592 lines
26 KiB
JSON
592 lines
26 KiB
JSON
|
{
|
||
|
"type": "bundle",
|
||
|
"id": "bundle--590348da-977c-436f-ad6f-4ecb950d210f",
|
||
|
"objects": [
|
||
|
{
|
||
|
"type": "identity",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-04-28T14:03:57.000Z",
|
||
|
"modified": "2017-04-28T14:03:57.000Z",
|
||
|
"name": "CIRCL",
|
||
|
"identity_class": "organization"
|
||
|
},
|
||
|
{
|
||
|
"type": "report",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "report--590348da-977c-436f-ad6f-4ecb950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-04-28T14:03:57.000Z",
|
||
|
"modified": "2017-04-28T14:03:57.000Z",
|
||
|
"name": "OSINT - Use of DNS Tunneling for C&C Communications",
|
||
|
"published": "2017-04-28T14:04:49Z",
|
||
|
"object_refs": [
|
||
|
"observed-data--590348f2-1638-4871-9a44-41df950d210f",
|
||
|
"url--590348f2-1638-4871-9a44-41df950d210f",
|
||
|
"x-misp-attribute--5903493b-4e54-4a41-a012-91e5950d210f",
|
||
|
"indicator--59034954-4a34-4050-8065-4799950d210f",
|
||
|
"indicator--59034954-ef98-4519-a388-46b6950d210f",
|
||
|
"indicator--59034955-0b94-41e8-b659-45aa950d210f",
|
||
|
"indicator--59034955-d724-4e43-af62-4ed6950d210f",
|
||
|
"indicator--59034956-cf84-4aac-8830-439f950d210f",
|
||
|
"indicator--59034969-7be4-4e97-a9f4-4c5c02de0b81",
|
||
|
"indicator--5903496a-9848-4945-a9b8-44c702de0b81",
|
||
|
"observed-data--5903496a-fffc-40c8-bd0f-4d9f02de0b81",
|
||
|
"url--5903496a-fffc-40c8-bd0f-4d9f02de0b81",
|
||
|
"indicator--5903496a-4238-4c8b-9d6b-466602de0b81",
|
||
|
"indicator--5903496b-526c-4b14-b1f0-40e602de0b81",
|
||
|
"observed-data--5903496b-458c-4267-83b7-453902de0b81",
|
||
|
"url--5903496b-458c-4267-83b7-453902de0b81",
|
||
|
"indicator--5903496c-7148-4de6-bb84-4a2a02de0b81",
|
||
|
"indicator--5903496c-00b8-4fd9-8250-4b3802de0b81",
|
||
|
"observed-data--5903496c-8284-4ffd-94bb-4ac102de0b81",
|
||
|
"url--5903496c-8284-4ffd-94bb-4ac102de0b81",
|
||
|
"indicator--5903496d-1568-4141-8b0d-4f7602de0b81",
|
||
|
"indicator--5903496d-93e0-4829-b4ea-4ca502de0b81",
|
||
|
"observed-data--5903496d-c4f8-42f6-a121-4f6702de0b81",
|
||
|
"url--5903496d-c4f8-42f6-a121-4f6702de0b81",
|
||
|
"indicator--5903496e-7a44-4607-90ad-440202de0b81",
|
||
|
"indicator--5903496e-b240-47c9-94a4-497702de0b81",
|
||
|
"observed-data--5903496f-011c-4e8f-b442-4e8602de0b81",
|
||
|
"url--5903496f-011c-4e8f-b442-4e8602de0b81"
|
||
|
],
|
||
|
"labels": [
|
||
|
"Threat-Report",
|
||
|
"misp:tool=\"MISP-STIX-Converter\"",
|
||
|
"malware_classification:obfuscation-technique=\"tunneling\""
|
||
|
],
|
||
|
"object_marking_refs": [
|
||
|
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "observed-data",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "observed-data--590348f2-1638-4871-9a44-41df950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-04-28T14:03:44.000Z",
|
||
|
"modified": "2017-04-28T14:03:44.000Z",
|
||
|
"first_observed": "2017-04-28T14:03:44Z",
|
||
|
"last_observed": "2017-04-28T14:03:44Z",
|
||
|
"number_observed": 1,
|
||
|
"object_refs": [
|
||
|
"url--590348f2-1638-4871-9a44-41df950d210f"
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"link\"",
|
||
|
"misp:category=\"External analysis\"",
|
||
|
"estimative-language:likelihood-probability=\"likely\"",
|
||
|
"osint:source-type=\"blog-post\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "url",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "url--590348f2-1638-4871-9a44-41df950d210f",
|
||
|
"value": "https://securelist.com/blog/research/78203/use-of-dns-tunneling-for-cc-communications/"
|
||
|
},
|
||
|
{
|
||
|
"type": "x-misp-attribute",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "x-misp-attribute--5903493b-4e54-4a41-a012-91e5950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-04-28T14:03:44.000Z",
|
||
|
"modified": "2017-04-28T14:03:44.000Z",
|
||
|
"labels": [
|
||
|
"misp:type=\"text\"",
|
||
|
"misp:category=\"External analysis\"",
|
||
|
"estimative-language:likelihood-probability=\"likely\"",
|
||
|
"osint:source-type=\"blog-post\""
|
||
|
],
|
||
|
"x_misp_category": "External analysis",
|
||
|
"x_misp_type": "text",
|
||
|
"x_misp_value": "Network communication is a key function for any malicious program. Yes, there are exceptions, such as cryptors and ransomware Trojans that can do their job just fine without using the Internet. However, they also require their victims to establish contact with the threat actor so they can send the ransom and recover their encrypted data. If we omit these two and have a look at the types of malware that have no communication with a C&C and/or threat actor, all that remains are a few outdated or extinct families of malware (such as Trojan-ArcBomb), or irrelevant, crudely made prankware that usually does nothing more than scare the user with screamers or switches mouse buttons.\r\n\r\nMalware has come a long way since the Morris worm, and the authors never stop looking for new ways to maintain communication with their creations. Some create complex, multi-tier authentication and management protocols that can take weeks or even months for analysists to decipher. Others go back to the basics and use IRC servers as a management host \u00e2\u20ac\u201c as we saw in the recent case of Mirai and its numerous clones.\r\n\r\nOften, virus writers don\u00e2\u20ac\u2122t even bother to run encryption or mask their communications: instructions and related information is sent in plain text, which comes in handy for a researcher analyzing the bot. This approach is typical of incompetent cybercriminals or even experienced programmers who don\u00e2\u20ac\u2122t have much experience developing malware.\r\n\r\nHowever, you do get the occasional off-the-wall approaches that don\u00e2\u20ac\u2122t fall into either of the above categories. Take, for instance, the case of a Trojan that Kaspersky Lab researchers discovered in mid-March and which establishes a DNS tunnel for communication with the C&C server.\r\n\r\nThe malicious program in question is detected by Kaspersky Lab products as Backdoor.Win32.Denis. This Trojan enables an intruder to manipulate the file system, run arbitrary commands and run loadable modules."
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--59034954-4a34-4050-8065-4799950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-04-28T13:53:42.000Z",
|
||
|
"modified": "2017-04-28T13:53:42.000Z",
|
||
|
"pattern": "[file:hashes.MD5 = 'facec411b6d6aa23ff80d1366633ea7a']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2017-04-28T13:53:42Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"md5\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--59034954-ef98-4519-a388-46b6950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-04-28T13:53:42.000Z",
|
||
|
"modified": "2017-04-28T13:53:42.000Z",
|
||
|
"pattern": "[file:hashes.MD5 = '018433e8e815d9d2065e57b759202edc']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2017-04-28T13:53:42Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"md5\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--59034955-0b94-41e8-b659-45aa950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-04-28T13:53:42.000Z",
|
||
|
"modified": "2017-04-28T13:53:42.000Z",
|
||
|
"pattern": "[file:hashes.MD5 = '1a4d58e281103fea2a4ccbfab93f74d2']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2017-04-28T13:53:42Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"md5\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--59034955-d724-4e43-af62-4ed6950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-04-28T13:53:42.000Z",
|
||
|
"modified": "2017-04-28T13:53:42.000Z",
|
||
|
"pattern": "[file:hashes.MD5 = '5394b09cf2a0b3d1caaecc46c0e502e3']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2017-04-28T13:53:42Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"md5\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--59034956-cf84-4aac-8830-439f950d210f",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-04-28T13:53:42.000Z",
|
||
|
"modified": "2017-04-28T13:53:42.000Z",
|
||
|
"pattern": "[file:hashes.MD5 = '5421781c2c05e64ef20be54e2ee32e37']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2017-04-28T13:53:42Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"md5\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--59034969-7be4-4e97-a9f4-4c5c02de0b81",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-04-28T13:53:45.000Z",
|
||
|
"modified": "2017-04-28T13:53:45.000Z",
|
||
|
"description": "- Xchecked via VT: 5421781c2c05e64ef20be54e2ee32e37",
|
||
|
"pattern": "[file:hashes.SHA256 = 'bb5114227ab5bb2e6bde5bcd876e437f72998ee88d27f7cbb15828c82666bef1']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2017-04-28T13:53:45Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"sha256\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5903496a-9848-4945-a9b8-44c702de0b81",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-04-28T13:53:46.000Z",
|
||
|
"modified": "2017-04-28T13:53:46.000Z",
|
||
|
"description": "- Xchecked via VT: 5421781c2c05e64ef20be54e2ee32e37",
|
||
|
"pattern": "[file:hashes.SHA1 = '1af72331e7e1c9cfc2f1f3f7b198068264430fbe']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2017-04-28T13:53:46Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"sha1\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "observed-data",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "observed-data--5903496a-fffc-40c8-bd0f-4d9f02de0b81",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-04-28T13:53:46.000Z",
|
||
|
"modified": "2017-04-28T13:53:46.000Z",
|
||
|
"first_observed": "2017-04-28T13:53:46Z",
|
||
|
"last_observed": "2017-04-28T13:53:46Z",
|
||
|
"number_observed": 1,
|
||
|
"object_refs": [
|
||
|
"url--5903496a-fffc-40c8-bd0f-4d9f02de0b81"
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"link\"",
|
||
|
"misp:category=\"External analysis\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "url",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "url--5903496a-fffc-40c8-bd0f-4d9f02de0b81",
|
||
|
"value": "https://www.virustotal.com/file/bb5114227ab5bb2e6bde5bcd876e437f72998ee88d27f7cbb15828c82666bef1/analysis/1489120629/"
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5903496a-4238-4c8b-9d6b-466602de0b81",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-04-28T13:53:46.000Z",
|
||
|
"modified": "2017-04-28T13:53:46.000Z",
|
||
|
"description": "- Xchecked via VT: 5394b09cf2a0b3d1caaecc46c0e502e3",
|
||
|
"pattern": "[file:hashes.SHA256 = '087ef9f7ce4681d49c6fa8842785fedef21461f160a34fc37c75fed26ddfa91e']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2017-04-28T13:53:46Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"sha256\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5903496b-526c-4b14-b1f0-40e602de0b81",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-04-28T13:53:47.000Z",
|
||
|
"modified": "2017-04-28T13:53:47.000Z",
|
||
|
"description": "- Xchecked via VT: 5394b09cf2a0b3d1caaecc46c0e502e3",
|
||
|
"pattern": "[file:hashes.SHA1 = '1fef52800fa9b752b98d3cbb8fff0c44046526aa']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2017-04-28T13:53:47Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"sha1\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "observed-data",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "observed-data--5903496b-458c-4267-83b7-453902de0b81",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-04-28T13:53:47.000Z",
|
||
|
"modified": "2017-04-28T13:53:47.000Z",
|
||
|
"first_observed": "2017-04-28T13:53:47Z",
|
||
|
"last_observed": "2017-04-28T13:53:47Z",
|
||
|
"number_observed": 1,
|
||
|
"object_refs": [
|
||
|
"url--5903496b-458c-4267-83b7-453902de0b81"
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"link\"",
|
||
|
"misp:category=\"External analysis\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "url",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "url--5903496b-458c-4267-83b7-453902de0b81",
|
||
|
"value": "https://www.virustotal.com/file/087ef9f7ce4681d49c6fa8842785fedef21461f160a34fc37c75fed26ddfa91e/analysis/1490772409/"
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5903496c-7148-4de6-bb84-4a2a02de0b81",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-04-28T13:53:48.000Z",
|
||
|
"modified": "2017-04-28T13:53:48.000Z",
|
||
|
"description": "- Xchecked via VT: 1a4d58e281103fea2a4ccbfab93f74d2",
|
||
|
"pattern": "[file:hashes.SHA256 = 'f5872f49943c39b73026fc3982b85330953a138cc27c23487a28103337bfdbb5']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2017-04-28T13:53:48Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"sha256\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5903496c-00b8-4fd9-8250-4b3802de0b81",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-04-28T13:53:48.000Z",
|
||
|
"modified": "2017-04-28T13:53:48.000Z",
|
||
|
"description": "- Xchecked via VT: 1a4d58e281103fea2a4ccbfab93f74d2",
|
||
|
"pattern": "[file:hashes.SHA1 = '1a2cd9b94a70440a962d9ad78e5e46d7d22070d0']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2017-04-28T13:53:48Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"sha1\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "observed-data",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "observed-data--5903496c-8284-4ffd-94bb-4ac102de0b81",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-04-28T13:53:48.000Z",
|
||
|
"modified": "2017-04-28T13:53:48.000Z",
|
||
|
"first_observed": "2017-04-28T13:53:48Z",
|
||
|
"last_observed": "2017-04-28T13:53:48Z",
|
||
|
"number_observed": 1,
|
||
|
"object_refs": [
|
||
|
"url--5903496c-8284-4ffd-94bb-4ac102de0b81"
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"link\"",
|
||
|
"misp:category=\"External analysis\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "url",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "url--5903496c-8284-4ffd-94bb-4ac102de0b81",
|
||
|
"value": "https://www.virustotal.com/file/f5872f49943c39b73026fc3982b85330953a138cc27c23487a28103337bfdbb5/analysis/1492046570/"
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5903496d-1568-4141-8b0d-4f7602de0b81",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-04-28T13:53:49.000Z",
|
||
|
"modified": "2017-04-28T13:53:49.000Z",
|
||
|
"description": "- Xchecked via VT: 018433e8e815d9d2065e57b759202edc",
|
||
|
"pattern": "[file:hashes.SHA256 = '12c2c3566c29f80478277e0f96b79fc85b9e86ebf16505d8f2d7877a6204f860']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2017-04-28T13:53:49Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"sha256\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5903496d-93e0-4829-b4ea-4ca502de0b81",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-04-28T13:53:49.000Z",
|
||
|
"modified": "2017-04-28T13:53:49.000Z",
|
||
|
"description": "- Xchecked via VT: 018433e8e815d9d2065e57b759202edc",
|
||
|
"pattern": "[file:hashes.SHA1 = 'c05451b0eb6246676dcf93f86be971004c40b631']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2017-04-28T13:53:49Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"sha1\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "observed-data",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "observed-data--5903496d-c4f8-42f6-a121-4f6702de0b81",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-04-28T13:53:49.000Z",
|
||
|
"modified": "2017-04-28T13:53:49.000Z",
|
||
|
"first_observed": "2017-04-28T13:53:49Z",
|
||
|
"last_observed": "2017-04-28T13:53:49Z",
|
||
|
"number_observed": 1,
|
||
|
"object_refs": [
|
||
|
"url--5903496d-c4f8-42f6-a121-4f6702de0b81"
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"link\"",
|
||
|
"misp:category=\"External analysis\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "url",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "url--5903496d-c4f8-42f6-a121-4f6702de0b81",
|
||
|
"value": "https://www.virustotal.com/file/12c2c3566c29f80478277e0f96b79fc85b9e86ebf16505d8f2d7877a6204f860/analysis/1493377594/"
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5903496e-7a44-4607-90ad-440202de0b81",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-04-28T13:53:50.000Z",
|
||
|
"modified": "2017-04-28T13:53:50.000Z",
|
||
|
"description": "- Xchecked via VT: facec411b6d6aa23ff80d1366633ea7a",
|
||
|
"pattern": "[file:hashes.SHA256 = '155b13e582adeab564c60a1091b4dccc43ed78db290aa3e2da7e8bc1e039770c']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2017-04-28T13:53:50Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"sha256\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "indicator",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "indicator--5903496e-b240-47c9-94a4-497702de0b81",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-04-28T13:53:50.000Z",
|
||
|
"modified": "2017-04-28T13:53:50.000Z",
|
||
|
"description": "- Xchecked via VT: facec411b6d6aa23ff80d1366633ea7a",
|
||
|
"pattern": "[file:hashes.SHA1 = '55beac11f0ee9049661ef9c35f52e226bc3035d0']",
|
||
|
"pattern_type": "stix",
|
||
|
"pattern_version": "2.1",
|
||
|
"valid_from": "2017-04-28T13:53:50Z",
|
||
|
"kill_chain_phases": [
|
||
|
{
|
||
|
"kill_chain_name": "misp-category",
|
||
|
"phase_name": "Payload delivery"
|
||
|
}
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"sha1\"",
|
||
|
"misp:category=\"Payload delivery\"",
|
||
|
"misp:to_ids=\"True\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "observed-data",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "observed-data--5903496f-011c-4e8f-b442-4e8602de0b81",
|
||
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
||
|
"created": "2017-04-28T13:53:51.000Z",
|
||
|
"modified": "2017-04-28T13:53:51.000Z",
|
||
|
"first_observed": "2017-04-28T13:53:51Z",
|
||
|
"last_observed": "2017-04-28T13:53:51Z",
|
||
|
"number_observed": 1,
|
||
|
"object_refs": [
|
||
|
"url--5903496f-011c-4e8f-b442-4e8602de0b81"
|
||
|
],
|
||
|
"labels": [
|
||
|
"misp:type=\"link\"",
|
||
|
"misp:category=\"External analysis\""
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"type": "url",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "url--5903496f-011c-4e8f-b442-4e8602de0b81",
|
||
|
"value": "https://www.virustotal.com/file/155b13e582adeab564c60a1091b4dccc43ed78db290aa3e2da7e8bc1e039770c/analysis/1489419438/"
|
||
|
},
|
||
|
{
|
||
|
"type": "marking-definition",
|
||
|
"spec_version": "2.1",
|
||
|
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
|
||
|
"created": "2017-01-20T00:00:00.000Z",
|
||
|
"definition_type": "tlp",
|
||
|
"name": "TLP:WHITE",
|
||
|
"definition": {
|
||
|
"tlp": "white"
|
||
|
}
|
||
|
}
|
||
|
]
|
||
|
}
|