2023-04-21 14:44:17 +00:00
{
"type" : "bundle" ,
"id" : "bundle--5adeed17-3124-41c1-91b9-4a97950d210f" ,
"objects" : [
{
"type" : "identity" ,
"spec_version" : "2.1" ,
"id" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T17:37:19.000Z" ,
"modified" : "2018-05-03T17:37:19.000Z" ,
"name" : "CIRCL" ,
"identity_class" : "organization"
} ,
{
"type" : "report" ,
"spec_version" : "2.1" ,
"id" : "report--5adeed17-3124-41c1-91b9-4a97950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T17:37:19.000Z" ,
"modified" : "2018-05-03T17:37:19.000Z" ,
"name" : "OSINT - New Orangeworm attack group targets the healthcare sector in the U.S., Europe, and Asia" ,
"published" : "2018-05-03T17:37:39Z" ,
"object_refs" : [
"observed-data--5adef6b2-0c40-42f2-b09a-4f47950d210f" ,
"url--5adef6b2-0c40-42f2-b09a-4f47950d210f" ,
"x-misp-attribute--5adef6f8-b494-41ab-8387-4af4950d210f" ,
"observed-data--5adf24e9-4768-4334-bbef-44fc950d210f" ,
"file--5adf24e9-4768-4334-bbef-44fc950d210f" ,
"artifact--5adf24e9-4768-4334-bbef-44fc950d210f" ,
"observed-data--5adf2515-d258-4589-a5c5-1b99950d210f" ,
"file--5adf2515-d258-4589-a5c5-1b99950d210f" ,
"artifact--5adf2515-d258-4589-a5c5-1b99950d210f" ,
"observed-data--5adf25d7-a76c-4b3f-8624-4f17950d210f" ,
"file--5adf25d7-a76c-4b3f-8624-4f17950d210f" ,
"artifact--5adf25d7-a76c-4b3f-8624-4f17950d210f" ,
"indicator--5adf267b-04bc-42bd-8ac0-466d950d210f" ,
"observed-data--5ae03296-6130-4be2-9966-43eb950d210f" ,
"file--5ae03296-6130-4be2-9966-43eb950d210f" ,
"artifact--5ae03296-6130-4be2-9966-43eb950d210f" ,
"indicator--5ae98af5-3404-4d83-9ee8-4364950d210f" ,
"indicator--5ae98af6-95bc-4353-b9ff-438b950d210f" ,
"indicator--5ae98af7-2790-4cae-86a1-4904950d210f" ,
"indicator--5ae98af7-0880-4da7-9150-4772950d210f" ,
"indicator--5ae98af8-81f0-48d9-9e4e-4f1f950d210f" ,
"indicator--5ae98af8-611c-4d06-88c3-4c1e950d210f" ,
"indicator--5ae98af9-6c78-41f3-89ae-4e7e950d210f" ,
"indicator--5ae98af9-e05c-492c-8038-42a2950d210f" ,
"indicator--5ae98afa-0e4c-4b25-a753-4827950d210f" ,
"indicator--5ae98afa-ce94-4831-bab9-4174950d210f" ,
"indicator--5ae98afa-ec3c-4db6-9cc9-408e950d210f" ,
"indicator--5ae98afb-1af0-4200-894e-4285950d210f" ,
"indicator--5ae98afb-fcf4-447f-a52a-4b26950d210f" ,
"indicator--5ae98afc-a388-4113-b9ff-49b3950d210f" ,
"indicator--5ae98afc-70a4-4c42-9700-4457950d210f" ,
"indicator--5ae98afd-cf80-4192-a5f5-4505950d210f" ,
"indicator--5ae98afd-f244-44dc-a659-429a950d210f" ,
"indicator--5ae98afd-bc18-4a29-986f-408a950d210f" ,
"indicator--5ae98afe-c690-48d6-8b66-45b0950d210f" ,
"indicator--5ae98afe-c06c-4303-b6aa-4baf950d210f" ,
"indicator--5ae98b53-0b28-4c9e-95dd-4490950d210f" ,
"indicator--5ae98b54-a0bc-44b9-9635-4bfd950d210f" ,
"indicator--5ae98b54-3a80-40fd-8cc0-471c950d210f" ,
"indicator--5ae98b55-b92c-4bee-8389-4ade950d210f" ,
"indicator--5ae98bc6-4174-4cc1-b7ea-463d950d210f" ,
"indicator--5ae98c5b-b9bc-4412-8524-41d7950d210f" ,
"indicator--5ae98c72-cc64-40f2-936c-4fe2950d210f" ,
"indicator--5ae98db9-d4f4-4f99-977c-41cf950d210f" ,
"indicator--5ae98dd1-b830-415a-8f6b-4624950d210f" ,
"indicator--5ae98de5-f138-42ba-b319-4480950d210f" ,
"indicator--5ae98e52-6884-4b46-8b3c-48e2950d210f" ,
"indicator--5ae98e60-3740-4354-bec4-46f1950d210f" ,
"indicator--5ae98e76-a45c-4f1c-9f80-43b1950d210f" ,
"indicator--5ae98e8b-8fe0-4d0a-ae73-475d950d210f" ,
"indicator--5ae992c9-0f9c-4f49-8336-4944950d210f" ,
"indicator--5ae992f9-d2a4-4abf-a7b6-429d950d210f" ,
"indicator--5ae99316-d028-4704-adad-469f950d210f" ,
"indicator--5ae99449-65ec-4419-aeb6-46a9950d210f" ,
"indicator--5ae994ad-a768-4ee7-a1f4-4330950d210f" ,
"indicator--5ae994fe-1108-4bf7-a7fa-4497950d210f" ,
"indicator--5ae9951e-7f10-41ac-b7bc-4234950d210f" ,
"indicator--5ae9981a-ad08-4334-99f4-471f950d210f" ,
"indicator--5ae99864-03f8-4a65-928a-4bde950d210f" ,
"indicator--5ae998cb-f5b4-4f8a-81c3-406e950d210f" ,
"indicator--5ae99901-3fcc-473f-ab05-4c3e950d210f" ,
"indicator--5ae9997d-8770-4ab8-b19d-4c8f950d210f" ,
"indicator--5ae999b8-8d60-4297-a180-4bf7950d210f" ,
"indicator--5ae99b53-9990-442f-8a80-4301950d210f" ,
"indicator--5ae99bad-464c-4be6-8451-4552950d210f" ,
"indicator--5ae99bdc-fca0-4cfe-9271-14db950d210f" ,
"indicator--5ae99bf9-f24c-472f-b767-1226950d210f" ,
"indicator--5ae9abdf-465c-4bb6-9474-a8f4950d210f" ,
"indicator--5ae9abf3-2210-4cc9-97e0-11f0950d210f" ,
"indicator--5ae9ac09-88b8-4b91-9890-a91b950d210f" ,
"indicator--5ae9ac1f-e6c0-4d66-b160-14e1950d210f" ,
"indicator--5ae9ac38-8598-4864-928d-1506950d210f" ,
"indicator--5ae9ac9d-1eb8-4652-8010-a914950d210f" ,
"indicator--5ae9acf2-866c-468d-9198-a8f4950d210f" ,
"indicator--5ae9ad09-0074-4093-927f-1506950d210f" ,
"indicator--5ae9ad2f-805c-4d81-b83c-a8d6950d210f" ,
"indicator--5ae9ae3b-fcd8-4175-88c9-1271950d210f" ,
"indicator--5ae9ae61-7ff4-4b1d-9c77-1271950d210f" ,
"indicator--5ae9ae72-10dc-49a9-b36a-1226950d210f" ,
"indicator--5ae9aeb5-57e0-4f5f-88c2-1271950d210f" ,
"indicator--5ae9aeca-6de0-4888-b26b-a916950d210f" ,
"indicator--5ae9af2f-c994-4e9a-b4e5-a8d7950d210f" ,
"indicator--5ae9af42-6da8-4148-9130-a91c950d210f" ,
"indicator--5ae9af7b-e280-4f48-988e-429d950d210f" ,
"indicator--5ae9af90-4b54-4f8b-bc95-d2ce950d210f" ,
"indicator--5ae9afa7-0db8-4409-849e-a915950d210f" ,
"indicator--5ae9afc4-cb78-4a3e-81a2-14e1950d210f" ,
"indicator--5ae9b03e-4250-45ba-a01a-451b950d210f" ,
"indicator--5ae9b050-838c-45e0-ba07-a919950d210f" ,
"indicator--5ae9b073-9948-4526-af40-1259950d210f" ,
"indicator--5ae9b087-b410-44c3-b88e-a917950d210f" ,
"indicator--5ae9b0a8-bd78-4b09-a3c4-14e1950d210f" ,
"indicator--5ae9b0fb-156c-4a3d-9cf5-a8d7950d210f" ,
"indicator--f7491bdd-1ef0-4396-8ce0-9836ecc6cb69" ,
"x-misp-object--61af3dd7-d2d0-4190-b3b3-548c2731036a" ,
"indicator--a865d3fe-d34a-46f0-a584-b0407e02886b" ,
"x-misp-object--1e274a7c-acc3-4c97-8de6-2713c49af382" ,
"indicator--6d1f2a52-688f-488d-8079-9fd7231bafe1" ,
"x-misp-object--3e9b9cdf-67b5-4f5a-b249-8968780d6edd" ,
"indicator--82912a16-0d33-442a-ad32-2f7b1974a1ba" ,
"x-misp-object--3aeb74b0-13be-4c9a-9713-99b92c0f3b22" ,
"indicator--0f5e820b-d877-4907-bc53-935e590a0057" ,
"x-misp-object--b0bd7aa6-f585-43f8-8455-957d88f83037" ,
"indicator--bda9edae-72a1-4ae8-905b-e8b58791c3f8" ,
"x-misp-object--eed7363d-d9df-4c60-8023-379e611f1e42" ,
"indicator--043f490a-6ddc-4a71-b2ee-449dbc922568" ,
"x-misp-object--72bc8ab4-e347-4bf0-8ed4-ce5f95d0db56" ,
"indicator--3b5e6f4e-964d-43ed-b937-946ece94d05b" ,
"x-misp-object--44fd254d-c2d4-4ee6-8fca-43ed18455c97" ,
"indicator--7a13163b-13c1-4226-8036-8c1bb5afe2e1" ,
"x-misp-object--1c82ca99-3349-4041-a7d1-27347301b8f7" ,
2024-08-07 08:13:15 +00:00
"relationship--954f7504-a6b2-4aa2-9851-3281f1a00989" ,
"relationship--baff4786-8961-49cf-8a37-f948f0f4746a" ,
"relationship--d1a1fed0-ed42-456f-9aa0-e8a0a5501f48" ,
"relationship--4dd5a5b3-91bc-43c3-8936-440e71d7cf5c" ,
"relationship--4b618d2a-3d07-48e9-b019-44f04d7c6903" ,
"relationship--80efc68f-af7e-4589-bb85-c8f87dba89a6" ,
"relationship--0e4633be-80c7-42cf-8828-b4f85369b86d" ,
"relationship--abb5d6cf-ef5d-449f-a26e-89a66eb31728" ,
"relationship--3a6f6af0-3cb1-4b39-abb5-352336c6720d"
2023-04-21 14:44:17 +00:00
] ,
"labels" : [
"Threat-Report" ,
"misp:tool=\"MISP-STIX-Converter\"" ,
"ms-caro-malware-full:malware-type=\"Backdoor\"" ,
"misp-galaxy:threat-actor=\"Orangeworm\"" ,
"osint:source-type=\"blog-post\""
] ,
"object_marking_refs" : [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--5adef6b2-0c40-42f2-b09a-4f47950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:14:49.000Z" ,
"modified" : "2018-05-03T14:14:49.000Z" ,
"first_observed" : "2018-05-03T14:14:49Z" ,
"last_observed" : "2018-05-03T14:14:49Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--5adef6b2-0c40-42f2-b09a-4f47950d210f"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\"" ,
"osint:source-type=\"blog-post\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--5adef6b2-0c40-42f2-b09a-4f47950d210f" ,
"value" : "https://www.symantec.com/blogs/threat-intelligence/orangeworm-targets-healthcare-us-europe-asia"
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--5adef6f8-b494-41ab-8387-4af4950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:14:49.000Z" ,
"modified" : "2018-05-03T14:14:49.000Z" ,
"labels" : [
"misp:type=\"comment\"" ,
"misp:category=\"External analysis\"" ,
"osint:source-type=\"blog-post\""
] ,
"x_misp_category" : "External analysis" ,
"x_misp_type" : "comment" ,
"x_misp_value" : "Symantec has identified a new attack group dubbed Orangeworm deploying the Kwampirs backdoor in a targeted attack campaign against the healthcare sector and related industries.\r\n\r\nSymantec has identified a previously unknown group called Orangeworm that has been observed installing a custom backdoor called Trojan.Kwampirs within large international corporations that operate within the healthcare sector in the United States, Europe, and Asia.\r\n\r\nFirst identified in January 2015, Orangeworm has also conducted targeted attacks against organizations in related industries as part of a larger supply-chain attack in order to reach their intended victims. Known victims include healthcare providers, pharmaceuticals, IT solution providers for healthcare and equipment manufacturers that serve the healthcare industry, likely for the purpose of corporate espionage."
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--5adf24e9-4768-4334-bbef-44fc950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:14:49.000Z" ,
"modified" : "2018-05-03T14:14:49.000Z" ,
"first_observed" : "2018-05-03T14:14:49Z" ,
"last_observed" : "2018-05-03T14:14:49Z" ,
"number_observed" : 1 ,
"object_refs" : [
"file--5adf24e9-4768-4334-bbef-44fc950d210f" ,
"artifact--5adf24e9-4768-4334-bbef-44fc950d210f"
] ,
"labels" : [
"misp:type=\"attachment\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "file" ,
"spec_version" : "2.1" ,
"id" : "file--5adf24e9-4768-4334-bbef-44fc950d210f" ,
"name" : "Untitled-6.png" ,
"content_ref" : "artifact--5adf24e9-4768-4334-bbef-44fc950d210f"
} ,
{
"type" : "artifact" ,
"spec_version" : "2.1" ,
"id" : "artifact--5adf24e9-4768-4334-bbef-44fc950d210f" ,
"payload_bin" : " i V B O R w 0 K G g o A A A A N S U h E U g A A A h c A A A L c C A Y A A A B U 9 p I / A A A g A E l E Q V R 4 n O y 9 v Y 7 r v n b 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
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--5adf2515-d258-4589-a5c5-1b99950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:14:50.000Z" ,
"modified" : "2018-05-03T14:14:50.000Z" ,
"first_observed" : "2018-05-03T14:14:50Z" ,
"last_observed" : "2018-05-03T14:14:50Z" ,
"number_observed" : 1 ,
"object_refs" : [
"file--5adf2515-d258-4589-a5c5-1b99950d210f" ,
"artifact--5adf2515-d258-4589-a5c5-1b99950d210f"
] ,
"labels" : [
"misp:type=\"attachment\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "file" ,
"spec_version" : "2.1" ,
"id" : "file--5adf2515-d258-4589-a5c5-1b99950d210f" ,
"name" : "Sample payload DLL_0.png" ,
"content_ref" : "artifact--5adf2515-d258-4589-a5c5-1b99950d210f"
} ,
{
"type" : "artifact" ,
"spec_version" : "2.1" ,
"id" : "artifact--5adf2515-d258-4589-a5c5-1b99950d210f" ,
"payload_bin" : " i V B O R w 0 K G g o A A A A N S U h E U g A A A e U A A A F g C A Y A A A C F T W E J A A A g A E l E Q V R 4 n O y d z W r j z L b 3 V 172 V Y Q Q g u R L O H h g 5 B z w w N I F Z G C H M / A o I I 0 b e y I 4 b P D E J q M z i C E j D w 6 x 2 O Q C b A 8 M x x I e + B o s E U L I b e g d p F d l 1 V L J d j r u t N N 7 / a B 5 n i 6 X 6 n P V x 6 p S 63 + S 53 k O g i A I g i D 8 c f 7 f n y 6 A I A i C I A h v y K I s C I I g C E e C L M q C I A i C c C T I o i w I g i A I R 4 I s y o I g C I J w J M i i L A i C I A h H g i z K g i A I g n A k y K I s C I I g C E e C L M q C I A i C c C T I o i w I g i A I R 4 I s y o I g C I J w J M i i L A i C I A h H w j 92 R T g 5 O f m K c g i C I A j C v w X b d K B 2 L s q 7 E h A E 4 f C c n J z I u B M O i t j U c b D L 0 Z X j a 0 E Q B E E 4 E m R R F o S / i J O T E w i C 4 G D p J U k C J y c n E E X R w d I U v g + H t i d h N 59 e l L M s g 5 O T E + P A r V Q q W q d 6 n q f i n p y c Q K V S U X G j K C r 9 j a b 3 W Q M 5 O T m B 4 X D 4 q T Q E 4 U 9 D x x 3 + y b J M i / O Z 8 S K T 8 b 8 X v 9 u e h P 359 K L 8 + v o K A A C 2 b c N 4 P F b h S Z J A m q Z g 27 b q 3 M 1 m A 67 r Q p 7 n 6 m 6 D L 77422 a z + W z R B O G v B c f d Z D J R Y 8 a y L M j z H O 7 u 7 g 6 W j + M 4 k O c 5 t F q t T 6 c l k / r x 8 l X 2 J O z m Y M f X N z c 3 M J v N 1 A L 88 P A A r u s a P V 5 k P B 5 D m q Y f O h q j O z o c 4 H j E h n / Q E 6 b e t + d 5 K o 3 F Y l G I K w h / A 2 U L H x 8 j 3 A v C Z / k p F Y 63 K I r U / w d B A C c n J 5 A k S W m 6 N H w 4 H I L n e Z C m K Y x G I / W i C 38 W 54 E g C F Q e //mf/6mNU3wmSZKDt51Q5FftKYoi9SyPg3ZGbQ3TGw6H6jduQ7RMf/P8fbBFuVargW3b8Pj4CAAA8/kcOp3O1mdOT08BAOD5+VmF7WrszWYDeZ7DYDCA0Wik0sHd3WAwgF6vBwAAYRjCYDCAPM9hOp1q6eR5Dr7vw/39/S/VVxC+E/V6XXlBrusWJtrhcAhpmkKaptDv97emlWUZ5HkOjuOUpluv19XYe3p6gul0CrZtg+/76pSMxhkMBtBut9XEPRqNII5j+L//+z9wXVeN09VqBQBvHrzw59hlTwAAaZrC5eWl6m+6NuR5ruyNO2XUPnCexjk9CAKoVCqQ5zlMJhPo9XrGDeZ35qAvejWbTbi/v1dH19Vqde9nW62WWlixE0y74WazCQAA5+fnAACqQ3Axx84DeNtR9Xo9zUsGAGg0GgAAcHFxAWmafqySgnBEtNvt0ncwEBxHGHc2mxWuh56ensC2bbAsa+dRNW62y9LF8FqtBgBgPP7kcfC/9DoMF95OpwNpmkKWZbBYLMD3/a3lE36dQ9kTgmuAbdvw9PQEAKC8Z9u2C/HRDmzbBtd1AeBtngZ4m+vn8znMZjM4OTmBdrsNAO8287dw0EX5+voa0jSFTqcDruuCZVlb42NjYkcgl5eXH8o3CAJ1Vz0YDFT4dDqFyWSiOlEQ/jbQW9nnHYw4jn/LOxu/K10ENwm3t7cwm80+PD8I+/O77SmKIpjNZspL/hXwtAX//G2nJgddlLFxcGHeRafT0XbEyHK5BID34+2PsFgs1P8HQQCtVgsmk8mH0xGEvwUcR3j0awJPjbIs2/sdj7J0ebjpaJPH2XUs7fu+uq46xEtnwq+zjz3tw3q9/vAzlUoF5vP5p/I9dg7+75TxaMl0dF2pVJTXip4r7rDoCwF4n7TL00bCMFTp0h3bxcWFOuagHrQg/DthWZa6fyt7Z6Pb7YJt2+pfUeDR4a+ky8Px+PHm5ka96MXj9Ho9iOO4NK/r62sAgL3KJfxe9rGnMlqtlrKzdrttPMLexnQ6hTRNt/7T2e/OSb7ju2vyaTZB+Hpk3OkkSaJeLhJP+dcQmzoOdvWDfNFLEISj5+HhAQDk6Fr4+xFPWRCOEBl3wqERmzoOxFMWBEEQhG+CLMqCIAiCcCTIoiwIgiAIR8I/9okkH94QhK9Hxp1waMSmjp+9FmV5OUAQvhZ5KUc4NGJTx8GujZEcXwuCIAjCkSCLsiAIfwWVSuWvUwwS/v348kXZ87yCfiqArpNMtTdpfKr2VJYO1dpENROqq0x1mMvibwun6dF8sTxBEGg6oPt+Bo7mh+lSbVF65EHD+XeF8XOllLLjEtrmSZKUtin9BCr9nB6GcxWubXkiZW20re2w3vtMvGVa2mVt993u2njfIZ7nQZIk6ndKpVLR+g/7HOC9/lQzGYmiSP2d2yTvez6O6e+87zzP0/LJskz1ObU5qrPM06R1uLm5UfKAx8av2PtXEgSBZhs4fihoW2gDpm+k0/6hdkPz4fWk+twUky1y++Jj2NSGWN4kSbR5tsyGuVb0PvPpIeePL12UsRNRS5Pqp9q2ramOWJalxUclEhRWbzQakOc5xHEMYRiq9Pv9vtLapKIYVFkEpeR4fNSRHQ6H0Gw2Vfr1el2rRxiGBfk41Hm+u7tTaeZ5DpVKZecH/j3Pg5ubG/VMq9WCLMug1+tpcpY4aBaLhQofjUbKmD3P+5CCznq9Vnq2Ly8vxr5JkkTpn+Z5rumXYjjXqt6Hsjbi4VhnHHz7fiu33W5DmqbqDi2KokKbzufzvcUXjo3Hx0eYTCYQx7H62lUURdBoNMBxHLAsC1zX1Sa6NE01wZbVaqVkTCm2bcNoNCrd/KDNYNvipJZlWWEcA7z3ne/7mgjBZrPRxAXW6zU0m82CzaFADYZhXgBvojZof1dXVwfVR8dF6BB81N6/muvra802UOOe1n82mynBENd1YTwea2lEUbTz2+Tz+RwqlUqhXV3XVXaMPD4+auklSQK2batxjbbAnSme9v39vUoH52nf95Uilmn+QtVBVB78yk37QRZl6pXQnQvd7QZBAMvlUi2UOGm8vr5CFEXg+35BIebs7KyQ1+npKTiOA91uFwAAXl5e1O6o1Wqpz/Dto+VM4z8/PysBjMVioT6A7zgO2LatJoHhcFgQgT85OVEfSU+SROvkzWaj6kF3eVjmLMtgs9mo+iAmMQ7UkKbpU6OdTqelnyGkfYFKQO12G3q9HlQqldK+eXh4gJubG5UOTqyVSkXVGScYkw3wUwpsx7I2ouF0wbi7uyu0UVmb4uSAbdjpdGC5XMJ6vdY2Uzc3N2ryMbXRdwAVe7Isg/F4rLVRo9FQSj5JkoDv+zCbzdTvi8WiIJuKDAYDuL293Zn/dDqF2WwGWZbB4+NjYRzf3d0pdafLy0u1wFKvGNt6uVwaN5Vcjxn7NQgCbWHAcNp31P6Gw2HBI8SFl8fzPA9msxnU63W16aAeFN2IeJ6nTpk8z9PS+lV7/2ocxynYhu/7mv3QuabRaMBms9HaOgzDreqAURTBzc2NZpdIp9NRdoL0ej0tvX6/D5PJRJsb7+7uNHvrdDra4h5FETSbzR2130632wXXdb9sA//pRRknA75z4bvdu7s7uLi4UIMS4G0Qvby8wPPzs1KPoZMr7vgxfDweqw7BQdBut407ncfHR60zaPqm4+77+3s1+C3L0oymUqnA6+srZFkG9/f3hYUvTVOwbVtpe9LBe3Nzo4wGve88z6Hf78NwOITX11dN9YQO5MlkosIuLi4K+WZZpu1et3F5eal2fbe3t9BqtWAwGMBgMIDNZlPaNwDvmwGAN+Wt5+dnpcaFnr3neWrnSSfWVqul6jyZTNREX9ZGlPv7+9JFAzG1KZYfOTs7gyzL4OzsTPPMzs/PlfC6qY2OmaurK6Wyc319Dc1ms7B41Wo15f2sViu4vLzUvOfNZlNqO91ud6u3TMEN3NPTU2FRtSxLbWqr1apq//V6DY1GA5rNpvKe5/M5tFotcBwHms1mYaxiWJZl6hlefn6EHYah8qy63W7BI8Txw+NNp1NwXRfiOFbzS6fTUbbWaDRU2Wazmfpts9mo+ZDa0aHs/XfCbYO21Wq1Kiy4tK3xaNjkSCHj8RhqtVrpiYbv+6pN0VGjbDabnc5Wq9XSFvfxeKwcrM/QaDS0Dfzv5NOL8nq91uQYR6MRrFYrWK1WmocF8D7QaVyEHonR4535fA6DwQBc19WMYjqdquNlfrSAx5Q4SdGFIY5jaLf
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--5adf25d7-a76c-4b3f-8624-4f17950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:14:50.000Z" ,
"modified" : "2018-05-03T14:14:50.000Z" ,
"first_observed" : "2018-05-03T14:14:50Z" ,
"last_observed" : "2018-05-03T14:14:50Z" ,
"number_observed" : 1 ,
"object_refs" : [
"file--5adf25d7-a76c-4b3f-8624-4f17950d210f" ,
"artifact--5adf25d7-a76c-4b3f-8624-4f17950d210f"
] ,
"labels" : [
"misp:type=\"attachment\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "file" ,
"spec_version" : "2.1" ,
"id" : "file--5adf25d7-a76c-4b3f-8624-4f17950d210f" ,
"name" : "Sample C and Cs_0.png" ,
"content_ref" : "artifact--5adf25d7-a76c-4b3f-8624-4f17950d210f"
} ,
{
"type" : "artifact" ,
"spec_version" : "2.1" ,
"id" : "artifact--5adf25d7-a76c-4b3f-8624-4f17950d210f" ,
"payload_bin" : " i V B O R w 0 K G g o A A A A N S U h E U g A A A l 4 A A A D c C A Y A A A C h x q 98 A A A g A E l E Q V R 4 n O y 9 z 27 i z t L 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
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5adf267b-04bc-42bd-8ac0-466d950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:14:50.000Z" ,
"modified" : "2018-05-03T14:14:50.000Z" ,
"pattern" : "[rule Kwampirs\r\n{\r\n meta:\r\n copyright = \"Symantec\"\r\n family = \"Kwampirs\"\r\n description = \"Kwampirs dropper and main payload components\"\r\n \r\n strings: \r\n $pubkey =\r\n {\r\n 06 02 00 00 00 A4 00 00 52 53 41 31 00 08 00 00\r\n 01 00 01 00 CD 74 15 BC 47 7E 0A 5E E4 35 22 A5\r\n 97 0C 65 BE E0 33 22 F2 94 9D F5 40 97 3C 53 F9\r\n E4 7E DD 67 CF 5F 0A 5E F4 AD C9 CF 27 D3 E6 31\r\n 48 B8 00 32 1D BE 87 10 89 DA 8B 2F 21 B4 5D 0A\r\n CD 43 D7 B4 75 C9 19 FE CC 88 4A 7B E9 1D 8C 11\r\n 56 A6 A7 21 D8 C6 82 94 C1 66 11 08 E6 99 2C 33\r\n 02 E2 3A 50 EA 58 D2 A7 36 EE 5A D6 8F 5D 5D D2\r\n 9E 04 24 4A CE 4C B6 91 C0 7A C9 5C E7 5F 51 28\r\n 4C 72 E1 60 AB 76 73 30 66 18 BE EC F3 99 5E 4B\r\n 4F 59 F5 56 AD 65 75 2B 8F 14 0C 0D 27 97 12 71\r\n 6B 49 08 84 61 1D 03 BA A5 42 92 F9 13 33 57 D9\r\n 59 B3 E4 05 F9 12 23 08 B3 50 9A DA 6E 79 02 36\r\n EE CE 6D F3 7F 8B C9 BE 6A 7E BE 8F 85 B8 AA 82\r\n C6 1E 14 C6 1A 28 29 59 C2 22 71 44 52 05 E5 E6\r\n FE 58 80 6E D4 95 2D 57 CB 99 34 61 E9 E9 B3 3D\r\n 90 DC 6C 26 5D 70 B4 78 F9 5E C9 7D 59 10 61 DF\r\n F7 E4 0C B3\r\n }\r\n \r\n $network_xor_key =\r\n {\r\n B7 E9 F9 2D F8 3E 18 57 B9 18 2B 1F 5F D9 A5 38\r\n C8 E7 67 E9 C6 62 9C 50 4E 8D 00 A6 59 F8 72 E0\r\n 91 42 FF 18 A6 D1 81 F2 2B C8 29 EB B9 87 6F 58\r\n C2 C9 8E 75 3F 71 ED 07 D0 AC CE 28 A1 E7 B5 68\r\n CD CF F1 D8 2B 26 5C 31 1E BC 52 7C 23 6C 3E 6B\r\n 8A 24 61 0A 17 6C E2 BB 1D 11 3B 79 E0 29 75 02\r\n D9 25 31 5F 95 E7 28 28 26 2B 31 EC 4D B3 49 D9\r\n 62 F0 3E D4 89 E4 CC F8 02 41 CC 25 15 6E 63 1B\r\n 10 3B 60 32 1C 0D 5B FA 52 DA 39 DF D1 42 1E 3E\r\n BD BC 17 A5 96 D9 43 73 3C 09 7F D2 C6 D4 29 83\r\n 3E 44 44 6C 97 85 9E 7B F0 EE 32 C3 11 41 A3 6B\r\n A9 27 F4 A3 FB 2B 27 2B B6 A6 AF 6B 39 63 2D 91\r\n 75 AE 83 2E 1E F8 5F B5 65 ED B3 40 EA 2A 36 2C\r\n A6 CF 8E 4A 4A 3E 10 6C 9D 28 49 66 35 83 30 E7\r\n 45 0E 05 ED 69 8D CF C5 40 50 B1 AA 13 74 33 0F\r\n DF 41 82 3B 1A 79 DC 3B 9D C3 BD EA B1 3E 04 33\r\n }\r\n \r\n $decrypt_string =\r\n {\r\n 85 DB 75 09 85 F6 74 05 89 1E B0 01 C3 85 FF 74\r\n 4F F6 C3 01 75 4A 85 F6 74 46 8B C3 D1 E8 33 C9\r\n 40 BA 02 00 00 00 F7 E2 0F 90 C1 F7 D9 0B C8 51\r\n E8 12 28 00 00 89 06 8B C8 83 C4 04 33 C0 85 DB\r\n 74 16 8B D0 83 E2 0F 8A 92 1C 33 02 10 32 14 38\r\n 40 88 11 41 3B C3 72 EA 66 C7 01 00 00 B0 01 C3\r\n 32 C0 C3\r\n }\r\n \r\n $init_strings =\r\n {\r\n 55 8B EC 83 EC 10 33 C9 B8 0D 00 00 00 BA 02 00\r\n 00 00 F7 E2 0F 90 C1 53 56 57 F7 D9 0B C8 51 E8\r\n B3 27 00 00 BF 05 00 00 00 8D 77 FE BB 4A 35 02\r\n 10 2B DE 89 5D F4 BA 48 35 02 10 4A BB 4C 35 02\r\n 10 83 C4 04 2B DF A3 C8 FC 03 10 C7 45 FC 00 00\r\n 00 00 8D 4F FC 89 55 F8 89 5D F0 EB 06\r\n }\r\n \r\n condition:\r\n 2 of them\r\n}]" ,
"pattern_type" : "yara" ,
2023-12-14 14:30:15 +00:00
"pattern_version" : "2.1" ,
2023-04-21 14:44:17 +00:00
"valid_from" : "2018-05-03T14:14:50Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"yara\"" ,
"misp:category=\"Payload delivery\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--5ae03296-6130-4be2-9966-43eb950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:14:51.000Z" ,
"modified" : "2018-05-03T14:14:51.000Z" ,
"first_observed" : "2018-05-03T14:14:51Z" ,
"last_observed" : "2018-05-03T14:14:51Z" ,
"number_observed" : 1 ,
"object_refs" : [
"file--5ae03296-6130-4be2-9966-43eb950d210f" ,
"artifact--5ae03296-6130-4be2-9966-43eb950d210f"
] ,
"labels" : [
"misp:type=\"attachment\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "file" ,
"spec_version" : "2.1" ,
"id" : "file--5ae03296-6130-4be2-9966-43eb950d210f" ,
"name" : "Sample configs.png" ,
"content_ref" : "artifact--5ae03296-6130-4be2-9966-43eb950d210f"
} ,
{
"type" : "artifact" ,
"spec_version" : "2.1" ,
"id" : "artifact--5ae03296-6130-4be2-9966-43eb950d210f" ,
"payload_bin" : " i V B O R w 0 K G g o A A A A N S U h E U g A A A i 4 A A A C a C A Y A A A C O j s O V A A A g A E l E Q V R 4 n O 2 d T 4 g j y Z X / v / p 5 F j z g H e a y 8 K O o b U S m b r + L Y d c a U 5 v S Q Q d J V 0 M d J J 10 M A U p M J 4 f L q S D N f g w M i Z F g W 8 S d P s g s G n p U O C r l A c Z p K Q M 8 n E M v 4 O V 6 a J 3 a J Z l 1 o b d 9 c z s 7 j D x O 5 R f d E Q q M 5 W q U v 3 r e h 8 o u p W K j I h 88 S L i x Y t Q v o w Q Q o B h G I Z h G O Y R 8 L / u u w I M w z A M w z B p Y c O F Y R i G Y Z h H A x s u D M M w D M M 8 G t h w Y R i G Y R j m 0 c C G C 8 M w D M M w j w Y 2 X B i G Y R i G e T S 8 k z Z h J p O 5 z X o w D M M w D M N I 4 t 7 W k t p w S c q E Y d 5 W M p k M 6 z 3 D M M w d k + Q s 4 a 0 i h m E Y h m E e D Y / S c K l W q 8 j l c v d d D Y a 5 U 4 I g Q C a T Q b / f 3 + m + X C 6 H a r V 6 S 7 V i G I a 5 W x 684 Z L L 5 Z D J Z O T f Z D L R v m + 1 W n d q x O R y O b R a r T s r j 3 n Y k D G h / u 1 q W D A M w z D p 2 e m M y 33 g + z 5 s 28 Z g M J D X a r X a n Z V P K 9 X p d H p n Z T K P h 9 e v X w M A x u M x a r U a P M 9 D o V A A A L T b 7 b 2 W Z R h G q v M 2 / X 4 f n U 5 H p l 2 v 13 u t B 8 M w z H 3 y 4 D 0 u U S R 5 W Z K 8 M 6 q r P Z y m 1 W p p 9 w Z B g F a r h d l s h t l s J q + p + W Q y G f a + M B q W Z c G 2 b X Q 6 H X k t S i d V f S M P z W Q y 0 d J 5 n i d 1 j P S P 0 s f p 8 m Q y k W X T t W q 1 q m 0 V q f U h / e 33 + z I d f c c w D P M Q e Z S G S x z V a h W 2 b U M I A c d x U K / X I 9 P N 53 M I I V C p V N D t d g E A p 6 e n E E J A C A H T N H F 2 d o b B Y I B K p Y J K p Q I h B A z D A H C 1 g q U y h s P h n T 0 f 8 z j I Z r M A r g z c K J 0 M g g D D 4 R D L 5 R J C C L T b b Q R B g H q 9 j v F 4 D C E E F o u F l q e q f y p h X a 7 V a n A c R 94 T 9 k 5 W q 1 W p z 8 v l E s P h U B p T s 9 k M 3 W 4 X v u 8 D w I b h z z A M 8 x B 4 F I b L c D j U P C F x z G Y z m Z Z W n V H p m 80 m A K B U K s H 3 f Q R B g P P z c 1 k G D d x x l M t l A M C z Z 89 i y 2 A Y I F o n i U K h I L 0 t q 9 U K A J D P 5 w F A 2 x p t N B q x + U f p 8 r b 6 l E o l A F f e I Q B 49 e q V / N 6 y L G k g q d c Z h m E e C o / C c K E V a 9 y q U 8 V x H J k 2 T X o A + O d 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
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98af5-3404-4d83-9ee8-4364950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:14:51.000Z" ,
"modified" : "2018-05-03T14:14:51.000Z" ,
"description" : "C&C" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '65.116.107.24']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:14:51Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98af6-95bc-4353-b9ff-438b950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:14:52.000Z" ,
"modified" : "2018-05-03T14:14:52.000Z" ,
"description" : "C&C" ,
"pattern" : "[url:value = 'http://65.116.107.24/login/login.php?q=kt[REDACTED_BASE64_STRING]==']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:14:52Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98af7-2790-4cae-86a1-4904950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:14:52.000Z" ,
"modified" : "2018-05-03T14:14:52.000Z" ,
"description" : "C&C" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '13.44.61.126']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:14:52Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98af7-0880-4da7-9150-4772950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:14:52.000Z" ,
"modified" : "2018-05-03T14:14:52.000Z" ,
"description" : "C&C" ,
"pattern" : "[url:value = 'http://13.44.61.126/main/indexmain.php?q=KT[REDACTED_BASE64_STRING]==']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:14:52Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98af8-81f0-48d9-9e4e-4f1f950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:14:53.000Z" ,
"modified" : "2018-05-03T14:14:53.000Z" ,
"description" : "C&C" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '56.28.111.63']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:14:53Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98af8-611c-4d06-88c3-4c1e950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:14:53.000Z" ,
"modified" : "2018-05-03T14:14:53.000Z" ,
"description" : "C&C" ,
"pattern" : "[url:value = 'http://56.28.111.63/group/group/defaultmain.php?q=kt[REDACTED_BASE64_STRING]==']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:14:53Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98af9-6c78-41f3-89ae-4e7e950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:14:54.000Z" ,
"modified" : "2018-05-03T14:14:54.000Z" ,
"description" : "C&C" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '118.71.138.69']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:14:54Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98af9-e05c-492c-8038-42a2950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:14:54.000Z" ,
"modified" : "2018-05-03T14:14:54.000Z" ,
"description" : "C&C" ,
"pattern" : "[url:value = 'http://118.71.138.69/new/main/default.php?q=KT[REDACTED_BASE64_STRING]==']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:14:54Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98afa-0e4c-4b25-a753-4827950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:14:54.000Z" ,
"modified" : "2018-05-03T14:14:54.000Z" ,
"description" : "C&C" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '117.32.65.101']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:14:54Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98afa-ce94-4831-bab9-4174950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:14:55.000Z" ,
"modified" : "2018-05-03T14:14:55.000Z" ,
"description" : "C&C" ,
"pattern" : "[url:value = 'http://117.32.65.101/users/login.php?q=kt[REDACTED_BASE64_STRING]==']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:14:55Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98afa-ec3c-4db6-9cc9-408e950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:14:55.000Z" ,
"modified" : "2018-05-03T14:14:55.000Z" ,
"description" : "C&C" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '18.25.62.70']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:14:55Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98afb-1af0-4200-894e-4285950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:14:56.000Z" ,
"modified" : "2018-05-03T14:14:56.000Z" ,
"description" : "C&C" ,
"pattern" : "[url:value = 'http://18.25.62.70/groupgroup/default.php?q=kt[REDACTED_BASE64_STRING]==']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:14:56Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98afb-fcf4-447f-a52a-4b26950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:14:56.000Z" ,
"modified" : "2018-05-03T14:14:56.000Z" ,
"description" : "C&C" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '92.137.43.17']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:14:56Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98afc-a388-4113-b9ff-49b3950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:14:56.000Z" ,
"modified" : "2018-05-03T14:14:56.000Z" ,
"description" : "C&C" ,
"pattern" : "[url:value = 'http://92.137.43.17/group/group/home/login/home.php?q=KT[REDACTED_BASE64_STRING]==']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:14:56Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98afc-70a4-4c42-9700-4457950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:14:57.000Z" ,
"modified" : "2018-05-03T14:14:57.000Z" ,
"description" : "C&C" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '33.25.72.21']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:14:57Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98afd-cf80-4192-a5f5-4505950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:14:57.000Z" ,
"modified" : "2018-05-03T14:14:57.000Z" ,
"description" : "C&C" ,
"pattern" : "[url:value = 'http://33.25.72.21/group/main.asp?q=KT[REDACTED_BASE64_STRING]==']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:14:57Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98afd-f244-44dc-a659-429a950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:14:58.000Z" ,
"modified" : "2018-05-03T14:14:58.000Z" ,
"description" : "C&C" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '16.48.37.37']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:14:58Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98afd-bc18-4a29-986f-408a950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:14:58.000Z" ,
"modified" : "2018-05-03T14:14:58.000Z" ,
"description" : "C&C" ,
"pattern" : "[url:value = 'http://16.48.37.37/groupusers/default.php?q=kt[REDACTED_BASE64_STRING]==']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:14:58Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98afe-c690-48d6-8b66-45b0950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:14:59.000Z" ,
"modified" : "2018-05-03T14:14:59.000Z" ,
"description" : "C&C" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.29.51.11']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:14:59Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98afe-c06c-4303-b6aa-4baf950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:14:59.000Z" ,
"modified" : "2018-05-03T14:14:59.000Z" ,
"description" : "C&C" ,
"pattern" : "[url:value = 'http://91.29.51.11/default/main.php?q=KT[REDACTED_BASE64_STRING]==']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:14:59Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98b53-0b28-4c9e-95dd-4490950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:14:59.000Z" ,
"modified" : "2018-05-03T14:14:59.000Z" ,
"description" : "File contains a list of MD5 hashes of encoded modules downloaded by Trojan.Kwampirs" ,
"pattern" : "[file:name = '\\\\%WINDOWS&\\\\inf\\\\mkdiawb3.PNF']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:14:59Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"filename\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98b54-a0bc-44b9-9635-4bfd950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:15:00.000Z" ,
"modified" : "2018-05-03T14:15:00.000Z" ,
"description" : "Last modified timestamp is used to vcontrol frequency in which Trojan.Kwampirs attempts to communicate with the C&C infrastructure" ,
"pattern" : "[file:name = '\\\\%WINDOWS&\\\\inf\\\\mtmndkb32.PNF']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:15:00Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"filename\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98b54-3a80-40fd-8cc0-471c950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:15:00.000Z" ,
"modified" : "2018-05-03T14:15:00.000Z" ,
"description" : "Contains encrypted system information (e.g. MAC address)" ,
"pattern" : "[file:name = '\\\\%WINDOWS&\\\\inf\\\\digirps.PNF']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:15:00Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"filename\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98b55-b92c-4bee-8389-4ade950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:15:01.000Z" ,
"modified" : "2018-05-03T14:15:01.000Z" ,
"description" : "Used to determine read/write permissions on remote machine" ,
"pattern" : "[file:name = '\\\\%WINDOWS&\\\\inf\\\\e11.PNF']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:15:01Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"filename\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98bc6-4174-4cc1-b7ea-463d950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T09:59:07.000Z" ,
"modified" : "2018-05-02T09:59:07.000Z" ,
"description" : "Sample payload DLL " ,
"pattern" : "[file:hashes.MD5 = 'ec968325394f3e6821bf90fda321e09b' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\WMIAMGMT.DLL' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T09:59:07Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98c5b-b9bc-4412-8524-41d7950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T10:00:59.000Z" ,
"modified" : "2018-05-02T10:00:59.000Z" ,
"description" : "Sample payload DLL " ,
"pattern" : "[file:hashes.MD5 = '01cf05a07af57a7aafd0ad225a6fd300' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\WMIASSN.DLL' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T10:00:59Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98c72-cc64-40f2-936c-4fe2950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T10:01:22.000Z" ,
"modified" : "2018-05-02T10:01:22.000Z" ,
"description" : "Sample payload DLL " ,
"pattern" : "[file:hashes.MD5 = 'd57df638c7befd7897c9013e90b678f0' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmiamgmt.dll' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T10:01:22Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98db9-d4f4-4f99-977c-41cf950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T10:06:49.000Z" ,
"modified" : "2018-05-02T10:06:49.000Z" ,
"description" : "Sample payload DLL " ,
"pattern" : "[file:hashes.MD5 = '5c3499acfe0ad7563b367fbf7fb2928c' AND file:name = '\\\\%WINDOWS&\\\\syswow64\\\\wmipapd.dll' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T10:06:49Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98dd1-b830-415a-8f6b-4624950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T10:07:13.000Z" ,
"modified" : "2018-05-02T10:07:13.000Z" ,
"description" : "Sample payload DLL " ,
"pattern" : "[file:hashes.MD5 = '4b91ec8f5d4a008dd1da723748a633b6' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmipapd.dll' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T10:07:13Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98de5-f138-42ba-b319-4480950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T10:07:33.000Z" ,
"modified" : "2018-05-02T10:07:33.000Z" ,
"description" : "Sample payload DLL " ,
"pattern" : "[file:hashes.MD5 = '134846465b8c3f136ace0f2a6f15e534' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmiassn.dll' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T10:07:33Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98e52-6884-4b46-8b3c-48e2950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T10:09:22.000Z" ,
"modified" : "2018-05-02T10:09:22.000Z" ,
"description" : "Sample payload DLL " ,
"pattern" : "[file:hashes.MD5 = '9d2cb9d8e73fd879660d9390ba7de263' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\WMIPAPD.DLL' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T10:09:22Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98e60-3740-4354-bec4-46f1950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T10:09:36.000Z" ,
"modified" : "2018-05-02T10:09:36.000Z" ,
"description" : "Sample payload DLL " ,
"pattern" : "[file:hashes.MD5 = '939e76888bdeb628405e1b8be963273c' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmiadrv.dll' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T10:09:36Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98e76-a45c-4f1c-9f80-43b1950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T10:09:58.000Z" ,
"modified" : "2018-05-02T10:09:58.000Z" ,
"description" : "Sample payload DLL " ,
"pattern" : "[file:hashes.MD5 = 'de9b01a725d4f19da1c1470cf7a948ee' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmipdpa.dll' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T10:09:58Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae98e8b-8fe0-4d0a-ae73-475d950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T10:10:19.000Z" ,
"modified" : "2018-05-02T10:10:19.000Z" ,
"description" : "Sample payload DLL " ,
"pattern" : "[file:hashes.MD5 = 'bb939a868021db963916cc0118aab8ee' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmipapd.dll' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T10:10:19Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae992c9-0f9c-4f49-8336-4944950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T10:28:25.000Z" ,
"modified" : "2018-05-02T10:28:25.000Z" ,
"description" : "Sample payload DLL " ,
"pattern" : "[file:hashes.MD5 = '3289c9a1b534a19925a14a8f7c39187c' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmiadrv.dll' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T10:28:25Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae992f9-d2a4-4abf-a7b6-429d950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T10:29:13.000Z" ,
"modified" : "2018-05-02T10:29:13.000Z" ,
"description" : "Sample payload DLL " ,
"pattern" : "[file:hashes.MD5 = '9d3839b39d699336993df1dd4501892b' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmipapd.dll' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T10:29:13Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae99316-d028-4704-adad-469f950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T10:29:42.000Z" ,
"modified" : "2018-05-02T10:29:42.000Z" ,
"description" : "Sample payload DLL " ,
"pattern" : "[file:hashes.MD5 = '5c3499acfe0ad7563b367fbf7fb2928c' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmipapd.dll' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T10:29:42Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae99449-65ec-4419-aeb6-46a9950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T10:34:49.000Z" ,
"modified" : "2018-05-02T10:34:49.000Z" ,
"description" : "Sample payload DLL " ,
"pattern" : "[file:hashes.MD5 = 'fece72bd41cb0e06e05a847838fbde56' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmiassn.dll' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T10:34:49Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae994ad-a768-4ee7-a1f4-4330950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T10:36:29.000Z" ,
"modified" : "2018-05-02T10:36:29.000Z" ,
"description" : "Sample payload DLL" ,
"pattern" : "[file:hashes.MD5 = 'bbd9e4204514c66c1babda178c01c213' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmiadrv.dll' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T10:36:29Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae994fe-1108-4bf7-a7fa-4497950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T10:37:50.000Z" ,
"modified" : "2018-05-02T10:37:50.000Z" ,
"description" : "Sample payload DLL" ,
"pattern" : "[file:hashes.MD5 = 'ee4206cf4227661d3e7ec846f0d69a43' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\smipapd.dll' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T10:37:50Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9951e-7f10-41ac-b7bc-4234950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T10:38:22.000Z" ,
"modified" : "2018-05-02T10:38:22.000Z" ,
"description" : "Sample payload DLL" ,
"pattern" : "[file:hashes.MD5 = '290d8e8524e57783e8cc1b9a3445dfe9' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmiamgmt.dll' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T10:38:22Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9981a-ad08-4334-99f4-471f950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T10:51:06.000Z" ,
"modified" : "2018-05-02T10:51:06.000Z" ,
"description" : "Sample dropper " ,
"pattern" : "[file:hashes.MD5 = '0240ed7e45567f606793dafaff024acf' AND file:name = '\\\\%WINDOWS&\\\\sysWOW64\\\\wmipsrce.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T10:51:06Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae99864-03f8-4a65-928a-4bde950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T10:52:20.000Z" ,
"modified" : "2018-05-02T10:52:20.000Z" ,
"description" : "Sample dropper " ,
"pattern" : "[file:hashes.MD5 = '047f70dbac6cd9a4d07abef606d89fb7' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmiapsrce.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T10:52:20Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae998cb-f5b4-4f8a-81c3-406e950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T10:54:03.000Z" ,
"modified" : "2018-05-02T10:54:03.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = '0240ed7e45567f606793dafaff024acf' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\WMIAPSRVUX.EXE' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T10:54:03Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae99901-3fcc-473f-ab05-4c3e950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T10:54:57.000Z" ,
"modified" : "2018-05-02T10:54:57.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = '2ae53de1a1f65a6d57e96dab26c73cda' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmiapsrce.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T10:54:57Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9997d-8770-4ab8-b19d-4c8f950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T10:57:01.000Z" ,
"modified" : "2018-05-02T10:57:01.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = '47345640c135bd00d9f2969fabb4c9fa' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\WMIPSVRCE.EXE' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T10:57:01Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae999b8-8d60-4297-a180-4bf7950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T10:58:00.000Z" ,
"modified" : "2018-05-02T10:58:00.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = 'cb9954509dc82e6bbed2aee202d88415' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmipsrce.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T10:58:00Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae99b53-9990-442f-8a80-4301950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T11:04:51.000Z" ,
"modified" : "2018-05-02T11:04:51.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = 'cb9954509dc82e6bbed2aee202d88415' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\WMIPSVRE.EXE' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T11:04:51Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae99bad-464c-4be6-8451-4552950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T11:06:21.000Z" ,
"modified" : "2018-05-02T11:06:21.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = 'b680b119643876286030c4f6134dc4e3' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmiapsrve.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T11:06:21Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae99bdc-fca0-4cfe-9271-14db950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T11:07:08.000Z" ,
"modified" : "2018-05-02T11:07:08.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = 'fac94bc2dcfbef7c3b248927cb5abf6d' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmipvsre.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T11:07:08Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae99bf9-f24c-472f-b767-1226950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T11:07:37.000Z" ,
"modified" : "2018-05-02T11:07:37.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = '856683aee9687f6fdf00cfd4dc4c2aef' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmiapsvrce.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T11:07:37Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9abdf-465c-4bb6-9474-a8f4950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T12:15:27.000Z" ,
"modified" : "2018-05-02T12:15:27.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = '847459c8379250d8be2b2d365be877f5' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmiapsrve.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T12:15:27Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9abf3-2210-4cc9-97e0-11f0950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T12:15:47.000Z" ,
"modified" : "2018-05-02T12:15:47.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = 'fac94bc2dcfbef7c3b248927cb5abf6d' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\WMIAPSRVE.EXE' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T12:15:47Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9ac09-88b8-4b91-9890-a91b950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T12:16:09.000Z" ,
"modified" : "2018-05-02T12:16:09.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = 'fac94bc2dcfbef7c3b248927cb5abf6d' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\WMIPRVSE.EXE' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T12:16:09Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9ac1f-e6c0-4d66-b160-14e1950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T12:16:31.000Z" ,
"modified" : "2018-05-02T12:16:31.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = 'cb9954509dc82e6bbed2aee202d88415' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\WMIPRVSE.EXE' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T12:16:31Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9ac38-8598-4864-928d-1506950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T12:16:56.000Z" ,
"modified" : "2018-05-02T12:16:56.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = '6277e675d335fd69a3ff13a465f6b0a8' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmipsrvce.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T12:16:56Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9ac9d-1eb8-4652-8010-a914950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T12:18:37.000Z" ,
"modified" : "2018-05-02T12:18:37.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = '847459c8379250d8be2b2d365be877f5' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmiapsvre.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T12:18:37Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9acf2-866c-468d-9198-a8f4950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T12:20:02.000Z" ,
"modified" : "2018-05-02T12:20:02.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = '3bedc1c4c1023c141c2f977e846c476e' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmipsvrce.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T12:20:02Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9ad09-0074-4093-927f-1506950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T12:20:25.000Z" ,
"modified" : "2018-05-02T12:20:25.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = 'ce3894ee6f3c2c2c828148f7f779aafe' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\WMIAPVSRE.EXE' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T12:20:25Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9ad2f-805c-4d81-b83c-a8d6950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T12:21:03.000Z" ,
"modified" : "2018-05-02T12:21:03.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = '3b3a1062689ffa191e58d5507d39939d' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmiaprvse.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T12:21:03Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9ae3b-fcd8-4175-88c9-1271950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T12:25:31.000Z" ,
"modified" : "2018-05-02T12:25:31.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = '47345640c135bd00d9f2969fabb4c9fa' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\WMIAPSVRE.EXE' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T12:25:31Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9ae61-7ff4-4b1d-9c77-1271950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T12:26:09.000Z" ,
"modified" : "2018-05-02T12:26:09.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = '3bedc1c4c1023c141c2f977e846c476e' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmiapvsre.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T12:26:09Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9ae72-10dc-49a9-b36a-1226950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T12:26:26.000Z" ,
"modified" : "2018-05-02T12:26:26.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = '6277e675d335fd69a3ff13a465f6b0a8' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmiapsrve.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T12:26:26Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9aeb5-57e0-4f5f-88c2-1271950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T12:27:33.000Z" ,
"modified" : "2018-05-02T12:27:33.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = '856683aee9687f6fdf00cfd4dc4c2aef' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmipsvrce.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T12:27:33Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9aeca-6de0-4888-b26b-a916950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T12:27:54.000Z" ,
"modified" : "2018-05-02T12:27:54.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = 'cb9954509dc82e6bbed2aee202d88415' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmipsvrce.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T12:27:54Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9af2f-c994-4e9a-b4e5-a8d7950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T12:29:35.000Z" ,
"modified" : "2018-05-02T12:29:35.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = 'fac94bc2dcfbef7c3b248927cb5abf6d' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmipsvrce.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T12:29:35Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9af42-6da8-4148-9130-a91c950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T12:29:54.000Z" ,
"modified" : "2018-05-02T12:29:54.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = '847459c8379250d8be2b2d365be877f5' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\WMIPRVSE.EXE' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T12:29:54Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9af7b-e280-4f48-988e-429d950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T12:30:51.000Z" ,
"modified" : "2018-05-02T12:30:51.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = 'cb9954509dc82e6bbed2aee202d88415' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmiapsrvcx.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T12:30:51Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9af90-4b54-4f8b-bc95-d2ce950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T12:31:12.000Z" ,
"modified" : "2018-05-02T12:31:12.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = '856683aee9687f6fdf00cfd4dc4c2aef' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmiapsrvce.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T12:31:12Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9afa7-0db8-4409-849e-a915950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T12:31:35.000Z" ,
"modified" : "2018-05-02T12:31:35.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = 'cb9954509dc82e6bbed2aee202d88415' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmipevse.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T12:31:35Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9afc4-cb78-4a3e-81a2-14e1950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T12:32:04.000Z" ,
"modified" : "2018-05-02T12:32:04.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = '7e5f76c7b5bf606b0fdc17f4ba75de03' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmiapsvrcec.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T12:32:04Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9b03e-4250-45ba-a01a-451b950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T12:34:06.000Z" ,
"modified" : "2018-05-02T12:34:06.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = '177bece20ba6cc644134709a391c4a98' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmiapservex.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T12:34:06Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9b050-838c-45e0-ba07-a919950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T12:34:24.000Z" ,
"modified" : "2018-05-02T12:34:24.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = 'fac94bc2dcfbef7c3b248927cb5abf6d' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmiapvse.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T12:34:24Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9b073-9948-4526-af40-1259950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T12:34:59.000Z" ,
"modified" : "2018-05-02T12:34:59.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = 'fac94bc2dcfbef7c3b248927cb5abf6d' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmipsvre.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T12:34:59Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9b087-b410-44c3-b88e-a917950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T12:35:19.000Z" ,
"modified" : "2018-05-02T12:35:19.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = '3b3a1062689ffa191e58d5507d39939d' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmiapsrvex.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T12:35:19Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9b0a8-bd78-4b09-a3c4-14e1950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T12:35:52.000Z" ,
"modified" : "2018-05-02T12:35:52.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = 'b59e4942f7c68c584a35d59e32adce3a' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\wmiapsrve.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T12:35:52Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ae9b0fb-156c-4a3d-9cf5-a8d7950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-02T12:37:15.000Z" ,
"modified" : "2018-05-02T12:37:15.000Z" ,
"description" : "Sample dropper" ,
"pattern" : "[file:hashes.MD5 = '81e61e5f44a6a476983e7a90bdac6a55' AND file:name = '\\\\%WINDOWS&\\\\system32\\\\WMIAPSRVCX.EXE' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-02T12:37:15Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--f7491bdd-1ef0-4396-8ce0-9836ecc6cb69" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:15:04.000Z" ,
"modified" : "2018-05-03T14:15:04.000Z" ,
"pattern" : "[file:hashes.MD5 = 'cb9954509dc82e6bbed2aee202d88415' AND file:hashes.SHA1 = 'c6a56cd07bfeb45b2fecdf938927e3c5a5a3e38e' AND file:hashes.SHA256 = 'f8022b973900c783fd861ede7d0ac02f665c041b9cd0641be7318999fb82ce8f']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:15:04Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--61af3dd7-d2d0-4190-b3b3-548c2731036a" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:15:02.000Z" ,
"modified" : "2018-05-03T14:15:02.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2018-05-02T08:11:41" ,
"category" : "Other" ,
"uuid" : "5aeb1966-941c-4475-a931-4b7602de0b81"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "49/67" ,
"category" : "Other" ,
"uuid" : "5aeb1967-9ec8-47d7-bd4e-429902de0b81"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/f8022b973900c783fd861ede7d0ac02f665c041b9cd0641be7318999fb82ce8f/analysis/1525248701/" ,
"category" : "External analysis" ,
"uuid" : "5aeb1967-b0d0-42bd-a93e-4df202de0b81"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--a865d3fe-d34a-46f0-a584-b0407e02886b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:15:06.000Z" ,
"modified" : "2018-05-03T14:15:06.000Z" ,
"pattern" : "[file:hashes.MD5 = '3b3a1062689ffa191e58d5507d39939d' AND file:hashes.SHA1 = 'ce3e75f6f8b187656d18618756da68aac135b334' AND file:hashes.SHA256 = 'ea61bcd4774ce2b6ab364a7831f36e010214be2ba2e6daa7dcba10b7e229ddfa']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:15:06Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--1e274a7c-acc3-4c97-8de6-2713c49af382" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:15:05.000Z" ,
"modified" : "2018-05-03T14:15:05.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2018-05-02T23:44:54" ,
"category" : "Other" ,
"uuid" : "5aeb1969-c000-40c0-b728-479302de0b81"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "44/61" ,
"category" : "Other" ,
"uuid" : "5aeb1969-7f48-46ae-9f64-430202de0b81"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/ea61bcd4774ce2b6ab364a7831f36e010214be2ba2e6daa7dcba10b7e229ddfa/analysis/1525304694/" ,
"category" : "External analysis" ,
"uuid" : "5aeb1969-9edc-4fcd-956f-47ce02de0b81"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--6d1f2a52-688f-488d-8079-9fd7231bafe1" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:15:09.000Z" ,
"modified" : "2018-05-03T14:15:09.000Z" ,
"pattern" : "[file:hashes.MD5 = '7e5f76c7b5bf606b0fdc17f4ba75de03' AND file:hashes.SHA1 = '20c30a82cc974cf1ef21dbcd94dfba73d7c4b723' AND file:hashes.SHA256 = 'a37bf368f0285ac938e1477c1c0230d28e8f39717ddded2fd82b00190cdf090e']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:15:09Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--3e9b9cdf-67b5-4f5a-b249-8968780d6edd" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:15:07.000Z" ,
"modified" : "2018-05-03T14:15:07.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2018-05-02T23:54:13" ,
"category" : "Other" ,
"uuid" : "5aeb196b-3f60-46bf-a12d-4eff02de0b81"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "51/67" ,
"category" : "Other" ,
"uuid" : "5aeb196b-9198-4e89-9df3-41f002de0b81"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/a37bf368f0285ac938e1477c1c0230d28e8f39717ddded2fd82b00190cdf090e/analysis/1525305253/" ,
"category" : "External analysis" ,
"uuid" : "5aeb196b-9170-4cdd-bdac-421002de0b81"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--82912a16-0d33-442a-ad32-2f7b1974a1ba" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:15:11.000Z" ,
"modified" : "2018-05-03T14:15:11.000Z" ,
"pattern" : "[file:hashes.MD5 = '290d8e8524e57783e8cc1b9a3445dfe9' AND file:hashes.SHA1 = '3adbb352b23e8750d993e3df27904b0e5a466016' AND file:hashes.SHA256 = '15fc575b0278281541212e393f03278d47ea03d26693efeec8e16261735bc634']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:15:11Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--3aeb74b0-13be-4c9a-9713-99b92c0f3b22" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:15:09.000Z" ,
"modified" : "2018-05-03T14:15:09.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2018-05-02T23:42:09" ,
"category" : "Other" ,
"uuid" : "5aeb196d-7bac-4208-83b6-473902de0b81"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "50/68" ,
"category" : "Other" ,
"uuid" : "5aeb196e-246c-4a4f-9303-49ac02de0b81"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/15fc575b0278281541212e393f03278d47ea03d26693efeec8e16261735bc634/analysis/1525304529/" ,
"category" : "External analysis" ,
"uuid" : "5aeb196e-ace4-4977-b065-45d402de0b81"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--0f5e820b-d877-4907-bc53-935e590a0057" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:15:13.000Z" ,
"modified" : "2018-05-03T14:15:13.000Z" ,
"pattern" : "[file:hashes.MD5 = '6277e675d335fd69a3ff13a465f6b0a8' AND file:hashes.SHA1 = '3f5ea936f02187e3e6297c410e260e71ca11e14b' AND file:hashes.SHA256 = '6f7173b7ae87b5f3262e24a5177dbbd4413d999627f767754f08d8289f359bb3']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:15:13Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--b0bd7aa6-f585-43f8-8455-957d88f83037" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:15:11.000Z" ,
"modified" : "2018-05-03T14:15:11.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2018-05-02T23:50:05" ,
"category" : "Other" ,
"uuid" : "5aeb196f-2fec-4b91-8a76-4ba402de0b81"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "53/67" ,
"category" : "Other" ,
"uuid" : "5aeb1970-4b80-4b70-abec-4e2002de0b81"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/6f7173b7ae87b5f3262e24a5177dbbd4413d999627f767754f08d8289f359bb3/analysis/1525305005/" ,
"category" : "External analysis" ,
"uuid" : "5aeb1970-a68c-45db-8def-43fe02de0b81"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--bda9edae-72a1-4ae8-905b-e8b58791c3f8" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:15:15.000Z" ,
"modified" : "2018-05-03T14:15:15.000Z" ,
"pattern" : "[file:hashes.MD5 = '939e76888bdeb628405e1b8be963273c' AND file:hashes.SHA1 = 'a59de3e9f8c0b684575df7cac9cfe2d84ba26d6f' AND file:hashes.SHA256 = '7bb12284fc28fbb270507c410afdc21c60bde5d34d59de67f78796c09f5ccd9c']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:15:15Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--eed7363d-d9df-4c60-8023-379e611f1e42" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:15:14.000Z" ,
"modified" : "2018-05-03T14:15:14.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2018-05-02T23:56:59" ,
"category" : "Other" ,
"uuid" : "5aeb1972-f48c-4a84-aa20-4f3802de0b81"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "50/67" ,
"category" : "Other" ,
"uuid" : "5aeb1972-5a28-467a-a30b-425202de0b81"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/7bb12284fc28fbb270507c410afdc21c60bde5d34d59de67f78796c09f5ccd9c/analysis/1525305419/" ,
"category" : "External analysis" ,
"uuid" : "5aeb1972-5c7c-4efa-812a-40f402de0b81"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--043f490a-6ddc-4a71-b2ee-449dbc922568" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:15:18.000Z" ,
"modified" : "2018-05-03T14:15:18.000Z" ,
"pattern" : "[file:hashes.MD5 = 'fac94bc2dcfbef7c3b248927cb5abf6d' AND file:hashes.SHA1 = '20b7e624eaa2da04867a9229e9aca41f952917c0' AND file:hashes.SHA256 = '3e7181fd3e893e6b13cc40ed70afa549c8aaf37fe9bee22445b8bd912d7bc522']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:15:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--72bc8ab4-e347-4bf0-8ed4-ce5f95d0db56" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:15:16.000Z" ,
"modified" : "2018-05-03T14:15:16.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2018-04-26T05:35:08" ,
"category" : "Other" ,
"uuid" : "5aeb1974-8f10-40c6-a1bc-498002de0b81"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "46/67" ,
"category" : "Other" ,
"uuid" : "5aeb1974-3194-46b2-82c4-4db002de0b81"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/3e7181fd3e893e6b13cc40ed70afa549c8aaf37fe9bee22445b8bd912d7bc522/analysis/1524720908/" ,
"category" : "External analysis" ,
"uuid" : "5aeb1974-229c-4d4d-8cfa-446302de0b81"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--3b5e6f4e-964d-43ed-b937-946ece94d05b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:15:20.000Z" ,
"modified" : "2018-05-03T14:15:20.000Z" ,
"pattern" : "[file:hashes.MD5 = '5c3499acfe0ad7563b367fbf7fb2928c' AND file:hashes.SHA1 = 'd1e791f3f8c79d76d4629b9360e1104156682899' AND file:hashes.SHA256 = 'c5b9406fdbe2c7bb1d516d1d270568c54a6e0002a4506668aaad9ff13298c3f2']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:15:20Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--44fd254d-c2d4-4ee6-8fca-43ed18455c97" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:15:18.000Z" ,
"modified" : "2018-05-03T14:15:18.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2018-05-02T23:49:34" ,
"category" : "Other" ,
"uuid" : "5aeb1976-f414-4f8e-bf56-40a802de0b81"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "52/67" ,
"category" : "Other" ,
"uuid" : "5aeb1977-9cf4-48d2-a835-494102de0b81"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/c5b9406fdbe2c7bb1d516d1d270568c54a6e0002a4506668aaad9ff13298c3f2/analysis/1525304974/" ,
"category" : "External analysis" ,
"uuid" : "5aeb1977-0154-4c93-97fd-475202de0b81"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--7a13163b-13c1-4226-8036-8c1bb5afe2e1" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:15:22.000Z" ,
"modified" : "2018-05-03T14:15:22.000Z" ,
"pattern" : "[file:hashes.MD5 = '0240ed7e45567f606793dafaff024acf' AND file:hashes.SHA1 = '2646a18fdd6a7a2063b3443283ec1159696c1339' AND file:hashes.SHA256 = '14461260f9b3988d4eb4e46bc7d9861172266a9a01bf15c57916a9e4f9dc0618']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-05-03T14:15:22Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--1c82ca99-3349-4041-a7d1-27347301b8f7" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-05-03T14:15:20.000Z" ,
"modified" : "2018-05-03T14:15:20.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2018-05-03T13:28:27" ,
"category" : "Other" ,
"uuid" : "5aeb1978-1898-48f6-8912-4fec02de0b81"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "52/67" ,
"category" : "Other" ,
"uuid" : "5aeb1979-f550-4ab5-8d44-4ee302de0b81"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/14461260f9b3988d4eb4e46bc7d9861172266a9a01bf15c57916a9e4f9dc0618/analysis/1525354107/" ,
"category" : "External analysis" ,
"uuid" : "5aeb1979-23ec-4f31-a937-4e5502de0b81"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--954f7504-a6b2-4aa2-9851-3281f1a00989" ,
2023-04-21 14:44:17 +00:00
"created" : "2018-05-03T14:15:21.000Z" ,
"modified" : "2018-05-03T14:15:21.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--f7491bdd-1ef0-4396-8ce0-9836ecc6cb69" ,
"target_ref" : "x-misp-object--61af3dd7-d2d0-4190-b3b3-548c2731036a"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--baff4786-8961-49cf-8a37-f948f0f4746a" ,
2023-04-21 14:44:17 +00:00
"created" : "2018-05-03T14:15:21.000Z" ,
"modified" : "2018-05-03T14:15:21.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--a865d3fe-d34a-46f0-a584-b0407e02886b" ,
"target_ref" : "x-misp-object--1e274a7c-acc3-4c97-8de6-2713c49af382"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--d1a1fed0-ed42-456f-9aa0-e8a0a5501f48" ,
2023-04-21 14:44:17 +00:00
"created" : "2018-05-03T14:15:21.000Z" ,
"modified" : "2018-05-03T14:15:21.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--6d1f2a52-688f-488d-8079-9fd7231bafe1" ,
"target_ref" : "x-misp-object--3e9b9cdf-67b5-4f5a-b249-8968780d6edd"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--4dd5a5b3-91bc-43c3-8936-440e71d7cf5c" ,
2023-04-21 14:44:17 +00:00
"created" : "2018-05-03T14:15:22.000Z" ,
"modified" : "2018-05-03T14:15:22.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--82912a16-0d33-442a-ad32-2f7b1974a1ba" ,
"target_ref" : "x-misp-object--3aeb74b0-13be-4c9a-9713-99b92c0f3b22"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--4b618d2a-3d07-48e9-b019-44f04d7c6903" ,
2023-04-21 14:44:17 +00:00
"created" : "2018-05-03T14:15:22.000Z" ,
"modified" : "2018-05-03T14:15:22.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--0f5e820b-d877-4907-bc53-935e590a0057" ,
"target_ref" : "x-misp-object--b0bd7aa6-f585-43f8-8455-957d88f83037"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--80efc68f-af7e-4589-bb85-c8f87dba89a6" ,
2023-04-21 14:44:17 +00:00
"created" : "2018-05-03T14:15:22.000Z" ,
"modified" : "2018-05-03T14:15:22.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--bda9edae-72a1-4ae8-905b-e8b58791c3f8" ,
"target_ref" : "x-misp-object--eed7363d-d9df-4c60-8023-379e611f1e42"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--0e4633be-80c7-42cf-8828-b4f85369b86d" ,
2023-04-21 14:44:17 +00:00
"created" : "2018-05-03T14:15:22.000Z" ,
"modified" : "2018-05-03T14:15:22.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--043f490a-6ddc-4a71-b2ee-449dbc922568" ,
"target_ref" : "x-misp-object--72bc8ab4-e347-4bf0-8ed4-ce5f95d0db56"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--abb5d6cf-ef5d-449f-a26e-89a66eb31728" ,
2023-04-21 14:44:17 +00:00
"created" : "2018-05-03T14:15:22.000Z" ,
"modified" : "2018-05-03T14:15:22.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--3b5e6f4e-964d-43ed-b937-946ece94d05b" ,
"target_ref" : "x-misp-object--44fd254d-c2d4-4ee6-8fca-43ed18455c97"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--3a6f6af0-3cb1-4b39-abb5-352336c6720d" ,
2023-04-21 14:44:17 +00:00
"created" : "2018-05-03T14:15:22.000Z" ,
"modified" : "2018-05-03T14:15:22.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--7a13163b-13c1-4226-8036-8c1bb5afe2e1" ,
"target_ref" : "x-misp-object--1c82ca99-3349-4041-a7d1-27347301b8f7"
} ,
{
"type" : "marking-definition" ,
"spec_version" : "2.1" ,
"id" : "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ,
"created" : "2017-01-20T00:00:00.000Z" ,
"definition_type" : "tlp" ,
"name" : "TLP:WHITE" ,
"definition" : {
"tlp" : "white"
}
}
]
}