misp-circl-feed/feeds/circl/stix-2.1/5a3cc84d-2434-4ae6-8d76-c328950d210f.json

763 lines
32 KiB
JSON
Raw Permalink Normal View History

2023-04-21 14:44:17 +00:00
{
"type": "bundle",
"id": "bundle--5a3cc84d-2434-4ae6-8d76-c328950d210f",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-16T03:00:22.000Z",
"modified": "2018-01-16T03:00:22.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--5a3cc84d-2434-4ae6-8d76-c328950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-16T03:00:22.000Z",
"modified": "2018-01-16T03:00:22.000Z",
"name": "OSINT - Sednit espionage group now using custom exploit kit",
"published": "2018-02-16T08:50:00Z",
"object_refs": [
"observed-data--5a3cc85e-39cc-4aaf-8eec-4c5c950d210f",
"url--5a3cc85e-39cc-4aaf-8eec-4c5c950d210f",
"indicator--5a5c62c4-5fa8-47a1-ac11-42d1950d210f",
"indicator--5a5c62c4-d124-4726-be84-4da3950d210f",
"x-misp-attribute--5a5c62d9-9f74-422c-8f34-4b01950d210f",
"indicator--5a5c638d-0124-4863-9ec0-4887950d210f",
"indicator--5a5c638e-8a7c-43e1-937f-4b3b950d210f",
"indicator--5a5c638e-bf5c-4a8b-95a1-46b8950d210f",
"indicator--5a5c638f-4cec-4f74-827a-4e65950d210f",
"indicator--5a5c638f-4558-4ffb-84e6-4e5c950d210f",
"indicator--5a5c638f-aad4-4cda-b677-420f950d210f",
"indicator--5a5c6390-a4a4-408c-ad20-45a1950d210f",
"indicator--5a5c6390-ffd0-4f5b-a8e9-4b66950d210f",
"indicator--5a5c6391-5ec8-4f4d-9dd1-4195950d210f",
"observed-data--5a5c64c3-16fc-4549-ba11-46fb950d210f",
"mutex--5a5c64c3-16fc-4549-ba11-46fb950d210f",
"indicator--5a5c658d-553c-4781-b2b4-42e0950d210f",
"indicator--5a5c658d-692c-41e7-bff7-4273950d210f",
"indicator--5a5c658e-b0c0-4b6c-95b3-4a10950d210f",
"indicator--5a5c65a4-a200-44f5-8df6-416f950d210f",
"indicator--5a5c65a4-acbc-44bd-84eb-4716950d210f",
"indicator--5a5c65ee-e860-4444-911d-4da6950d210f",
"indicator--5a5c65ef-8130-414c-95a8-4513950d210f",
"indicator--5a5c65ef-25c8-40c4-bcca-4adc950d210f",
"indicator--5a5c65ef-9280-45a6-8a0d-40df950d210f",
"indicator--935f70e3-fd7e-4dcd-80a9-71f5122d366e",
"x-misp-object--6fb315f6-2c07-4d90-a911-0e19777e1ece",
"indicator--a480344a-22a8-4fc6-9f8e-40ca8337e6f7",
"x-misp-object--644f91bf-274d-4743-ae1e-075b0118c184",
2024-08-07 08:13:15 +00:00
"relationship--1496bf19-f051-49f0-8e1f-ddb08e4c25e8",
"relationship--c2dfc74c-ec9b-481f-993c-46e9c2c3ee78"
2023-04-21 14:44:17 +00:00
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"misp-galaxy:exploit-kit=\"Sednit EK\"",
"veris:actor:motive=\"Espionage\"",
"osint:source-type=\"blog-post\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5a3cc85e-39cc-4aaf-8eec-4c5c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-15T09:33:18.000Z",
"modified": "2018-01-15T09:33:18.000Z",
"first_observed": "2018-01-15T09:33:18Z",
"last_observed": "2018-01-15T09:33:18Z",
"number_observed": 1,
"object_refs": [
"url--5a3cc85e-39cc-4aaf-8eec-4c5c950d210f"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\"",
"osint:source-type=\"blog-post\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--5a3cc85e-39cc-4aaf-8eec-4c5c950d210f",
"value": "https://www.welivesecurity.com/2014/10/08/sednit-espionage-group-now-using-custom-exploit-kit/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a5c62c4-5fa8-47a1-ac11-42d1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-15T09:33:19.000Z",
"modified": "2018-01-15T09:33:19.000Z",
"pattern": "[url:value = 'http://defenceiq.us/2rfKZL_BGwEQ']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-15T09:33:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a5c62c4-d124-4726-be84-4da3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-15T09:33:19.000Z",
"modified": "2018-01-15T09:33:19.000Z",
"pattern": "[url:value = 'http://cntt.akcdndata.com/gpw?file=stat.js']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-15T09:33:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--5a5c62d9-9f74-422c-8f34-4b01950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-15T09:33:20.000Z",
"modified": "2018-01-15T09:33:20.000Z",
"labels": [
"misp:type=\"comment\"",
"misp:category=\"External analysis\"",
"osint:source-type=\"blog-post\""
],
"x_misp_category": "External analysis",
"x_misp_type": "comment",
"x_misp_value": "For at least five years the Sednit group has been relentlessly attacking various institutions, most notably in Eastern Europe. The group used several advanced pieces of malware for these targeted attacks, in particular the one we named Win32/Sednit, also known as Sofacy.\r\n\r\nWe recently came across cases of legitimate financial websites being redirected to a custom exploit kit. Based on our research and on some information provided by the Google Security Team, we were able to establish that it is used by the Sednit group. This is a new strategy for this group which has relied mostly on spear-phishing emails up until now.\r\n\r\nIn this blog, we will first examine on recent cases of spear-phishing emails using the CVE-2014-1761 Microsoft Word exploit. We will then focus on the exploit kit, which appears to still be in development and testing phase, and briefly describe the actual payload."
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a5c638d-0124-4863-9ec0-4887950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-15T09:33:20.000Z",
"modified": "2018-01-15T09:33:20.000Z",
"description": "Military news",
"pattern": "[domain-name:value = 'defenceiq.us']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-15T09:33:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a5c638e-8a7c-43e1-937f-4b3b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-15T09:33:20.000Z",
"modified": "2018-01-15T09:33:20.000Z",
"description": "Military news",
"pattern": "[domain-name:value = 'defenceiq.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-15T09:33:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a5c638e-bf5c-4a8b-95a1-46b8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-15T09:33:20.000Z",
"modified": "2018-01-15T09:33:20.000Z",
"description": "Military news",
"pattern": "[domain-name:value = 'armypress.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-15T09:33:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a5c638f-4cec-4f74-827a-4e65950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-15T09:33:21.000Z",
"modified": "2018-01-15T09:33:21.000Z",
"description": "Military news",
"pattern": "[domain-name:value = 'armytime.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-15T09:33:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a5c638f-4558-4ffb-84e6-4e5c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-15T09:33:21.000Z",
"modified": "2018-01-15T09:33:21.000Z",
"description": "Foreign Affairs magazine",
"pattern": "[domain-name:value = 'mfapress.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-15T09:33:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a5c638f-aad4-4cda-b677-420f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-15T09:33:22.000Z",
"modified": "2018-01-15T09:33:22.000Z",
"description": "Foreign Affairs magazine",
"pattern": "[domain-name:value = 'foreignaffairs.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-15T09:33:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a5c6390-a4a4-408c-ad20-45a1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-15T09:33:22.000Z",
"modified": "2018-01-15T09:33:22.000Z",
"description": "Foreign Affairs magazine",
"pattern": "[domain-name:value = 'mfapress.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-15T09:33:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a5c6390-ffd0-4f5b-a8e9-4b66950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-15T09:33:22.000Z",
"modified": "2018-01-15T09:33:22.000Z",
"description": "CACI International, defense & cyber security contractor",
"pattern": "[domain-name:value = 'caciltd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-15T09:33:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a5c6391-5ec8-4f4d-9dd1-4195950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-15T09:33:23.000Z",
"modified": "2018-01-15T09:33:23.000Z",
"description": "CACI International, defense & cyber security contractor",
"pattern": "[domain-name:value = 'caci.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-15T09:33:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5a5c64c3-16fc-4549-ba11-46fb950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-15T09:33:23.000Z",
"modified": "2018-01-15T09:33:23.000Z",
"first_observed": "2018-01-15T09:33:23Z",
"last_observed": "2018-01-15T09:33:23Z",
"number_observed": 1,
"object_refs": [
"mutex--5a5c64c3-16fc-4549-ba11-46fb950d210f"
],
"labels": [
"misp:type=\"mutex\"",
"misp:category=\"Artifacts dropped\""
]
},
{
"type": "mutex",
"spec_version": "2.1",
"id": "mutex--5a5c64c3-16fc-4549-ba11-46fb950d210f",
"name": "XSQWERSystemCriticalSection_for_1232321"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a5c658d-553c-4781-b2b4-42e0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-15T09:33:23.000Z",
"modified": "2018-01-15T09:33:23.000Z",
"pattern": "[domain-name:value = 'msonlinelive.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-15T09:33:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a5c658d-692c-41e7-bff7-4273950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-15T09:33:24.000Z",
"modified": "2018-01-15T09:33:24.000Z",
"pattern": "[domain-name:value = 'windows-updater.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-15T09:33:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a5c658e-b0c0-4b6c-95b3-4a10950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-15T09:33:24.000Z",
"modified": "2018-01-15T09:33:24.000Z",
"pattern": "[domain-name:value = 'azureon-line.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-15T09:33:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a5c65a4-a200-44f5-8df6-416f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-15T09:33:25.000Z",
"modified": "2018-01-15T09:33:25.000Z",
"pattern": "[file:name = 'edg6EF885E2.tmp']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-15T09:33:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"filename\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a5c65a4-acbc-44bd-84eb-4716950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-15T09:33:26.000Z",
"modified": "2018-01-15T09:33:26.000Z",
"pattern": "[file:name = 'edg6E85F98675.tmp']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-15T09:33:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"filename\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a5c65ee-e860-4444-911d-4da6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-15T08:27:26.000Z",
"modified": "2018-01-15T08:27:26.000Z",
"description": "Word exploit",
"pattern": "[file:hashes.SHA1 = '86092636e7ffa22481ca89ac1b023c32c56b24cf']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-15T08:27:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a5c65ef-8130-414c-95a8-4513950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-15T08:27:27.000Z",
"modified": "2018-01-15T08:27:27.000Z",
"description": "Word exploit",
"pattern": "[file:hashes.SHA1 = '12223f098ba3088379ec1dc59440c662752ddabd']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-15T08:27:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a5c65ef-25c8-40c4-bcca-4adc950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-15T08:27:27.000Z",
"modified": "2018-01-15T08:27:27.000Z",
"description": "Dropper",
"pattern": "[file:hashes.SHA1 = 'd61ee0b0d4ed95f3300735c81740a21b8beef337']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-15T08:27:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a5c65ef-9280-45a6-8a0d-40df950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-15T08:27:27.000Z",
"modified": "2018-01-15T08:27:27.000Z",
"description": "Payload",
"pattern": "[file:hashes.SHA1 = 'd0db619a7a160949528d46d20fc0151bf9775c32']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-15T08:27:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--935f70e3-fd7e-4dcd-80a9-71f5122d366e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-15T09:33:29.000Z",
"modified": "2018-01-15T09:33:29.000Z",
"pattern": "[file:hashes.MD5 = 'df895e6479abf85c4c65d7d3a2451ddb' AND file:hashes.SHA1 = 'd61ee0b0d4ed95f3300735c81740a21b8beef337' AND file:hashes.SHA256 = '6ffaa374cfa9504b061b52a353913c6c120bd4fe43e1a79f69fba7f964e30a4e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-15T09:33:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--6fb315f6-2c07-4d90-a911-0e19777e1ece",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-15T09:33:28.000Z",
"modified": "2018-01-15T09:33:28.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/6ffaa374cfa9504b061b52a353913c6c120bd4fe43e1a79f69fba7f964e30a4e/analysis/1515795459/",
"category": "External analysis",
"comment": "Dropper",
"uuid": "5a5c7568-9fa0-46fb-b5e0-482d02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "51/68",
"category": "Other",
"comment": "Dropper",
"uuid": "5a5c7568-b834-46be-af37-4b5f02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-12T22:17:39",
"category": "Other",
"comment": "Dropper",
"uuid": "5a5c7568-8aec-4806-9c81-425c02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a480344a-22a8-4fc6-9f8e-40ca8337e6f7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-15T09:33:32.000Z",
"modified": "2018-01-15T09:33:32.000Z",
"pattern": "[file:hashes.MD5 = 'ee64d3273f9b4d80020c24edcbbf961e' AND file:hashes.SHA1 = 'd0db619a7a160949528d46d20fc0151bf9775c32' AND file:hashes.SHA256 = 'e031299fa1381b40c660b8cd831bb861654f900a1e2952b1a76bedf140972a81']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-01-15T09:33:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--644f91bf-274d-4743-ae1e-075b0118c184",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-01-15T09:33:30.000Z",
"modified": "2018-01-15T09:33:30.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/e031299fa1381b40c660b8cd831bb861654f900a1e2952b1a76bedf140972a81/analysis/1490591462/",
"category": "External analysis",
"comment": "Payload",
"uuid": "5a5c756a-6948-4c29-89dc-443c02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "44/61",
"category": "Other",
"comment": "Payload",
"uuid": "5a5c756a-63e8-4ebb-af6b-49f602de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-03-27T05:11:02",
"category": "Other",
"comment": "Payload",
"uuid": "5a5c756b-c6a8-4d3b-9ab5-426302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "relationship",
"spec_version": "2.1",
2024-08-07 08:13:15 +00:00
"id": "relationship--1496bf19-f051-49f0-8e1f-ddb08e4c25e8",
2023-04-21 14:44:17 +00:00
"created": "2018-02-16T08:50:00.000Z",
"modified": "2018-02-16T08:50:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--935f70e3-fd7e-4dcd-80a9-71f5122d366e",
"target_ref": "x-misp-object--6fb315f6-2c07-4d90-a911-0e19777e1ece"
},
{
"type": "relationship",
"spec_version": "2.1",
2024-08-07 08:13:15 +00:00
"id": "relationship--c2dfc74c-ec9b-481f-993c-46e9c2c3ee78",
2023-04-21 14:44:17 +00:00
"created": "2018-02-16T08:50:00.000Z",
"modified": "2018-02-16T08:50:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--a480344a-22a8-4fc6-9f8e-40ca8337e6f7",
"target_ref": "x-misp-object--644f91bf-274d-4743-ae1e-075b0118c184"
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}