コード例 #1
0
zeus = Malware.get_or_create(name="Zeus")
zeus.family = MalwareFamily.objects.get(name="banker")
zeus.killchain = "7"
zeus.tags = ['zeus']
zeus.save()

## Create initial intelligence

# Indicators
bartalex_callback = Regex(name="Bartalex callback", pattern="/mg.jpg$")
bartalex_callback.description = "Bartalex [stage2] callback (extracted from macros)"
bartalex_callback.diamond = "capability"
bartalex_callback.location = "network"
bartalex_callback.save()
bartalex_callback.action(bartalex, 'testrun', verb='indicates')

bartalex_callback2 = Regex(name="Bartalex callback",
                           pattern="/[0-9a-z]{7,8}/[0-9a-z]{7,8}.exe$")
bartalex_callback2.description = "Bartalex [stage2] callback (extracted from macros)"
bartalex_callback2.diamond = "capability"
bartalex_callback2.location = "network"
bartalex_callback2.save()
bartalex_callback2.action(bartalex, 'testrun', verb="indicates")

bartalex_callback.action(dridex, 'testrun', verb="hosts")
bartalex_callback2.action(dridex, 'testrun', verb="hosts")

bartalex.action(dridex, 'testrun', verb="drops")

zeus_callback = Regex(name="Zeus C2 check-in", pattern="/gate.php$")
コード例 #2
0
ファイル: testrun.py プロジェクト: carriercomm/yeti
zeus = Malware.get_or_create(name="Zeus")
zeus.family = MalwareFamily.objects.get(name="banker")
zeus.killchain = "objectives"
zeus.tags = ['zeus']
zeus.save()

## Create initial intelligence

# Indicators
bartalex_callback = Regex(name="Bartalex callback")
bartalex_callback.pattern = "/mg.jpg$"
bartalex_callback.description = "Bartalex [stage2] callback (extracted from macros)"
bartalex_callback.diamond = "Capability"
bartalex_callback.location = "network"
bartalex_callback.save()
bartalex_callback.action('indicates', bartalex, description="Bartalex payload URL (Dridex)")

bartalex_callback2 = Regex(name="Bartalex callback")
bartalex_callback2.pattern = "/[0-9a-z]{7,8}/[0-9a-z]{7,8}.exe$"
bartalex_callback2.description = "Bartalex [stage2] callback (extracted from macros)"
bartalex_callback2.diamond = "Capability"
bartalex_callback2.location = "network"
bartalex_callback2.save()
bartalex_callback2.action("indicates", bartalex, description="Bartalex payload URL (Dridex)")

bartalex_callback.action("hosts", dridex, description="Hosting Dridex")
bartalex_callback2.action("hosts", dridex, description="Hosting Dridex")

bartalex.action("drops", dridex, description="Drops Dridex")

zeus_callback = Regex(name="Zeus C2 check-in")
コード例 #3
0
ファイル: testrun.py プロジェクト: raymundl/yeti
zeus = Malware.get_or_create(name="Zeus")
zeus.family = MalwareFamily.objects.get(name="banker")
zeus.killchain = "7"
zeus.tags = ['zeus']
zeus.save()

## Create initial intelligence

# Indicators
bartalex_callback = Regex(name="Bartalex callback", pattern="/mg.jpg$")
bartalex_callback.description = "Bartalex [stage2] callback (extracted from macros)"
bartalex_callback.diamond = "capability"
bartalex_callback.location = "network"
bartalex_callback.save()
bartalex_callback.action(bartalex, 'testrun', verb='indicates')

bartalex_callback2 = Regex(
    name="Bartalex callback", pattern="/[0-9a-z]{7,8}/[0-9a-z]{7,8}.exe$")
bartalex_callback2.description = "Bartalex [stage2] callback (extracted from macros)"
bartalex_callback2.diamond = "capability"
bartalex_callback2.location = "network"
bartalex_callback2.save()
bartalex_callback2.action(bartalex, 'testrun', verb="indicates")

bartalex_callback.action(dridex, 'testrun', verb="hosts")
bartalex_callback2.action(dridex, 'testrun', verb="hosts")

bartalex.action(dridex, 'testrun', verb="drops")

zeus_callback = Regex(name="Zeus C2 check-in", pattern="/gate.php$")