misp-circl-feed/feeds/circl/stix-2.1/58e3f451-6ff8-4bf1-8412-4e5a950d210f.json

637 lines
30 KiB
JSON
Raw Permalink Normal View History

2023-04-21 14:44:17 +00:00
{
"type": "bundle",
"id": "bundle--58e3f451-6ff8-4bf1-8412-4e5a950d210f",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-11-28T13:03:30.000Z",
"modified": "2017-11-28T13:03:30.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "grouping",
"spec_version": "2.1",
"id": "grouping--58e3f451-6ff8-4bf1-8412-4e5a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-11-28T13:03:30.000Z",
"modified": "2017-11-28T13:03:30.000Z",
"name": "OSINT - Introducing ROKRAT",
"context": "suspicious-activity",
"object_refs": [
"observed-data--58e3f463-21ac-4f6a-adc1-4e36950d210f",
"url--58e3f463-21ac-4f6a-adc1-4e36950d210f",
"x-misp-attribute--58e3f472-01f8-4f87-a9d4-44e7950d210f",
"indicator--58e3f4b1-0674-48ec-8197-dbe7950d210f",
"indicator--58e3f4b2-5594-45b7-a9ce-dbe7950d210f",
"indicator--58e3f4c0-e40c-4d59-a481-4977950d210f",
"indicator--58e3f4c1-d2cc-4220-a25b-4557950d210f",
"indicator--58e3f4dc-4264-4991-a3a2-480b950d210f",
"indicator--58e3f4dd-fdbc-4c26-b78f-4bdf950d210f",
"indicator--58e3f4ec-be0c-4e20-b032-4c21950d210f",
"indicator--58e3f4ed-94a0-4e0e-9baa-4636950d210f",
"x-misp-attribute--58e3f50e-5d14-4600-8c01-47f2950d210f",
"indicator--58e3f53a-e950-4870-83e2-45d4950d210f",
"indicator--58e3f573-cecc-4128-a46d-450502de0b81",
"indicator--58e3f574-86dc-479a-8de4-4f7602de0b81",
"observed-data--58e3f575-ee78-489f-8e55-4f5502de0b81",
"url--58e3f575-ee78-489f-8e55-4f5502de0b81",
"indicator--58e3f576-be44-4546-bbbd-4d7902de0b81",
"indicator--58e3f577-1340-4135-8b8b-4f3802de0b81",
"observed-data--58e3f578-9c24-4edc-890c-468402de0b81",
"url--58e3f578-9c24-4edc-890c-468402de0b81",
"indicator--58e3f579-7f4c-4562-aa37-475d02de0b81",
"indicator--58e3f57a-acc4-485c-bcdc-4ddc02de0b81",
"observed-data--58e3f57b-ea60-4866-8026-4cf402de0b81",
"url--58e3f57b-ea60-4866-8026-4cf402de0b81",
"indicator--58e3f57c-f834-43f2-bf32-456d02de0b81",
"indicator--58e3f57d-ea80-4673-ba8a-4b4502de0b81",
"observed-data--58e3f57e-fe50-4632-a869-48f302de0b81",
"url--58e3f57e-fe50-4632-a869-48f302de0b81"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"osint:source-type=\"blog-post\"",
"misp-galaxy:rat=\"rokrat\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e3f463-21ac-4f6a-adc1-4e36950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-04T19:35:04.000Z",
"modified": "2017-04-04T19:35:04.000Z",
"first_observed": "2017-04-04T19:35:04Z",
"last_observed": "2017-04-04T19:35:04Z",
"number_observed": 1,
"object_refs": [
"url--58e3f463-21ac-4f6a-adc1-4e36950d210f"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\"",
"osint:source-type=\"blog-post\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e3f463-21ac-4f6a-adc1-4e36950d210f",
"value": "http://blog.talosintelligence.com/2017/04/introducing-rokrat.html"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--58e3f472-01f8-4f87-a9d4-44e7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-04T19:35:04.000Z",
"modified": "2017-04-04T19:35:04.000Z",
"labels": [
"misp:type=\"text\"",
"misp:category=\"External analysis\"",
"osint:source-type=\"blog-post\""
],
"x_misp_category": "External analysis",
"x_misp_type": "text",
"x_misp_value": "A few weeks ago, Talos published research on a Korean MalDoc. As we previously discussed this actor is quick to cover their tracks and very quickly cleaned up their compromised hosts. We believe the compromised infrastructure was live for a mere matter of hours during any campaign. We identified a new campaign, again leveraging a malicious Hangul Word Processor (HWP) document. After analyzing the final payload, we determined the winner was\u2026 a Remote Administration Tool, which we have named ROKRAT.\r\n\r\nLike in the previous post, the campaign started with a spear phishing email containing a malicious attachment, the HWP document. One of the identified emails was sent from the email server of Yonsei, a private university in Seoul. The address used in the email was 'kgf2016@yonsei.ac.kr' which is the contact email of the Korea Global Forum where the slogan in 2016 was \"Peace and Unification of the Korean Peninsula\". This fact gives more credit and legitimacy to the email.\r\n\r\nThe HWP document contained an embedded Encapsulated PostScript (EPS) object. As with our previous publication this again is zlib compressed and trivial to obtain. The purpose of the EPS is to exploit a well-known vulnerability (CVE-2013-0808) to download a binary disguised as a .jpg file. This file is decoded and finally an executable is launched: ROKRAT. This RAT has the added complexity that the command and control servers are legitimate websites. The malware uses Twitter and two cloud platforms, Yandex and Mediafire, apparently for both C2 communications and exfiltration platforms. Unfortunately, these platforms are difficult to block globally within organizations as their use can be viewed as legitimate in most cases. Additionally, these 3 platforms all make use of HTTPS connectivity, making it much more difficult to identify specific patterns or the usage of specific tokens."
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e3f4b1-0674-48ec-8197-dbe7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-04T19:35:04.000Z",
"modified": "2017-04-04T19:35:04.000Z",
"description": "HWP Documents",
"pattern": "[file:hashes.SHA256 = '7d163e36f47ec56c9fe08d758a0770f1778fa30af68f39aac80441a3f037761e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-04T19:35:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e3f4b2-5594-45b7-a9ce-dbe7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-04T19:35:04.000Z",
"modified": "2017-04-04T19:35:04.000Z",
"description": "HWP Documents",
"pattern": "[file:hashes.SHA256 = '5441f45df22af63498c63a49aae82065086964f9067cfa75987951831017bd4f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-04T19:35:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e3f4c0-e40c-4d59-a481-4977950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-04T19:35:04.000Z",
"modified": "2017-04-04T19:35:04.000Z",
"description": "ROKRAT PE32",
"pattern": "[file:hashes.SHA256 = 'cd166565ce09ef410c5bba40bad0b49441af6cfb48772e7e4a9de3d646b4851c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-04T19:35:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e3f4c1-d2cc-4220-a25b-4557950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-04T19:35:04.000Z",
"modified": "2017-04-04T19:35:04.000Z",
"description": "ROKRAT PE32",
"pattern": "[file:hashes.SHA256 = '051463a14767c6477b6dacd639f30a8a5b9e126ff31532b58fc29c8364604d00']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-04T19:35:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e3f4dc-4264-4991-a3a2-480b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-04T19:35:04.000Z",
"modified": "2017-04-04T19:35:04.000Z",
"description": "Malicious URL",
"pattern": "[url:value = 'http://discgolfglow.com/wp-content/plugins/maintenance/images/worker.jpg']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-04T19:35:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e3f4dd-fdbc-4c26-b78f-4bdf950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-04T19:35:04.000Z",
"modified": "2017-04-04T19:35:04.000Z",
"description": "Malicious URL",
"pattern": "[url:value = 'http://acddesigns.com.au/clients/ACPRCM/kingstone.jpg']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-04T19:35:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e3f4ec-be0c-4e20-b032-4c21950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-04T19:35:04.000Z",
"modified": "2017-04-04T19:35:04.000Z",
"description": "Not malicious URLs but could be use to identify RAT execution:",
"pattern": "[url:value = 'https://www.amazon.com/Men-War-PC/dp/B001QZGVEC/EsoftTeam/watchcom.jpg']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-04T19:35:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e3f4ed-94a0-4e0e-9baa-4636950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-04T19:35:04.000Z",
"modified": "2017-04-04T19:35:04.000Z",
"description": "Not malicious URLs but could be use to identify RAT execution:",
"pattern": "[url:value = 'http://www.hulu.com/watch/559035/episode3.mp4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-04T19:35:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--58e3f50e-5d14-4600-8c01-47f2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-04T19:35:04.000Z",
"modified": "2017-04-04T19:35:04.000Z",
"labels": [
"misp:type=\"text\"",
"misp:category=\"Payload delivery\""
],
"x_misp_category": "Payload delivery",
"x_misp_comment": "TOKENS",
"x_misp_type": "text",
"x_misp_value": "MEDIAFIRE\r\nAccount #1\r\nUsername: ksy182824@gmail.com\r\nApplication ID: 81342\r\nTWITTER\r\nAccount #1\r\nConsumer key: sOPcUKjJteYrg8klXC4XUlk9l\r\nToken: 722226174008315904-u6P1FlI7IDg8VIYe720X0gqDYcAMQAR\r\n\r\nAccount #2\r\nConsumer key: sgpalyF1KukVKaPAePb3EGeMT\r\nToken: 759577633630593029-CQzXMfvsQ2RztFYawUPeVbAzcSnwllX\r\n\r\nAccount #3\r\nConsumer key: XVvauoXKfnAUm2qdR1nNEZqkN\r\nToken: 752302142474051585-r2TH1Dk8tU5TetUyfnw9c5OgA1popTj\r\n\r\nAccount #4\r\nConsumer key: U1AoCSLLHxfeDbtxRXVgj7y00\r\nToken: 779546496603561984-Qm8CknTvS4nKxWOB4tJvbtBUMBfNCKE\r\n\r\nAccount #5\r\nConsumer key: 9ndXAB6UcxhQVoBAkEKnwzt4C\r\nToken: 777852155245080576-H0kXYcQCpV6qiFER38h3wS1tBFdROcQ\r\n\r\nAccount #6\r\nConsumer key: QCDXTaOCPBQM4VZigrRj2CnJi\r\nToken: 775849572124307457-4ICTjYmOfAy5MX2FxUHVdUfqeNTYYqj\r\n\r\nAccount #7\r\nConsumer key: 2DQ8GqKhDWp55XIl77Es9oFRV\r\nToken: 778855419785154560-0YUVZtZjKblo2gTGWKiNF67ROwS9MMq\r\nYANDEX\r\nToken #1: AQAAAAAYm4qtAANss-XFfX3FjU8VmVR76k4aMA0\r\nToken #2: AQAAAAAA8uDKAANxExojbqps-UOIi8kc8EAhcq8\r\nToken #3: AQAAAAAY9j8KAANyULDuYU1240rjvpNXcRdF5Tw\r\nToken #4: AQAAAAAZDPB1AAN6l1Ht3ctALU1flix57TvuMa4"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e3f53a-e950-4870-83e2-45d4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-04T19:35:04.000Z",
"modified": "2017-04-04T19:35:04.000Z",
"description": "MEDIAFIRE account",
"pattern": "[email-message:from_ref.value = 'ksy182824@gmail.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-04T19:35:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Social network"
}
],
"labels": [
"misp:type=\"email-src\"",
"misp:category=\"Social network\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e3f573-cecc-4128-a46d-450502de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-04T19:35:15.000Z",
"modified": "2017-04-04T19:35:15.000Z",
"description": "ROKRAT PE32 - Xchecked via VT: 051463a14767c6477b6dacd639f30a8a5b9e126ff31532b58fc29c8364604d00",
"pattern": "[file:hashes.SHA1 = '75d7f88e010e5c7d9a4617157034cff16da0733f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-04T19:35:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e3f574-86dc-479a-8de4-4f7602de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-04T19:35:16.000Z",
"modified": "2017-04-04T19:35:16.000Z",
"description": "ROKRAT PE32 - Xchecked via VT: 051463a14767c6477b6dacd639f30a8a5b9e126ff31532b58fc29c8364604d00",
"pattern": "[file:hashes.MD5 = 'c909ca40d1124fc86662a12d72e0fb78']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-04T19:35:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e3f575-ee78-489f-8e55-4f5502de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-04T19:35:17.000Z",
"modified": "2017-04-04T19:35:17.000Z",
"first_observed": "2017-04-04T19:35:17Z",
"last_observed": "2017-04-04T19:35:17Z",
"number_observed": 1,
"object_refs": [
"url--58e3f575-ee78-489f-8e55-4f5502de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e3f575-ee78-489f-8e55-4f5502de0b81",
"value": "https://www.virustotal.com/file/051463a14767c6477b6dacd639f30a8a5b9e126ff31532b58fc29c8364604d00/analysis/1491317438/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e3f576-be44-4546-bbbd-4d7902de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-04T19:35:18.000Z",
"modified": "2017-04-04T19:35:18.000Z",
"description": "ROKRAT PE32 - Xchecked via VT: cd166565ce09ef410c5bba40bad0b49441af6cfb48772e7e4a9de3d646b4851c",
"pattern": "[file:hashes.SHA1 = '24d5d32c5b171f375b92bf3af83f55579eefe23d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-04T19:35:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e3f577-1340-4135-8b8b-4f3802de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-04T19:35:19.000Z",
"modified": "2017-04-04T19:35:19.000Z",
"description": "ROKRAT PE32 - Xchecked via VT: cd166565ce09ef410c5bba40bad0b49441af6cfb48772e7e4a9de3d646b4851c",
"pattern": "[file:hashes.MD5 = '033284841a9c8edbbad3422a0ae82566']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-04T19:35:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e3f578-9c24-4edc-890c-468402de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-04T19:35:20.000Z",
"modified": "2017-04-04T19:35:20.000Z",
"first_observed": "2017-04-04T19:35:20Z",
"last_observed": "2017-04-04T19:35:20Z",
"number_observed": 1,
"object_refs": [
"url--58e3f578-9c24-4edc-890c-468402de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e3f578-9c24-4edc-890c-468402de0b81",
"value": "https://www.virustotal.com/file/cd166565ce09ef410c5bba40bad0b49441af6cfb48772e7e4a9de3d646b4851c/analysis/1491235235/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e3f579-7f4c-4562-aa37-475d02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-04T19:35:21.000Z",
"modified": "2017-04-04T19:35:21.000Z",
"description": "HWP Documents - Xchecked via VT: 5441f45df22af63498c63a49aae82065086964f9067cfa75987951831017bd4f",
"pattern": "[file:hashes.SHA1 = 'b29394fcc40fa661094bda2f885b1d3982dea73a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-04T19:35:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e3f57a-acc4-485c-bcdc-4ddc02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-04T19:35:22.000Z",
"modified": "2017-04-04T19:35:22.000Z",
"description": "HWP Documents - Xchecked via VT: 5441f45df22af63498c63a49aae82065086964f9067cfa75987951831017bd4f",
"pattern": "[file:hashes.MD5 = 'aa1541d198207d261652e0f6f74098a4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-04T19:35:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e3f57b-ea60-4866-8026-4cf402de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-04T19:35:23.000Z",
"modified": "2017-04-04T19:35:23.000Z",
"first_observed": "2017-04-04T19:35:23Z",
"last_observed": "2017-04-04T19:35:23Z",
"number_observed": 1,
"object_refs": [
"url--58e3f57b-ea60-4866-8026-4cf402de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e3f57b-ea60-4866-8026-4cf402de0b81",
"value": "https://www.virustotal.com/file/5441f45df22af63498c63a49aae82065086964f9067cfa75987951831017bd4f/analysis/1491235236/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e3f57c-f834-43f2-bf32-456d02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-04T19:35:24.000Z",
"modified": "2017-04-04T19:35:24.000Z",
"description": "HWP Documents - Xchecked via VT: 7d163e36f47ec56c9fe08d758a0770f1778fa30af68f39aac80441a3f037761e",
"pattern": "[file:hashes.SHA1 = 'c835764ecaa382ae4262fe6fc1a049b09710d151']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-04T19:35:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e3f57d-ea80-4673-ba8a-4b4502de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-04T19:35:25.000Z",
"modified": "2017-04-04T19:35:25.000Z",
"description": "HWP Documents - Xchecked via VT: 7d163e36f47ec56c9fe08d758a0770f1778fa30af68f39aac80441a3f037761e",
"pattern": "[file:hashes.MD5 = '183be2035d5a546670d2b9deeca4eb59']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-04T19:35:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e3f57e-fe50-4632-a869-48f302de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-04T19:35:26.000Z",
"modified": "2017-04-04T19:35:26.000Z",
"first_observed": "2017-04-04T19:35:26Z",
"last_observed": "2017-04-04T19:35:26Z",
"number_observed": 1,
"object_refs": [
"url--58e3f57e-fe50-4632-a869-48f302de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e3f57e-fe50-4632-a869-48f302de0b81",
"value": "https://www.virustotal.com/file/7d163e36f47ec56c9fe08d758a0770f1778fa30af68f39aac80441a3f037761e/analysis/1491280391/"
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}