3.5 KiB
| tags |
|---|
| MISP, misp-training, training, exercise, hands-on |
MISP Encoding Exercise: Scam call
Ressources
- Cheatsheet: Concepts & Data model
- Attributes Categories and Types
- MISP Objects and searchable in MISP
- Galaxies and searchable in MISP
- Taxonomies and searchable in MISP
Context
A victim was asked to transfer money to a novice scammer
Narrative
A victim was called by the suspected scammer Wallace Breen using the following number: +12243359185. The scammer pretended to be a Microsoft employee, managed to convince the victim that he could help by using remote desktop assistance.
Once he had access, the scammer downloaded a binary bin.exe from the following url https://zdgyot.ugic0k.ru/assets/bin.exe. He then proceed to install the binary, probably to use it a backdoor for future access.
After the installation, he asked the victim to transfer money to the scammer bank account: GB29NWBK60161331926819
The day after, the victim suspecting a scam contacted the police.
Type of data extracted from evidences
- RDP Log file
- Installed binary
- Victim's browser history
- Bank account statement
- Victim's phone call log
Data extracted from evidences
- Scammer's ip address
- Potentially malicious binary
- URL (and domain) from which the binary was downloaded
- Scammer's bank account and phone number
- Scammer's full name and nationality
Extracted values
194.78.89.250- ip-address from log file
bin.exe- Downloaded binary malware-sample
https://zdgyot.ugic0k.ru/assets/bin.exe- Download
URL
- Download
GB 29 NWBK 601613 31926819- IBAN number
- Swift:
NWBK, Account number:31926819, Currency:GBP
+12243359185- Phone number
Wallace Breenis fromGB- Name and nationality
Encoding tasks
These are the steps you are asked to do. The order is provided as a suggestion.
- Create an new event
- Encode all data to be shared
- Indicators
- Supportive data / Observable
- Non technical indicators
- Add relationships to recreate the events and story
- Add the time component to recreate the chronology
- Perform enrichments where applicable (e.g location if IP address)
- Add contextualization
- Incident type
circl,enisa,europol-incident
- Releasability and Permissible Actions
tlp,PAP
- Malware type / familly
malware_classification,ransomware,malpediaGalaxy
- Infection vector
ransomware,maec-delivery-vectors,europol-event
- Adversary infrastructure
adversary
- Adversary tactics and techniques
attack-patternGalaxy
- Malware-specific information
ransomware,maec-malware-capabilities
- Mitigations and Detection
Course of ActionGalaxy
- Sector and Location
SectorGalaxy,CountryGalaxy
- Collaboration and sharing
workflow,collaborative-intelligence
- Incident type
- Create a small write-up as an event report
- Review the distribution level and publish