Current ThreatQ Version Filter
 

Intel 471 Malware Intelligence CDF

The web format of this guide reflects the most current release.  Guides for older iterations are available in PDF format.  

Integration Details

ThreatQuotient provides the following details for this integration:

Introduction

Malware Intelligence Reports provides analysis of malware families and features, network traffic, how to identify, detect and decode it, extract and parse its configuration, control server(s) encryption key and campaign IDYARA Rules and IDS Signatures to accurately identify the identification and detection of malware families, malicious network traffic and improve detection systems. The Intel 471 Malware Intelligence CDF by ThreatQ brings Malware Reports with associated IOCs  and Signatures all in with a 1-click experience.

Intel471 Malware Feed ingests threat intelligence data from the following endpoints:

  • Malware Reportshttps://api.intel471.com/v1/malwareReports
  • Malware Indicatorshttps://api.intel471.com/v1/indicators/stream
  • Malware Signatureshttps://api.intel471.com/v1/yara

Important Notes

  • An email address and API key are used for HTTP basic authentication.
  • Time constrained data fetching is possible.

Installation

This integration can be installed in the My Integration section of your ThreatQ instance. See the Adding an Integration topic for more details.

Configuration

ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.

To configure the integration:

  1. Navigate to your integrations management page in ThreatQ.
  2. Select the Commercial option from the Category dropdown (optional).

    If you are installing the integration for the first time, it will be located under the Disabled tab.

  3. Click on the integration entry to open its details page.
  4. Enter the following parameters under the Configuration tab:
    Parameter Description
    Email Address Your Intel471 Account email address.
    API Key Your Intel471 Account API key.
    Count The maximum number of records that can be returned per response from the provider.  The default setting is 10.

    This only affects the Malware Reports and Malware Signatures feeds.  The Malware Indicators feed is hardcoded with a value of 100.

  5. Review any additional settings, make any changes if needed, and click on Save.
  6. Click on the toggle switch, located above the Additional Information section, to enable it.

ThreatQ Mapping

Malware Reports

High-level summary of what info the feed does

GET https://api.intel471.com/v1/malwareReports

Sample Response:

{
    "malwareReportTotalCount": 14,
    "malwareReports": [
        {
            "data": {
                "threat": {
                    "uid": "d972018da6adf284cce963c2552df80b",
                    "type": "malware",
                    "data": {
                        "family": "bokbot",
                        "malware_family_profile_uid": "d972018da6adf284cce963c2552df80b"
                    }
                },
                "malware_report_data": {
                    "text": "foo <div>bar</div>",
                    "released_at": 1566552377000,
                    "title": "BokBot - The evolution of Vawtrak",
                    "version": "1.8"
                }
            },
            "meta": {
                "version": "0.1"
            },
            "last_updated": 1566748352307,
            "uid": "1a36e81e75c363d4cb7022f007e1182b",
            "activity": {
                "first": 1566550742000,
                "last": 1566552377000
            }
        }
    ]
}

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Examples Notes
.data.malware_report_data.title report.value Report Title "BokBot - The evolution of Vawtrak"  
.data.malware_report_data.text report.description Report Description "foo

bar

"
*
.uid report.attribute UID "1a36e81e75c363d4cb7022f007e1182b"  
.last_updated report.attribute Modified At 1566748352307 formatted
.data.threat.uid report.attribute Threat UID "d972018da6adf284cce963c2552df80b"  
.data.threat.type report.attribute Threat Type "malware"  
.data.threat.data.family report.attribute Malware Family "bokbot"  
.data.threat.data.malware_family_profile_uid report.attribute Malware Family Profile ID "d972018da6adf284cce963c2552df80b"  
.data.threat.data.version report.attribute Threat Version "1.8"  
.data.malware_report_data.released_at report.attribute Released At 1566552377000 formatted
.meta.version report.attribute Document Version "0.1"  
.activity.first report.attribute Active Period First 1566550742000 formatted
.activity.last report.attribute Active Period Last 1566552377000 formatted
.data.malware_report_data.released_at report.published_at N/A 1566552377000 formatted

* Stripped tags, trimmed to first paragraph, added link for full description.

Malware Indicators

High-level summary of what info the feed does

GET https://api.intel471.com/v1/indicators/stream

Sample Response:

{
    "indicatorTotalCount": 102158,
    "indicators": [
        {
            "data": {
                "confidence": "medium",
                "expiration": 1572707778000,
                "context": {
                    "description": "danabot exfiltration URL"
                },
                "threat": {
                    "uid": "0e3263ebcdc7611ae808f82e58353ac5",
                    "type": "malware",
                    "data": {
                        "family": "danabot",
                        "malware_family_profile_uid": "0e3263ebcdc7611ae808f82e58353ac5"
                    }
                },
                "mitre_tactics": "command_and_control",
                "intel_requirements": [
                    "1.1.4",
                    "1.1.16"
                ],
                "indicator_type": "url",
                "indicator_data": {
                    "url": "tcp://195.123.246.209:443"
                }
            },
            "meta": {
                "version": "0.1"
            },
            "last_updated": 1570115782701,
            "uid": "428f4c3517ffd31e65ad240d2a7dc37c",
            "activity": {
                "first": 1565902923000,
                "last": 1570115778000
            }
        },
        {
            "data": {
                "confidence": "high",
                "expiration": 1601723409000,
                "context": {
                    "description": "sample of vidar malware family"
                },
                "threat": {
                    "uid": "bcf1b5b912722362f2f928f5a32e2272",
                    "type": "malware",
                    "data": {
                        "family": "vidar",
                        "malware_family_profile_uid": "22594e13276480dd456a8441babc227b",
                        "version": "13.6"
                    }
                },
                "mitre_tactics": "command_and_control",
                "intel_requirements": [
                    "1.1.5",
                    "1.1.6"
                ],
                "indicator_type": "file",
                "indicator_data": {
                    "file": {
                        "md5": "d4b9734b3f06ce112f88e2f7d88e3513",
                        "sha1": "d0400b8ef915d633dc6f3db0878d4c3ae3f8eaaa",
                        "sha256": "900a568f4e95dd8d7e93707a214e43a76653b17aea43fc3a7adf4ae89668efea",
                        "download_url": "https://api.intel471.com/v1/download/malwareIntel/900a568f4e95dd8d7e93707a214e43a76653b17aea43fc3a7adf4ae89668efea.zip"
                    }
                }
            },
            "meta": {
                "version": "0.1"
            },
            "last_updated": 1570187418736,
            "uid": "de38abab91098b99072fc5b10ad279e2",
            "activity": {
                "first": 1570187409000,
                "last": 1570187409000
            }
        },
        {
            "data": {
                "confidence": "medium",
                "expiration": 1572779544000,
                "context": {
                    "description": "lokibot controller IPv4"
                },
                "threat": {
                    "uid": "22e7a5f41d4f3cc5c704758ffa505556",
                    "type": "malware",
                    "data": {
                        "family": "lokibot",
                        "malware_family_profile_uid": "20eb1f82621001883ea0c2085aff5729",
                        "version": "1.8"
                    }
                },
                "mitre_tactics": "command_and_control",
                "intel_requirements": [
                    "1.1.5",
                    "1.1.6"
                ],
                "indicator_type": "ipv4",
                "indicator_data": {
                    "address": "8.208.76.80"
                }
            },
            "meta": {
                "version": "0.1"
            },
            "last_updated": 1570187545255,
            "uid": "30b5c9b5e16179132f0369d8b6f74738",
            "activity": {
                "first": 1569808002000,
                "last": 1570187544000
            }
        }
    ]
}

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Examples Notes
.data.indicator_type indicator.type Indicator Type "url" / "ipv4" / "file" *
.data.indicator_data indicator.value Indicator Value * See note *
.uid indicator.attribute Indicator UID "048fe252afced217d487600349355bbc"  
.last_updated indicator.attribute Modified At 1556258716643 formatted
.data.threat.uid indicator.attribute Threat UID "45c17dfa1b60fb295f377836da5454c5"  
.data.threat.type indicator.attribute Threat Type "malware"  
.data.threat.data.family indicator.attribute Malware Family "arkei"  
.data.threat.data.malware_family_profile_uid indicator.attribute Malware Family Profile ID "45c17dfa1b60fb295f377836da5454c5"  
.data.threat.data.version indicator.attribute Threat Version "1.8"  
.meta.version indicator.attribute Document Version "0.1"  
.activity.first indicator.attribute Active Period First 1566550742000 formatted
.activity.last indicator.attribute Active Period Last 1566552377000 formatted
.data.confidence indicator.attribute Confidence "high"  
.data.intel_requirements indicator.attribute Intelligence Requirement ["1.1.5","1.1.6"]  
.data.expiration indicator.attribute Expires At 1572779544000 formatted
.data.context.description indicator.attribute Description "lokibot controller IPv4"  
.data.mitre_tactics indicator.attribute Mitre Tactics "command_and_control"  
[see note 4] indicator.attribute Released At 1566552377000 formatted
[see note 4] indicator.published_at N/A 1566552377000 formatted

* If .data.indicator_type == 'ipv4', the value of the indicator will be equal to .data.indicator_data.address (8.208.76.80) and the type of the indicator will be "IP Address"

* If .data.indicator_type == 'url', the value of the indicator will be equal to .data.indicator_data.url (tcp://195.123.246.209:443) and the type of the indicator will be "URL"

* If .data.indicator_type == 'file', 3 indicators will be added with types 'MD5','SHA-1','SHA-256' and the value of the indicators will be extracted from .value.file.md5/sha1/sha256

**
 The 'Released At' attribute and the indicator.published_at values are fetched from the '.data.malware_report_data.released_at' value of the Malware Reports feed response.

Malware Signatures

GET https://api.intel471.com/v1/yara

Sample Response:

{
    "yaraTotalCount": 3,
    "yaras": [
        {
            "data": {
                "confidence": "high",
                "yara_data": {
                    "title": "arkei",
                    "signature": "rule arkei\n{\n  meta: \n    author = \"Intel 471\"\n  strings:\n    $config = \"/server/grubConfig\" fullword ascii\n    $gate = \"/server/gate\" fullword ascii\n    $arkei = \"Arkei\"\n    $filezilla1 = \"\\\\files\\\\filezilla_recentservers.xml\" fullword\n    $filezilla2 = \"\\\\files\\\\filezilla_sitemanager.xml\" fullword\n    $info_log = \"files\\\\information.log\"\n    $passwords_log = \"files\\\\passwords.log\" fullword wide\n    $stats1 = \"MachineID: %s\"\n    $stats2 = \"Windows Username: %s\"\n    $stats3 = \"Videocard: %s\" \n    $desktop = \"Desktop.zip\"\n    $ipgeo1 = \"http://ip-api.com/line/?fields=countryCode\" fullword wide\n    $ipgeo2 = \"http://ip-api.com/line/?fields=query\" fullword wide\n\n  condition:\n    uint16(0) == 0x5a4d and (all of them)\n}\n"
                },
                "threat": {
                    "data": {
                        "family": "arkei",
                        "malware_family_profile_uid": "45c17dfa1b60fb295f377836da5454c5"
                    },
                    "type": "malware",
                    "uid": "45c17dfa1b60fb295f377836da5454c5",
                    "version": "1.6"
                },
                "intel_requirements": [
                    "1.1.5",
                    "1.1.6"
                ]
            },
            "meta": {
                "version": "0.1"
            },
            "last_updated": 1556258716643,
            "uid": "048fe252afced217d487600349355bbc",
            "activity": {
                "first": 1550066320000,
                "last": 1550066320000
            }
        }
    ]
}

ThreatQuotient provides the following default mapping for this feed:

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Examples Notes
- signature.type Signature Type "YARA"  
.data.yara_data.title signature.name Signature Name "arkei"  
.data.yara_data.signature signature.value Signature Value "rule arkei\n{\n meta: \n author = ..."  
.uid signature.attribute Signature UID "048fe252afced217d487600349355bbc"  
.last_updated signature.attribute Modified At 1556258716643 formatted
.data.threat.uid signature.attribute Threat UID "45c17dfa1b60fb295f377836da5454c5"  
.data.threat.type signature.attribute Threat Type "malware"  
.data.threat.data.family signature.attribute Malware Family "arkei"  
.data.threat.data.malware
_family_profile_uid
signature.attribute Malware Family Profile ID "45c17dfa1b60fb295f377836da5454c5"  
.data.threat.data.version signature.attribute Threat Version "1.6"  
.meta.version signature.attribute Document Version "0.1"  
.activity.first signature.attribute Active Period First 1566550742000 formatted
.activity.last signature.attribute Active Period Last 1566552377000 formatted
.data.confidence signature.attribute Confidence "high"  
.data.intel_requirements signature.attribute Intelligence Requirement ["1.1.5","1.1.6"]  
[see note 1] signature.attribute Released At* 1566552377000 formatted
[see note 1] signature.published_at N/A 1566552377000 formatted

* The 'Released At' attribute and the signature.published_at values are fetched from the '.data.malware_report_data.released_at' value of the Malware Reports feed response.

Change Log

  • Version 1.1.0
    • Updated the Malware Indicators supplemental feed endpoint to use the streaming API.
  • Version 1.0.2
    • N/A
  • Version 1.0.1
    • N/A

PDF Guides

Document ThreatQ Version
Intel 471 Malware Intelligence CDF Guide v1.1.0 4.21.0 or Greater
Intel 471 Malware Intelligence CDF Guide v1.0.2 4.21.0 or Greater
Intel 471 Malware Intelligence CDF Guide v1.0.1 4.21.0 or Greater