{"Event":{"info":"OSINT - AESDDoS Botnet Malware Exploits CVE-2019-3396 to Perform Remote Code Execution, DDoS Attacks, and Cryptocurrency Mining","Tag":[{"colour":"#00223b","exportable":true,"name":"osint:source-type=\"blog-post\""},{"colour":"#ffffff","exportable":true,"name":"tlp:white"},{"colour":"#72003d","exportable":true,"name":"workflow:todo=\"add-missing-misp-galaxy-cluster-values\""},{"colour":"#22681c","exportable":true,"name":"malware_classification:malware-category=\"Botnet\""}],"publish_timestamp":"0","timestamp":"1556786521","Object":[{"comment":"","template_uuid":"81650945-f186-437b-8945-9f31715d32da","uuid":"5ccaa846-4cc4-4b86-badd-48c9950d210f","sharing_group_id":"0","timestamp":"1556785222","description":"Vulnerability object describing a common vulnerability enumeration which can describe published, unpublished, under review or embargo vulnerability for software, equipments or hardware.","template_version":"5","Attribute":[{"comment":"","category":"Other","uuid":"5ccaa846-c408-414c-9089-49e6950d210f","timestamp":"1556785222","to_ids":false,"value":"Published","disable_correlation":true,"object_relation":"state","type":"text"},{"comment":"","category":"Other","uuid":"5ccaa846-1e1c-47e7-91c1-4e02950d210f","timestamp":"1556785222","to_ids":false,"value":"CVE-2019-3396","disable_correlation":false,"object_relation":"id","type":"text"}],"distribution":"5","meta-category":"vulnerability","name":"vulnerability"},{"comment":"","template_uuid":"688c46fb-5edb-40a3-8273-1af7923e2215","uuid":"5ccaa8c5-e6bc-4cb0-9102-4b99950d210f","sharing_group_id":"0","timestamp":"1556785349","description":"File object describing a file with meta-information","template_version":"17","Attribute":[{"comment":"","category":"Payload delivery","uuid":"5ccaa8c5-bff0-4bad-b764-487f950d210f","timestamp":"1556785349","to_ids":true,"value":"b14d5602c8aa16e3db4518832d567a4ca5b9545ce09f9a87684d58f8b1d9daaf","disable_correlation":false,"object_relation":"sha256","type":"sha256"},{"comment":"","category":"Other","uuid":"5ccaa8c5-6cf8-44ad-96a5-472b950d210f","timestamp":"1556785349","to_ids":false,"value":"Malicious","disable_correlation":true,"object_relation":"state","type":"text"}],"distribution":"5","meta-category":"file","name":"file"},{"comment":"","template_uuid":"688c46fb-5edb-40a3-8273-1af7923e2215","uuid":"5ccaa97d-d23c-402d-98a5-4373950d210f","sharing_group_id":"0","timestamp":"1556785533","description":"File object describing a file with meta-information","template_version":"17","Attribute":[{"comment":"","category":"Payload delivery","uuid":"5ccaa97d-e9dc-46dc-9bbb-4cfa950d210f","timestamp":"1556785533","to_ids":true,"value":"2e4f18e28830771414c9d0cb99c1696d202fe001d1aa41f64d2f7ce6aef7f7c4","disable_correlation":false,"object_relation":"sha256","type":"sha256"},{"comment":"","category":"Other","uuid":"5ccaa97d-9fd8-4742-acc4-4045950d210f","timestamp":"1556785533","to_ids":false,"value":"Malicious","disable_correlation":true,"object_relation":"state","type":"text"}],"distribution":"5","meta-category":"file","name":"file"},{"comment":"","template_uuid":"688c46fb-5edb-40a3-8273-1af7923e2215","uuid":"5ccaac11-9dc4-4811-9b60-b711950d210f","sharing_group_id":"0","timestamp":"1556786193","description":"File object describing a file with meta-information","template_version":"17","Attribute":[{"comment":"","category":"Payload delivery","uuid":"5ccaac11-9c60-4820-8ea1-b711950d210f","timestamp":"1556786193","to_ids":true,"value":"f82dc01b04dfbdab3ccaacd20449395e0175d9ab4f0732019651480358d44ac6","disable_correlation":false,"object_relation":"sha256","type":"sha256"},{"comment":"","category":"Other","uuid":"5ccaac11-4e90-4cac-bf33-b711950d210f","timestamp":"1556786193","to_ids":false,"value":"Malicious","disable_correlation":true,"object_relation":"state","type":"text"}],"distribution":"5",