mirror of
https://github.com/valitydev/signature-base.git
synced 2024-11-06 18:15:20 +00:00
OTX Feed Update
This commit is contained in:
parent
699b322d89
commit
c7f3f6ff41
File diff suppressed because it is too large
Load Diff
@ -0,0 +1,14 @@
|
||||
2001:da8:253:8::8;The Chinese People\u2019s Liberation Army Signals Intelligence and Cyber Reconnaissance Infrastructure
|
||||
2604:5800:0:23::8;APT-28
|
||||
2400:cb00:2048:1::681c:41c;IoC Sharing - November 2017
|
||||
2400:cb00:2048:1::681c:51c;IoC Sharing - November 2017
|
||||
2400:cb00:2048:1::681b:9d87;IoCs from ThreatConnect https://app.threatconnect.com
|
||||
2400:cb00:2048:1::681b:9c87;IoCs from ThreatConnect https://app.threatconnect.com
|
||||
2400:cb00:2048:1::681c:1133;IoC Sharing 2017-October
|
||||
2400:cb00:2048:1::681c:1033;IoC Sharing 2017-October
|
||||
2400:cb00:2048:1::681c:d68;IoC Sharing 2017-October
|
||||
2400:cb00:2048:1::681c:c68;IoC Sharing 2017-October
|
||||
2a03:6f00:1::b039:d227;IoC Sharing 2017-October
|
||||
::ffff:182.184.78.244;WannaCry/Wcry Ransomware https://www.virustotal.com/en/file/f01644082db3fa50ba9f4773f11f062ab785c9db02a3a
|
||||
::ffff:125.18.51.148;Big Yellow Worm http://moyix.blogspot.com/2006/12/malware-with-twist.html / https://isc.sans.edu
|
||||
2607:f358:1f:196:196:4f8e:edec:7e7f;Linkedin Phishing Email http://urlquery.net/report.php?id=1488306719799 /
|
47909
iocs/otx-c2-iocs.txt
47909
iocs/otx-c2-iocs.txt
File diff suppressed because it is too large
Load Diff
@ -1,3 +1,19 @@
|
||||
C:\\Users\\user\\AppData\\Roaming\\Macromedia\\Flash;Malware: Hancitor (Chanitor or Tordal)
|
||||
C:\\Users\\user~1\\AppData\\Local\\Temp\\;Malware: Hancitor (Chanitor or Tordal)
|
||||
C:\\Users\\user\\AppData\\Roaming\\Adobe\\Acrobat\\11\.0\\Security\\CRLCache\\;Malware: Hancitor (Chanitor or Tordal)
|
||||
C:\\Users\\user~1\\AppData\\Local\\Temp,,;Malware: Hancitor (Chanitor or Tordal)
|
||||
C:\\Users\\user~1\\AppData\\Local\\Temp\\;Ransomware: GLOBEIMPOSTER
|
||||
C:\\Users\\user\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\qrehcsuv\.default\\datareporting\\archived\\;Ransomware: GLOBEIMPOSTER
|
||||
C:\\Users\\user\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\;Ransomware: GLOBEIMPOSTER
|
||||
C:\\Users\\user\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content\.IE5\\;Ransomware: GLOBEIMPOSTER
|
||||
com\.system\.update\.systemupdate;Google Security: Tizi Android Malware https://security.googleblog.com/2017/11/tizi-detecting-and-blocking-socially.htm
|
||||
com\.dailyworkout\.tizi;Google Security: Tizi Android Malware https://security.googleblog.com/2017/11/tizi-detecting-and-blocking-socially.htm
|
||||
com\.press\.nasa\.com\.tanofresh;Google Security: Tizi Android Malware https://security.googleblog.com/2017/11/tizi-detecting-and-blocking-socially.htm
|
||||
UPS Express #69084735_XTZ#KYVBA \(01 Nov 17\)\-1\.doc;PowerShell EMOTET Delivery
|
||||
C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\;Kerkoporta (Greek) ransomware
|
||||
C:\\Users\\user\\AppData\\Local\\Microsoft\\CLR_v4\.0_32\\UsageLogs\\;Kerkoporta (Greek) ransomware
|
||||
C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\;Kerkoporta (Greek) ransomware
|
||||
C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Windows Update Protocol\\;Kerkoporta (Greek) ransomware
|
||||
C:\\ProgramData\\ManagerApp\\d3d9\.dll;BlackOasis APT and new targeted attacks leveraging zero-day exploit - Securelist https://securelist.com/blackoasis-apt-and-new-targeted-attacks-leveraging-zero-d
|
||||
C:\\ProgramData\\ManagerApp\\msvcr90\.dll;BlackOasis APT and new targeted attacks leveraging zero-day exploit - Securelist https://securelist.com/blackoasis-apt-and-new-targeted-attacks-leveraging-zero-d
|
||||
C:\\ProgramData\\ManagerApp\\install\.cab;BlackOasis APT and new targeted attacks leveraging zero-day exploit - Securelist https://securelist.com/blackoasis-apt-and-new-targeted-attacks-leveraging-zero-d
|
||||
@ -12,8 +28,28 @@ _DECRYPT_FILE\.html;Erebus Resurfaces as Linux Ransomware http://blog.trendmicro
|
||||
_DECRYPT_FILE\.txt;Erebus Resurfaces as Linux Ransomware http://blog.trendmicro.com/trendlabs-security-intelligence/erebus-resurfaces-as-
|
||||
/Users/_%User%_/Library/LaunchAgents/com\.apple\.Safari\.pac\.plist;OSX/Dok - OSX Malware http://blog.checkpoint.com/2017/04/27/osx-malware-catching-wants-read-https-traf
|
||||
/Users/_%User%_/Library/LaunchAgents/com\.apple\.Safari\.proxy\.plist;OSX/Dok - OSX Malware http://blog.checkpoint.com/2017/04/27/osx-malware-catching-wants-read-https-traf
|
||||
%WINDOWS%/perfc;Petya Ransomware (IOCs from First Run in 2016 and June 2017 variant) https://www.swordshield.com/2017/06/petya-ransomware-older-malware-new-dangerous
|
||||
C:\\Windows\\perfc;Petya Ransomware (IOCs from First Run in 2016 and June 2017 variant) https://www.swordshield.com/2017/06/petya-ransomware-older-malware-new-dangerous
|
||||
READ ME ABOUT DECRYPTION\.txt;Analyzing the Fileless, Code-injecting SOREBRECT Ransomware http://blog.trendmicro.com/trendlabs-security-intelligence/analyzing-fileless-co
|
||||
C:\\Flash player\\vlc\.exe;New Kasper samples https://www.hybrid-analysis.com/sample/6a48b5211b622ffe49ae4e32ada72bb4d9db40576
|
||||
C:\\WINDOWS\\system32\\msg;WannaCry/Wcry Ransomware https://www.virustotal.com/en/file/f01644082db3fa50ba9f4773f11f062ab785c9db02a3a
|
||||
wanacry\.exe;WannaCry Ransomware Campaign mai_12_2017
|
||||
%homedrive%\\wanacry\.exe;WannaCry Ransomware Campaign mai_12_2017
|
||||
%windows%\\wanacry\.exe;WannaCry Ransomware Campaign mai_12_2017
|
||||
%userprofile%\\Desktop\\wanacry\.exe;WannaCry Ransomware Campaign mai_12_2017
|
||||
%LocalLow%\\wanacry\.exe;WannaCry Ransomware Campaign mai_12_2017
|
||||
%Local%\\wanacry\.exe;WannaCry Ransomware Campaign mai_12_2017
|
||||
%AppData%\\wanacry\.exe;WannaCry Ransomware Campaign mai_12_2017
|
||||
@WanaDecryptor@\.exe;WannaCry Ransomware Campaign mai_12_2017
|
||||
%homedrive%\\@WanaDecryptor@\.exe;WannaCry Ransomware Campaign mai_12_2017
|
||||
%windows%\\@WanaDecryptor@\.exe;WannaCry Ransomware Campaign mai_12_2017
|
||||
%userprofile%\\Desktop\\@WanaDecryptor@\.exe;WannaCry Ransomware Campaign mai_12_2017
|
||||
%LocalLow%\\@WanaDecryptor@\.exe;WannaCry Ransomware Campaign mai_12_2017
|
||||
%Local%\\@WanaDecryptor@\.exe;WannaCry Ransomware Campaign mai_12_2017
|
||||
%AppData%\\@WanaDecryptor@\.exe;WannaCry Ransomware Campaign mai_12_2017
|
||||
*\.wncry\.;WannaCry Ransomware Campaign mai_12_2017
|
||||
@Please_Read_Me@\.txt;WannaCry Ransomware Campaign mai_12_2017
|
||||
wcry\.exe;WannaCry Ransomware Campaign mai_12_2017
|
||||
C:\\WINDOWS\\tasksche\.exe;WannaCry Indicators
|
||||
C:\\Windows\\mssecsvc\.exe;WannaCry Indicators
|
||||
C:\\taskse\.exe;WannaCry Indicators
|
||||
@ -21,6 +57,12 @@ C:\\taskdl\.exe;WannaCry Indicators
|
||||
C:\\m\.vbs;WannaCry Indicators
|
||||
C:\\111\.exe;WannaCry Indicators
|
||||
C:\\@WanaDecryptor@\.exe;WannaCry Indicators
|
||||
C:\\ProgramData\\Dropebox*;New Carbanak / Anunak Attack Methodology https://www.trustwave.com/Resources/SpiderLabs-Blog/Carbanak-Continues-To-Evolve
|
||||
%HOMEPATH%\\Intel\\\{BFF4219E\-C7D1\-2880\-AE58\-9C9CD9701C90\};New Carbanak / Anunak Attack Methodology https://www.trustwave.com/Resources/SpiderLabs-Blog/Carbanak-Continues-To-Evolve
|
||||
%HOMEPATH%\\Intel;New Carbanak / Anunak Attack Methodology https://www.trustwave.com/Resources/SpiderLabs-Blog/Carbanak-Continues-To-Evolve
|
||||
%Application Data%\\Frfx;Jigsaw Ransomware IOCs http://blog.trendmicro.com/trendlabs-security-intelligence/jigsaw-ransomware-pla
|
||||
%Application Data%\\System32Work;Jigsaw Ransomware IOCs http://blog.trendmicro.com/trendlabs-security-intelligence/jigsaw-ransomware-pla
|
||||
%AppDataLocal%\\Drpbx;Jigsaw Ransomware IOCs http://blog.trendmicro.com/trendlabs-security-intelligence/jigsaw-ransomware-pla
|
||||
%TEMP%\\AdobeARMM\.log;The Kittens Strike Back https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/rocket-kitten-co
|
||||
%TEMP%\\wlg\.dat;The Kittens Strike Back https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/rocket-kitten-co
|
||||
Message\.xlsb;The Kittens Strike Back https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/rocket-kitten-co
|
||||
|
31431
iocs/otx-hash-iocs.txt
31431
iocs/otx-hash-iocs.txt
File diff suppressed because it is too large
Load Diff
Loading…
Reference in New Issue
Block a user