5184000000 + }, + { + "durationMs": 7776000000 + } + ] + }, + "value": { + "durationMs": 7776000000 + } + }, + { + "id": "e7c7e2ea-f5b3-4505-b64c-b18ca8561168", + "version": "KqlParameterItem/1.0", + "name": "RF_Risk_list", + "label": "Risk List", + "type": 2, + "description": "Which Domain Risk List do you want to correlate against", + "isRequired": true, + "query": "ThreatIntelligenceIndicator\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\n| where isnotempty(Url)\n| where Description contains \"Recorded Future\"\n| summarize count() by Description\n| project output = strcat('\"', Description, '\"')\n", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "value": "\"Recorded Future - URL - Recently Reported by Insikt Group\"" + } + ], + "style": "pills", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + }, + "customWidth": "50", + "name": "parameters - 1" + } + ], + "exportParameters": true + }, + "name": "group - 10" + }, + { + "type": 12, + "content": { + "version": "NotebookGroup/1.0", + "groupType": "editable", + "items": [ + { + "type": 1, + "content": { + "json": "\n### Guide: Detected URLs Per Day\n\nThe chart displays the number of correlation detections per day between URL logs and Recorded Future's URL Risk lists.", + "style": "info" + }, + "conditionalVisibility": { + "parameterName": "Help", + "comparison": "isEqualTo", + "value": "Yes" + }, + "name": "text - 0" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "ThreatIntelligenceIndicator\r\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\r\n| where Description contains {RF_Risk_list:value}\r\n| where isnotempty(Tags)\r\n| join (\r\n {URL_Logs_Table:value}\r\n | where TimeGenerated {URL_Logs_Time_Range:query}\r\n // renaming time column so it is clear the log this came from\r\n | extend URL_TimeGenerated = TimeGenerated\r\n)\r\non $left.Url == $right.{URL_Logs_Field:value}\r\n| summarize Correlation_Matches=count() by bin(URL_TimeGenerated, 1d)\r\n| render barchart", + "size": 0, + "title": "Detected URLs Per Day", + "noDataMessage": "No detected URLs", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + }, + "name": "query - 1" + } + ] + }, + "name": "group - 11" + }, + { + "type": 12, + "content": { + "version": "NotebookGroup/1.0", + "groupType": "editable", + "items": [ + { + "type": 1, + "content": { + "json": "\n### Guide: Detected URLs\n\nThe Detected URLs table lists URLs from the correlated logs that have been matched with Recorded Future URL Risk Lists.\n\n**Table Columns**\n\n* **Risk Score:** The Recorded Future Risk Score for the URL (IOC), ranging from 1 to 99, with 99 being the highest level of severity.\n* **URL:** The detected URL.\n* **Detected:** The time when the log was correlated with a Risk List.\n* **Log Created:** The time when the log event itself was created.\n* **Threat Classification:** The type of threat associated with the URL (IOC).", + "style": "info" + }, + "conditionalVisibility": { + "parameterName": "Help", + "comparison": "isEqualTo", + "value": "Yes" + }, + "name": "text - 0" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "ThreatIntelligenceIndicator\r\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\r\n| where Description contains {RF_Risk_list:value}\r\n| where isnotempty(Tags)\r\n| join (\r\n {URL_Logs_Table:value}\r\n | where TimeGenerated {URL_Logs_Time_Range:query}\r\n // renaming time column so it is clear the log this came from\r\n | extend IP_TimeGenerated = TimeGenerated\r\n)\r\non $left.Url == $right.{URL_Logs_Field:value}\r\n| project [\"Risk Score\"]=ConfidenceScore, URL=Url, Detected = format_datetime(TimeGenerated, 'yyyy-MM-dd HH:mm:ss'), [\"Log Created\"] = IP_TimeGenerated, [\"Threat Classification\"]=ThreatType\r\n| summarize [\"Log Created\"]=max([\"Log Created\"]) by URL, [\"Risk Score\"], Detected, [\"Threat Classification\"]\r\n| project [\"Risk Score\"], URL, Detected, [\"Log Created\"], [\"Threat Classification\"]\r\n| sort by [\"Risk Score\"] desc\r\n", + "size": 0, + "title": "Detected URLs", + "noDataMessage": "No detected URLs", + "exportFieldName": "URL", + "exportParameterName": "MaliciousURLMatch", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "gridSettings": { + "formatters": [ + { + "columnMatch": "Risk", + "formatter": 18, + "formatOptions": { + "thresholdsOptions": "colors", + "thresholdsGrid": [ + { + "operator": ">=", + "thresholdValue": "90", + "representation": "redBright", + "text": "{0}{1}" + }, + { + "operator": ">=", + "thresholdValue": "65", + "representation": "orange", + "text": "{0}{1}" + }, + { + "operator": ">=", + "thresholdValue": "25", + "representation": "yellow", + "text": "{0}{1}" + }, + { + "operator": "Default", + "representation": "blue", + "text": "{0}{1}" + } + ] + } + } + ] + } + }, + "customWidth": "70", + "name": "query - 3" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "ThreatIntelligenceIndicator\r\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\r\n| where Description contains {RF_Risk_list:value}\r\n| where isnotempty(Tags)\r\n| join (\r\n {URL_Logs_Table:value}\r\n | where TimeGenerated {URL_Logs_Time_Range:query}\r\n // renaming time column so it is clear the log this came from\r\n | extend URL_TimeGenerated = TimeGenerated\r\n)\r\non $left.Url == $right.{URL_Logs_Field:value}\r\n| project Risk=ConfidenceScore, Url, ThreatType, Tags\r\n| extend Evidence=parse_json(Tags)[0]\r\n| mv-expand Evidence = parse_json(tostring(Evidence))\r\n| extend Rule=Evidence['Rule']\r\n| summarize count() by tostring(Rule)\r\n| sort by count_ desc\r\n\r\n", + "size": 0, + "title": "Top Triggered Risk Rules", + "noDataMessage": "No triggered Risk Rules", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces", + "gridSettings": { + "formatters": [ + { + "columnMatch": "count_", + "formatter": 8, + "formatOptions": { + "palette": "orange" + } + } + ] + } + }, + "customWidth": "30", + "name": "query - 2" + }, + { + "type": 1, + "content": { + "json": "### Detected URLs: Evidence Details\n\nTo view evidence details, click a row (URL) in the Detected URLs table." + }, + "name": "text - 3" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "ThreatIntelligenceIndicator\n| where TimeGenerated {Threat_Intelligence_Time_Range:query}\n| where Description contains {RF_Risk_list}\n| where Url == \"{MaliciousURLMatch}\"\n| where isnotempty(Tags)\n//| where ExpirationDateTime > now()\n| extend Evidence=parse_json(Tags)[0]\n| take 1\n| mv-expand Evidence = parse_json(tostring(Evidence))\n| project Rules = Evidence['Rule'], Criticality = Evidence['Criticality'], Evidence_String = Evidence['EvidenceString']\n| sort by toint(Criticality) desc", + "size": 1, + "noDataMessage": "ExpirationDateTime", + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + }, + "conditionalVisibility": { + "parameterName": "MaliciousURLMatch", + "comparison": "isNotEqualTo" + }, + "name": "query - 5" + }, + { + "type": 1, + "content": { + "json": "\n### Source data from {URL_Logs_Table:value}\nTo view source data of correlated URL, click a row (URL) in the Detected URLs table." + }, + "name": "text - 5" + }, + { + "type": 3, + "content": { + "version": "KqlItem/1.0", + "query": "{URL_Logs_Table:value}\n| where TimeGenerated {URL_Logs_Time_Range:query}\n| where {URL_Logs_Field:value} == \"{MaliciousURLMatch}\"\n", + "size": 1, + "queryType": 0, + "resourceType": "microsoft.operationalinsights/workspaces" + }, + "conditionalVisibility": { + "parameterName": "MaliciousURLMatch", + "comparison": "isNotEqualTo" + }, + "name": "query - 6" + } + ] + }, + "name": "group - 10" + } + ], + "styleSettings": { + "paddingStyle": "wide" + }, + "fromTemplateId": "sentinel-RecordedFutureURLCorrelationWorkbook", + "$schema": "https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json" +} \ No newline at end of file diff --git a/Solutions/Recorded Future/readme.md b/Solutions/Recorded Future/readme.md new file mode 100644 index 00000000000..ea95d7b645d --- /dev/null +++ b/Solutions/Recorded Future/readme.md @@ -0,0 +1,17 @@ +[Recorded Future](https://www.recordedfuture.com/) +# Recorded Future Intelligence for Microsoft Sentinel + +Instructions how to install and use Recorded Future Solution for Microsoft Sentinel or how to install individual playbooks kan be found in the [ main readme.md](playbooks/readme.md) in the Playbook subdirectory in this repository. + +Recorded Future also provide standalone Playbooks in this repository for EntraID (identity) and Defender for endpoints: + +**Recorded Future Sentinel Solution** +- [Installation guide](playbooks/readme.md) + +**Recorded Future Defender Integrations** +- [Recorded Future Defender playbooks](../../Playbooks/RecordedFuture-Block-IPs-and-Domains-on-Microsoft-Defender-for-Endpoint/) +- [Recorded Future Defender SCF playbooks](../../Playbooks/RecordedFuture_IP_SCF/) + +**Recorded Future for Identity** +- [Recorded Future Identity](../Recorded%20Future%20Identity/Playbooks/readme.md) + diff --git a/Tools/Create-Azure-Sentinel-Solution/V2/WorkbookMetadata/WorkbooksMetadata.json b/Tools/Create-Azure-Sentinel-Solution/V2/WorkbookMetadata/WorkbooksMetadata.json index ce139b613b6..3e3513c1fb7 100644 --- a/Tools/Create-Azure-Sentinel-Solution/V2/WorkbookMetadata/WorkbooksMetadata.json +++ b/Tools/Create-Azure-Sentinel-Solution/V2/WorkbookMetadata/WorkbooksMetadata.json @@ -5533,4 +5533,4 @@ "templateRelativePath": "DataminrPulseAlerts.json", "provider": "Dataminr" } -] +] \ No newline at end of file diff --git a/Workbooks/Images/Logos/greynoise_logomark_black.svg b/Workbooks/Images/Logos/greynoise_logomark_black.svg new file mode 100644 index 00000000000..12c2e131372 --- /dev/null +++ b/Workbooks/Images/Logos/greynoise_logomark_black.svg @@ -0,0 +1,42 @@ + + + + + + + + + + + + + + + + + + + + + diff --git a/Workbooks/Images/Preview/GreyNoiseOverviewBlack.png b/Workbooks/Images/Preview/GreyNoiseOverviewBlack.png new file mode 100644 index 00000000000..79d9cb60c45 Binary files /dev/null and b/Workbooks/Images/Preview/GreyNoiseOverviewBlack.png differ diff --git a/Workbooks/Images/Preview/GreyNoiseOverviewWhite.png b/Workbooks/Images/Preview/GreyNoiseOverviewWhite.png new file mode 100644 index 00000000000..14c534e9a70 Binary files /dev/null and b/Workbooks/Images/Preview/GreyNoiseOverviewWhite.png differ diff --git a/Workbooks/Images/Preview/RecordedFutureAlertOverviewBlack.png b/Workbooks/Images/Preview/RecordedFutureAlertOverviewBlack.png new file mode 100644 index 00000000000..575a9e1a0bd Binary files /dev/null and b/Workbooks/Images/Preview/RecordedFutureAlertOverviewBlack.png differ diff --git a/Workbooks/Images/Preview/RecordedFutureAlertOverviewWhite.png b/Workbooks/Images/Preview/RecordedFutureAlertOverviewWhite.png new file mode 100644 index 00000000000..776e7ba6d2a Binary files /dev/null and b/Workbooks/Images/Preview/RecordedFutureAlertOverviewWhite.png differ diff --git a/Workbooks/Images/Preview/RecordedFutureDomainCorrelationBlack.png b/Workbooks/Images/Preview/RecordedFutureDomainCorrelationBlack.png new file mode 100644 index 00000000000..84056416677 Binary files /dev/null and b/Workbooks/Images/Preview/RecordedFutureDomainCorrelationBlack.png differ diff --git a/Workbooks/Images/Preview/RecordedFutureDomainCorrelationWhite.png b/Workbooks/Images/Preview/RecordedFutureDomainCorrelationWhite.png new file mode 100644 index 00000000000..0867027c94c Binary files /dev/null and b/Workbooks/Images/Preview/RecordedFutureDomainCorrelationWhite.png differ diff --git a/Workbooks/Images/Preview/RecordedFutureHashCorrelationBlack.png b/Workbooks/Images/Preview/RecordedFutureHashCorrelationBlack.png new file mode 100644 index 00000000000..814b1000ccd Binary files /dev/null and b/Workbooks/Images/Preview/RecordedFutureHashCorrelationBlack.png differ diff --git a/Workbooks/Images/Preview/RecordedFutureHashCorrelationWhite.png b/Workbooks/Images/Preview/RecordedFutureHashCorrelationWhite.png new file mode 100644 index 00000000000..68896a81627 Binary files /dev/null and b/Workbooks/Images/Preview/RecordedFutureHashCorrelationWhite.png differ diff --git a/Workbooks/Images/Preview/RecordedFutureIPCorrelationBlack.png b/Workbooks/Images/Preview/RecordedFutureIPCorrelationBlack.png new file mode 100644 index 00000000000..f356f10587f Binary files /dev/null and b/Workbooks/Images/Preview/RecordedFutureIPCorrelationBlack.png differ diff --git a/Workbooks/Images/Preview/RecordedFutureIPCorrelationWhite.png b/Workbooks/Images/Preview/RecordedFutureIPCorrelationWhite.png new file mode 100644 index 00000000000..ff3a4b5266f Binary files /dev/null and b/Workbooks/Images/Preview/RecordedFutureIPCorrelationWhite.png differ diff --git a/Workbooks/Images/Preview/RecordedFuturePlaybookAlertOverviewBlack1.png b/Workbooks/Images/Preview/RecordedFuturePlaybookAlertOverviewBlack1.png new file mode 100644 index 00000000000..6a4d04183bf Binary files /dev/null and b/Workbooks/Images/Preview/RecordedFuturePlaybookAlertOverviewBlack1.png differ diff --git a/Workbooks/Images/Preview/RecordedFuturePlaybookAlertOverviewWhite1.png b/Workbooks/Images/Preview/RecordedFuturePlaybookAlertOverviewWhite1.png new file mode 100644 index 00000000000..55a91554e38 Binary files /dev/null and b/Workbooks/Images/Preview/RecordedFuturePlaybookAlertOverviewWhite1.png differ diff --git a/Workbooks/Images/Preview/RecordedFutureUrlCorrelationBlack.png b/Workbooks/Images/Preview/RecordedFutureUrlCorrelationBlack.png new file mode 100644 index 00000000000..e1429a00277 Binary files /dev/null and b/Workbooks/Images/Preview/RecordedFutureUrlCorrelationBlack.png differ diff --git a/Workbooks/Images/Preview/RecordedFutureUrlCorrelationWhite.png b/Workbooks/Images/Preview/RecordedFutureUrlCorrelationWhite.png new file mode 100644 index 00000000000..06cea3d4bd7 Binary files /dev/null and b/Workbooks/Images/Preview/RecordedFutureUrlCorrelationWhite.png differ diff --git a/Workbooks/WorkbooksMetadata.json b/Workbooks/WorkbooksMetadata.json index dffcfa68a61..a015e8b4fa4 100644 --- a/Workbooks/WorkbooksMetadata.json +++ b/Workbooks/WorkbooksMetadata.json @@ -4681,36 +4681,6 @@ "subtitle": "", "provider": "Darktrace" }, -{ - "workbookKey": "RecordedFutureDomainC2DNSWorkbook", - "logoFileName": "RecordedFuture.svg", - "description": "Sets the time name for DNS Events and Threat Intelligence Time Range", - "dataTypesDependencies": [ - "ThreatIntelligenceIndicator" - ], - "dataConnectorsDependencies": [], - "previewImagesFileNames": [""], - "version": "1.0.0", - "title": "Recorded Future - C&C DNS Name to DNS Events - Correlation&Threat Hunting", - "templateRelativePath": "Recorded Future - C&C DNS Name to DNS Events - Correlation&Threat Hunting.json", - "subtitle": "", - "provider": "Recorded Future" -}, -{ - "workbookKey": "RecordedFutureIPActiveC2Workbook", - "logoFileName": "RecordedFuture.svg", - "description": "Sets the time name for DNS Events and Threat Intelligence Time Range", - "dataTypesDependencies": [ - "ThreatIntelligenceIndicator" - ], - "dataConnectorsDependencies": [], - "previewImagesFileNames": [""], - "version": "1.0.0", - "title": "Recorded Future - Actively Communicating C&C IPs to DNS Events - Correlation&Threat Hunting", - "templateRelativePath": "Recorded Future - Actively Communicating C&C IPs to DNS Events - Correlation&Threat Hunting.json", - "subtitle": "", - "provider": "Recorded Future" -}, { "workbookKey": "MaturityModelForEventLogManagement_M2131", "logoFileName": "contrastsecurity_logo.svg", @@ -6647,7 +6617,27 @@ "domains": [ "IT Operations" ] -} + } +}, +{ + "workbookKey": "GreyNoiseIntellegenceOverviewWorkbook", + "logoFileName": "greynoise_logomark_black.svg", + "description": "This workbook provides visualization of GreyNoise Intelligence threat indicators which are ingested in the Microsoft Sentinel Threat intelligence.", + "dataTypesDependencies": [ + "ThreatIntelligenceIndicator" + ], + "dataConnectorsDependencies": [ + "GreyNoise2SentinelAPI" + ], + "previewImagesFileNames": [ + "GreyNoiseOverviewWhite.png", + "GreyNoiseOverviewBlack.png" + ], + "version": "1.0", + "title": "GreyNoise Intelligence Threat Indicators", + "templateRelativePath": "GreyNoiseOverview.json", + "subtitle": "", + "provider": "GreyNoise Intelligence, Inc." }, { "workbookKey": "WizFindingsWorkbook", @@ -6674,5 +6664,113 @@ "templateRelativePath": "WizFindings.json", "subtitle": "", "provider": "Wiz" +}, +{ + "workbookKey": "RecordedFutureAlertOverviewWorkbook", + "logoFileName": "RecordedFuture.svg", + "description": "Recorded Future Alerts Overview Workbook. This workbook will visualize playbook alerts imported via the RecordedFuture-Alert-Importer.", + "dataTypesDependencies": [ + "RecordedFuturePortalAlerts_CL" + ], + "dataConnectorsDependencies": [], + "previewImagesFileNames": [ + "RecordedFutureAlertOverviewWhite.png", + "RecordedFutureAlertOverviewBlack.png" + ], + "version": "1.0.0", + "title": "Recorded Future - Alerts Overview", + "templateRelativePath": "RecordedFutureAlertOverview.json", + "subtitle": "", + "provider": "Recorded Future" +}, +{ + "workbookKey": "RecordedFuturePlaybookAlertOverviewWorkbook", + "logoFileName": "RecordedFuture.svg", + "description": "Recorded Future Playbook Alerts Overview Workbook. This workbook will visualize playbook alerts imported via the RecordedFuture-Playbook-Alert-Importer.", + "dataTypesDependencies": [ + "RecordedFuturePlaybookAlerts_CL" + ], + "dataConnectorsDependencies": [], + "previewImagesFileNames": [ + "RecordedFuturePlaybookAlertOverviewWhite1.png", + "RecordedFuturePlaybookAlertOverviewBlack1.png" + ], + "version": "1.0.0", + "title": "Recorded Future - Playbook Alerts Overview", + "templateRelativePath": "RecordedFuturePlaybookAlertOverview.json", + "subtitle": "", + "provider": "Recorded Future" +}, +{ + "workbookKey": "RecordedFutureDomainCorrelationWorkbook", + "logoFileName": "RecordedFuture.svg", + "description": "Recorded Future Domain Correlation Workbook. This workbook will visualize Recorded Future threat intelligence data together with infrastructure logs ingested in to Sentinel.", + "dataTypesDependencies": [ + "ThreatIntelligenceIndicator" + ], + "dataConnectorsDependencies": [], + "previewImagesFileNames": [ + "RecordedFutureDomainCorrelationWhite.png", + "RecordedFutureDomainCorrelationBlack.png" + ], + "version": "1.0.1", + "title": "Recorded Future - Domain Correlation", + "templateRelativePath": "RecordedFutureDomainCorrelation.json", + "subtitle": "", + "provider": "Recorded Future" +}, +{ + "workbookKey": "RecordedFutureHashCorrelationWorkbook", + "logoFileName": "RecordedFuture.svg", + "description": "Recorded Future Hash Correlation Workbook. This workbook will visualize Recorded Future threat intelligence data together with infrastructure logs ingested in to Sentinel.", + "dataTypesDependencies": [ + "ThreatIntelligenceIndicator" + ], + "dataConnectorsDependencies": [], + "previewImagesFileNames": [ + "RecordedFutureHashCorrelationWhite.png", + "RecordedFutureHashCorrelationBlack.png" + ], + "version": "1.0.1", + "title": "Recorded Future - Hash Correlation", + "templateRelativePath": "RecordedFutureHashCorrelation.json", + "subtitle": "", + "provider": "Recorded Future" +}, +{ + "workbookKey": "RecordedFutureIPCorrelationWorkbook", + "logoFileName": "RecordedFuture.svg", + "description": "Recorded Future IP Correlation Workbook. This workbook will visualize Recorded Future threat intelligence data together with infrastructure logs ingested in to Sentinel.", + "dataTypesDependencies": [ + "ThreatIntelligenceIndicator" + ], + "dataConnectorsDependencies": [], + "previewImagesFileNames": [ + "RecordedFutureIPCorrelationWhite.png", + "RecordedFutureIPCorrelationBlack.png" + ], + "version": "1.0.1", + "title": "Recorded Future - IP Correlation", + "templateRelativePath": "RecordedFutureIPCorrelation.json", + "subtitle": "", + "provider": "Recorded Future" +}, +{ + "workbookKey": "RecordedFutureURLCorrelationWorkbook", + "logoFileName": "RecordedFuture.svg", + "description": "Recorded Future URL Correlation Workbook. This workbook will visualize Recorded Future threat intelligence data together with infrastructure logs ingested in to Sentinel.", + "dataTypesDependencies": [ + "ThreatIntelligenceIndicator" + ], + "dataConnectorsDependencies": [], + "previewImagesFileNames": [ + "RecordedFutureUrlCorrelationWhite.png", + "RecordedFutureUrlCorrelationBlack.png" + ], + "version": "1.0.1", + "title": "Recorded Future - URL Correlation", + "templateRelativePath": "RecordedFutureURLCorrelation.json", + "subtitle": "", + "provider": "Recorded Future" } -] +] \ No newline at end of file