<?xml version="1.0" encoding="UTF-8"?>
<response><Event><id>808</id><org>CIRCL</org><date>2014-05-30</date><threat_level_id>1</threat_level_id><info>Destory RAT malware analysis</info><published>0</published><uuid>53886ab4-1f14-43b0-a822-41a9950d2109</uuid><attribute_count>11</attribute_count><analysis>1</analysis><timestamp>1401622773</timestamp><distribution>3</distribution><proposal_email_lock>0</proposal_email_lock><orgc>CIRCL</orgc><locked>0</locked><publish_timestamp>0</publish_timestamp><Attribute><id>53457</id><type>pattern-in-memory</type><category>Artifacts dropped</category><to_ids>0</to_ids><uuid>53886cdc-cf58-42af-8eda-40bb950d2109</uuid><event_id>808</event_id><distribution>3</distribution><timestamp>1401449692</timestamp><comment/><value>win3dx.DLL</value><ShadowAttribute/></Attribute><Attribute><id>53458</id><type>hostname</type><category>Network activity</category><to_ids>1</to_ids><uuid>5388797f-f188-4f00-8e93-4210950d2109</uuid><event_id>808</event_id><distribution>3</distribution><timestamp>1401452927</timestamp><comment/><value>microsoft.operaa.net</value><ShadowAttribute/></Attribute><Attribute><id>53460</id><type>hostname</type><category>Network activity</category><to_ids>1</to_ids><uuid>538879bc-67c0-4c8a-b0fa-4035950d2109</uuid><event_id>808</event_id><distribution>3</distribution><timestamp>1401452988</timestamp><comment>Related hostname (via passive acquisition)</comment><value>microsoftno.operaa.net</value><ShadowAttribute/></Attribute><Attribute><id>53459</id><type>ip-dst</type><category>Network activity</category><to_ids>1</to_ids><uuid>53887993-0318-4375-a010-4bc8950d2109</uuid><event_id>808</event_id><distribution>3</distribution><timestamp>1401452947</timestamp><comment/><value>123.254.104.51</value><ShadowAttribute/></Attribute><Attribute><id>53461</id><type>ip-dst</type><category>Network activity</category><to_ids>1</to_ids><uuid>538879e3-c5e0-4bcb-a9ed-471c950d2109</uuid><event_id>808</event_id><distribution>3</distribution><timestamp>1401453027</timestamp><comment>Older IP used for the C&amp;C/proxy in 2013</comment><value>111.68.10.83</value><ShadowAttribute/></Attribute><Attribute><id>53462</id><type>ip-dst</type><category>Network activity</category><to_ids>1</to_ids><uuid>538879f8-5f00-4fda-bc8a-4213950d2109</uuid><event_id>808</event_id><distribution>3</distribution><timestamp>1401453048</timestamp><comment>Older IP used for the C&amp;C/proxy in 2013</comment><value>111.68.10.85</value><ShadowAttribute/></Attribute><Attribute><id>53616</id><type>user-agent</type><category>Network activity</category><to_ids>1</to_ids><uuid>538b10f6-3c4c-48d5-8c02-488e950d2109</uuid><event_id>808</event_id><distribution>3</distribution><timestamp>1401622773</timestamp><comment/><value>Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;</value><ShadowAttribute/></Attribute><Attribute><id>53456</id><type>filename</type><category>Payload installation</category><to_ids>0</to_ids><uuid>53886be8-51ac-44aa-b81e-886b950d2109</uuid><event_id>808</event_id><distribution>3</distribution><timestamp>1401449448</timestamp><comment/><value>win3dx.DLL</value><ShadowAttribute/></Attribute><Attribute><id>53453</id><type>md5</type><category>Payload installation</category><to_ids>0</to_ids><uuid>53886b1e-06c0-4588-b163-a35d950d2109</uuid><event_id>808</event_id><distribution>3</distribution><timestamp>1401449246</timestamp><comment>Sample A</comment><value>801389d08baa4144018460fbe95da5ea</value><ShadowAttribute/></Attribute><Attribute><id>53454</id><type>sha1</type><category>Payload installation</category><to_ids>0</to_ids><uuid>53886b57-a3d8-43a7-8f4d-472a950d2109</uuid><event_id>808</event_id><distribution>3</distribution><timestamp>1401449320</timestamp><comment>Sample A</comment><value>c1f8738b3d7ef40177becc0ffde9321a03ef961a</value><ShadowAttribute/></Attribute><Attribute><id>53455</id><type>sha256</type><category>Payload installation</category><to_ids>0</to_ids><uuid>53886bc8-14d4-4ef4-bf66-4795950d2109</uuid><event_id>808</event_id><distribution>3</distribution><timestamp>1401449425</timestamp><comment>Sample A</comment><value>217fe60d2ecea69055f93e86225e3596709f2e1baf458476d340726fdc8d5653</value><ShadowAttribute/></Attribute><ShadowAttribute/><RelatedEvent><Event><id>758</id><org>CERT-BUND</org><date>2014-05-09</date><risk>Undefined</risk><info>SOGU/PlugX sample from an ongoing compromise of a manufacturing company</info><user_id>79</user_id><published>1</published><uuid>536cb845-a184-400f-a11c-ac48950d2109</uuid><attribute_count>5</attribute_count><analysis>0</analysis><orgc>CERT-BUND</orgc><timestamp>1399634277</timestamp><distribution>1</distribution><proposal_email_lock>0</proposal_email_lock><locked>0</locked><threat_level_id>2</threat_level_id><publish_timestamp>1399634420</publish_timestamp></Event></RelatedEvent><RelatedEvent><Event><id>312</id><org>CIRCL</org><date>2012-03-27</date><risk>Undefined</risk><info>Command and control in the 5th domain</info><user_id>1</user_id><published>1</published><uuid>4f71b658-f864-4413-a865-05da0a000b01</uuid><attribute_count>87</attribute_count><analysis>2</analysis><orgc>MIL.be</orgc><timestamp>1000000000</timestamp><distribution>3</distribution><proposal_email_lock>0</proposal_email_lock><locked>0</locked><threat_level_id>4</threat_level_id><publish_timestamp>0</publish_timestamp></Event></RelatedEvent><RelatedEvent><Event><id>75</id><org>CIRCL</org><date>2012-02-13</date><risk>High</risk><info>Another on-going RAT campaign</info><user_id>3</user_id><published>1</published><uuid>4f75a819-b100-48b3-be8f-49b30a000b01</uuid><attribute_count>5</attribute_count><analysis>2</analysis><orgc>CIRCL</orgc><timestamp>1374591275</timestamp><distribution>3</distribution><proposal_email_lock>0</proposal_email_lock><locked>0</locked><threat_level_id>1</threat_level_id><publish_timestamp>0</publish_timestamp></Event></RelatedEvent></Event><xml_version>2.2.0</xml_version></response>
