Skip to main content

Mandiant Advantage Threat Intelligence

This Integration is part of the Mandiant Advantage Threat Intelligence Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.6.0 and later.

Enrich Indicators of Compromise, and fetch information about Actors, Malware Families, and Campaigns from Mandiant Advantage. This integration was integrated and tested with version 4 of the Mandiant Advantage Threat Intelligence API

Configure Mandiant Advantage Threat Intelligence on Cortex XSOAR#

  1. Navigate to Settings > Integrations > Servers & Services.

  2. Search for Mandiant Advantage Threat Intelligence.

  3. Click Add instance to create and configure a new integration instance.

    ParameterDescriptionRequired
    API Base URLLeave as 'api.intelligence.mandiant.com' if unsureFalse
    API KeyYour API Key from Mandiant Advantage Threat IntelligenceTrue
    Secret KeyYour Secret Key from Mandiant Advantage Threat IntelligenceTrue
    Fetch indicatorsFalse
    Indicator ReputationIndicators from this integration instance will be marked with this reputation.False
    Source ReliabilityReliability of the source providing the intelligence data.True
    Traffic Light Protocol ColorThe Traffic Light Protocol (TLP) designation to apply to indicators fetched from the feed.False
    Feed Expiration PolicyFalse
    Feed Expiration IntervalFalse
    Feed Fetch IntervalFalse
    Feed Minimum Confidence ScoreThe minimum MScore value to import as part of the feedTrue
    Feed Exclude Open Source IntelligenceWhether to exclude Open Source Intelligence as part of the feedTrue
    Mandiant indicator typeThe type of indicators to fetch. Indicator type might include the following: Domains, IPs, Files and URLs.False
    First fetch timeThe maximum value allowed is 90 days.False
    Maximum number of indicators per fetchMaximum value of 1000. Any values higher will be capped to 1000False
    TagsSupports CSV values.False
    TimeoutAPI calls timeout.False
    Bypass exclusion listWhen selected, the exclusion list is ignored for indicators from this feed. This means that if an indicator from this feed is on the exclusion list, the indicator might still be added to the system.False
    Retrieve indicator metadataRetrieve additional information for each indicator. Note that this requires additional API calls.False
    Create relationshipsNote that this requires additional API calls.False
    Trust any certificate (not secure)False
    Use system proxy settingsFalse
  4. Click Test to validate the URLs, token, and connection.

Commands#

You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

mati-get-indicator#


Get information about a single Indicator of Compromise from Mandiant

Base Command#

mati-get-indicator

Input#

Argument NameDescriptionRequired
indicator_valueValue of the indicator to look up. Can be URL, domain name, IP address, or file hash.Required

Context Output#

PathTypeDescription
MANDIANTTI.IP.scoreNumberThe Severity Score of the IP indicator
MANDIANTTI.IP.fields.ipStringThe IP address of the IP indicator
MANDIANTTI.FILE.scoreNumberThe Severity Score of the File indicator
MANDIANTTI.FILE.fields.md5StringThe MD5 Hash associated with the File indicator
MANDIANTTI.FILE.fields.sha256StringThe SHA256 Hash associated with the File indicator
MANDIANTTI.FILE.fields.sha1StringThe SHA1 Hash associated with the File indicator
MANDIANTTI.DOMAIN.scoreNumberThe Severity Score of the Domain indicator
MANDIANTTI.DOMAIN.fields.dnsStringThe DNS record value for the Domain indicator
MANDIANTTI.DOMAIN.fields.domainStringThe domain name for the Domain indicator
MANDIANTTI.URL.scoreNumberThe Severity Score of the URL indicator
MANDIANTTI.URL.fields.urlStringThe URL value for the Domain indicator

Command example#

!mati-get-indicator indicator_value=124.248.207.50

Context Example#

{
"MANDIANTTI": {
"IP": {
"fields": {
"DBotScore": {
"Indicator": "124.248.207.50",
"Reliability": "A - Completely reliable",
"Score": 2,
"Type": "ip",
"Vendor": "Mandiant"
},
"firstseenbysource": "2016-06-09T16:28:01.000Z",
"ip": "124.248.207.50",
"lastseenbysource": "2018-04-19T17:23:59.000Z",
"stixid": "ipv4--3a4d8f76-6fde-5b25-9672-a45a0ac16bc8",
"trafficlightprotocol": "AMBER"
},
"rawJSON": {
"attributed_associations": [
{
"id": "threat-actor--3790b99d-7067-536c-821d-19953727bf7b",
"name": "Turla Team",
"type": "threat-actor"
}
],
"campaigns": [],
"first_seen": "2016-06-09T16:28:01.000Z",
"id": "ipv4--3a4d8f76-6fde-5b25-9672-a45a0ac16bc8",
"is_exclusive": false,
"is_publishable": true,
"last_seen": "2018-04-19T17:23:59.000Z",
"last_updated": "2022-05-14T10:15:13.771Z",
"mscore": 52,
"publications": [],
"sources": [
{
"category": [],
"first_seen": "2018-01-08T21:29:53.000+0000",
"last_seen": "2018-04-19T17:23:59.000+0000",
"osint": false,
"source_name": "Mandiant"
},
{
"category": [],
"first_seen": "2016-06-09T16:28:01.000+0000",
"last_seen": "2016-06-09T16:28:01.000+0000",
"osint": false,
"source_name": "Mandiant"
}
],
"type": "ipv4",
"value": "124.248.207.50"
},
"relationships": [],
"score": 2,
"type": "IP",
"value": {
"124.248.207.50": "[124.248.207.50](#/indicator/34576)"
}
}
}
}

Human Readable Output#

Results#

fieldsrawJSONrelationshipsscoretypevalue
firstseenbysource: 2016-06-09T16:28:01.000Z
lastseenbysource: 2018-04-19T17:23:59.000Z
stixid: ipv4--3a4d8f76-6fde-5b25-9672-a45a0ac16bc8
trafficlightprotocol: AMBER
DBotScore: {"Indicator": "124.248.207.50", "Type": "ip", "Vendor": "Mandiant", "Score": 2, "Reliability": "A - Completely reliable"}
ip: 124.248.207.50
id: ipv4--3a4d8f76-6fde-5b25-9672-a45a0ac16bc8
mscore: 52
type: ipv4
value: 124.248.207.50
is_exclusive: false
is_publishable: true
sources: {'first_seen': '2018-01-08T21:29:53.000+0000', 'last_seen': '2018-04-19T17:23:59.000+0000', 'osint': False, 'category': [], 'source_name': 'Mandiant'},
{'first_seen': '2016-06-09T16:28:01.000+0000', 'last_seen': '2016-06-09T16:28:01.000+0000', 'osint': False, 'category': [], 'source_name': 'Mandiant'}
attributed_associations: {'id': 'threat-actor--3790b99d-7067-536c-821d-19953727bf7b', 'name': 'Turla Team', 'type': 'threat-actor'}
last_updated: 2022-05-14T10:15:13.771Z
first_seen: 2016-06-09T16:28:01.000Z
last_seen: 2018-04-19T17:23:59.000Z
campaigns:
publications:
2IP124.248.207.50: 124.248.207.50

mati-get-actor#


Get information about a Threat Actor from Mandiant

Base Command#

mati-get-actor

Input#

Argument NameDescriptionRequired
actor_nameName of the actor to look up.Required

Context Output#

PathTypeDescription
MANDIANTTI.ThreatActor.valueStringThe name of the ThreatActor
MANDIANTTI.ThreatActor.fields.primarymotivationStringThe primary motivation of the ThreatActor
MANDIANTTI.ThreatActor.fields.tagsStringThe tags and target industries of the ThreatActor
MANDIANTTI.ThreatActor.fields.aliasesStringThe known aliases of the ThreatActor
MANDIANTTI.ThreatActor.fields.targetsStringThe known targets of the ThreatActor
MANDIANTTI.ThreatActor.fields.descriptionStringThe description of the ThreatActor
MANDIANTTI.ThreatActor.fields.publications.titleStringThe title of a report associated with the ThreatActor
MANDIANTTI.ThreatActor.fields.publications.linkStringThe link to the report in Mandiant Advantage

Command example#

!mati-get-actor actor_name=APT1

Context Example#

{
"MANDIANTTI": {
"ThreatActor": {
"fields": {
"DBot Score": {
"Indicator": null,
"Reliability": "A - Completely reliable",
"Score": 0,
"Type": "Actor",
"Vendor": "Mandiant"
},
"aliases": [
"Apt1 (Recorded Future)",
"Bronzesunset (Dell SecureWorks)",
"Comment Crew (Internet)",
"Comment Crew (ThreatConnect)",
"Comment Panda (CrowdStrike)",
"Commentcrew (Symantec)",
"Dev0046 (Microsoft)",
"Famoussparrow (ESET)",
"Fluorine (Microsoft)",
"Foxypanda (CrowdStrike)",
"Ghostemperor (Kaspersky)",
"Kumming Group (Dell SecureWorks)",
"Shanghaigroup (Dell SecureWorks)",
"Tg8223 (Dell SecureWorks)"
],
"description": "APT1 refers to a distinct grouping of global cyber espionage activity with a nexus to China. Based on available data, we assess that this is a nation-state-sponsored group located in China. Specifically, we believe that APT1 is the 2nd Bureau of the People's Liberation Army (PLA) General Staff Department's 3rd Department, or Unit 61398. The activity is distinguished by the use of common infrastructure and tools and a clear intent to collect intelligence on a number of issues that may be of interest to the People's Republic of China (PRC).",
"firstseenbysource": [
"2003-06-20T12:00:00.000Z",
"2019-05-22T00:00:00.000Z"
],
"lastseenbysource": [
"2015-10-20T00:00:00.000Z",
"2022-12-22T00:00:00.000Z"
],
"name": "APT1",
"primarymotivation": "Espionage",
"publications": [
{
"link": "https://advantage.mandiant.com/reports/23-00002244",
"source": "Mandiant",
"timestamp": 1675443298,
"title": "MITRE ATT&CK for ICS Tactics: Impact"
},
{
"link": "https://advantage.mandiant.com/reports/22-00023922",
"source": "Mandiant",
"timestamp": 1666102868,
"title": "Weekly Malware Update for Oct. 10\u201317, 2022"
}
],
"stixid": "threat-actor--0ac5c1db-8ad6-54b8-b4b9-c32fc738c54a",
"tags": [
"Aerospace & Defense",
"Chemicals & Materials",
"Civil Society & Non-Profits",
"Construction & Engineering",
"Education",
"Energy & Utilities",
"Financial Services",
"Governments",
"Healthcare",
"Hospitality",
"Legal & Professional Services",
"Manufacturing",
"Media & Entertainment",
"Oil & Gas",
"Retail",
"Technology",
"Telecommunications",
"Transportation"
],
"targets": [
"Belgium",
"Canada",
"Denmark",
"France",
"Hong Kong",
"India",
"Israel",
"Japan",
"Luxembourg",
"Norway",
"Singapore",
"South Africa",
"Switzerland",
"Taiwan",
"United Arab Emirates",
"United Kingdom",
"United States of America"
],
"trafficlightprotocol": "AMBER",
"updateddate": "2023-02-23T14:17:35.000Z"
},
"rawJSON": {
"aliases": [
{
"attribution_scope": "confirmed",
"name": "Apt1 (Recorded Future)"
},
{
"attribution_scope": "confirmed",
"name": "Bronzesunset (Dell SecureWorks)"
}
],
"associated_uncs": [
{
"attribution_scope": "possible",
"id": "threat-actor--aa6c510a-ddb7-5ea7-9921-bee8408ed3be",
"name": "UNC2286"
}
],
"audience": [
{
"license": "INTEL_RBI_FUS",
"name": "intel_fusion"
},
{
"license": "INTEL_CYB_ESP",
"name": "intel_ce"
}
],
"counts": {
"aliases": 14,
"associated_uncs": 1,
"attack_patterns": 133,
"cve": 2,
"industries": 18,
"malware": 104,
"reports": 9
},
"cve": [
{
"attribution_scope": "possible",
"cve_id": "CVE-2020-0688",
"id": "vulnerability--5335a68a-b519-51c3-b05f-bc1749604b7c"
},
{
"attribution_scope": "confirmed",
"cve_id": "CVE-2009-3129",
"id": "vulnerability--8cb90843-f69a-5aa6-95dc-3bdebcc8fa78"
}
],
"description": "APT1 refers to a distinct grouping of global cyber espionage activity with a nexus to China. Based on available data, we assess that this is a nation-state-sponsored group located in China. Specifically, we believe that APT1 is the 2nd Bureau of the People's Liberation Army (PLA) General Staff Department's 3rd Department, or Unit 61398. The activity is distinguished by the use of common infrastructure and tools and a clear intent to collect intelligence on a number of issues that may be of interest to the People's Republic of China (PRC).",
"id": "threat-actor--0ac5c1db-8ad6-54b8-b4b9-c32fc738c54a",
"industries": [
{
"attribution_scope": "confirmed",
"first_seen": "2009-07-29T04:35:35.000Z",
"id": "identity--cc593632-0c42-500c-8d0b-d38e97b90f1d",
"last_seen": "2014-10-24T03:07:40.000Z",
"name": "Aerospace & Defense"
},
{
"attribution_scope": "confirmed",
"first_seen": "2008-08-10T16:25:00.000Z",
"id": "identity--a93f63bc-bbfc-52ab-88c0-794c74f5bec0",
"last_seen": "2014-09-05T00:00:00.000Z",
"name": "Chemicals & Materials"
}
],
"intel_free": true,
"is_publishable": true,
"last_activity_time": "2015-10-20T00:00:00.000Z",
"last_updated": "2023-02-23T14:17:35.000Z",
"locations": {
"source": [
{
"country": {
"attribution_scope": "confirmed",
"id": "location--740e7e5f-f2a0-55e0-98a3-88872c55b581",
"iso2": "CN",
"name": "China"
},
"region": {
"attribution_scope": "confirmed",
"id": "location--8fc231f3-4e62-57e7-b734-eaee0a734612",
"name": "Asia"
},
"sub_region": {
"attribution_scope": "confirmed",
"id": "location--7b33370b-da4b-5c48-9741-b69f69febb77",
"name": "East Asia"
}
}
],
"target": [
{
"attribution_scope": "confirmed",
"id": "location--a509dfc8-789b-595b-a201-29c7af1dc0bb",
"iso2": "BE",
"name": "Belgium",
"region": "Europe",
"sub-region": "West Europe"
},
{
"attribution_scope": "confirmed",
"id": "location--fde14246-c07b-5f3f-9ac8-8d4d50910f15",
"iso2": "CA",
"name": "Canada",
"region": "Americas",
"sub-region": "North America"
}
],
"target_region": [
{
"attribution_scope": "confirmed",
"id": "location--9488166d-6469-5e54-ba5f-9abf2a385824",
"key": "africa",
"name": "Africa"
},
{
"attribution_scope": "confirmed",
"id": "location--6d65522f-0166-5e7e-973c-35cf7973e4e3",
"key": "americas",
"name": "Americas"
}
],
"target_sub_region": [
{
"attribution_scope": "confirmed",
"id": "location--7b33370b-da4b-5c48-9741-b69f69febb77",
"key": "eastasia",
"name": "East Asia",
"region": "Asia"
},
{
"attribution_scope": "confirmed",
"id": "location--0daadcfb-ad23-5f16-b53b-6c5b09bf20de",
"key": "northamerica",
"name": "North America",
"region": "Americas"
}
]
},
"malware": [
{
"attribution_scope": "confirmed",
"id": "malware--09673ebc-9fbf-5ab0-9130-7874c84cd3e4",
"name": "AGEDMOAT"
},
{
"attribution_scope": "confirmed",
"id": "malware--7c00490d-dc79-5623-bf50-fb4b169d1b4f",
"name": "AGEDSHOE"
}
],
"motivations": [
{
"attribution_scope": "confirmed",
"id": "motivation--1b8ca82a-7cff-5622-bedd-965c11d38a9e",
"name": "Espionage"
}
],
"name": "APT1",
"observed": [
{
"attribution_scope": "confirmed",
"earliest": "2003-06-20T12:00:00.000Z",
"recent": "2015-10-20T00:00:00.000Z"
},
{
"attribution_scope": "possible",
"earliest": "2019-05-22T00:00:00.000Z",
"recent": "2022-12-22T00:00:00.000Z"
}
],
"tools": [
{
"attribution_scope": "possible",
"id": "malware--e224f74a-ca0e-540b-884f-03753787316f",
"name": "NLTEST"
},
{
"attribution_scope": "possible",
"id": "malware--76ccff98-5f46-5b7e-8eae-f7b439d0e64a",
"name": "TCPTRAN"
}
],
"type": "threat-actor"
},
"relationships": [
{
"entityA": "APT1",
"entityAFamily": "Indicator",
"entityAType": "Threat Actor",
"entityB": "AGEDMOAT",
"entityBFamily": "Indicator",
"entityBType": "Malware",
"fields": {},
"name": "related-to",
"reverseName": "related-to",
"type": "IndicatorToIndicator"
},
{
"entityA": "APT1",
"entityAFamily": "Indicator",
"entityAType": "Threat Actor",
"entityB": "AGEDSHOE",
"entityBFamily": "Indicator",
"entityBType": "Malware",
"fields": {},
"name": "related-to",
"reverseName": "related-to",
"type": "IndicatorToIndicator"
}
],
"score": 0,
"type": "Threat Actor",
"value": "APT1"
}
}
}

Human Readable Output#

Results#

fieldsrawJSONrelationshipsscoretypevalue
primarymotivation: Espionage
tags: Aerospace & Defense,
Chemicals & Materials,
Civil Society & Non-Profits,
Construction & Engineering,
Education,
Energy & Utilities,
Financial Services,
Governments,
Healthcare,
Hospitality,
Legal & Professional Services,
Manufacturing,
Media & Entertainment,
Oil & Gas,
Retail,
Technology,
Telecommunications,
Transportation
aliases: Apt1 (Recorded Future),
Bronzesunset (Dell SecureWorks),
Comment Crew (Internet),
Comment Crew (ThreatConnect),
Comment Panda (CrowdStrike),
Commentcrew (Symantec),
Dev0046 (Microsoft),
Famoussparrow (ESET),
Fluorine (Microsoft),
Foxypanda (CrowdStrike),
Ghostemperor (Kaspersky),
Kumming Group (Dell SecureWorks),
Shanghaigroup (Dell SecureWorks),
Tg8223 (Dell SecureWorks)
firstseenbysource: 2003-06-20T12:00:00.000Z,
2019-05-22T00:00:00.000Z
lastseenbysource: 2015-10-20T00:00:00.000Z,
2022-12-22T00:00:00.000Z
targets: Belgium,
Canada,
Denmark,
France,
Hong Kong,
India,
Israel,
Japan,
Luxembourg,
Norway,
Singapore,
South Africa,
Switzerland,
Taiwan,
United Arab Emirates,
United Kingdom,
United States of America
stixid: threat-actor--0ac5c1db-8ad6-54b8-b4b9-c32fc738c54a
name: APT1
description: APT1 refers to a distinct grouping of global cyber espionage activity with a nexus to China. Based on available data, we assess that this is a nation-state-sponsored group located in China. Specifically, we believe that APT1 is the 2nd Bureau of the People's Liberation Army (PLA) General Staff Department's 3rd Department, or Unit 61398. The activity is distinguished by the use of common infrastructure and tools and a clear intent to collect intelligence on a number of issues that may be of interest to the People's Republic of China (PRC).
updateddate: 2023-02-23T14:17:35.000Z
trafficlightprotocol: AMBER
DBot Score: {"Indicator": null, "Type": "Actor", "Vendor": "Mandiant", "Score": 0, "Reliability": "A - Completely reliable"}
publications: {'source': 'Mandiant', 'title': 'MITRE ATT&CK for ICS Tactics: Impact', 'link': 'https://advantage.mandiant.com/reports/23-00002244', 'timestamp': 1675443298.0},
{'source': 'Mandiant', 'title': 'Weekly Malware Update for Oct. 10–17, 2022', 'link': 'https://advantage.mandiant.com/reports/22-00023922', 'timestamp': 1666102868.0}
industries: {'id': 'identity--cc593632-0c42-500c-8d0b-d38e97b90f1d', 'name': 'Aerospace & Defense', 'attribution_scope': 'confirmed', 'first_seen': '2009-07-29T04:35:35.000Z', 'last_seen': '2014-10-24T03:07:40.000Z'},
{'id': 'identity--a93f63bc-bbfc-52ab-88c0-794c74f5bec0', 'name': 'Chemicals & Materials', 'attribution_scope': 'confirmed', 'first_seen': '2008-08-10T16:25:00.000Z', 'last_seen': '2014-09-05T00:00:00.000Z'}
locations: {"source": [{"region": {"id": "location--8fc231f3-4e62-57e7-b734-eaee0a734612", "name": "Asia", "attribution_scope": "confirmed"}, "country": {"id": "location--740e7e5f-f2a0-55e0-98a3-88872c55b581", "name": "China", "iso2": "CN", "attribution_scope": "confirmed"}, "sub_region": {"attribution_scope": "confirmed", "id": "location--7b33370b-da4b-5c48-9741-b69f69febb77", "name": "East Asia"}}], "target": [{"id": "location--a509dfc8-789b-595b-a201-29c7af1dc0bb", "name": "Belgium", "iso2": "BE", "region": "Europe", "sub-region": "West Europe", "attribution_scope": "confirmed"}, {"id": "location--fde14246-c07b-5f3f-9ac8-8d4d50910f15", "name": "Canada", "iso2": "CA", "region": "Americas", "sub-region": "North America", "attribution_scope": "confirmed"}]}
id: threat-actor--0ac5c1db-8ad6-54b8-b4b9-c32fc738c54a
name: APT1
description: APT1 refers to a distinct grouping of global cyber espionage activity with a nexus to China. Based on available data, we assess that this is a nation-state-sponsored group located in China. Specifically, we believe that APT1 is the 2nd Bureau of the People's Liberation Army (PLA) General Staff Department's 3rd Department, or Unit 61398. The activity is distinguished by the use of common infrastructure and tools and a clear intent to collect intelligence on a number of issues that may be of interest to the People's Republic of China (PRC).
type: threat-actor
last_activity_time: 2015-10-20T00:00:00.000Z
audience: {'name': 'intel_fusion', 'license': 'INTEL_RBI_FUS'},
{'name': 'intel_ce', 'license': 'INTEL_CYB_ESP'}
is_publishable: true
intel_free: true
counts: {"reports": 9, "malware": 104, "cve": 2, "associated_uncs": 1, "aliases": 14, "industries": 18, "attack_patterns": 133}
last_updated: 2023-02-23T14:17:35.000Z
aliases: {'name': 'Apt1 (Recorded Future)', 'attribution_scope': 'confirmed'},
{'name': 'Bronzesunset (Dell SecureWorks)', 'attribution_scope': 'confirmed'}
malware: {'id': 'malware--09673ebc-9fbf-5ab0-9130-7874c84cd3e4', 'name': 'AGEDMOAT', 'attribution_scope': 'confirmed'},
{'id': 'malware--7c00490d-dc79-5623-bf50-fb4b169d1b4f', 'name': 'AGEDSHOE', 'attribution_scope': 'confirmed'}
motivations: {'id': 'motivation--1b8ca82a-7cff-5622-bedd-965c11d38a9e', 'name': 'Espionage', 'attribution_scope': 'confirmed'}
associated_uncs: {'attribution_scope': 'possible', 'id': 'threat-actor--aa6c510a-ddb7-5ea7-9921-bee8408ed3be', 'name': 'UNC2286'}
cve: {'attribution_scope': 'possible', 'cve_id': 'CVE-2020-0688', 'id': 'vulnerability--5335a68a-b519-51c3-b05f-bc1749604b7c'},
{'attribution_scope': 'confirmed', 'cve_id': 'CVE-2009-3129', 'id': 'vulnerability--8cb90843-f69a-5aa6-95dc-3bdebcc8fa78'}
observed: {'earliest': '2003-06-20T12:00:00.000Z', 'recent': '2015-10-20T00:00:00.000Z', 'attribution_scope': 'confirmed'},
{'earliest': '2019-05-22T00:00:00.000Z', 'recent': '2022-12-22T00:00:00.000Z', 'attribution_scope': 'possible'}
tools: {'id': 'malware--e224f74a-ca0e-540b-884f-03753787316f', 'name': 'NLTEST', 'attribution_scope': 'possible'},
{'id': 'malware--76ccff98-5f46-5b7e-8eae-f7b439d0e64a', 'name': 'TCPTRAN', 'attribution_scope': 'possible'},
{'id': 'malware--126826c5-cfdc-5970-a734-a4ce7d6d92f4', 'name': 'RAR', 'attribution_scope': 'possible'},
{'id': 'malware--934dcadf-f9a8-52c1-9c90-353a1c3144d5', 'name': 'PSEXEC', 'attribution_scope': 'possible'},
{'id': 'malware--0f315a7c-9bf4-58dc-8ea9-033355617485', 'name': 'PSINFO', 'attribution_scope': 'confirmed'},
{'id': 'malware--d84951d6-8f8a-5f7f-92cb-4fee4ef18664', 'name': 'LDIFDE', 'attribution_scope': 'confirmed'},
{'id': 'malware--4fb0b16d-53d6-56e5-975f-10458225f317', 'name': 'COBALTSTRIKE', 'attribution_scope': 'possible'},
{'id': 'malware--22055c71-bf62-5456-a5af-b7f298f47627', 'name': 'CMDEXE', 'attribution_scope': 'confirmed'},
{'id': 'malware--70e3757d-09ea-5267-9aa3-01be476b3dd9', 'name': 'XCMD', 'attribution_scope': 'confirmed'},
{'id': 'malware--82f2aa10-d254-5e1e-a1db-a0c822d4cef6', 'name': 'POWERSHELL', 'attribution_scope': 'possible'},
{'id': 'malware--f872b3e0-c277-5716-baae-885a9c410398', 'name': 'WHOAMI', 'attribution_scope': 'possible'},
{'id': 'malware--0bfd6f0b-4cdc-525c-b3e9-cf56d747f189', 'name': 'FGDUMP', 'attribution_scope': 'confirmed'},
{'id': 'malware--a73560d8-e4d4-5a38-8efc-bfe7b8e5aef6', 'name': 'PSFTP', 'attribution_scope': 'possible'},
{'id': 'malware--33e3fd12-4c4a-5824-a4e5-5ac35b308345', 'name': 'PWDUMP', 'attribution_scope': 'confirmed'},
{'id': 'malware--0c7945de-0968-55e3-ad4e-1600ddfc6b36', 'name': 'PROCDUMP', 'attribution_scope': 'possible'},
{'id': 'malware--57e5ea29-1c08-5f80-b28e-dd7ca373e4b7', 'name': 'ANGRYIP', 'attribution_scope': 'confirmed'},
{'id': 'malware--125d583e-0617-5192-bc27-9f3377bb98c3', 'name': 'WINRAR', 'attribution_scope': 'possible'},
{'id': 'malware--bf2fc1e5-7850-5ecd-87a7-263e6da5708d', 'name': 'MIMIKATZ', 'attribution_scope': 'confirmed'},
{'id': 'malware--ed8a8e26-0773-5fcf-b3f3-e17aac203fa3', 'name': 'SFXZIP', 'attribution_scope': 'confirmed'},
{'id': 'malware--0953f997-41ce-5fe2-804a-08fd8d567c29', 'name': 'PUTTY', 'attribution_scope': 'possible'},
{'id': 'malware--2db234c8-596a-58f9-a50f-ce24b58965cd', 'name': 'IMPACKET.SMBEXEC', 'attribution_scope': 'possible'},
{'id': 'malware--b2bb2d97-675e-5023-9cdd-a4274893b4a7', 'name': 'SFXRAR', 'attribution_scope': 'confirmed'}
{'name': 'related-to', 'reverseName': 'related-to', 'type': 'IndicatorToIndicator', 'entityA': 'APT1', 'entityAFamily': 'Indicator', 'entityAType': 'Threat Actor', 'entityB': 'AGEDMOAT', 'entityBFamily': 'Indicator', 'entityBType': 'Malware', 'fields': {}},
{'name': 'related-to', 'reverseName': 'related-to', 'type': 'IndicatorToIndicator', 'entityA': 'APT1', 'entityAFamily': 'Indicator', 'entityAType': 'Threat Actor', 'entityB': 'AGEDSHOE', 'entityBFamily': 'Indicator', 'entityBType': 'Malware', 'fields': {}}
0Threat ActorAPT1

mati-get-malware#


Get information about a Malware Family from Mandiant

Base Command#

mati-get-malware

Input#

Argument NameDescriptionRequired
malware_nameName of the malware family to look up.Required

Context Output#

PathTypeDescription
MANDIANTTI.Malware.valueStringThe name of the Malware
MANDIANTTI.Malware.fields.operatingsystemrefsStringThe Operating Systems impacted by the malware
MANDIANTTI.Malware.fields.rolesStringThe known roles of the Malware
MANDIANTTI.Malware.fields.descriptionStringThe description of the Malware
MANDIANTTI.Malware.fields.Is Malware FamilyStringWhether the Indicator is a Malware Family or a Tool
MANDIANTTI.Malware.fields.publications.titleStringThe name of the Malware
MANDIANTTI.Malware.fields.publications.titleStringThe title of a report associated with the Malware
MANDIANTTI.Malware.fields.publications.linkStringThe link to the report in Mandiant Advantage

Command example#

!mati-get-malware malware_name=PoisonIvy

Context Example#

{
"MANDIANTTI": {
"Malware": {
"fields": {
"DBot Score": {
"Indicator": null,
"Reliability": "A - Completely reliable",
"Score": 0,
"Type": "Malware",
"Vendor": "Mandiant"
},
"Is Malware Family": true,
"aliases": [
"Pivnoxy (Fortinet)",
"PIVY (LAC)",
"Pivy (Palo Alto Networks)",
"Pivydwnldr",
"Poison Ivy",
"Poison Ivy (JPCERT)",
"Poison Ivy (Proofpoint)",
"Poison Ivy (Symantec)",
"PoisonIvy",
"Poisonivy (Check Point)",
"Poisonivy (Recorded Future)",
"Royal Road (Anomali)",
"Royal Road (Internet)",
"Spivy (Palo Alto Networks)"
],
"capabilities": [
{
"description": "Capable of performing raw access to physical disks.",
"name": "Access raw disk"
},
{
"description": "Capable of allocating memory. ",
"name": "Allocates memory"
}
],
"description": "POISONIVY is a backdoor that exists as shellcode and communicates via a custom binary protocol over TCP. Additional shellcode plugins are downloaded, mapped directly into memory, and executed. Observed plugin functionality includes reverse shell, keylogging, video capture, audio capture, and registry manipulation. POISONIVY is configured, built, and controlled using a publicly available management interface. The interface produces the shellcode that must be included in, or executed by, a separate application.",
"lastseenbysource": "2023-03-06T02:29:14.000Z",
"mandiantdetections": [
"APT.Backdoor.Win.POISONIVY",
"POISON IVY (VARIANT)",
"FE_PoisonIVY_Stealer_Toolkit",
"FE_APT_Backdoor_Win32_POISONIVY_1",
"ET INFO SUSPICIOUS Dotted Quad Host MZ Response (ET OPEN)",
"ET POLICY PE EXE or DLL Windows file download HTTP (ET OPEN)",
"Backdoor.Win32.Poison.FEC2 (Trellix)",
"Trojan.APT.PoisonIvy",
"Win.Dropper.Zusy-9801038-0 (ClamAV)",
"Backdoor.APT.PoisonIvy",
"Win.Malware.Loader-9834612-0 (ClamAV)",
"Backdoor.Poison",
"Backdoor.Win.PI.FEC2 (Trellix)",
"Trojan.Poison",
"Trojan.PoisonIvy.DNS",
"Win.Trojan.PoisonIvy-9755171-0 (ClamAV)"
],
"name": {
"POISONIVY": "[POISONIVY](#/indicator/5559)"
},
"operatingsystemrefs": [
"Windows"
],
"publications": [
{
"link": "https://advantage.mandiant.com/reports/22-00022357",
"source": "Mandiant",
"timestamp": 1668046325,
"title": "Country Profile: India (2022)"
},
{
"link": "https://advantage.mandiant.com/reports/21-00010407",
"source": "Mandiant",
"timestamp": 1648063696,
"title": "Supply Chain Compromise Trends, 2019\u20132020"
}
],
"roles": [
"Backdoor"
],
"stixid": "malware--c14087e2-91dc-5a4c-a820-5eaa86ba4c99",
"tags": [
"Aerospace & Defense",
"Agriculture",
"Automotive",
"Chemicals & Materials",
"Civil Society & Non-Profits",
"Construction & Engineering",
"Energy & Utilities",
"Financial Services",
"Governments",
"Healthcare",
"Hospitality",
"Legal & Professional Services",
"Manufacturing",
"Media & Entertainment",
"Oil & Gas",
"Pharmaceuticals",
"Retail",
"Technology",
"Telecommunications",
"Transportation"
],
"trafficlightprotocol": "AMBER",
"updateddate": "2023-03-06T02:29:14.000Z",
"yara": [
[
"FE_PoisonIVY_Stealer_Toolkit",
"signature--84b13cca-37e8-5c95-9471-b63dcaeb6df0"
],
[
"FE_APT_Backdoor_Win32_POISONIVY_1",
"signature--22f52a69-ccc0-5763-bae7-c488ea856dae"
]
]
},
"rawJSON": {
"actors": [
{
"country_name": "China",
"id": "threat-actor--0ac5c1db-8ad6-54b8-b4b9-c32fc738c54a",
"iso2": "CN",
"last_updated": "2023-02-23T14:17:35Z",
"name": "APT1"
},
{
"country_name": "China",
"id": "threat-actor--bf9da649-f617-5464-9442-93e69cb80aa9",
"iso2": "CN",
"last_updated": "2023-01-28T06:02:22Z",
"name": "APT10"
}
],
"aliases": [
{
"name": "Pivnoxy (Fortinet)"
},
{
"name": "PIVY (LAC)"
}
],
"audience": [
{
"license": "INTEL_RBI_FUS",
"name": "intel_fusion"
},
{
"license": "INTEL_RBI_OPS",
"name": "intel_oper"
},
{
"license": "amber",
"name": "tlp_marking"
}
],
"capabilities": [
{
"description": "Capable of performing raw access to physical disks.",
"name": "Access raw disk"
},
{
"description": "Capable of allocating memory. ",
"name": "Allocates memory"
}
],
"counts": {
"actors": 27,
"aliases": 14,
"attack_patterns": 68,
"capabilities": 42,
"cve": 11,
"detections": 16,
"industries": 20,
"malware": 21,
"reports": 25
},
"cve": [
{
"cve_id": "CVE-2012-0158",
"id": "vulnerability--e0b130b7-1772-5c4d-891c-9c48eb1a5a23"
},
{
"cve_id": "CVE-2015-2545",
"id": "vulnerability--74c54fd3-dbc9-5273-88c6-b47975fca9b6"
}
],
"description": "POISONIVY is a backdoor that exists as shellcode and communicates via a custom binary protocol over TCP. Additional shellcode plugins are downloaded, mapped directly into memory, and executed. Observed plugin functionality includes reverse shell, keylogging, video capture, audio capture, and registry manipulation. POISONIVY is configured, built, and controlled using a publicly available management interface. The interface produces the shellcode that must be included in, or executed by, a separate application.",
"detections": [
"APT.Backdoor.Win.POISONIVY",
"POISON IVY (VARIANT)",
"FE_PoisonIVY_Stealer_Toolkit",
"FE_APT_Backdoor_Win32_POISONIVY_1",
"ET INFO SUSPICIOUS Dotted Quad Host MZ Response (ET OPEN)",
"ET POLICY PE EXE or DLL Windows file download HTTP (ET OPEN)",
"Backdoor.Win32.Poison.FEC2 (Trellix)",
"Trojan.APT.PoisonIvy",
"Win.Dropper.Zusy-9801038-0 (ClamAV)",
"Backdoor.APT.PoisonIvy",
"Win.Malware.Loader-9834612-0 (ClamAV)",
"Backdoor.Poison",
"Backdoor.Win.PI.FEC2 (Trellix)",
"Trojan.Poison",
"Trojan.PoisonIvy.DNS",
"Win.Trojan.PoisonIvy-9755171-0 (ClamAV)"
],
"id": "malware--c14087e2-91dc-5a4c-a820-5eaa86ba4c99",
"industries": [
{
"id": "identity--cc593632-0c42-500c-8d0b-d38e97b90f1d",
"name": "Aerospace & Defense"
},
{
"id": "identity--cd044760-0aef-557e-94c4-bc672ea177c2",
"name": "Agriculture"
}
],
"inherently_malicious": 1,
"is_publishable": true,
"last_activity_time": "2023-03-06T02:29:14.000Z",
"last_updated": "2023-03-06T02:29:14.000Z",
"malware": [
{
"id": "malware--709f2440-b4fa-5017-991e-b4a5b22b5fd9",
"name": "CRABREST"
},
{
"id": "malware--6e812e51-feb9-54fb-8372-8e38aaead41d",
"name": "EASYCHAIR"
}
],
"name": "POISONIVY",
"operating_systems": [
"Windows"
],
"roles": [
"Backdoor"
],
"type": "malware",
"yara": [
{
"id": "signature--84b13cca-37e8-5c95-9471-b63dcaeb6df0",
"name": "FE_PoisonIVY_Stealer_Toolkit"
},
{
"id": "signature--22f52a69-ccc0-5763-bae7-c488ea856dae",
"name": "FE_APT_Backdoor_Win32_POISONIVY_1"
}
]
},
"relationships": [
{
"entityA": "POISONIVY",
"entityAFamily": "Indicator",
"entityAType": "Malware",
"entityB": "APT1",
"entityBFamily": "Indicator",
"entityBType": "Threat Actor",
"fields": {},
"name": "related-to",
"reverseName": "related-to",
"type": "IndicatorToIndicator"
},
{
"entityA": "POISONIVY",
"entityAFamily": "Indicator",
"entityAType": "Malware",
"entityB": "APT10",
"entityBFamily": "Indicator",
"entityBType": "Threat Actor",
"fields": {},
"name": "related-to",
"reverseName": "related-to",
"type": "IndicatorToIndicator"
}
],
"score": 0,
"type": "Malware",
"value": "POISONIVY"
}
}
}

Human Readable Output#

Results#

fieldsrawJSONrelationshipsscoretypevalue
operatingsystemrefs: Windows
aliases: Pivnoxy (Fortinet),
PIVY (LAC),
Pivy (Palo Alto Networks),
Pivydwnldr,
Poison Ivy,
Poison Ivy (JPCERT),
Poison Ivy (Proofpoint),
Poison Ivy (Symantec),
PoisonIvy,
Poisonivy (Check Point),
Poisonivy (Recorded Future),
Royal Road (Anomali),
Royal Road (Internet),
Spivy (Palo Alto Networks)
capabilities: {'name': 'Access raw disk', 'description': 'Capable of performing raw access to physical disks.'},
{'name': 'Allocates memory', 'description': 'Capable of allocating memory. '},
{'name': 'Capture operating system information', 'description': 'Can capture information about the system OS configuration.'}
tags: Aerospace & Defense,
Agriculture,
Automotive,
Chemicals & Materials,
Civil Society & Non-Profits,
Construction & Engineering,
Energy & Utilities,
Financial Services,
Governments,
Healthcare,
Hospitality,
Legal & Professional Services,
Manufacturing,
Media & Entertainment,
Oil & Gas,
Pharmaceuticals,
Retail,
Technology,
Telecommunications,
Transportation
mandiantdetections: APT.Backdoor.Win.POISONIVY,
POISON IVY (VARIANT),
FE_PoisonIVY_Stealer_Toolkit,
FE_APT_Backdoor_Win32_POISONIVY_1,
ET INFO SUSPICIOUS Dotted Quad Host MZ Response (ET OPEN),
ET POLICY PE EXE or DLL Windows file download HTTP (ET OPEN),
Backdoor.Win32.Poison.FEC2 (Trellix),
Trojan.APT.PoisonIvy,
Win.Dropper.Zusy-9801038-0 (ClamAV),
Backdoor.APT.PoisonIvy,
Win.Malware.Loader-9834612-0 (ClamAV),
Backdoor.Poison,
Backdoor.Win.PI.FEC2 (Trellix),
Trojan.Poison,
Trojan.PoisonIvy.DNS,
Win.Trojan.PoisonIvy-9755171-0 (ClamAV)
yara: ('FE_PoisonIVY_Stealer_Toolkit', 'signature--84b13cca-37e8-5c95-9471-b63dcaeb6df0'),
('FE_APT_Backdoor_Win32_POISONIVY_1', 'signature--22f52a69-ccc0-5763-bae7-c488ea856dae')
roles: Backdoor
stixid: malware--c14087e2-91dc-5a4c-a820-5eaa86ba4c99
name: {"POISONIVY": "POISONIVY"}
description: POISONIVY is a backdoor that exists as shellcode and communicates via a custom binary protocol over TCP. Additional shellcode plugins are downloaded, mapped directly into memory, and executed. Observed plugin functionality includes reverse shell, keylogging, video capture, audio capture, and registry manipulation. POISONIVY is configured, built, and controlled using a publicly available management interface. The interface produces the shellcode that must be included in, or executed by, a separate application.
updateddate: 2023-03-06T02:29:14.000Z
lastseenbysource: 2023-03-06T02:29:14.000Z
trafficlightprotocol: AMBER
Is Malware Family: true
DBot Score: {"Indicator": null, "Type": "Malware", "Vendor": "Mandiant", "Score": 0, "Reliability": "A - Completely reliable"}
publications: {'source': 'Mandiant', 'title': 'Country Profile: India (2022)', 'link': 'https://advantage.mandiant.com/reports/22-00022357', 'timestamp': 1668046325.0},
{'source': 'Mandiant', 'title': 'Supply Chain Compromise Trends, 2019–2020', 'link': 'https://advantage.mandiant.com/reports/21-00010407', 'timestamp': 1648063696.0}
actors: {'id': 'threat-actor--0ac5c1db-8ad6-54b8-b4b9-c32fc738c54a', 'name': 'APT1', 'country_name': 'China', 'iso2': 'CN', 'last_updated': '2023-02-23T14:17:35Z'},
{'id': 'threat-actor--bf9da649-f617-5464-9442-93e69cb80aa9', 'name': 'APT10', 'country_name': 'China', 'iso2': 'CN', 'last_updated': '2023-01-28T06:02:22Z'}
audience: {'name': 'intel_fusion', 'license': 'INTEL_RBI_FUS'},
{'name': 'intel_oper', 'license': 'INTEL_RBI_OPS'},
{'name': 'tlp_marking', 'license': 'amber'}
description: POISONIVY is a backdoor that exists as shellcode and communicates via a custom binary protocol over TCP. Additional shellcode plugins are downloaded, mapped directly into memory, and executed. Observed plugin functionality includes reverse shell, keylogging, video capture, audio capture, and registry manipulation. POISONIVY is configured, built, and controlled using a publicly available management interface. The interface produces the shellcode that must be included in, or executed by, a separate application.
detections: APT.Backdoor.Win.POISONIVY,
POISON IVY (VARIANT),
FE_PoisonIVY_Stealer_Toolkit,
FE_APT_Backdoor_Win32_POISONIVY_1,
ET INFO SUSPICIOUS Dotted Quad Host MZ Response (ET OPEN),
ET POLICY PE EXE or DLL Windows file download HTTP (ET OPEN),
Backdoor.Win32.Poison.FEC2 (Trellix),
Trojan.APT.PoisonIvy,
Win.Dropper.Zusy-9801038-0 (ClamAV),
Backdoor.APT.PoisonIvy,
Win.Malware.Loader-9834612-0 (ClamAV),
Backdoor.Poison,
Backdoor.Win.PI.FEC2 (Trellix),
Trojan.Poison,
Trojan.PoisonIvy.DNS,
Win.Trojan.PoisonIvy-9755171-0 (ClamAV)
id: malware--c14087e2-91dc-5a4c-a820-5eaa86ba4c99
industries: {'id': 'identity--cc593632-0c42-500c-8d0b-d38e97b90f1d', 'name': 'Aerospace & Defense'},
{'id': 'identity--cd044760-0aef-557e-94c4-bc672ea177c2', 'name': 'Agriculture'}
inherently_malicious: 1
last_activity_time: 2023-03-06T02:29:14.000Z
last_updated: 2023-03-06T02:29:14.000Z
malware: {'id': 'malware--709f2440-b4fa-5017-991e-b4a5b22b5fd9', 'name': 'CRABREST'},
{'id': 'malware--6e812e51-feb9-54fb-8372-8e38aaead41d', 'name': 'EASYCHAIR'}
name: POISONIVY
operating_systems: Windows
type: malware
yara: {'id': 'signature--84b13cca-37e8-5c95-9471-b63dcaeb6df0', 'name': 'FE_PoisonIVY_Stealer_Toolkit'},
{'id': 'signature--22f52a69-ccc0-5763-bae7-c488ea856dae', 'name': 'FE_APT_Backdoor_Win32_POISONIVY_1'}
is_publishable: true
counts: {"reports": 25, "capabilities": 42, "malware": 21, "actors": 27, "detections": 16, "cve": 11, "aliases": 14, "industries": 20, "attack_patterns": 68}
aliases: {'name': 'Pivnoxy (Fortinet)'},
{'name': 'PIVY (LAC)'}
capabilities: {'name': 'Access raw disk', 'description': 'Capable of performing raw access to physical disks.'},
{'name': 'Allocates memory', 'description': 'Capable of allocating memory. '}
cve: {'id': 'vulnerability--e0b130b7-1772-5c4d-891c-9c48eb1a5a23', 'cve_id': 'CVE-2012-0158'},
{'id': 'vulnerability--74c54fd3-dbc9-5273-88c6-b47975fca9b6', 'cve_id': 'CVE-2015-2545'},
{'id': 'vulnerability--005f9d5c-0298-52ea-b7d4-003fb7729586', 'cve_id': 'CVE-2018-0798'}
roles: Backdoor
{'name': 'related-to', 'reverseName': 'related-to', 'type': 'IndicatorToIndicator', 'entityA': 'POISONIVY', 'entityAFamily': 'Indicator', 'entityAType': 'Malware', 'entityB': 'APT1', 'entityBFamily': 'Indicator', 'entityBType': 'Threat Actor', 'fields': {}},
{'name': 'related-to', 'reverseName': 'related-to', 'type': 'IndicatorToIndicator', 'entityA': 'POISONIVY', 'entityAFamily': 'Indicator', 'entityAType': 'Malware', 'entityB': 'APT10', 'entityBFamily': 'Indicator', 'entityBType': 'Threat Actor', 'fields': {}}
0MalwarePOISONIVY

file#


Retrieve information about a File Hash from Mandiant

Base Command#

file

Input#

Argument NameDescriptionRequired
fileList of files.Optional

Context Output#

PathTypeDescription
MANDIANTTI.FILE.scoreNumberThe Severity Score of the File indicator
MANDIANTTI.FILE.fields.md5StringThe MD5 Hash associated with the File indicator
MANDIANTTI.FILE.fields.sha256StringThe SHA256 Hash associated with the File indicator
MANDIANTTI.FILE.fields.sha1StringThe SHA1 Hash associated with the File indicator
File.MD5StringMD5 hash of the file submitted for analysis.
File.SHA1StringSHA1 hash of the file submitted for analysis.
File.SHA256StringSHA256 hash of the file submitted for analysis.
DBotScore.ScorenumberThe actual score.
DBotScore.VendorStringThe vendor used to calculate the score.
DBotScore.TypeStringThe indicator type.
DBotScore.IndicatorStringThe indicator that was tested.

Command example#

!file file=9c944bd7a0af0ebd8a52f16d2e09f4ae

Context Example#

{
"MANDIANTTI": {
"FILE": [
{
"fields": {
"DBotScore": {
"Indicator": "9c944bd7a0af0ebd8a52f16d2e09f4ae",
"Reliability": "A - Completely reliable",
"Score": 3,
"Type": "file",
"Vendor": "Mandiant"
},
"firstseenbysource": "2016-06-09T16:27:25.000Z",
"lastseenbysource": "2016-06-09T16:27:25.000Z",
"md5": "9c944bd7a0af0ebd8a52f16d2e09f4ae",
"sha1": "03b89c5e964113cb25bf6581d35ca3db97692ae2",
"sha256": "74bb66638683a1a3b6b64d4b90b7979f60e9269418fc07b17eacfd3324688a5e",
"stixid": "md5--381c455d-58ba-51e0-89fa-74534671c9fc",
"trafficlightprotocol": "AMBER"
},
"rawJSON": {
"associated_hashes": [
{
"id": "md5--381c455d-58ba-51e0-89fa-74534671c9fc",
"type": "md5",
"value": "9c944bd7a0af0ebd8a52f16d2e09f4ae"
},
{
"id": "sha1--2d3d8372-ecef-50bb-947b-8c004c6489dc",
"type": "sha1",
"value": "03b89c5e964113cb25bf6581d35ca3db97692ae2"
},
{
"id": "sha256--55212b49-045d-5f74-a9c7-37907e016e6a",
"type": "sha256",
"value": "74bb66638683a1a3b6b64d4b90b7979f60e9269418fc07b17eacfd3324688a5e"
}
],
"campaigns": [],
"first_seen": "2016-06-09T16:27:25.000Z",
"id": "md5--381c455d-58ba-51e0-89fa-74534671c9fc",
"is_publishable": true,
"last_seen": "2016-06-09T16:27:25.000Z",
"last_updated": "2022-02-21T02:46:13.698Z",
"mscore": 100,
"publications": [],
"sources": [
{
"category": [],
"first_seen": "2016-06-09T16:27:25.000+0000",
"last_seen": "2016-06-09T16:27:25.000+0000",
"osint": false,
"source_name": "Mandiant"
},
{
"category": [],
"first_seen": "2016-06-09T16:27:25.000+0000",
"last_seen": "2016-06-09T16:27:25.000+0000",
"osint": false,
"source_name": "Mandiant"
}
],
"type": "md5",
"value": "9c944bd7a0af0ebd8a52f16d2e09f4ae"
},
"relationships": [],
"score": 3,
"type": "File",
"value": "9c944bd7a0af0ebd8a52f16d2e09f4ae"
}
]
}
}

Human Readable Output#

Results#

fieldsrawJSONrelationshipsscoretypevalue
firstseenbysource: 2016-06-09T16:27:25.000Z
lastseenbysource: 2016-06-09T16:27:25.000Z
stixid: md5--381c455d-58ba-51e0-89fa-74534671c9fc
trafficlightprotocol: AMBER
DBotScore: {"Indicator": "9c944bd7a0af0ebd8a52f16d2e09f4ae", "Type": "file", "Vendor": "Mandiant", "Score": 3, "Reliability": "A - Completely reliable"}
md5: 9c944bd7a0af0ebd8a52f16d2e09f4ae
sha256: 74bb66638683a1a3b6b64d4b90b7979f60e9269418fc07b17eacfd3324688a5e
sha1: 03b89c5e964113cb25bf6581d35ca3db97692ae2
id: md5--381c455d-58ba-51e0-89fa-74534671c9fc
mscore: 100
type: md5
value: 9c944bd7a0af0ebd8a52f16d2e09f4ae
is_publishable: true
sources: {'first_seen': '2016-06-09T16:27:25.000+0000', 'last_seen': '2016-06-09T16:27:25.000+0000', 'osint': False, 'category': [], 'source_name': 'Mandiant'},
{'first_seen': '2016-06-09T16:27:25.000+0000', 'last_seen': '2016-06-09T16:27:25.000+0000', 'osint': False, 'category': [], 'source_name': 'Mandiant'}
associated_hashes: {'id': 'md5--381c455d-58ba-51e0-89fa-74534671c9fc', 'type': 'md5', 'value': '9c944bd7a0af0ebd8a52f16d2e09f4ae'},
{'id': 'sha1--2d3d8372-ecef-50bb-947b-8c004c6489dc', 'type': 'sha1', 'value': '03b89c5e964113cb25bf6581d35ca3db97692ae2'},
{'id': 'sha256--55212b49-045d-5f74-a9c7-37907e016e6a', 'type': 'sha256', 'value': '74bb66638683a1a3b6b64d4b90b7979f60e9269418fc07b17eacfd3324688a5e'}
misp: {"akamai": false, "alexa": false, "alexa_1M": false, "amazon-aws": false, "apple": false, "automated-malware-analysis": false, "bank-website": false, "cisco_1M": false, "cisco_top1000": false, "cisco_top10k": false, "cisco_top20k": false, "cisco_top5k": false, "cloudflare": false, "common-contact-emails": false, "common-ioc-false-positive": false, "covid": false, "covid-19-cyber-threat-coalition-whitelist": false, "covid-19-krassi-whitelist": false, "crl-hostname": false, "crl-ip": false, "dax30": false, "disposable-email": false, "dynamic-dns": false, "eicar.com": false, "empty-hashes": false, "fastly": false, "google": false, "google-gcp": false, "google-gmail-sending-ips": false, "googlebot": false, "ipv6-linklocal": false, "majestic_million": false, "majestic_million_1M": false, "microsoft": false, "microsoft-attack-simulator": false, "microsoft-azure": false, "microsoft-azure-china": false, "microsoft-azure-germany": false, "microsoft-azure-us-gov": false, "microsoft-office365": false, "microsoft-office365-cn": false, "microsoft-office365-ip": false, "microsoft-win10-connection-endpoints": false, "moz-top500": false, "mozilla-CA": false, "mozilla-IntermediateCA": false, "multicast": false, "nioc-filehash": false, "ovh-cluster": false, "phone_numbers": false, "public-dns-hostname": false, "public-dns-v4": false, "public-dns-v6": false, "rfc1918": false, "rfc3849": false, "rfc5735": false, "rfc6598": false, "rfc6761": false, "second-level-tlds": false, "security-provider-blogpost": false, "sinkholes": false, "smtp-receiving-ips": false, "smtp-sending-ips": false, "stackpath": false, "ti-falsepositives": false, "tlds": false, "tranco": false, "tranco10k": false, "university_domains": false, "url-shortener": false, "vpn-ipv4": false, "vpn-ipv6": false, "whats-my-ip": false, "wikimedia": false}
last_updated: 2022-02-21T02:46:13.698Z
first_seen: 2016-06-09T16:27:25.000Z
last_seen: 2016-06-09T16:27:25.000Z
campaigns:
publications:
3File9c944bd7a0af0ebd8a52f16d2e09f4ae

ip#


Retrieve information about an IP Address from Mandiant

Base Command#

ip

Input#

Argument NameDescriptionRequired
ipList of IPs.Optional

Context Output#

PathTypeDescription
MANDIANTTI.IP.scoreNumberThe Severity Score of the IP indicator
MANDIANTTI.IP.fields.ipStringThe IP address of the IP indicator
DBotScore.ScorenumberThe actual score.
DBotScore.VendorStringThe vendor used to calculate the score.
DBotScore.TypeStringThe indicator type.
DBotScore.IndicatorStringThe indicator that was tested.
IP.AddressstringIP address

Command example#

!ip ip=124.248.207.50

Context Example#

{
"MANDIANTTI": {
"Campaign": {
"fields": {
"DBot Score": {
"Indicator": null,
"Reliability": "A - Completely reliable",
"Score": 0,
"Type": "Campaign",
"Vendor": "Mandiant"
},
"actors": [
"APT41"
],
"description": "In mid-October 2021, Mandiant observed a wave of APT41 activity targeting multiple U.S. state governments. We believe the actors exploited a vulnerability in a public-facing web application, used by numerous state governments and U.S. educational research institutes, to gain initial access. The actors then conducted reconnaissance and credential harvesting activity, dropping multiple files including the publicly available BADPOTATO privilege escalation tool. Mandiant also identified the DEADEYE dropper, which executed a KEYPLUG backdoor. \n\nThis activity is likely a continuation of a previously observed APT41 campaign targeting multiple U.S. state government entities in May 2021. The specific motivation behind the targeting of U.S. state government entities remains unclear, though we infer, based on the targeting profile, that the purpose may include capturing political intelligence or data related to sensitive technologies with national or state-level applications. It is also possible that the capture of credentials can facilitate future targeting or pivoting to targets of interest.",
"publications": [],
"tags": [
"Governments"
]
},
"rawJSON": {
"actors": [
{
"attribution_scope": "confirmed",
"id": "threat-actor--9c88bd9c-f41b-59fa-bfb6-427b1755ea64",
"motivations": [
{
"attribution_scope": "confirmed",
"id": "motivation--fa4d4992-1762-50ac-b0b1-2c75210645d0",
"name": "Financial Gain",
"releasable": true,
"type": "motivation"
},
{
"attribution_scope": "confirmed",
"id": "motivation--1b8ca82a-7cff-5622-bedd-965c11d38a9e",
"name": "Espionage",
"releasable": true,
"type": "motivation"
}
],
"name": "APT41",
"releasable": true,
"source_locations": [
{
"country": {
"attribution_scope": "confirmed",
"id": "location--740e7e5f-f2a0-55e0-98a3-88872c55b581",
"iso2": "CN",
"name": "China",
"releasable": true,
"type": "location"
},
"region": {
"attribution_scope": "confirmed",
"id": "location--8fc231f3-4e62-57e7-b734-eaee0a734612",
"name": "Asia",
"releasable": true,
"type": "location"
},
"releasable": true,
"sub_region": {
"attribution_scope": "confirmed",
"id": "location--7b33370b-da4b-5c48-9741-b69f69febb77",
"name": "East Asia",
"releasable": true,
"type": "location"
}
}
],
"type": "threat-actor"
}
],
"aliases": {
"actor": [
{
"attribution_scope": "confirmed",
"id": "alias--c63f2b2b-3639-5bd0-be28-b1cb79b00b21",
"name": "Barium (Microsoft)",
"nucleus_name": "Barium",
"releasable": true,
"source": "Microsoft",
"type": "alias"
}
],
"campaign": [],
"malware": [],
"releasable": true
},
"audience": [
{
"license": "INTEL_RBI_OPS",
"name": "intel_oper"
},
{
"license": "INTEL_RBI_FUS",
"name": "intel_fusion"
},
{
"license": "amber",
"name": "tlp_marking"
}
],
"campaign_type": "Individual",
"counts": {
"actor_collaborations": 0,
"actors": 1,
"campaigns": 0,
"industries": 1,
"malware": 19,
"reports": 4,
"timeline": 104,
"tools": 9,
"vulnerabilities": 1
},
"description": "In mid-October 2021, Mandiant observed a wave of APT41 activity targeting multiple U.S. state governments. We believe the actors exploited a vulnerability in a public-facing web application, used by numerous state governments and U.S. educational research institutes, to gain initial access. The actors then conducted reconnaissance and credential harvesting activity, dropping multiple files including the publicly available BADPOTATO privilege escalation tool. Mandiant also identified the DEADEYE dropper, which executed a KEYPLUG backdoor. \n\nThis activity is likely a continuation of a previously observed APT41 campaign targeting multiple U.S. state government entities in May 2021. The specific motivation behind the targeting of U.S. state government entities remains unclear, though we infer, based on the targeting profile, that the purpose may include capturing political intelligence or data related to sensitive technologies with national or state-level applications. It is also possible that the capture of credentials can facilitate future targeting or pivoting to targets of interest.",
"id": "campaign--c344bb9b-cb50-58be-9c33-350b622c1fce",
"industries": [
{
"attribution_scope": "confirmed",
"id": "identity--8d0881d8-d199-5e5a-bef9-be3ca6bb8f0d",
"name": "Governments",
"releasable": true,
"type": "identity"
}
],
"is_publishable": true,
"last_activity_time": "2022-02-26T00:00:00.000Z",
"malware": [
{
"attribution_scope": "confirmed",
"id": "malware--448e822d-8496-5021-88cb-599062f74176",
"name": "BEACON",
"releasable": true,
"type": "malware"
},
{
"attribution_scope": "confirmed",
"id": "malware--ad51977a-c6fc-5cd3-822e-4e2aa6c832a2",
"name": "FASTPACE",
"releasable": true,
"type": "malware"
},
{
"attribution_scope": "confirmed",
"id": "malware--e62ff7e0-b076-53bb-9872-5888833df016",
"name": "KEYPLUG.PASSIVE",
"releasable": true,
"type": "malware"
},
{
"attribution_scope": "confirmed",
"id": "malware--cc16c574-c8ff-5873-8ee2-ca5fe841d86f",
"name": "LOWKEY.PASSIVE",
"releasable": true,
"type": "malware"
},
{
"attribution_scope": "confirmed",
"id": "malware--826fd422-6e98-5ea9-82c1-0cf54072658f",
"name": "DEADEYE.EMBED",
"releasable": true,
"type": "malware"
},
{
"attribution_scope": "confirmed",
"id": "malware--81b043a3-44c5-526a-af8c-b2730ba3bfbb",
"name": "DEADEYE.APPEND",
"releasable": true,
"type": "malware"
},
{
"attribution_scope": "confirmed",
"id": "malware--29ff2215-d745-5855-a3dd-3178121aac8a",
"name": "LOWKEY",
"releasable": true,
"type": "malware"
},
{
"attribution_scope": "confirmed",
"id": "malware--515cf8ae-3453-5eb6-a07b-a9f0fa586959",
"name": "TRAILBRAKE",
"releasable": true,
"type": "malware"
},
{
"attribution_scope": "confirmed",
"id": "malware--6732275a-d77a-50d8-84c3-d54c36a93d1b",
"name": "ICECOLD",
"releasable": true,
"type": "malware"
},
{
"attribution_scope": "confirmed",
"id": "malware--0514a150-7c5a-512f-bec2-8aa51cbcb8b1",
"name": "DEADEYE",
"releasable": true,
"type": "malware"
},
{
"attribution_scope": "confirmed",
"id": "malware--487dd1af-1763-5af3-878e-dc606dd71f6e",
"name": "KEYPLUG.LINUX",
"releasable": true,
"type": "malware"
},
{
"attribution_scope": "confirmed",
"id": "malware--440967f3-ca59-5708-837a-b6d0ae58a413",
"name": "JAYPOTATO",
"releasable": true,
"type": "malware"
},
{
"attribution_scope": "confirmed",
"id": "malware--8e99e597-dda4-57dc-be6e-f1bc8b80a5f3",
"name": "BADPOTATO",
"releasable": true,
"type": "malware"
},
{
"attribution_scope": "confirmed",
"id": "malware--81737f54-c8df-55cf-96c3-77aa373ab4c9",
"name": "SWEETSHOT",
"releasable": true,
"type": "malware"
},
{
"attribution_scope": "confirmed",
"id": "malware--e9eda095-4e8b-5c30-a5cd-a531b39a0a2f",
"name": "DUSTCOVER",
"releasable": true,
"type": "malware"
},
{
"attribution_scope": "confirmed",
"id": "malware--8c31abe5-7cb1-51f4-97d5-a14e0a95eccb",
"name": "KEYPLUG.LINUX.PASSIVE",
"releasable": true,
"type": "malware"
},
{
"attribution_scope": "confirmed",
"id": "malware--b0e965fb-1737-5c63-85c7-e90a323b1e27",
"name": "HTRAN",
"releasable": true,
"type": "malware"
},
{
"attribution_scope": "confirmed",
"id": "malware--13e9e1a1-5870-5caa-af40-26b9027df5ef",
"name": "DUSTPAN",
"releasable": true,
"type": "malware"
},
{
"attribution_scope": "confirmed",
"id": "malware--4484e24c-fbf7-5894-90e2-4c6ed949ec6c",
"name": "KEYPLUG",
"releasable": true,
"type": "malware"
}
],
"name": "APT41 Exploition of .NET Web Applications at U.S. State Governments",
"profile_updated": "2023-03-06T07:10:13.356Z",
"releasable": true,
"short_name": "CAMP.21.014",
"target_locations": {
"countries": [
{
"attribution_scope": "confirmed",
"count": 8,
"id": "location--5c5b39aa-9308-52a6-9daf-0547d5aaa160",
"iso2": "US",
"name": "United States of America",
"region": "location--6d65522f-0166-5e7e-973c-35cf7973e4e3",
"releasable": true,
"sub_region": "location--0daadcfb-ad23-5f16-b53b-6c5b09bf20de",
"type": "location"
}
],
"regions": [
{
"attribution_scope": "confirmed",
"count": 8,
"id": "location--6d65522f-0166-5e7e-973c-35cf7973e4e3",
"name": "Americas",
"releasable": true,
"type": "location"
}
],
"releasable": true,
"sub_regions": [
{
"attribution_scope": "confirmed",
"count": 8,
"id": "location--0daadcfb-ad23-5f16-b53b-6c5b09bf20de",
"name": "North America",
"region": "location--6d65522f-0166-5e7e-973c-35cf7973e4e3",
"releasable": true,
"type": "location"
}
]
},
"timeline": [
{
"description": "Mandiant Declared Campaign",
"event_type": "created",
"name": "Campaign Created",
"releasable": true,
"timestamp": "2021-10-18T00:00:00.000Z"
},
{
"description": "Mandiant Observed First Activity of Campaign",
"event_type": "first_observed",
"name": "First Observed",
"releasable": true,
"timestamp": "2020-06-15T00:00:00.000Z"
},
{
"description": "Mandiant Observed Use of The Technique",
"event_type": "technique_observed",
"mandiant_technique": {
"attribution_scope": "confirmed",
"id": "attack-pattern--ae0d50d8-79de-5193-9223-178fde2c0756",
"name": "Privilege escalation via access token impersonation",
"releasable": true,
"type": "attack-pattern"
},
"mitre_techniques": [
{
"attribution_scope": "confirmed",
"id": "attack-pattern--86850eff-2729-40c3-b85e-c4af26da4a2d",
"mitre_id": "T1134.001",
"name": "Token Impersonation/Theft",
"releasable": true,
"tactics": [
"Privilege Escalation",
"Defense Evasion"
],
"type": "attack-pattern"
},
{
"attribution_scope": "confirmed",
"id": "attack-pattern--dcaa092b-7de9-4a21-977f-7fcb77e89c48",
"mitre_id": "T1134",
"name": "Access Token Manipulation",
"releasable": true,
"tactics": [
"Privilege Escalation",
"Defense Evasion"
],
"type": "attack-pattern"
}
],
"name": "Technique Observed",
"releasable": true,
"used_by": [
{
"actor": {
"attribution_scope": "confirmed",
"id": "threat-actor--9c88bd9c-f41b-59fa-bfb6-427b1755ea64",
"name": "APT41",
"releasable": true,
"type": "threat-actor"
},
"first_observed": "2021-05-05T00:00:00.000Z",
"last_observed": "2021-10-17T00:00:00.000Z",
"releasable": true
}
]
}
],
"tools": [
{
"attribution_scope": "confirmed",
"id": "malware--8130c516-308e-51e1-b16c-f398d80e67b0",
"name": "IMPACKET.PSEXEC",
"releasable": true,
"type": "malware"
},
{
"attribution_scope": "confirmed",
"id": "malware--bf2fc1e5-7850-5ecd-87a7-263e6da5708d",
"name": "MIMIKATZ",
"releasable": true,
"type": "malware"
},
{
"attribution_scope": "confirmed",
"id": "malware--934dcadf-f9a8-52c1-9c90-353a1c3144d5",
"name": "PSEXEC",
"releasable": true,
"type": "malware"
},
{
"attribution_scope": "confirmed",
"id": "malware--47530422-6b2d-5329-95c1-fcf7698edeee",
"name": "7ZIP",
"releasable": true,
"type": "malware"
},
{
"attribution_scope": "confirmed",
"id": "malware--f872b3e0-c277-5716-baae-885a9c410398",
"name": "WHOAMI",
"releasable": true,
"type": "malware"
},
{
"attribution_scope": "confirmed",
"id": "malware--e224f74a-ca0e-540b-884f-03753787316f",
"name": "NLTEST",
"releasable": true,
"type": "malware"
},
{
"attribution_scope": "confirmed",
"id": "malware--2db234c8-596a-58f9-a50f-ce24b58965cd",
"name": "IMPACKET.SMBEXEC",
"releasable": true,
"type": "malware"
},
{
"attribution_scope": "confirmed",
"id": "malware--0c7945de-0968-55e3-ad4e-1600ddfc6b36",
"name": "PROCDUMP",
"releasable": true,
"type": "malware"
},
{
"attribution_scope": "confirmed",
"id": "malware--fed3481f-0095-53f2-8c32-7e286013233b",
"name": "DSQUERY",
"releasable": true,
"type": "malware"
}
],
"type": "campaign",
"vulnerabilities": [
{
"attribution_scope": "confirmed",
"cve_id": "CVE-2021-44207",
"id": "vulnerability--362764b4-aa15-55fd-a68b-caf84f25a6b0",
"releasable": true,
"type": "vulnerability"
}
]
},
"relationships": [
{
"entityA": "CAMP.21.014",
"entityAFamily": "Indicator",
"entityAType": "Campaign",
"entityB": "APT41",
"entityBFamily": "Indicator",
"entityBType": "Threat Actor",
"fields": {},
"name": "related-to",
"reverseName": "related-to",
"type": "IndicatorToIndicator"
},
{
"entityA": "CAMP.21.014",
"entityAFamily": "Indicator",
"entityAType": "Campaign",
"entityB": "BEACON",
"entityBFamily": "Indicator",
"entityBType": "Malware",
"fields": {},
"name": "related-to",
"reverseName": "related-to",
"type": "IndicatorToIndicator"
}
],
"type": "Campaign",
"value": "CAMP.21.014"
},
"IP": [
{
"fields": {
"DBotScore": {
"Indicator": "124.248.207.50",
"Reliability": "A - Completely reliable",
"Score": 2,
"Type": "ip",
"Vendor": "Mandiant"
},
"firstseenbysource": "2016-06-09T16:28:01.000Z",
"ip": "124.248.207.50",
"lastseenbysource": "2018-04-19T17:23:59.000Z",
"stixid": "ipv4--3a4d8f76-6fde-5b25-9672-a45a0ac16bc8",
"trafficlightprotocol": "AMBER"
},
"rawJSON": {
"attributed_associations": [
{
"id": "threat-actor--3790b99d-7067-536c-821d-19953727bf7b",
"name": "Turla Team",
"type": "threat-actor"
}
],
"campaigns": [],
"first_seen": "2016-06-09T16:28:01.000Z",
"id": "ipv4--3a4d8f76-6fde-5b25-9672-a45a0ac16bc8",
"is_exclusive": false,
"is_publishable": true,
"last_seen": "2018-04-19T17:23:59.000Z",
"last_updated": "2022-05-14T10:15:13.771Z",
"mscore": 52,
"publications": [],
"sources": [
{
"category": [],
"first_seen": "2018-01-08T21:29:53.000+0000",
"last_seen": "2018-04-19T17:23:59.000+0000",
"osint": false,
"source_name": "Mandiant"
},
{
"category": [],
"first_seen": "2016-06-09T16:28:01.000+0000",
"last_seen": "2016-06-09T16:28:01.000+0000",
"osint": false,
"source_name": "Mandiant"
}
],
"type": "ipv4",
"value": "124.248.207.50"
},
"relationships": [],
"score": 2,
"type": "IP",
"value": "124.248.207.50"
}
]
}
}

Human Readable Output#

Results#

fieldsrawJSONrelationshipsscoretypevalue
firstseenbysource: 2016-06-09T16:28:01.000Z
lastseenbysource: 2018-04-19T17:23:59.000Z
stixid: ipv4--3a4d8f76-6fde-5b25-9672-a45a0ac16bc8
trafficlightprotocol: AMBER
DBotScore: {"Indicator": "124.248.207.50", "Type": "ip", "Vendor": "Mandiant", "Score": 2, "Reliability": "A - Completely reliable"}
ip: 124.248.207.50
id: ipv4--3a4d8f76-6fde-5b25-9672-a45a0ac16bc8
mscore: 52
type: ipv4
value: 124.248.207.50
is_exclusive: false
is_publishable: true
sources: {'first_seen': '2018-01-08T21:29:53.000+0000', 'last_seen': '2018-04-19T17:23:59.000+0000', 'osint': False, 'category': [], 'source_name': 'Mandiant'},
{'first_seen': '2016-06-09T16:28:01.000+0000', 'last_seen': '2016-06-09T16:28:01.000+0000', 'osint': False, 'category': [], 'source_name': 'Mandiant'}
attributed_associations: {'id': 'threat-actor--3790b99d-7067-536c-821d-19953727bf7b', 'name': 'Turla Team', 'type': 'threat-actor'}
misp: {"akamai": false, "alexa": false, "alexa_1M": false, "amazon-aws": false, "apple": false, "automated-malware-analysis": false, "bank-website": false, "cisco_1M": false, "cisco_top1000": false, "cisco_top10k": false, "cisco_top20k": false, "cisco_top5k": false, "cloudflare": false, "common-contact-emails": false, "common-ioc-false-positive": false, "covid": false, "covid-19-cyber-threat-coalition-whitelist": false, "covid-19-krassi-whitelist": false, "crl-hostname": false, "crl-ip": false, "dax30": false, "disposable-email": false, "dynamic-dns": false, "eicar.com": false, "empty-hashes": false, "fastly": false, "google": false, "google-gcp": false, "google-gmail-sending-ips": false, "googlebot": false, "ipv6-linklocal": false, "majestic_million": false, "majestic_million_1M": false, "microsoft": false, "microsoft-attack-simulator": false, "microsoft-azure": false, "microsoft-azure-china": false, "microsoft-azure-germany": false, "microsoft-azure-us-gov": false, "microsoft-office365": false, "microsoft-office365-cn": false, "microsoft-office365-ip": false, "microsoft-win10-connection-endpoints": false, "moz-top500": false, "mozilla-CA": false, "mozilla-IntermediateCA": false, "multicast": false, "nioc-filehash": false, "ovh-cluster": false, "phone_numbers": false, "public-dns-hostname": false, "public-dns-v4": false, "public-dns-v6": false, "rfc1918": false, "rfc3849": false, "rfc5735": false, "rfc6598": false, "rfc6761": false, "second-level-tlds": false, "security-provider-blogpost": false, "sinkholes": false, "smtp-receiving-ips": false, "smtp-sending-ips": false, "stackpath": false, "ti-falsepositives": false, "tlds": false, "tranco": false, "tranco10k": false, "university_domains": false, "url-shortener": false, "vpn-ipv4": false, "vpn-ipv6": false, "whats-my-ip": false, "wikimedia": false}
last_updated: 2022-05-14T10:15:13.771Z
first_seen: 2016-06-09T16:28:01.000Z
last_seen: 2018-04-19T17:23:59.000Z
campaigns:
publications:
2IP124.248.207.50

url#


Retrieve information about a URL from Mandiant

Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.

Base Command#

url

Input#

Argument NameDescriptionRequired
urlList of URLs.Optional

Context Output#

PathTypeDescription
MANDIANTTI.URL.scoreNumberThe Severity Score of the URL indicator
MANDIANTTI.URL.fields.urlStringThe URL value for the Domain indicator
URL.DataStringURL data.
DBotScore.ScorenumberThe actual score.
DBotScore.VendorStringThe vendor used to calculate the score.
DBotScore.TypeStringThe indicator type.
DBotScore.IndicatorStringThe indicator that was tested.

Command example#

!url url=http://67.205.132.162/a.txt

Context Example#

{
"MANDIANTTI": {
"URL": [
{
"fields": {
"DBotScore": {
"Indicator": "http://67.205.132.162/a.txt",
"Reliability": "A - Completely reliable",
"Score": 3,
"Type": "url",
"Vendor": "Mandiant"
},
"firstseenbysource": "2021-06-14T17:46:19.000Z",
"lastseenbysource": "2021-06-14T17:46:41.000Z",
"stixid": "url--e5cc1f98-a9db-5e45-88c3-957fec8f274d",
"trafficlightprotocol": "AMBER",
"url": "http://67.205.132.162/a.txt"
},
"rawJSON": {
"attributed_associations": [
{
"id": "threat-actor--9c88bd9c-f41b-59fa-bfb6-427b1755ea64",
"name": "APT41",
"type": "threat-actor"
}
],
"campaigns": [
{
"id": "campaign--c344bb9b-cb50-58be-9c33-350b622c1fce",
"name": "CAMP.21.014",
"title": "APT41 Exploition of .NET Web Applications at U.S. State Governments"
}
],
"first_seen": "2021-06-14T17:46:19.000Z",
"id": "url--e5cc1f98-a9db-5e45-88c3-957fec8f274d",
"is_exclusive": true,
"is_publishable": true,
"last_seen": "2021-06-14T17:46:41.000Z",
"last_updated": "2022-10-10T23:04:53.568Z",
"mscore": 100,
"publications": [],
"sources": [
{
"category": [],
"first_seen": "2021-06-14T17:46:19.000+0000",
"last_seen": "2021-06-14T17:46:41.000+0000",
"osint": false,
"source_name": "Mandiant"
}
],
"type": "url",
"value": "http://67.205.132.162/a.txt"
},
"relationships": [
{
"entityA": "http://67.205.132.162/a.txt",
"entityAFamily": "Indicator",
"entityAType": "URL",
"entityB": "CAMP.21.014",
"entityBFamily": "Indicator",
"entityBType": "Campaign",
"fields": {},
"name": "related-to",
"reverseName": "related-to",
"type": "IndicatorToIndicator"
}
],
"score": 3,
"type": "URL",
"value": "http://67.205.132.162/a.txt"
}
]
}
}

Human Readable Output#

Results#

fieldsrawJSONrelationshipsscoretypevalue
firstseenbysource: 2021-06-14T17:46:19.000Z
lastseenbysource: 2021-06-14T17:46:41.000Z
stixid: url--e5cc1f98-a9db-5e45-88c3-957fec8f274d
trafficlightprotocol: AMBER
DBotScore: {"Indicator": "http://67.205.132.162/a.txt", "Type": "url", "Vendor": "Mandiant", "Score": 3, "Reliability": "A - Completely reliable"}
url: http://67.205.132.162/a.txt
id: url--e5cc1f98-a9db-5e45-88c3-957fec8f274d
mscore: 100
type: url
value: http://67.205.132.162/a.txt
is_exclusive: true
is_publishable: true
sources: {'first_seen': '2021-06-14T17:46:19.000+0000', 'last_seen': '2021-06-14T17:46:41.000+0000', 'osint': False, 'category': [], 'source_name': 'Mandiant'}
attributed_associations: {'id': 'threat-actor--9c88bd9c-f41b-59fa-bfb6-427b1755ea64', 'name': 'APT41', 'type': 'threat-actor'}
misp: {"akamai": false, "alexa": false, "alexa_1M": false, "amazon-aws": false, "apple": false, "automated-malware-analysis": false, "bank-website": false, "cisco_1M": false, "cisco_top1000": false, "cisco_top10k": false, "cisco_top20k": false, "cisco_top5k": false, "cloudflare": false, "common-contact-emails": false, "common-ioc-false-positive": false, "covid": false, "covid-19-cyber-threat-coalition-whitelist": false, "covid-19-krassi-whitelist": false, "crl-hostname": false, "crl-ip": false, "dax30": false, "disposable-email": false, "dynamic-dns": false, "eicar.com": false, "empty-hashes": false, "fastly": false, "google": false, "google-gcp": false, "google-gmail-sending-ips": false, "googlebot": false, "ipv6-linklocal": false, "majestic_million": false, "majestic_million_1M": false, "microsoft": false, "microsoft-attack-simulator": false, "microsoft-azure": false, "microsoft-azure-china": false, "microsoft-azure-germany": false, "microsoft-azure-us-gov": false, "microsoft-office365": false, "microsoft-office365-cn": false, "microsoft-office365-ip": false, "microsoft-win10-connection-endpoints": false, "moz-top500": false, "mozilla-CA": false, "mozilla-IntermediateCA": false, "multicast": false, "nioc-filehash": false, "ovh-cluster": false, "phone_numbers": false, "public-dns-hostname": false, "public-dns-v4": false, "public-dns-v6": false, "rfc1918": false, "rfc3849": false, "rfc5735": false, "rfc6598": false, "rfc6761": false, "second-level-tlds": false, "security-provider-blogpost": false, "sinkholes": false, "smtp-receiving-ips": false, "smtp-sending-ips": false, "stackpath": false, "tenable-cloud-ipv4": false, "tenable-cloud-ipv6": false, "ti-falsepositives": false, "tlds": false, "tranco": false, "tranco10k": false, "university_domains": false, "url-shortener": false, "vpn-ipv4": true, "vpn-ipv6": false, "whats-my-ip": false, "wikimedia": false}
last_updated: 2022-10-10T23:04:53.568Z
first_seen: 2021-06-14T17:46:19.000Z
last_seen: 2021-06-14T17:46:41.000Z
campaigns: {'id': 'campaign--c344bb9b-cb50-58be-9c33-350b622c1fce', 'name': 'CAMP.21.014', 'title': 'APT41 Exploition of .NET Web Applications at U.S. State Governments'}
publications:
{'name': 'related-to', 'reverseName': 'related-to', 'type': 'IndicatorToIndicator', 'entityA': 'http://67.205.132.162/a.txt', 'entityAFamily': 'Indicator', 'entityAType': 'URL', 'entityB': 'CAMP.21.014', 'entityBFamily': 'Indicator', 'entityBType': 'Campaign', 'fields': {}}3URLhttp://67.205.132.162/a.txt

domain#


Retrieve information about an FQDN from Mandiant

Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.

Base Command#

domain

Input#

Argument NameDescriptionRequired
domainList of domains.Optional

Context Output#

PathTypeDescription
MANDIANTTI.DOMAIN.scoreNumberThe Severity Score of the Domain indicator
MANDIANTTI.DOMAIN.fields.dnsStringThe DNS record value for the Domain indicator
MANDIANTTI.DOMAIN.fields.domainStringThe domain name for the Domain indicator
DBotScore.ScorenumberThe actual score.
DBotScore.VendorStringThe vendor used to calculate the score.
DBotScore.TypeStringThe indicator type.
DBotScore.IndicatorStringThe indicator that was tested.
Domain.NamestringThe Domain being checked

Command example#

!domain domain=2011.my03.com

Context Example#

{
"MANDIANTTI": {
"DOMAIN": [
{
"fields": {
"DBotScore": {
"Indicator": "2011.my03.com",
"Reliability": "A - Completely reliable",
"Score": 0,
"Type": "domain",
"Vendor": "Mandiant"
},
"dns": "2011.my03.com",
"domain": "2011.my03.com",
"firstseenbysource": "2016-06-09T16:28:00.000Z",
"lastseenbysource": "2023-01-23T16:52:33.000Z",
"stixid": "fqdn--3c525155-bc95-511d-a717-83e50e20aa14",
"trafficlightprotocol": "AMBER"
},
"rawJSON": {
"campaigns": [],
"first_seen": "2016-06-09T16:28:00.000Z",
"id": "fqdn--3c525155-bc95-511d-a717-83e50e20aa14",
"is_publishable": true,
"last_seen": "2023-01-23T16:52:33.000Z",
"last_updated": "2023-02-20T18:43:42.349Z",
"mscore": 50,
"publications": [],
"sources": [
{
"category": [],
"first_seen": "2023-01-23T16:52:33.000+0000",
"last_seen": "2023-01-23T16:52:33.000+0000",
"osint": false,
"source_name": "Mandiant"
},
{
"category": [],
"first_seen": "2016-06-09T16:28:00.000+0000",
"last_seen": "2016-06-09T16:28:00.000+0000",
"osint": false,
"source_name": "Mandiant"
}
],
"type": "fqdn",
"value": "2011.my03.com"
},
"relationships": [],
"score": 0,
"type": "Domain",
"value": "2011.my03.com"
}
]
}
}

Human Readable Output#

Results#

fieldsrawJSONrelationshipsscoretypevalue
firstseenbysource: 2016-06-09T16:28:00.000Z
lastseenbysource: 2023-01-23T16:52:33.000Z
stixid: fqdn--3c525155-bc95-511d-a717-83e50e20aa14
trafficlightprotocol: AMBER
DBotScore: {"Indicator": "2011.my03.com", "Type": "domain", "Vendor": "Mandiant", "Score": 0, "Reliability": "A - Completely reliable"}
dns: 2011.my03.com
domain: 2011.my03.com
id: fqdn--3c525155-bc95-511d-a717-83e50e20aa14
mscore: 50
type: fqdn
value: 2011.my03.com
is_publishable: true
sources: {'first_seen': '2023-01-23T16:52:33.000+0000', 'last_seen': '2023-01-23T16:52:33.000+0000', 'osint': False, 'category': [], 'source_name': 'Mandiant'},
{'first_seen': '2016-06-09T16:28:00.000+0000', 'last_seen': '2016-06-09T16:28:00.000+0000', 'osint': False, 'category': [], 'source_name': 'Mandiant'}
misp: {"akamai": false, "alexa": false, "alexa_1M": false, "amazon-aws": false, "apple": false, "automated-malware-analysis": false, "bank-website": false, "captive-portals": false, "cisco_1M": true, "cisco_top1000": false, "cisco_top10k": false, "cisco_top20k": false, "cisco_top5k": false, "cloudflare": false, "common-contact-emails": false, "common-ioc-false-positive": false, "covid": false, "covid-19-cyber-threat-coalition-whitelist": false, "covid-19-krassi-whitelist": false, "crl-hostname": false, "crl-ip": false, "dax30": false, "disposable-email": false, "dynamic-dns": false, "eicar.com": false, "empty-hashes": false, "fastly": false, "google": false, "google-chrome-crux-1million": false, "google-gcp": false, "google-gmail-sending-ips": false, "googlebot": false, "ipv6-linklocal": false, "majestic_million": false, "majestic_million_1M": false, "microsoft": false, "microsoft-attack-simulator": false, "microsoft-azure": false, "microsoft-azure-appid": false, "microsoft-azure-china": false, "microsoft-azure-germany": false, "microsoft-azure-us-gov": false, "microsoft-office365": false, "microsoft-office365-cn": false, "microsoft-office365-ip": false, "microsoft-win10-connection-endpoints": false, "moz-top500": false, "mozilla-CA": false, "mozilla-IntermediateCA": false, "multicast": false, "nioc-filehash": false, "ovh-cluster": false, "parking-domain": false, "parking-domain-ns": false, "phone_numbers": false, "public-dns-hostname": false, "public-dns-v4": false, "public-dns-v6": false, "public-ipfs-gateways": false, "rfc1918": false, "rfc3849": false, "rfc5735": false, "rfc6598": false, "rfc6761": false, "second-level-tlds": true, "security-provider-blogpost": false, "sinkholes": false, "smtp-receiving-ips": false, "smtp-sending-ips": false, "stackpath": false, "tenable-cloud-ipv4": false, "tenable-cloud-ipv6": false, "ti-falsepositives": false, "tlds": true, "tranco": true, "tranco10k": false, "university_domains": false, "url-shortener": false, "vpn-ipv4": false, "vpn-ipv6": false, "whats-my-ip": false, "wikimedia": false}
last_updated: 2023-02-20T18:43:42.349Z
first_seen: 2016-06-09T16:28:00.000Z
last_seen: 2023-01-23T16:52:33.000Z
campaigns:
publications:
0Domain2011.my03.com

cve#


Retrieve information about a Vulnerability (by CVE) from Mandiant

Base Command#

cve

Input#

Argument NameDescriptionRequired
cveList of CVEs.Optional

Context Output#

PathTypeDescription
MANDIANTTI.CVE.scoreNumberThe Severity Score of the CVE
MANDIANTTI.CVE.idStringThe CVE ID
MANDIANTTI.CVE.fields.cvssStringThe CVSS version of the CVE
MANDIANTTI.CVE.fields.cvssvectorStringThe CVSS vector string for the CVE
MANDIANTTI.CVE.fields.cvss2.metricStringThe name of the CVSS metric
MANDIANTTI.CVE.fields.cvss2.valuesStringThe values of the CVSS metric
DBotScore.ScorenumberThe actual score.
DBotScore.VendorStringThe vendor used to calculate the score.
DBotScore.TypeStringThe indicator type.
DBotScore.IndicatorStringThe indicator that was tested.

Command example#

!cve cve=CVE-2018-8120

Context Example#

{
"MANDIANTTI": {
"CVE": [
{
"fields": {
"DBotScore": {
"Indicator": null,
"Reliability": "A - Completely reliable",
"Score": 0,
"Type": "cve",
"Vendor": "Mandiant"
},
"cvss": "v2.0",
"cvss2": [
{
"metric": "Access Complexity",
"values": "MEDIUM"
},
{
"metric": "Access Vector",
"values": "LOCAL"
},
{
"metric": "Authentication",
"values": "NONE"
},
{
"metric": "Availability Impact",
"values": "COMPLETE"
},
{
"metric": "Base Score",
"values": 6.9
},
{
"metric": "Confidentiality Impact",
"values": "COMPLETE"
},
{
"metric": "Exploitability",
"values": "FUNCTIONAL"
},
{
"metric": "Integrity Impact",
"values": "COMPLETE"
},
{
"metric": "Remediation Level",
"values": "OFFICIAL_FIX"
},
{
"metric": "Report Confidence",
"values": "CONFIRMED"
},
{
"metric": "Temporal Score",
"values": 5.7
},
{
"metric": "Vector String",
"values": "AV:L/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C"
}
],
"cvssvector": "AV:L/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C",
"id": null,
"stixid": "vulnerability--6dc0a4db-e822-5c76-bca2-b7eb750da2ad",
"trafficlightprotocol": "AMBER"
},
"rawJSON": {
"affects_ot": false,
"aliases": [],
"analysis": "<p>An attacker could exploit this vulnerability to execute arbitrary code. An attacker would need to gain low privilege access to the vulnerable system to exploit this issue. Further, upon obtaining the low privilege access, an attacker would need to craft a program which can change the privilege of the current process, using the call gate functions. A failed attempt at exploitation could potentially cause a crash of the application, resulting in a denial-of-service condition.</p>\n<p>&nbsp;</p>\n<p>A non-weaponized exploit is publicly available on VirusTotal, in the form of a PDF sample. This exploit code creates a new windowstation object and assigns it to the current process in user-mode, making the spklList Pointer field equal to zero. This code writes an arbitrary address in the kernel space by mapping the NULL page and setting a pointer to offset 0x2C. Upon writing an arbitrary address, the attacker changes the privilege level of a process by setting call gate to Ring 0. Further, the exploit uses the CALL FAR instruction to perform an inter-privilege level call, giving an attacker administrative access on the system. A similar exploit code is also publicly available via GitHub.</p>\n<p>&nbsp;</p>\n<p>An exploit code in the form of a Metasploit module has been publicly released. This exploit can trigger the null pointer dereference issue which is caused when the Win32k component does not properly handle objects in memory. Successful exploitation via this code will allow an attacker to perform privileged tasks on the compromised machine.</p>\n<p>&nbsp;</p>\n<p>Microsoft has reported this vulnerability has been exploited. Additionally, it is reported that threat actor ScarCruft is utilizing the publicly available exploit code to drop a backdoor, known as ROKRAT, used for data exfiltration. FireEye tracks most elements of the group publicly reported as Scarcruft as APT37 (Reaper).</p>\n<p>&nbsp;</p>\n<p>Trend Micro has reported observation of a malverstising campaign at the end of October 2019 using an exploit kit they refer to as Capesand to deliver DarkRAT and njRAT malware. This vulnerability was reportedly leveraged after successful exploitation via Capesand in order to gain escalated privileges and execute njcrypt.exe.</p>\n<p>&nbsp;</p>\n<p>No workaround is available, although the Microsoft reportedly addressed this vulnerability in a fix. FireEye iSIGHT Intelligence considers this a Medium-risk vulnerability because of possibility of arbitrary code execution offset by the local access required.</p>\n<p><br />CISA added this vulnerability to its Known Exploited Vulnerabilities Catalog on March 15, 2022, with a required remediation date of April 5, 2022.</p>",
"associated_actors": [
{
"aliases": [
{
"attribution_scope": "confirmed",
"name": "Odinaff (Symantec)"
},
{
"attribution_scope": "confirmed",
"name": "Sectoj04 (NSHC Group)"
},
{
"attribution_scope": "confirmed",
"name": "TA505 (Proofpoint)"
},
{
"attribution_scope": "confirmed",
"name": "TEMP.Warlock"
},
{
"attribution_scope": "confirmed",
"name": "Ta505 (Norfolkinfosec)"
},
{
"attribution_scope": "confirmed",
"name": "Ta505 (Trend Micro)"
}
],
"country_code": "unknown",
"description": "FIN11 is a financially motivated threat group that has conducted some of the largest and longest running malware distribution campaigns observed amongst our FIN groups to date. Mandiant has observed FIN11 attempt to monetize their operations at least once using named point-of-sale (POS) malware, and more recently using CLOP ransomware and/or data theft extortion. The volume of FIN11's high-volume spam campaigns slowed in 2021, before ceasing altogether in 2022, when the group shifted to server exploitation for initial access. The group has been active since at least 2016, but identified overlaps with activity tracked by security researchers as TA505 suggest they may have been conducting operations as early as 2014.",
"id": "threat-actor--b8ee8129-5ecc-581a-a636-fb17051d2ffe",
"intel_free": false,
"last_updated": "2023-03-04T07:03:58Z",
"name": "FIN11"
}
],
"associated_malware": [
{
"aliases": [],
"description": "BADPOTATO is a publicly available privilege escalation tool that abuses Impersonation Privileges on Windows 10 and Windows Server 2019. ",
"has_yara": true,
"id": "malware--8e99e597-dda4-57dc-be6e-f1bc8b80a5f3",
"intel_free": false,
"is_malicious": true,
"last_updated": "2023-03-06T02:10:40.000Z",
"name": "BADPOTATO"
},
{
"aliases": [],
"description": "COMAHAWK is a privilege escalation tool that attempts to exploit CVE-2019-1405 and CVE-2019-1322.",
"has_yara": true,
"id": "malware--0073c12d-177a-5353-8170-e72ac8fc75bb",
"intel_free": false,
"is_malicious": true,
"last_updated": "2023-03-06T02:13:12.000Z",
"name": "COMAHAWK"
}
],
"associated_reports": [
{
"audience": [
"vulnerability"
],
"published_date": "2018-05-08T23:36:07.596Z",
"report_id": "18-00007543",
"report_type": "Patch Report",
"title": "Microsoft May 2018 Security Advisory Release"
},
{
"audience": [
"vulnerability"
],
"published_date": "2019-06-12T13:15:13.875Z",
"report_id": "19-00009557",
"report_type": "Trends and Forecasting",
"title": "May 2019 Month in Vulnerabilities"
},
{
"audience": [
"strategic",
"vulnerability"
],
"published_date": "2019-12-18T13:16:56.301Z",
"report_id": "19-00021769",
"report_type": "Trends and Forecasting",
"title": "Analysis of Time to Exploit in Tracked Vulnerabilities Exploited in 2018\u20132019"
},
{
"audience": [
"cyber crime",
"fusion"
],
"published_date": "2018-10-19T20:32:50.054Z",
"report_id": "18-00017419",
"report_type": "Trends and Forecasting",
"title": "Operational Net Assessment of Cyber Crime Threats\u00e2July to September 2018"
},
{
"audience": [
"vulnerability"
],
"published_date": "2018-06-18T23:04:39.328Z",
"report_id": "18-00009795",
"report_type": "Vulnerability Report",
"title": "May 2018 Month in Vulnerabilities"
},
{
"audience": [
"cyber crime",
"fusion",
"vulnerability"
],
"published_date": "2018-06-28T18:46:09.706Z",
"report_id": "18-00010584",
"report_type": "Threat Activity Alert",
"title": "Threat Activity Alert: Russian-Speaking Actor Advertises a Malicious PDF Builder with CVE-2018-4990 and CVE-2018-8120 Exploits"
},
{
"audience": [
"cyber crime",
"fusion"
],
"published_date": "2019-02-05T22:02:15.475Z",
"report_id": "19-00002007",
"report_type": "Actor Profile",
"title": "Threat Actor Profile: GandCrab "
},
{
"audience": [
"cyber crime",
"fusion"
],
"published_date": "2018-10-16T18:37:46.427Z",
"report_id": "18-00017293",
"report_type": "Trends and Forecasting",
"title": "Monthly Report on Cyber Crime Threats to the Financial Sector \u2013 September 2018"
},
{
"audience": [
"vulnerability"
],
"published_date": "2022-04-05T14:17:42.242Z",
"report_id": "18-00007690",
"report_type": "Vulnerability Report",
"title": "Microsoft Windows Server 2008 NtUserSetImeInfoEx() Null Pointer Dereference Vulnerability"
},
{
"audience": [
"cyber crime",
"operational"
],
"published_date": "2019-12-16T19:20:00.473Z",
"report_id": "18-00003542",
"report_type": "Malware Profile",
"title": "GandCrab Ransomware Malware Profile"
}
],
"audience": [
"intel_vuln"
],
"available_mitigation": [
"Patch"
],
"cisa_known_exploited": null,
"common_vulnerability_scores": {
"v2.0": {
"access_complexity": "MEDIUM",
"access_vector": "LOCAL",
"authentication": "NONE",
"availability_impact": "COMPLETE",
"base_score": 6.9,
"confidentiality_impact": "COMPLETE",
"exploitability": "FUNCTIONAL",
"integrity_impact": "COMPLETE",
"remediation_level": "OFFICIAL_FIX",
"report_confidence": "CONFIRMED",
"temporal_score": 5.7,
"vector_string": "AV:L/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C"
},
"v3.0": {
"attack_complexity": "HIGH",
"attack_vector": "LOCAL",
"availability_impact": "HIGH",
"base_score": 7,
"confidentiality_impact": "HIGH",
"exploit_code_maturity": "FUNCTIONAL",
"integrity_impact": "HIGH",
"privileges_required": "LOW",
"remediation_level": "OFFICIAL_FIX",
"report_confidence": "CONFIRMED",
"scope": "UNCHANGED",
"temporal_score": 6.5,
"user_interaction": "NONE",
"vector_string": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
},
"cpe_ranges": [],
"cve_id": "CVE-2018-8120",
"cwe": "Null Pointer Dereference",
"cwe_details": null,
"date_of_disclosure": "2018-05-04T06:00:00.000Z",
"days_to_patch": null,
"description": "<p><a href=\"https://www.microsoft.com/en-sg/windows\">Windows </a>is the flagship operating system by Microsoft.</p>\n<p>&nbsp;</p>\n<p>A vulnerability exists in the NtUserSetImeInfoEx() function within the win32k kernel component in Microsoft Windows Server. The issue occurs because the SetImeInfoEx subroutine, within the NtUserSetImeInfoEx() function, does not validate a data pointer, this results in issue where an application dereferences a pointer which is Null.</p>",
"epss": null,
"executive_summary": "<p>A null pointer dereference vulnerability exists in the NtUserSetImeInfoEx() function within the Win32k component in Microsoft Windows Server 2008 and earlier that, when exploited, allows an attacker to locally gain elevated privileges. Exploit code is publicly available and Microsoft reported that this vulnerability has been exploited in the wild. Mitigation options include a vendor fix. Exploitation Rating: Confirmed</p>",
"exploitation_consequence": "Code Execution",
"exploitation_state": "Confirmed",
"exploitation_vectors": [
"Local Access"
],
"exploits": [
{
"description": "This exploit is a Metasploit module that can trigger the null pointer dereference issue on an affected server and yield an attacker elevated privileges on the affected system.",
"exploit_url": "https://www.exploit-db.com/exploits/45653/",
"file_size": 4498,
"grade": "",
"hashes": {},
"md5": "5dd08479823a39d8d808ead98110a070",
"name": "ms18_8120_win32k_privesc.rb",
"release_date": "2018-10-20T06:00:00Z",
"reliability": "Untested",
"replication_urls": []
},
{
"description": "This exploit will trigger this vulnerability to gain elevated privileges.",
"exploit_url": "https://github.com/leeqwind/HolicPOC/blob/master/windows/win32k/CVE-2018-8120/x86.cpp",
"file_size": 13367,
"grade": "",
"hashes": {},
"md5": "1A0D48A31B50691F8613B31A53C4D16A",
"name": "CVE-2018-8120_exploit",
"release_date": "2018-05-14T06:00:00Z",
"reliability": "Untested",
"replication_urls": []
}
],
"id": "vulnerability--6dc0a4db-e822-5c76-bca2-b7eb750da2ad",
"intel_free": false,
"is_publishable": true,
"last_modified_date": "2022-12-09T02:36:33.290Z",
"observed_in_the_wild": true,
"publish_date": "2022-04-05T14:17:00.000Z",
"risk_rating": "MEDIUM",
"sources": [
{
"date": "2018-05-08T17:00:00.000Z",
"is_vendor_fix": false,
"source_description": "CVE-2018-8120",
"source_name": "Microsoft Corp.",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8120"
},
{
"date": "2018-05-15T16:00:00.000Z",
"is_vendor_fix": false,
"source_description": "A tale of two zero-days",
"source_name": "WeLiveSecurity",
"url": "https://www.welivesecurity.com/2018/05/15/tale-two-zero-days/"
},
{
"date": "2019-05-13T16:00:00.000Z",
"is_vendor_fix": false,
"source_name": "Kaspersky Lab",
"url": "https://securelist.com/scarcruft-continues-to-evolve-introduces-bluetooth-harvester/90729/"
},
{
"date": "2019-11-05T05:00:00.000Z",
"is_vendor_fix": false,
"source_description": "New Exploit Kit Capesand Reuses Old and New Public Exploits and Tools, Blockchain Ruse",
"source_name": "Trend Micro",
"url": "https://blog.trendmicro.com/trendlabs-security-intelligence/new-exploit-kit-capesand-reuses-old-and-new-public-exploits-and-tools-blockchain-ruse/"
},
{
"date": "2022-03-15T12:00:00.000Z",
"is_vendor_fix": false,
"source_description": "CISA Known Exploited Vulnerabilities Catalog",
"source_name": "CISA",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"date": "2022-03-24T04:00:00.000Z",
"is_vendor_fix": false,
"source_name": "Tenable Inc.",
"url": "https://www.tenable.com/blog/contileaks-chats-reveal-over-30-vulnerabilities-used-by-conti-ransomware-affiliates"
}
],
"title": "Microsoft Windows Server 2008 NtUserSetImeInfoEx() Null Pointer Dereference Vulnerability",
"type": "vulnerability",
"updated_date": "2022-04-05T14:17:00.000Z",
"vendor_fix_references": [
{
"name": "Microsoft Security Update Information",
"unique_id": "",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8120"
}
],
"version_history": [],
"vulnerable_cpes": [
{
"cpe": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:itanium:*:*:*:*:*",
"cpe_title": "microsoft windows_server_2008 r2",
"technology_name": "windows_server_2008 r2",
"vendor_name": "microsoft"
},
{
"cpe": "cpe:2.3:o:microsoft:windows_server_2008:sp2:*:x64:*:*:*:*:*",
"cpe_title": "microsoft windows_server_2008 sp2",
"technology_name": "windows_server_2008 sp2",
"vendor_name": "microsoft"
},
{
"cpe": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:x64:*:*:*:*:*",
"cpe_title": "microsoft windows_server_2008 r2",
"technology_name": "windows_server_2008 r2",
"vendor_name": "microsoft"
},
{
"cpe": "cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*",
"cpe_title": "microsoft windows_7 -",
"technology_name": "windows_7 -",
"vendor_name": "microsoft"
},
{
"cpe": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe_title": "microsoft windows_server_2008 -",
"technology_name": "windows_server_2008 -",
"vendor_name": "microsoft"
},
{
"cpe": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe_title": "microsoft windows_server_2008 -",
"technology_name": "windows_server_2008 -",
"vendor_name": "microsoft"
},
{
"cpe": "cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*",
"cpe_title": "microsoft windows_7 -",
"technology_name": "windows_7 -",
"vendor_name": "microsoft"
}
],
"vulnerable_products": "<p>Microsoft reports that the following products and versions are vulnerable:</p>\n<ul>\n<li>Windows 7 for 32-bit Systems Service Pack 1</li>\n<li>Windows 7 for x64-based Systems Service Pack 1</li>\n<li>Windows Server 2008 for 32-bit Systems Service Pack2</li>\n<li>Windows Server 2008 for Itanium-based Systems Service Pack2</li>\n<li>Windows Server 2008 for x64-based Systems Service Pack2</li>\n<li>Windows Server 2008 for R2 for Itanium-based Systems Service Pack 1</li>\n<li>Windows Server 2008 for x64-based Systems Service Pack 1</li>\n</ul>",
"was_zero_day": true,
"workarounds": "<p>Aside from the available vendor fix, FireEye iSIGHT Intelligence is unaware of any alternate mitigation procedures for this vulnerability.</p>",
"workarounds_list": []
},
"relationships": [],
"score": 0,
"type": "CVE",
"value": null
}
]
}
}

Human Readable Output#

Results#

fieldsrawJSONrelationshipsscoretypevalue
stixid: vulnerability--6dc0a4db-e822-5c76-bca2-b7eb750da2ad
trafficlightprotocol: AMBER
DBotScore: {"Indicator": null, "Type": "cve", "Vendor": "Mandiant", "Score": 0, "Reliability": "A - Completely reliable"}
id: null
cvss: v2.0
cvssvector: AV:L/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C
cvss2: {'metric': 'Access Complexity', 'values': 'MEDIUM'},
{'metric': 'Access Vector', 'values': 'LOCAL'},
{'metric': 'Authentication', 'values': 'NONE'},
{'metric': 'Availability Impact', 'values': 'COMPLETE'},
{'metric': 'Base Score', 'values': 6.9},
{'metric': 'Confidentiality Impact', 'values': 'COMPLETE'},
{'metric': 'Exploitability', 'values': 'FUNCTIONAL'},
{'metric': 'Integrity Impact', 'values': 'COMPLETE'},
{'metric': 'Remediation Level', 'values': 'OFFICIAL_FIX'},
{'metric': 'Report Confidence', 'values': 'CONFIRMED'},
{'metric': 'Temporal Score', 'values': 5.7},
{'metric': 'Vector String', 'values': 'AV:L/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C'}
id: vulnerability--6dc0a4db-e822-5c76-bca2-b7eb750da2ad
type: vulnerability
is_publishable: true
risk_rating: MEDIUM
analysis:

An attacker could exploit this vulnerability to execute arbitrary code. An attacker would need to gain low privilege access to the vulnerable system to exploit this issue. Further, upon obtaining the low privilege access, an attacker would need to craft a program which can change the privilege of the current process, using the call gate functions. A failed attempt at exploitation could potentially cause a crash of the application, resulting in a denial-of-service condition.


 


A non-weaponized exploit is publicly available on VirusTotal, in the form of a PDF sample. This exploit code creates a new windowstation object and assigns it to the current process in user-mode, making the spklList Pointer field equal to zero. This code writes an arbitrary address in the kernel space by mapping the NULL page and setting a pointer to offset 0x2C. Upon writing an arbitrary address, the attacker changes the privilege level of a process by setting call gate to Ring 0. Further, the exploit uses the CALL FAR instruction to perform an inter-privilege level call, giving an attacker administrative access on the system. A similar exploit code is also publicly available via GitHub.


 


An exploit code in the form of a Metasploit module has been publicly released. This exploit can trigger the null pointer dereference issue which is caused when the Win32k component does not properly handle objects in memory. Successful exploitation via this code will allow an attacker to perform privileged tasks on the compromised machine.


 


Microsoft has reported this vulnerability has been exploited. Additionally, it is reported that threat actor ScarCruft is utilizing the publicly available exploit code to drop a backdoor, known as ROKRAT, used for data exfiltration. FireEye tracks most elements of the group publicly reported as Scarcruft as APT37 (Reaper).


 


Trend Micro has reported observation of a malverstising campaign at the end of October 2019 using an exploit kit they refer to as Capesand to deliver DarkRAT and njRAT malware. This vulnerability was reportedly leveraged after successful exploitation via Capesand in order to gain escalated privileges and execute njcrypt.exe.


 


No workaround is available, although the Microsoft reportedly addressed this vulnerability in a fix. FireEye iSIGHT Intelligence considers this a Medium-risk vulnerability because of possibility of arbitrary code execution offset by the local access required.



CISA added this vulnerability to its Known Exploited Vulnerabilities Catalog on March 15, 2022, with a required remediation date of April 5, 2022.


executive_summary:

A null pointer dereference vulnerability exists in the NtUserSetImeInfoEx() function within the Win32k component in Microsoft Windows Server 2008 and earlier that, when exploited, allows an attacker to locally gain elevated privileges. Exploit code is publicly available and Microsoft reported that this vulnerability has been exploited in the wild. Mitigation options include a vendor fix. Exploitation Rating: Confirmed


description:

Windows is the flagship operating system by Microsoft.


 


A vulnerability exists in the NtUserSetImeInfoEx() function within the win32k kernel component in Microsoft Windows Server. The issue occurs because the SetImeInfoEx subroutine, within the NtUserSetImeInfoEx() function, does not validate a data pointer, this results in issue where an application dereferences a pointer which is Null.


exploitation_vectors: Local Access
title: Microsoft Windows Server 2008 NtUserSetImeInfoEx() Null Pointer Dereference Vulnerability
associated_actors: {'last_updated': '2023-03-04T07:03:58Z', 'aliases': [{'name': 'Odinaff (Symantec)', 'attribution_scope': 'confirmed'}, {'name': 'Sectoj04 (NSHC Group)', 'attribution_scope': 'confirmed'}, {'name': 'TA505 (Proofpoint)', 'attribution_scope': 'confirmed'}, {'name': 'TEMP.Warlock', 'attribution_scope': 'confirmed'}, {'name': 'Ta505 (Norfolkinfosec)', 'attribution_scope': 'confirmed'}, {'name': 'Ta505 (Trend Micro)', 'attribution_scope': 'confirmed'}], 'name': 'FIN11', 'description': "FIN11 is a financially motivated threat group that has conducted some of the largest and longest running malware distribution campaigns observed amongst our FIN groups to date. Mandiant has observed FIN11 attempt to monetize their operations at least once using named point-of-sale (POS) malware, and more recently using CLOP ransomware and/or data theft extortion. The volume of FIN11's high-volume spam campaigns slowed in 2021, before ceasing altogether in 2022, when the group shifted to server exploitation for initial access. The group has been active since at least 2016, but identified overlaps with activity tracked by security researchers as TA505 suggest they may have been conducting operations as early as 2014.", 'id': 'threat-actor--b8ee8129-5ecc-581a-a636-fb17051d2ffe', 'intel_free': False, 'country_code': 'unknown'}
associated_malware: {'last_updated': '2023-03-06T02:10:40.000Z', 'aliases': [], 'name': 'BADPOTATO', 'description': 'BADPOTATO is a publicly available privilege escalation tool that abuses Impersonation Privileges on Windows 10 and Windows Server 2019. ', 'id': 'malware--8e99e597-dda4-57dc-be6e-f1bc8b80a5f3', 'intel_free': False, 'has_yara': True, 'is_malicious': True},
{'last_updated': '2023-03-06T02:13:12.000Z', 'aliases': [], 'name': 'COMAHAWK', 'description': 'COMAHAWK is a privilege escalation tool that attempts to exploit CVE-2019-1405 and CVE-2019-1322.', 'id': 'malware--0073c12d-177a-5353-8170-e72ac8fc75bb', 'intel_free': False, 'has_yara': True, 'is_malicious': True}
associated_reports: {'report_id': '18-00007543', 'report_type': 'Patch Report', 'title': 'Microsoft May 2018 Security Advisory Release', 'published_date': '2018-05-08T23:36:07.596Z', 'audience': ['vulnerability']},
{'report_id': '19-00009557', 'report_type': 'Trends and Forecasting', 'title': 'May 2019 Month in Vulnerabilities', 'published_date': '2019-06-12T13:15:13.875Z', 'audience': ['vulnerability']},
{'report_id': '19-00021769', 'report_type': 'Trends and Forecasting', 'title': 'Analysis of Time to Exploit in Tracked Vulnerabilities Exploited in 2018–2019', 'published_date': '2019-12-18T13:16:56.301Z', 'audience': ['strategic', 'vulnerability']},
{'report_id': '18-00017419', 'report_type': 'Trends and Forecasting', 'title': 'Operational Net Assessment of Cyber Crime ThreatsâJuly to September 2018', 'published_date': '2018-10-19T20:32:50.054Z', 'audience': ['cyber crime', 'fusion']},
{'report_id': '18-00009795', 'report_type': 'Vulnerability Report', 'title': 'May 2018 Month in Vulnerabilities', 'published_date': '2018-06-18T23:04:39.328Z', 'audience': ['vulnerability']},
{'report_id': '18-00010584', 'report_type': 'Threat Activity Alert', 'title': 'Threat Activity Alert: Russian-Speaking Actor Advertises a Malicious PDF Builder with CVE-2018-4990 and CVE-2018-8120 Exploits', 'published_date': '2018-06-28T18:46:09.706Z', 'audience': ['cyber crime', 'fusion', 'vulnerability']},
{'report_id': '19-00002007', 'report_type': 'Actor Profile', 'title': 'Threat Actor Profile: GandCrab ', 'published_date': '2019-02-05T22:02:15.475Z', 'audience': ['cyber crime', 'fusion']},
{'report_id': '18-00017293', 'report_type': 'Trends and Forecasting', 'title': 'Monthly Report on Cyber Crime Threats to the Financial Sector – September 2018', 'published_date': '2018-10-16T18:37:46.427Z', 'audience': ['cyber crime', 'fusion']},
{'report_id': '18-00007690', 'report_type': 'Vulnerability Report', 'title': 'Microsoft Windows Server 2008 NtUserSetImeInfoEx() Null Pointer Dereference Vulnerability', 'published_date': '2022-04-05T14:17:42.242Z', 'audience': ['vulnerability']},
{'report_id': '18-00003542', 'report_type': 'Malware Profile', 'title': 'GandCrab Ransomware Malware Profile', 'published_date': '2019-12-16T19:20:00.473Z', 'audience': ['cyber crime', 'operational']}
exploitation_consequence: Code Execution
cwe: Null Pointer Dereference
cve_id: CVE-2018-8120
vulnerable_products:

Microsoft reports that the following products and versions are vulnerable:



  • Windows 7 for 32-bit Systems Service Pack 1

  • Windows 7 for x64-based Systems Service Pack 1

  • Windows Server 2008 for 32-bit Systems Service Pack2

  • Windows Server 2008 for Itanium-based Systems Service Pack2

  • Windows Server 2008 for x64-based Systems Service Pack2

  • Windows Server 2008 for R2 for Itanium-based Systems Service Pack 1

  • Windows Server 2008 for x64-based Systems Service Pack 1


exploitation_state: Confirmed
vendor_fix_references: {'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8120', 'name': 'Microsoft Security Update Information', 'unique_id': ''}
date_of_disclosure: 2018-05-04T06:00:00.000Z
observed_in_the_wild: true
vulnerable_cpes: {'vendor_name': 'microsoft', 'technology_name': 'windows_server_2008 r2', 'cpe': 'cpe:2.3â­•microsoft:windows_server_2008:r2:sp1:itanium:::::', 'cpe_title': 'microsoft windows_server_2008 r2'},
{'vendor_name': 'microsoft', 'technology_name': 'windows_server_2008 sp2', 'cpe': 'cpe:2.3â­•microsoft:windows_server_2008:sp2:
:x64:::::', 'cpe_title': 'microsoft windows_server_2008 sp2'},
{'vendor_name': 'microsoft', 'technology_name': 'windows_server_2008 r2', 'cpe': 'cpe:2.3â­•microsoft:windows_server_2008:r2:sp1:x64:
::::', 'cpe_title': 'microsoft windows_server_2008 r2'},
{'vendor_name': 'microsoft', 'technology_name': 'windows_7 -', 'cpe': 'cpe:2.3â­•microsoft:windows_7:-:sp1:x64:::::', 'cpe_title': 'microsoft windows_7 -'},
{'vendor_name': 'microsoft', 'technology_name': 'windows_server_2008 -', 'cpe': 'cpe:2.3â­•microsoft:windows_server_2008:-:sp2:itanium:
::::', 'cpe_title': 'microsoft windows_server_2008 -'},
{'vendor_name': 'microsoft', 'technology_name': 'windows_server_2008 -', 'cpe': 'cpe:2.3â­•microsoft:windows_server_2008:-:sp2::::::', 'cpe_title': 'microsoft windows_server_2008 -'},
{'vendor_name': 'microsoft', 'technology_name': 'windows_7 -', 'cpe': 'cpe:2.3â­•microsoft:windows_7:-:sp1:x86:::::*', 'cpe_title': 'microsoft windows_7 -'}
was_zero_day: true
workarounds:

Aside from the available vendor fix, FireEye iSIGHT Intelligence is unaware of any alternate mitigation procedures for this vulnerability.


publish_date: 2022-04-05T14:17:00.000Z
updated_date: 2022-04-05T14:17:00.000Z
last_modified_date: 2022-12-09T02:36:33.290Z
available_mitigation: Patch
sources: {'source_name': 'Microsoft Corp.', 'source_description': 'CVE-2018-8120', 'date': '2018-05-08T17:00:00.000Z', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8120', 'is_vendor_fix': False},
{'source_name': 'WeLiveSecurity', 'source_description': 'A tale of two zero-days', 'date': '2018-05-15T16:00:00.000Z', 'url': 'https://www.welivesecurity.com/2018/05/15/tale-two-zero-days/', 'is_vendor_fix': False},
{'source_name': 'Kaspersky Lab', 'date': '2019-05-13T16:00:00.000Z', 'url': 'https://securelist.com/scarcruft-continues-to-evolve-introduces-bluetooth-harvester/90729/', 'is_vendor_fix': False},
{'source_name': 'Trend Micro', 'source_description': 'New Exploit Kit Capesand Reuses Old and New Public Exploits and Tools, Blockchain Ruse', 'date': '2019-11-05T05:00:00.000Z', 'url': 'https://blog.trendmicro.com/trendlabs-security-intelligence/new-exploit-kit-capesand-reuses-old-and-new-public-exploits-and-tools-blockchain-ruse/', 'is_vendor_fix': False},
{'source_name': 'CISA', 'source_description': 'CISA Known Exploited Vulnerabilities Catalog', 'date': '2022-03-15T12:00:00.000Z', 'url': 'https://www.cisa.gov/known-exploited-vulnerabilities-catalog', 'is_vendor_fix': False},
{'source_name': 'Tenable Inc.', 'date': '2022-03-24T04:00:00.000Z', 'url': 'https://www.tenable.com/blog/contileaks-chats-reveal-over-30-vulnerabilities-used-by-conti-ransomware-affiliates', 'is_vendor_fix': False}
exploits: {'name': 'ms18_8120_win32k_privesc.rb', 'description': 'This exploit is a Metasploit module that can trigger the null pointer dereference issue on an affected server and yield an attacker elevated privileges on the affected system.', 'reliability': 'Untested', 'file_size': 4498, 'md5': '5dd08479823a39d8d808ead98110a070', 'release_date': '2018-10-20T06:00:00Z', 'exploit_url': 'https://www.exploit-db.com/exploits/45653/', 'replication_urls': [], 'grade': '', 'hashes': {}},
{'name': 'CVE-2018-8120_exploit', 'description': 'This exploit will trigger this vulnerability to gain elevated privileges.', 'reliability': 'Untested', 'file_size': 13367, 'md5': '1A0D48A31B50691F8613B31A53C4D16A', 'release_date': '2018-05-14T06:00:00Z', 'exploit_url': 'https://github.com/leeqwind/HolicPOC/blob/master/windows/win32k/CVE-2018-8120/x86.cpp', 'replication_urls': [], 'grade': '', 'hashes': {}}
common_vulnerability_scores: {"v2.0": {"access_complexity": "MEDIUM", "access_vector": "LOCAL", "authentication": "NONE", "availability_impact": "COMPLETE", "base_score": 6.9, "confidentiality_impact": "COMPLETE", "exploitability": "FUNCTIONAL", "integrity_impact": "COMPLETE", "remediation_level": "OFFICIAL_FIX", "report_confidence": "CONFIRMED", "temporal_score": 5.7, "vector_string": "AV:L/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C"}, "v3.0": {"attack_complexity": "HIGH", "attack_vector": "LOCAL", "availability_impact": "HIGH", "base_score": 7, "confidentiality_impact": "HIGH", "exploit_code_maturity": "FUNCTIONAL", "integrity_impact": "HIGH", "privileges_required": "LOW", "remediation_level": "OFFICIAL_FIX", "report_confidence": "CONFIRMED", "scope": "UNCHANGED", "temporal_score": 6.5, "user_interaction": "NONE", "vector_string": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}}
audience: intel_vuln
intel_free: false
affects_ot: false
aliases:
cisa_known_exploited: null
cpe_ranges:
cwe_details: null
days_to_patch: null
epss: null
version_history:
workarounds_list:
0CVE

mati-get-campaign#


Retrieve information about a Campaign from Mandiant

Base Command#

mati-get-campaign

Input#

Argument NameDescriptionRequired
campaign_idID of the campaign to lookup.Required

Context Output#

PathTypeDescription
MANDIANTTI.Campaign.valueStringThe name of the Campaign
MANDIANTTI.Campaign.fields.actorsStringThe Threat Actors associated with the Campaign
MANDIANTTI.Campaign.fields.descriptionStringThe description of the Campaign
MANDIANTTI.Campaign.fields.tagsStringThe industries associated with the Campaign
MANDIANTTI.Campaign.fields.publications.titleStringThe title of a report associated with the Campaign
MANDIANTTI.Campaign.fields.publications.linkStringThe link to the report in Mandiant Advantage

Command example#

!mati-get-campaign campaign_id=CAMP.21.014

Context Example#

{
"MANDIANTTI": {
"Campaign": {
"fields": {
"DBot Score": {
"Indicator": null,
"Reliability": "A - Completely reliable",
"Score": 0,
"Type": "Campaign",
"Vendor": "Mandiant"
},
"actors": [
"APT41"
],
"description": "In mid-October 2021, Mandiant observed a wave of APT41 activity targeting multiple U.S. state governments. We believe the actors exploited a vulnerability in a public-facing web application, used by numerous state governments and U.S. educational research institutes, to gain initial access. The actors then conducted reconnaissance and credential harvesting activity, dropping multiple files including the publicly available BADPOTATO privilege escalation tool. Mandiant also identified the DEADEYE dropper, which executed a KEYPLUG backdoor. \n\nThis activity is likely a continuation of a previously observed APT41 campaign targeting multiple U.S. state government entities in May 2021. The specific motivation behind the targeting of U.S. state government entities remains unclear, though we infer, based on the targeting profile, that the purpose may include capturing political intelligence or data related to sensitive technologies with national or state-level applications. It is also possible that the capture of credentials can facilitate future targeting or pivoting to targets of interest.",
"publications": [],
"tags": [
"Governments"
]
},
"rawJSON": {
"actors": [
{
"attribution_scope": "confirmed",
"id": "threat-actor--9c88bd9c-f41b-59fa-bfb6-427b1755ea64",
"motivations": [
{
"attribution_scope": "confirmed",
"id": "motivation--fa4d4992-1762-50ac-b0b1-2c75210645d0",
"name": "Financial Gain",
"releasable": true,
"type": "motivation"
},
{
"attribution_scope": "confirmed",
"id": "motivation--1b8ca82a-7cff-5622-bedd-965c11d38a9e",
"name": "Espionage",
"releasable": true,
"type": "motivation"
}
],
"name": "APT41",
"releasable": true,
"source_locations": [
{
"country": {
"attribution_scope": "confirmed",
"id": "location--740e7e5f-f2a0-55e0-98a3-88872c55b581",
"iso2": "CN",
"name": "China",
"releasable": true,
"type": "location"
},
"region": {
"attribution_scope": "confirmed",
"id": "location--8fc231f3-4e62-57e7-b734-eaee0a734612",
"name": "Asia",
"releasable": true,
"type": "location"
},
"releasable": true,
"sub_region": {
"attribution_scope": "confirmed",
"id": "location--7b33370b-da4b-5c48-9741-b69f69febb77",
"name": "East Asia",
"releasable": true,
"type": "location"
}
}
],
"type": "threat-actor"
}
],
"aliases": {
"actor": [
{
"attribution_scope": "confirmed",
"id": "alias--c63f2b2b-3639-5bd0-be28-b1cb79b00b21",
"name": "Barium (Microsoft)",
"nucleus_name": "Barium",
"releasable": true,
"source": "Microsoft",
"type": "alias"
}
],
"campaign": [],
"malware": [],
"releasable": true
},
"audience": [
{
"license": "INTEL_RBI_OPS",
"name": "intel_oper"
},
{
"license": "INTEL_RBI_FUS",
"name": "intel_fusion"
},
{
"license": "amber",
"name": "tlp_marking"
}
],
"campaign_type": "Individual",
"counts": {
"actor_collaborations": 0,
"actors": 1,
"campaigns": 0,
"industries": 1,
"malware": 19,
"reports": 4,
"timeline": 104,
"tools": 9,
"vulnerabilities": 1
},
"description": "In mid-October 2021, Mandiant observed a wave of APT41 activity targeting multiple U.S. state governments. We believe the actors exploited a vulnerability in a public-facing web application, used by numerous state governments and U.S. educational research institutes, to gain initial access. The actors then conducted reconnaissance and credential harvesting activity, dropping multiple files including the publicly available BADPOTATO privilege escalation tool. Mandiant also identified the DEADEYE dropper, which executed a KEYPLUG backdoor. \n\nThis activity is likely a continuation of a previously observed APT41 campaign targeting multiple U.S. state government entities in May 2021. The specific motivation behind the targeting of U.S. state government entities remains unclear, though we infer, based on the targeting profile, that the purpose may include capturing political intelligence or data related to sensitive technologies with national or state-level applications. It is also possible that the capture of credentials can facilitate future targeting or pivoting to targets of interest.",
"id": "campaign--c344bb9b-cb50-58be-9c33-350b622c1fce",
"industries": [
{
"attribution_scope": "confirmed",
"id": "identity--8d0881d8-d199-5e5a-bef9-be3ca6bb8f0d",
"name": "Governments",
"releasable": true,
"type": "identity"
}
],
"is_publishable": true,
"last_activity_time": "2022-02-26T00:00:00.000Z",
"malware": [
{
"attribution_scope": "confirmed",
"id": "malware--448e822d-8496-5021-88cb-599062f74176",
"name": "BEACON",
"releasable": true,
"type": "malware"
},
{
"attribution_scope": "confirmed",
"id": "malware--ad51977a-c6fc-5cd3-822e-4e2aa6c832a2",
"name": "FASTPACE",
"releasable": true,
"type": "malware"
}
],
"name": "APT41 Exploition of .NET Web Applications at U.S. State Governments",
"profile_updated": "2023-03-06T07:10:13.356Z",
"releasable": true,
"short_name": "CAMP.21.014",
"target_locations": {
"countries": [
{
"attribution_scope": "confirmed",
"count": 8,
"id": "location--5c5b39aa-9308-52a6-9daf-0547d5aaa160",
"iso2": "US",
"name": "United States of America",
"region": "location--6d65522f-0166-5e7e-973c-35cf7973e4e3",
"releasable": true,
"sub_region": "location--0daadcfb-ad23-5f16-b53b-6c5b09bf20de",
"type": "location"
}
],
"regions": [
{
"attribution_scope": "confirmed",
"count": 8,
"id": "location--6d65522f-0166-5e7e-973c-35cf7973e4e3",
"name": "Americas",
"releasable": true,
"type": "location"
}
],
"releasable": true,
"sub_regions": [
{
"attribution_scope": "confirmed",
"count": 8,
"id": "location--0daadcfb-ad23-5f16-b53b-6c5b09bf20de",
"name": "North America",
"region": "location--6d65522f-0166-5e7e-973c-35cf7973e4e3",
"releasable": true,
"type": "location"
}
]
},
"timeline": [
{
"description": "Mandiant Declared Campaign",
"event_type": "created",
"name": "Campaign Created",
"releasable": true,
"timestamp": "2021-10-18T00:00:00.000Z"
},
{
"description": "Mandiant Observed First Activity of Campaign",
"event_type": "first_observed",
"name": "First Observed",
"releasable": true,
"timestamp": "2020-06-15T00:00:00.000Z"
}
],
"tools": [
{
"attribution_scope": "confirmed",
"id": "malware--8130c516-308e-51e1-b16c-f398d80e67b0",
"name": "IMPACKET.PSEXEC",
"releasable": true,
"type": "malware"
},
{
"attribution_scope": "confirmed",
"id": "malware--bf2fc1e5-7850-5ecd-87a7-263e6da5708d",
"name": "MIMIKATZ",
"releasable": true,
"type": "malware"
}
],
"type": "campaign",
"vulnerabilities": [
{
"attribution_scope": "confirmed",
"cve_id": "CVE-2021-44207",
"id": "vulnerability--362764b4-aa15-55fd-a68b-caf84f25a6b0",
"releasable": true,
"type": "vulnerability"
}
]
},
"relationships": [
{
"entityA": "CAMP.21.014",
"entityAFamily": "Indicator",
"entityAType": "Campaign",
"entityB": "APT41",
"entityBFamily": "Indicator",
"entityBType": "Threat Actor",
"fields": {},
"name": "related-to",
"reverseName": "related-to",
"type": "IndicatorToIndicator"
},
{
"entityA": "CAMP.21.014",
"entityAFamily": "Indicator",
"entityAType": "Campaign",
"entityB": "BEACON",
"entityBFamily": "Indicator",
"entityBType": "Malware",
"fields": {},
"name": "related-to",
"reverseName": "related-to",
"type": "IndicatorToIndicator"
}
],
"type": "Campaign",
"value": "CAMP.21.014"
}
}
}

Human Readable Output#

Results#

fieldsrawJSONrelationshipstypevalue
actors: APT41
description: In mid-October 2021, Mandiant observed a wave of APT41 activity targeting multiple U.S. state governments. We believe the actors exploited a vulnerability in a public-facing web application, used by numerous state governments and U.S. educational research institutes, to gain initial access. The actors then conducted reconnaissance and credential harvesting activity, dropping multiple files including the publicly available BADPOTATO privilege escalation tool. Mandiant also identified the DEADEYE dropper, which executed a KEYPLUG backdoor.

This activity is likely a continuation of a previously observed APT41 campaign targeting multiple U.S. state government entities in May 2021. The specific motivation behind the targeting of U.S. state government entities remains unclear, though we infer, based on the targeting profile, that the purpose may include capturing political intelligence or data related to sensitive technologies with national or state-level applications. It is also possible that the capture of credentials can facilitate future targeting or pivoting to targets of interest.
tags: Governments
DBot Score: {"Indicator": null, "Type": "Campaign", "Vendor": "Mandiant", "Score": 0, "Reliability": "A - Completely reliable"}
publications:
type: campaign
id: campaign--c344bb9b-cb50-58be-9c33-350b622c1fce
name: APT41 Exploition of .NET Web Applications at U.S. State Governments
description: In mid-October 2021, Mandiant observed a wave of APT41 activity targeting multiple U.S. state governments. We believe the actors exploited a vulnerability in a public-facing web application, used by numerous state governments and U.S. educational research institutes, to gain initial access. The actors then conducted reconnaissance and credential harvesting activity, dropping multiple files including the publicly available BADPOTATO privilege escalation tool. Mandiant also identified the DEADEYE dropper, which executed a KEYPLUG backdoor.

This activity is likely a continuation of a previously observed APT41 campaign targeting multiple U.S. state government entities in May 2021. The specific motivation behind the targeting of U.S. state government entities remains unclear, though we infer, based on the targeting profile, that the purpose may include capturing political intelligence or data related to sensitive technologies with national or state-level applications. It is also possible that the capture of credentials can facilitate future targeting or pivoting to targets of interest.
releasable: true
counts: {"actors": 1, "reports": 4, "malware": 19, "campaigns": 0, "industries": 1, "timeline": 104, "vulnerabilities": 1, "actor_collaborations": 0, "tools": 9}
audience: {'name': 'intel_oper', 'license': 'INTEL_RBI_OPS'},
{'name': 'intel_fusion', 'license': 'INTEL_RBI_FUS'},
{'name': 'tlp_marking', 'license': 'amber'}
profile_updated: 2023-03-06T07:10:13.356Z
campaign_type: Individual
short_name: CAMP.21.014
last_activity_time: 2022-02-26T00:00:00.000Z
timeline: {'name': 'Campaign Created', 'description': 'Mandiant Declared Campaign', 'releasable': True, 'event_type': 'created', 'timestamp': '2021-10-18T00:00:00.000Z'},
{'name': 'First Observed', 'description': 'Mandiant Observed First Activity of Campaign', 'releasable': True, 'event_type': 'first_observed', 'timestamp': '2020-06-15T00:00:00.000Z'},
{'name': 'Technique Observed', 'description': 'Mandiant Observed Use of The Technique', 'releasable': True, 'event_type': 'technique_observed', 'mandiant_technique': {'type': 'attack-pattern', 'id': 'attack-pattern--ae0d50d8-79de-5193-9223-178fde2c0756', 'name': 'Privilege escalation via access token impersonation', 'attribution_scope': 'confirmed', 'releasable': True}, 'mitre_techniques': [{'type': 'attack-pattern', 'id': 'attack-pattern--86850eff-2729-40c3-b85e-c4af26da4a2d', 'name': 'Token Impersonation/Theft', 'attribution_scope': 'confirmed', 'releasable': True, 'mitre_id': 'T1134.001', 'tactics': ['Privilege Escalation', 'Defense Evasion']}, {'type': 'attack-pattern', 'id': 'attack-pattern--dcaa092b-7de9-4a21-977f-7fcb77e89c48', 'name': 'Access Token Manipulation', 'attribution_scope': 'confirmed', 'releasable': True, 'mitre_id': 'T1134', 'tactics': ['Privilege Escalation', 'Defense Evasion']}], 'used_by': [{'releasable': True, 'actor': {'type': 'threat-actor', 'id': 'threat-actor--9c88bd9c-f41b-59fa-bfb6-427b1755ea64', 'name': 'APT41', 'attribution_scope': 'confirmed', 'releasable': True}, 'first_observed': '2021-05-05T00:00:00.000Z', 'last_observed': '2021-10-17T00:00:00.000Z'}]},
aliases: {"releasable": true, "actor": [{"type": "alias", "id": "alias--c63f2b2b-3639-5bd0-be28-b1cb79b00b21", "name": "Barium (Microsoft)", "attribution_scope": "confirmed", "releasable": true, "source": "Microsoft", "nucleus_name": "Barium"}], "malware": [], "campaign": []}
actors: {'type': 'threat-actor', 'id': 'threat-actor--9c88bd9c-f41b-59fa-bfb6-427b1755ea64', 'name': 'APT41', 'attribution_scope': 'confirmed', 'releasable': True, 'motivations': [{'type': 'motivation', 'id': 'motivation--fa4d4992-1762-50ac-b0b1-2c75210645d0', 'name': 'Financial Gain', 'attribution_scope': 'confirmed', 'releasable': True}, {'type': 'motivation', 'id': 'motivation--1b8ca82a-7cff-5622-bedd-965c11d38a9e', 'name': 'Espionage', 'attribution_scope': 'confirmed', 'releasable': True}], 'source_locations': [{'releasable': True, 'country': {'type': 'location', 'id': 'location--740e7e5f-f2a0-55e0-98a3-88872c55b581', 'name': 'China', 'attribution_scope': 'confirmed', 'releasable': True, 'iso2': 'CN'}, 'region': {'type': 'location', 'id': 'location--8fc231f3-4e62-57e7-b734-eaee0a734612', 'name': 'Asia', 'attribution_scope': 'confirmed', 'releasable': True}, 'sub_region': {'type': 'location', 'id': 'location--7b33370b-da4b-5c48-9741-b69f69febb77', 'name': 'East Asia', 'attribution_scope': 'confirmed', 'releasable': True}}]}
malware: {'type': 'malware', 'id': 'malware--448e822d-8496-5021-88cb-599062f74176', 'name': 'BEACON', 'attribution_scope': 'confirmed', 'releasable': True},
{'type': 'malware', 'id': 'malware--ad51977a-c6fc-5cd3-822e-4e2aa6c832a2', 'name': 'FASTPACE', 'attribution_scope': 'confirmed', 'releasable': True}
vulnerabilities: {'type': 'vulnerability', 'id': 'vulnerability--362764b4-aa15-55fd-a68b-caf84f25a6b0', 'attribution_scope': 'confirmed', 'releasable': True, 'cve_id': 'CVE-2021-44207'}
industries: {'type': 'identity', 'id': 'identity--8d0881d8-d199-5e5a-bef9-be3ca6bb8f0d', 'name': 'Governments', 'attribution_scope': 'confirmed', 'releasable': True}
target_locations: {"releasable": true, "countries": [{"type": "location", "id": "location--5c5b39aa-9308-52a6-9daf-0547d5aaa160", "name": "United States of America", "attribution_scope": "confirmed", "iso2": "US", "region": "location--6d65522f-0166-5e7e-973c-35cf7973e4e3", "sub_region": "location--0daadcfb-ad23-5f16-b53b-6c5b09bf20de", "releasable": true, "count": 8}], "regions": [{"type": "location", "id": "location--6d65522f-0166-5e7e-973c-35cf7973e4e3", "name": "Americas", "attribution_scope": "confirmed", "releasable": true, "count": 8}], "sub_regions": [{"type": "location", "id": "location--0daadcfb-ad23-5f16-b53b-6c5b09bf20de", "name": "North America", "attribution_scope": "confirmed", "region": "location--6d65522f-0166-5e7e-973c-35cf7973e4e3", "releasable": true, "count": 8}]}
is_publishable: true
{'name': 'related-to', 'reverseName': 'related-to', 'type': 'IndicatorToIndicator', 'entityA': 'CAMP.21.014', 'entityAFamily': 'Indicator', 'entityAType': 'Campaign', 'entityB': 'APT41', 'entityBFamily': 'Indicator', 'entityBType': 'Threat Actor', 'fields': {}},
{'name': 'related-to', 'reverseName': 'related-to', 'type': 'IndicatorToIndicator', 'entityA': 'CAMP.21.014', 'entityAFamily': 'Indicator', 'entityAType': 'Campaign', 'entityB': 'BEACON', 'entityBFamily': 'Indicator', 'entityBType': 'Malware', 'fields': {}}
CampaignCAMP.21.014