2023-04-21 14:44:17 +00:00
{
"type" : "bundle" ,
"id" : "bundle--5b671098-3024-42db-b972-42ae02de0b81" ,
"objects" : [
{
"type" : "identity" ,
"spec_version" : "2.1" ,
"id" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T16:16:48.000Z" ,
"modified" : "2018-08-05T16:16:48.000Z" ,
"name" : "CIRCL" ,
"identity_class" : "organization"
} ,
{
"type" : "report" ,
"spec_version" : "2.1" ,
"id" : "report--5b671098-3024-42db-b972-42ae02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T16:16:48.000Z" ,
"modified" : "2018-08-05T16:16:48.000Z" ,
"name" : "OSINT - Off-the-shelf RATs Targeting Pakistan" ,
"published" : "2018-08-05T16:16:53Z" ,
"object_refs" : [
"indicator--5b671120-d7a8-4a19-acac-479e02de0b81" ,
"indicator--5b671165-fb38-48bb-95ce-4ecc02de0b81" ,
"indicator--5b671166-8a94-4c41-9759-418c02de0b81" ,
"indicator--5b671166-3b9c-4460-847c-453302de0b81" ,
"indicator--5b671167-d4cc-4140-9529-412802de0b81" ,
"indicator--5b671167-47cc-468c-84a0-4db902de0b81" ,
"indicator--5b671168-5b54-430a-b339-4e7302de0b81" ,
"indicator--5b671168-17d4-42da-b68f-452f02de0b81" ,
"indicator--5b671169-a128-4fdd-847b-413f02de0b81" ,
"indicator--5b671169-3998-4ac4-80c0-415102de0b81" ,
"indicator--5b67116a-6acc-48aa-b6b1-4fc202de0b81" ,
"indicator--5b67116a-8108-42d2-8b83-430a02de0b81" ,
"indicator--5b67116b-98b4-4179-8ca5-48bc02de0b81" ,
"indicator--5b67116b-fef4-446c-ac17-410302de0b81" ,
"indicator--5b67116c-e530-4499-a463-462002de0b81" ,
"indicator--5b6711d4-8a28-4851-9d08-42a902de0b81" ,
"indicator--5b671207-b040-414e-9ece-44e702de0b81" ,
"indicator--5b671208-791c-42c5-971f-47d702de0b81" ,
"indicator--5b671208-419c-4af5-8327-4ea302de0b81" ,
"indicator--5b671209-d958-4ec5-ba1d-4ac902de0b81" ,
"indicator--5b671209-2cb8-4150-841b-4c2d02de0b81" ,
"indicator--5b67120a-18e0-43fd-ad6a-40c602de0b81" ,
"indicator--5b67120a-9410-441b-8044-420d02de0b81" ,
"indicator--5b67120b-9798-46ce-9573-405e02de0b81" ,
"indicator--5b67120b-8f84-4e53-8f59-4e3102de0b81" ,
"observed-data--5b67129d-2b54-4e4c-8041-4fd002de0b81" ,
"url--5b67129d-2b54-4e4c-8041-4fd002de0b81" ,
"observed-data--5b67129d-7880-4d91-8327-4aea02de0b81" ,
"url--5b67129d-7880-4d91-8327-4aea02de0b81" ,
"observed-data--5b67129d-313c-471d-ae49-4d3302de0b81" ,
"url--5b67129d-313c-471d-ae49-4d3302de0b81" ,
"x-misp-attribute--5b6712cc-2788-47c0-a58f-4e3102de0b81" ,
"x-misp-attribute--5b6712cc-2528-4489-89bb-4b2c02de0b81" ,
"x-misp-attribute--5b6712cc-c314-44aa-90d1-4d3502de0b81" ,
"x-misp-attribute--5b6712cc-654c-4ae2-9301-429b02de0b81" ,
"x-misp-attribute--5b6712cc-197c-477c-9b95-4fb602de0b81" ,
"x-misp-attribute--5b6712cc-cc80-4b5b-8f2a-4c1e02de0b81" ,
"x-misp-attribute--5b6712cc-9a78-41bb-8d9d-479402de0b81" ,
"x-misp-attribute--5b6712cc-4bec-43bd-9015-477a02de0b81" ,
"observed-data--5b671300-43f4-46cf-809f-4be202de0b81" ,
"url--5b671300-43f4-46cf-809f-4be202de0b81" ,
"x-misp-attribute--5b671328-93d8-4cbf-bdf5-421702de0b81" ,
"indicator--9cce2fcc-4464-411e-9110-154917ff6bc5" ,
"x-misp-object--31bb0167-40ca-41eb-a417-9f8b3576ce5f" ,
"indicator--cc9b6626-45ea-4ead-acf8-d36c1c177a66" ,
"x-misp-object--7408bb22-5f1b-47d2-acd9-a01582835166" ,
"indicator--67cc0e21-fb7b-43cc-90f4-271daa7a9568" ,
"x-misp-object--19a292d2-047b-4dac-afae-09753f498dde" ,
"indicator--aaee8c31-e7f3-48c2-9110-f3d1c262d886" ,
"x-misp-object--571a9d80-2124-46f6-bce7-f3db505b4eb1" ,
"indicator--339b2d38-8ed0-4de6-8139-d52bb2e6d46e" ,
"x-misp-object--c701290b-dea4-4ac3-8912-6dc78e89c279" ,
"indicator--1f18b9c7-fd52-4946-aa17-6d866bbe492a" ,
"x-misp-object--05308a13-616d-4518-96e6-6a879c797d45" ,
"indicator--fa7ddde5-5384-4723-bb39-00e95638691d" ,
"x-misp-object--aebfb468-c063-40be-94e1-63716a123348" ,
"indicator--e73e6cf3-61ba-4b28-b57e-b0e126141bf1" ,
"x-misp-object--6c2d9377-1c97-42c0-97a0-9f9e4878f812" ,
"indicator--2cb966ab-da1e-48a0-a09a-2b9a1f142a33" ,
"x-misp-object--ce0481e6-1fdc-4a29-be69-4d032f657aa2" ,
"indicator--b3a2372f-d21e-4ccb-a23b-ffc763c1c41e" ,
"x-misp-object--2c9ddf5d-caf3-44b3-aa26-a48dcf1158d1" ,
"indicator--b7f9bf64-db5e-49ed-9103-bde68b528cc3" ,
"x-misp-object--0dd1d615-e935-4eec-b381-6883de074d83" ,
2024-08-07 08:13:15 +00:00
"relationship--d487b978-a413-4d20-bb4f-ec7d6a4e359f" ,
"relationship--227976fd-0b20-4487-8376-0ae74300c45a" ,
"relationship--c7cf9294-a309-4aa6-ab54-4a99d65c8cf2" ,
"relationship--46dfea9c-d52f-426d-8c08-ba6cedf95d42" ,
"relationship--b723cef1-8dc7-4d38-9a27-83a566df3609" ,
"relationship--c90e96ba-ff23-4d20-ad9d-ce94746045a5" ,
"relationship--f16b6308-d3f9-47bd-b14d-a28a24582f46" ,
"relationship--4e5117be-3fa4-40b5-ab7f-32f1a637292e" ,
"relationship--ed29f139-bc65-4c0a-881d-85f64d6a937b" ,
"relationship--67001122-c3c5-4c1b-be21-05a30653c54a" ,
"relationship--656963a3-dcca-4c77-9fcb-90298e46791e"
2023-04-21 14:44:17 +00:00
] ,
"labels" : [
"Threat-Report" ,
"misp:tool=\"MISP-STIX-Converter\"" ,
"osint:source-type=\"blog-post\"" ,
"misp-galaxy:mitre-enterprise-attack-malware=\"NETWIRE - S0198\"" ,
"misp-galaxy:rat=\"Netwire\"" ,
"estimative-language:confidence-in-analytic-judgment=\"moderate\""
] ,
"object_marking_refs" : [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b671120-d7a8-4a19-acac-479e02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:00:48.000Z" ,
"modified" : "2018-08-05T15:00:48.000Z" ,
"pattern" : "[domain-name:value = '0x0.ignorelist.com']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:00:48Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"hostname\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b671165-fb38-48bb-95ce-4ecc02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:01:57.000Z" ,
"modified" : "2018-08-05T15:01:57.000Z" ,
"pattern" : "[file:hashes.SHA256 = '027e4c6c51e315f0e49f3644af08479303a747ed55ecba5aa0ae75c27cd6efeb']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:01:57Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b671166-8a94-4c41-9759-418c02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:01:58.000Z" ,
"modified" : "2018-08-05T15:01:58.000Z" ,
"pattern" : "[file:hashes.SHA256 = '81e518e094d597965f578f6f42c22c363450e8fb8d33c0a9568254ca048c15e6']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:01:58Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b671166-3b9c-4460-847c-453302de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:01:58.000Z" ,
"modified" : "2018-08-05T15:01:58.000Z" ,
"pattern" : "[file:hashes.SHA256 = '096012a5a9cf483fe0bdcd5a1030cc4d85b8e5296609fdc3632f2337a897a394']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:01:58Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b671167-d4cc-4140-9529-412802de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:01:59.000Z" ,
"modified" : "2018-08-05T15:01:59.000Z" ,
"pattern" : "[file:hashes.SHA256 = '291ca9e4aa9db88635a89cb58f8dbf49e60abddbbcec1c4a611ef4192bfc6d24']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:01:59Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b671167-47cc-468c-84a0-4db902de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:01:59.000Z" ,
"modified" : "2018-08-05T15:01:59.000Z" ,
"pattern" : "[file:hashes.SHA256 = '2be03e829856ad2ff772ba1f5074d4eafbf3ecab8d97794d1cc6589e043e3a28']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:01:59Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b671168-5b54-430a-b339-4e7302de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:02:00.000Z" ,
"modified" : "2018-08-05T15:02:00.000Z" ,
"pattern" : "[file:hashes.SHA256 = '2e219fc95d7b44d8b0e748628e559a9ec79a068b90fe162b192daa8cf8d6f3ee']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:02:00Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b671168-17d4-42da-b68f-452f02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:02:00.000Z" ,
"modified" : "2018-08-05T15:02:00.000Z" ,
"pattern" : "[file:hashes.SHA256 = '40e9287ff8828fb0e6baedcff873e8e35520c6227200f1c84b63446f07a59289']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:02:00Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b671169-a128-4fdd-847b-413f02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:02:01.000Z" ,
"modified" : "2018-08-05T15:02:01.000Z" ,
"pattern" : "[file:hashes.SHA256 = '48463e268acb50ffbcb27eaff46f757486a985ffc2d10f35ae1b9422660a20d2']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:02:01Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b671169-3998-4ac4-80c0-415102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:02:01.000Z" ,
"modified" : "2018-08-05T15:02:01.000Z" ,
"pattern" : "[file:hashes.SHA256 = '4ba13add1aa8ae3fffcb83f9b0990a6cd8b8912fc0e26811d0211f72aaaa7c79']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:02:01Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b67116a-6acc-48aa-b6b1-4fc202de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:02:02.000Z" ,
"modified" : "2018-08-05T15:02:02.000Z" ,
"pattern" : "[file:hashes.SHA256 = '82ce7dffef284571ca21eb240869148b7f3583d9cb95ebdc42c77536dccc9060']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:02:02Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b67116a-8108-42d2-8b83-430a02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:02:02.000Z" ,
"modified" : "2018-08-05T15:02:02.000Z" ,
"pattern" : "[file:hashes.SHA256 = '855ad4dcb9c5502d6ef73528704046cacf006770fd4af23259cb33e7577cd205']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:02:02Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b67116b-98b4-4179-8ca5-48bc02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:02:03.000Z" ,
"modified" : "2018-08-05T15:02:03.000Z" ,
"pattern" : "[file:hashes.SHA256 = 'f110283c4e459cc20e908267d88edba26e2135bcb7d7335cabbed1a128edeb86']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:02:03Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b67116b-fef4-446c-ac17-410302de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:02:03.000Z" ,
"modified" : "2018-08-05T15:02:03.000Z" ,
"pattern" : "[file:hashes.SHA256 = 'a70cacc8bfffc4a67171122fc424ed95fc3f89bc592d7489aacc666e5834f571']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:02:03Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b67116c-e530-4499-a463-462002de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:02:04.000Z" ,
"modified" : "2018-08-05T15:02:04.000Z" ,
"pattern" : "[file:hashes.SHA256 = 'a8fa4c806d97e59db0c42b574558a68942eadfe56286a66d90a8f6248a34cf43']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:02:04Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b6711d4-8a28-4851-9d08-42a902de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:03:48.000Z" ,
"modified" : "2018-08-05T15:03:48.000Z" ,
"pattern" : "[{\r\n\r\n meta:\r\n\r\n description = \"Pakistani Atomic Energy Commission Spearphishing dropped DLL\"\r\n\r\n author = \"Jose M Martin\"\r\n\r\n date = \"2018/07/10\"\r\n\r\n hash = \"027e4c6c51e315f0e49f3644af08479303a747ed55ecba5aa0ae75c27cd6efeb\"\r\n\r\n strings:\r\n\r\n $s1 = \"ExploitTagMenuState start\" fullword ascii\r\n\r\n $s2 = \"ExploitTagMenuState end\" fullword ascii\r\n\r\n $s3 = \"DonorThread start\" fullword ascii\r\n\r\n $s4 = \"EscalateThread start\" fullword ascii\r\n\r\n $s5 = \"EscalatePrivilegesOld start\" fullword ascii\r\n\r\n $s6 = \"EscalatePrivilegesWow\" fullword ascii\r\n\r\n condition:\r\n\r\nuint16(0) == 0x5A4D and filesize < 30KB and (any of them)\r\n\r\n}]" ,
"pattern_type" : "yara" ,
2023-12-14 14:30:15 +00:00
"pattern_version" : "2.1" ,
2023-04-21 14:44:17 +00:00
"valid_from" : "2018-08-05T15:03:48Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Artifacts dropped"
}
] ,
"labels" : [
"misp:type=\"yara\"" ,
"misp:category=\"Artifacts dropped\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b671207-b040-414e-9ece-44e702de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:04:39.000Z" ,
"modified" : "2018-08-05T15:04:39.000Z" ,
"pattern" : "[url:value = 'http://careers.fwo.com.pk/css/microsoftdm.exe']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:04:39Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b671208-791c-42c5-971f-47d702de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:04:40.000Z" ,
"modified" : "2018-08-05T15:04:40.000Z" ,
"pattern" : "[url:value = 'http://careers.fwo.com.pk/css/printer.exe']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:04:40Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b671208-419c-4af5-8327-4ea302de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:04:40.000Z" ,
"modified" : "2018-08-05T15:04:40.000Z" ,
"pattern" : "[url:value = 'http://sandipuniversity.edu.in/list/87_Copy.docx']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:04:40Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b671209-d958-4ec5-ba1d-4ac902de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:04:41.000Z" ,
"modified" : "2018-08-05T15:04:41.000Z" ,
"pattern" : "[url:value = 'http://www.serrurier-secours.be/./China-Pakistan-Internet-Security-LAW_2017.doc']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:04:41Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b671209-2cb8-4150-841b-4c2d02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:04:41.000Z" ,
"modified" : "2018-08-05T15:04:41.000Z" ,
"pattern" : "[url:value = 'http://www.serrurier-secours.be/./PAF\\\\%e2\\\\%80\\\\%99s\\\\%20first\\\\%20multinational\\\\%20air\\\\%20exercise\\\\%20ACES\\\\%20Meet\\\\%202017\\\\%20concludes\\\\%20in\\\\%20Pakistan.doc']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:04:41Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b67120a-18e0-43fd-ad6a-40c602de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:04:42.000Z" ,
"modified" : "2018-08-05T15:04:42.000Z" ,
"pattern" : "[url:value = 'https://www.serrurier-secours.be/./Fazaia_Housing_Scheme_Notice_Inviting_Tenders.doc']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:04:42Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b67120a-9410-441b-8044-420d02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:04:42.000Z" ,
"modified" : "2018-08-05T15:04:42.000Z" ,
"pattern" : "[url:value = 'https://www.serrurier-secours.be/./Hajj\\\\%20Policy\\\\%20and\\\\%20Plan\\\\%202017.doc']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:04:42Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b67120b-9798-46ce-9573-405e02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:04:43.000Z" ,
"modified" : "2018-08-05T15:04:43.000Z" ,
"pattern" : "[url:value = 'https://www.serrurier-secours.be/./Pakistan\\\\%20Air\\\\%20Force\\\\%20Jet\\\\%20Crashes\\\\%20During\\\\%20Routine\\\\%20Operation.doc']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:04:43Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5b67120b-8f84-4e53-8f59-4e3102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:04:43.000Z" ,
"modified" : "2018-08-05T15:04:43.000Z" ,
"pattern" : "[url:value = 'https://www.serrurier-secours.be/./Sales\\\\%20-\\\\%20Tax\\\\%20&']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:04:43Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--5b67129d-2b54-4e4c-8041-4fd002de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:07:09.000Z" ,
"modified" : "2018-08-05T15:07:09.000Z" ,
"first_observed" : "2018-08-05T15:07:09Z" ,
"last_observed" : "2018-08-05T15:07:09Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--5b67129d-2b54-4e4c-8041-4fd002de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--5b67129d-2b54-4e4c-8041-4fd002de0b81" ,
"value" : "https://twitter.com/securitydoggo/status/926144466674647041"
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--5b67129d-7880-4d91-8327-4aea02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:07:09.000Z" ,
"modified" : "2018-08-05T15:07:09.000Z" ,
"first_observed" : "2018-08-05T15:07:09Z" ,
"last_observed" : "2018-08-05T15:07:09Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--5b67129d-7880-4d91-8327-4aea02de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--5b67129d-7880-4d91-8327-4aea02de0b81" ,
"value" : "https://twitter.com/avman1995/status/905694140788219904"
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--5b67129d-313c-471d-ae49-4d3302de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:07:09.000Z" ,
"modified" : "2018-08-05T15:07:09.000Z" ,
"first_observed" : "2018-08-05T15:07:09Z" ,
"last_observed" : "2018-08-05T15:07:09Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--5b67129d-313c-471d-ae49-4d3302de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--5b67129d-313c-471d-ae49-4d3302de0b81" ,
"value" : "https://twitter.com/ImPureMotion/status/906216798986670080"
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--5b6712cc-2788-47c0-a58f-4e3102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:07:56.000Z" ,
"modified" : "2018-08-05T15:07:56.000Z" ,
"labels" : [
"misp:type=\"text\"" ,
"misp:category=\"Antivirus detection\""
] ,
"x_misp_category" : "Antivirus detection" ,
"x_misp_type" : "text" ,
"x_misp_value" : "ETPRO TROJAN NetWireRAT Keep-Alive"
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--5b6712cc-2528-4489-89bb-4b2c02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:07:56.000Z" ,
"modified" : "2018-08-05T15:07:56.000Z" ,
"labels" : [
"misp:type=\"text\"" ,
"misp:category=\"Antivirus detection\""
] ,
"x_misp_category" : "Antivirus detection" ,
"x_misp_type" : "text" ,
"x_misp_value" : "ETPRO TROJAN NetWire Variant"
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--5b6712cc-c314-44aa-90d1-4d3502de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:07:56.000Z" ,
"modified" : "2018-08-05T15:07:56.000Z" ,
"labels" : [
"misp:type=\"text\"" ,
"misp:category=\"Antivirus detection\""
] ,
"x_misp_category" : "Antivirus detection" ,
"x_misp_type" : "text" ,
"x_misp_value" : "ETPRO TROJAN Netwire RAT Check-in"
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--5b6712cc-654c-4ae2-9301-429b02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:07:56.000Z" ,
"modified" : "2018-08-05T15:07:56.000Z" ,
"labels" : [
"misp:type=\"text\"" ,
"misp:category=\"Antivirus detection\""
] ,
"x_misp_category" : "Antivirus detection" ,
"x_misp_type" : "text" ,
"x_misp_value" : "ETPRO TROJAN Fareit/Pony Downloader CnC response"
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--5b6712cc-197c-477c-9b95-4fb602de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:07:56.000Z" ,
"modified" : "2018-08-05T15:07:56.000Z" ,
"labels" : [
"misp:type=\"text\"" ,
"misp:category=\"Antivirus detection\""
] ,
"x_misp_category" : "Antivirus detection" ,
"x_misp_type" : "text" ,
"x_misp_value" : "ETPRO TROJAN Fareit/Pony Variant CnC Beacon"
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--5b6712cc-cc80-4b5b-8f2a-4c1e02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:07:56.000Z" ,
"modified" : "2018-08-05T15:07:56.000Z" ,
"labels" : [
"misp:type=\"text\"" ,
"misp:category=\"Antivirus detection\""
] ,
"x_misp_category" : "Antivirus detection" ,
"x_misp_type" : "text" ,
"x_misp_value" : "ETPRO TROJAN MSIL/Revenge-RAT CnC Checkin"
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--5b6712cc-9a78-41bb-8d9d-479402de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:07:56.000Z" ,
"modified" : "2018-08-05T15:07:56.000Z" ,
"labels" : [
"misp:type=\"text\"" ,
"misp:category=\"Antivirus detection\""
] ,
"x_misp_category" : "Antivirus detection" ,
"x_misp_type" : "text" ,
"x_misp_value" : "ET POLICY PE EXE or DLL Windows file download HTTP"
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--5b6712cc-4bec-43bd-9015-477a02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:07:56.000Z" ,
"modified" : "2018-08-05T15:07:56.000Z" ,
"labels" : [
"misp:type=\"text\"" ,
"misp:category=\"Antivirus detection\""
] ,
"x_misp_category" : "Antivirus detection" ,
"x_misp_type" : "text" ,
"x_misp_value" : "ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging)"
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--5b671300-43f4-46cf-809f-4be202de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:08:48.000Z" ,
"modified" : "2018-08-05T15:08:48.000Z" ,
"first_observed" : "2018-08-05T15:08:48Z" ,
"last_observed" : "2018-08-05T15:08:48Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--5b671300-43f4-46cf-809f-4be202de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--5b671300-43f4-46cf-809f-4be202de0b81" ,
"value" : "https://www.alienvault.com/blogs/labs-research/off-the-shelf-rats-targeting-pakistan"
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--5b671328-93d8-4cbf-bdf5-421702de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:09:28.000Z" ,
"modified" : "2018-08-05T15:09:28.000Z" ,
"labels" : [
"misp:type=\"text\"" ,
"misp:category=\"External analysis\""
] ,
"x_misp_category" : "External analysis" ,
"x_misp_type" : "text" ,
"x_misp_value" : "We\u00e2\u20ac\u2122ve identified a number of spear phishing campaigns with Pakistani themed documents, likely targeting the region. These spear phishing emails use a mix of different openly available malware and document exploits for delivery. These are served from the compromised domains www.serrurier-secours[.]be and careers.fwo.com[.]pk (a part of the Pakistani army). There are some clear trends in the themes of the decoy documents the attackers chose to include with file names such as:"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--9cce2fcc-4464-411e-9110-154917ff6bc5" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:10:19.000Z" ,
"modified" : "2018-08-05T15:10:19.000Z" ,
"pattern" : "[file:hashes.MD5 = '6f454d39f02bc3e75e904a0f2f5edb89' AND file:hashes.SHA1 = 'd83c7410c9140710f60d35af4402964c0e697a9f' AND file:hashes.SHA256 = '48463e268acb50ffbcb27eaff46f757486a985ffc2d10f35ae1b9422660a20d2']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:10:19Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--31bb0167-40ca-41eb-a417-9f8b3576ce5f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:10:18.000Z" ,
"modified" : "2018-08-05T15:10:18.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2018-08-04T06:29:14" ,
"category" : "Other" ,
"uuid" : "de23891a-63aa-4cb2-9717-1091ccfe2487"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/48463e268acb50ffbcb27eaff46f757486a985ffc2d10f35ae1b9422660a20d2/analysis/1533364154/" ,
"category" : "External analysis" ,
"uuid" : "d04ad598-b232-4961-a8dc-acee2c12dd7c"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "52/68" ,
"category" : "Other" ,
"uuid" : "f52f931b-98f0-424b-a03c-79a8f59f6c0d"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--cc9b6626-45ea-4ead-acf8-d36c1c177a66" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:10:22.000Z" ,
"modified" : "2018-08-05T15:10:22.000Z" ,
"pattern" : "[file:hashes.MD5 = '0edd591ba9fc1c8a4d133eae5e1414b0' AND file:hashes.SHA1 = '5f251e6bd7faf337880555c9410bf885964951ca' AND file:hashes.SHA256 = '2e219fc95d7b44d8b0e748628e559a9ec79a068b90fe162b192daa8cf8d6f3ee']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:10:22Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--7408bb22-5f1b-47d2-acd9-a01582835166" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:10:20.000Z" ,
"modified" : "2018-08-05T15:10:20.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2018-08-04T06:29:17" ,
"category" : "Other" ,
"uuid" : "1aa628eb-2631-4ecb-9479-f6b65299442e"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/2e219fc95d7b44d8b0e748628e559a9ec79a068b90fe162b192daa8cf8d6f3ee/analysis/1533364157/" ,
"category" : "External analysis" ,
"uuid" : "83882a76-f7d1-4121-9111-95c274bcee7c"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "35/60" ,
"category" : "Other" ,
"uuid" : "c365f82b-6c73-4d8a-b1cc-60426b19528b"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--67cc0e21-fb7b-43cc-90f4-271daa7a9568" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:10:24.000Z" ,
"modified" : "2018-08-05T15:10:24.000Z" ,
"pattern" : "[file:hashes.MD5 = '58e3de0352abeacb25e65657e6cb3d1a' AND file:hashes.SHA1 = 'c8c547e8565fafdd7f76974d2533e2282a1bf52a' AND file:hashes.SHA256 = 'a8fa4c806d97e59db0c42b574558a68942eadfe56286a66d90a8f6248a34cf43']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:10:24Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--19a292d2-047b-4dac-afae-09753f498dde" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:10:23.000Z" ,
"modified" : "2018-08-05T15:10:23.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2018-08-04T06:29:07" ,
"category" : "Other" ,
"uuid" : "de27edf7-b783-4c0c-ab07-6f7bffcde04d"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/a8fa4c806d97e59db0c42b574558a68942eadfe56286a66d90a8f6248a34cf43/analysis/1533364147/" ,
"category" : "External analysis" ,
"uuid" : "93659a93-29cf-4527-a290-d7dadf220d5a"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "34/60" ,
"category" : "Other" ,
"uuid" : "b4dfd2be-b2f9-4ef1-9fec-2bfebd534efc"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--aaee8c31-e7f3-48c2-9110-f3d1c262d886" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:10:27.000Z" ,
"modified" : "2018-08-05T15:10:27.000Z" ,
"pattern" : "[file:hashes.MD5 = '5ea2ac12ff2ea7672a1b1d088a9056ef' AND file:hashes.SHA1 = 'b023d97223473b425623408191d09500b3c59cdf' AND file:hashes.SHA256 = '291ca9e4aa9db88635a89cb58f8dbf49e60abddbbcec1c4a611ef4192bfc6d24']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:10:27Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--571a9d80-2124-46f6-bce7-f3db505b4eb1" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:10:25.000Z" ,
"modified" : "2018-08-05T15:10:25.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2018-08-04T06:29:20" ,
"category" : "Other" ,
"uuid" : "9e719b2b-675a-4313-9669-ed3de6620236"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/291ca9e4aa9db88635a89cb58f8dbf49e60abddbbcec1c4a611ef4192bfc6d24/analysis/1533364160/" ,
"category" : "External analysis" ,
"uuid" : "c2d9e2cb-213a-41f4-8597-71e4c699c719"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "48/68" ,
"category" : "Other" ,
"uuid" : "1734cf52-3313-4f1c-a4b5-dfe242a8e92e"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--339b2d38-8ed0-4de6-8139-d52bb2e6d46e" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:10:29.000Z" ,
"modified" : "2018-08-05T15:10:29.000Z" ,
"pattern" : "[file:hashes.MD5 = '6f3beaca4f864a15ac5eb70391a5e9e3' AND file:hashes.SHA1 = '0b449c49ab8f06f4334a08fa1803b4e727101ed6' AND file:hashes.SHA256 = '81e518e094d597965f578f6f42c22c363450e8fb8d33c0a9568254ca048c15e6']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:10:29Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--c701290b-dea4-4ac3-8912-6dc78e89c279" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:10:28.000Z" ,
"modified" : "2018-08-05T15:10:28.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2018-08-03T19:30:55" ,
"category" : "Other" ,
"uuid" : "83c238ab-019c-4cc8-9548-f2ac0c1974a5"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/81e518e094d597965f578f6f42c22c363450e8fb8d33c0a9568254ca048c15e6/analysis/1533324655/" ,
"category" : "External analysis" ,
"uuid" : "599de03a-9c7b-4ab6-a5db-f8fa990c537d"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "20/59" ,
"category" : "Other" ,
"uuid" : "dddfc72c-8ac2-4892-ac99-581b66265fa7"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--1f18b9c7-fd52-4946-aa17-6d866bbe492a" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:10:32.000Z" ,
"modified" : "2018-08-05T15:10:32.000Z" ,
"pattern" : "[file:hashes.MD5 = '987cda2d7593cb61f1432d7955eb2cfd' AND file:hashes.SHA1 = '54191c5052111bd7a8cfa06f4333c4dd99eeb366' AND file:hashes.SHA256 = '40e9287ff8828fb0e6baedcff873e8e35520c6227200f1c84b63446f07a59289']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:10:32Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--05308a13-616d-4518-96e6-6a879c797d45" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:10:30.000Z" ,
"modified" : "2018-08-05T15:10:30.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2018-08-04T06:29:16" ,
"category" : "Other" ,
"uuid" : "967d117a-9ac8-4151-9a93-2a53b81aa8f4"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/40e9287ff8828fb0e6baedcff873e8e35520c6227200f1c84b63446f07a59289/analysis/1533364156/" ,
"category" : "External analysis" ,
"uuid" : "fc6e0948-906d-425a-9129-d0c7596a0f4b"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "30/58" ,
"category" : "Other" ,
"uuid" : "6a0d257b-92a9-4225-aef4-e79dda7818e2"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--fa7ddde5-5384-4723-bb39-00e95638691d" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:10:34.000Z" ,
"modified" : "2018-08-05T15:10:34.000Z" ,
"pattern" : "[file:hashes.MD5 = '8975f12194624aaffb37a4e9f615b790' AND file:hashes.SHA1 = 'fa6c44ddae42a281752822ad8b868af248fff66f' AND file:hashes.SHA256 = '2be03e829856ad2ff772ba1f5074d4eafbf3ecab8d97794d1cc6589e043e3a28']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:10:34Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--aebfb468-c063-40be-94e1-63716a123348" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:10:33.000Z" ,
"modified" : "2018-08-05T15:10:33.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2018-08-03T19:32:41" ,
"category" : "Other" ,
"uuid" : "85bb26b6-1b5a-42f6-bbae-734217d9ac10"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/2be03e829856ad2ff772ba1f5074d4eafbf3ecab8d97794d1cc6589e043e3a28/analysis/1533324761/" ,
"category" : "External analysis" ,
"uuid" : "928f79fa-b21f-4384-8679-57691c448800"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "25/60" ,
"category" : "Other" ,
"uuid" : "bcbccb66-35e0-4874-b080-abd254de9bc8"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--e73e6cf3-61ba-4b28-b57e-b0e126141bf1" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:10:37.000Z" ,
"modified" : "2018-08-05T15:10:37.000Z" ,
"pattern" : "[file:hashes.MD5 = 'cf63638a2cfce962e228a06413dba33f' AND file:hashes.SHA1 = 'c344bcbee4c2ba94597c9a04c7b4aaa25e5e9a68' AND file:hashes.SHA256 = '82ce7dffef284571ca21eb240869148b7f3583d9cb95ebdc42c77536dccc9060']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:10:37Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--6c2d9377-1c97-42c0-97a0-9f9e4878f812" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:10:35.000Z" ,
"modified" : "2018-08-05T15:10:35.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2018-08-04T06:29:11" ,
"category" : "Other" ,
"uuid" : "426b267a-29bc-4703-b719-4017b405d634"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/82ce7dffef284571ca21eb240869148b7f3583d9cb95ebdc42c77536dccc9060/analysis/1533364151/" ,
"category" : "External analysis" ,
"uuid" : "cb864217-7090-4af8-b5a3-53bfc5b57a39"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "34/60" ,
"category" : "Other" ,
"uuid" : "5ae31f9e-ba26-4224-b486-cc2e2ea01c5e"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--2cb966ab-da1e-48a0-a09a-2b9a1f142a33" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:10:39.000Z" ,
"modified" : "2018-08-05T15:10:39.000Z" ,
"pattern" : "[file:hashes.MD5 = '8d536b85d05b8220e0e01f787db9a90c' AND file:hashes.SHA1 = '481d88db215bf9ed480e2749409987987a451605' AND file:hashes.SHA256 = 'a70cacc8bfffc4a67171122fc424ed95fc3f89bc592d7489aacc666e5834f571']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:10:39Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--ce0481e6-1fdc-4a29-be69-4d032f657aa2" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:10:37.000Z" ,
"modified" : "2018-08-05T15:10:37.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2018-08-04T06:29:08" ,
"category" : "Other" ,
"uuid" : "09ee5d35-4432-458c-8c5b-bdc7b7af027b"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/a70cacc8bfffc4a67171122fc424ed95fc3f89bc592d7489aacc666e5834f571/analysis/1533364148/" ,
"category" : "External analysis" ,
"uuid" : "b95c2d5b-8896-4564-ac0a-f2b4fe4487e9"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "50/68" ,
"category" : "Other" ,
"uuid" : "8d38ee24-68ca-4979-a8b4-ed7738da6ae0"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--b3a2372f-d21e-4ccb-a23b-ffc763c1c41e" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:10:41.000Z" ,
"modified" : "2018-08-05T15:10:41.000Z" ,
"pattern" : "[file:hashes.MD5 = '44551844584d5f4371d945afccf26a81' AND file:hashes.SHA1 = '7f631934c3a1bf28d539964b99e92749e84c3e60' AND file:hashes.SHA256 = '027e4c6c51e315f0e49f3644af08479303a747ed55ecba5aa0ae75c27cd6efeb']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:10:41Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--2c9ddf5d-caf3-44b3-aa26-a48dcf1158d1" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:10:40.000Z" ,
"modified" : "2018-08-05T15:10:40.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2018-08-04T06:31:51" ,
"category" : "Other" ,
"uuid" : "3750271b-5952-480a-83c9-a831e3837643"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/027e4c6c51e315f0e49f3644af08479303a747ed55ecba5aa0ae75c27cd6efeb/analysis/1533364311/" ,
"category" : "External analysis" ,
"uuid" : "a4e4caec-63dc-47f9-8bfe-eca7f0202865"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "26/59" ,
"category" : "Other" ,
"uuid" : "35a6ed8e-b2a5-4d35-ab9c-84f93d4e0e96"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--b7f9bf64-db5e-49ed-9103-bde68b528cc3" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:10:44.000Z" ,
"modified" : "2018-08-05T15:10:44.000Z" ,
"pattern" : "[file:hashes.MD5 = '856d79a39ca67e61ec9a34e103b0e4ce' AND file:hashes.SHA1 = 'b0c82d9ddc1b51cfb84797d593b38e3cc638b642' AND file:hashes.SHA256 = '096012a5a9cf483fe0bdcd5a1030cc4d85b8e5296609fdc3632f2337a897a394']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2018-08-05T15:10:44Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--0dd1d615-e935-4eec-b381-6883de074d83" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2018-08-05T15:10:43.000Z" ,
"modified" : "2018-08-05T15:10:43.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2018-08-03T19:31:47" ,
"category" : "Other" ,
"uuid" : "53ec942e-db04-4a13-8365-c385fe833985"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/096012a5a9cf483fe0bdcd5a1030cc4d85b8e5296609fdc3632f2337a897a394/analysis/1533324707/" ,
"category" : "External analysis" ,
"uuid" : "98802cca-95aa-468e-b297-ca964e469db8"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "26/60" ,
"category" : "Other" ,
"uuid" : "c7c47210-68e7-4530-9dc5-626620300989"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--d487b978-a413-4d20-bb4f-ec7d6a4e359f" ,
2023-04-21 14:44:17 +00:00
"created" : "2018-08-05T15:10:44.000Z" ,
"modified" : "2018-08-05T15:10:44.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--9cce2fcc-4464-411e-9110-154917ff6bc5" ,
"target_ref" : "x-misp-object--31bb0167-40ca-41eb-a417-9f8b3576ce5f"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--227976fd-0b20-4487-8376-0ae74300c45a" ,
2023-04-21 14:44:17 +00:00
"created" : "2018-08-05T15:10:44.000Z" ,
"modified" : "2018-08-05T15:10:44.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--cc9b6626-45ea-4ead-acf8-d36c1c177a66" ,
"target_ref" : "x-misp-object--7408bb22-5f1b-47d2-acd9-a01582835166"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--c7cf9294-a309-4aa6-ab54-4a99d65c8cf2" ,
2023-04-21 14:44:17 +00:00
"created" : "2018-08-05T15:10:44.000Z" ,
"modified" : "2018-08-05T15:10:44.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--67cc0e21-fb7b-43cc-90f4-271daa7a9568" ,
"target_ref" : "x-misp-object--19a292d2-047b-4dac-afae-09753f498dde"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--46dfea9c-d52f-426d-8c08-ba6cedf95d42" ,
2023-04-21 14:44:17 +00:00
"created" : "2018-08-05T15:10:44.000Z" ,
"modified" : "2018-08-05T15:10:44.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--aaee8c31-e7f3-48c2-9110-f3d1c262d886" ,
"target_ref" : "x-misp-object--571a9d80-2124-46f6-bce7-f3db505b4eb1"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--b723cef1-8dc7-4d38-9a27-83a566df3609" ,
2023-04-21 14:44:17 +00:00
"created" : "2018-08-05T15:10:44.000Z" ,
"modified" : "2018-08-05T15:10:44.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--339b2d38-8ed0-4de6-8139-d52bb2e6d46e" ,
"target_ref" : "x-misp-object--c701290b-dea4-4ac3-8912-6dc78e89c279"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--c90e96ba-ff23-4d20-ad9d-ce94746045a5" ,
2023-04-21 14:44:17 +00:00
"created" : "2018-08-05T15:10:44.000Z" ,
"modified" : "2018-08-05T15:10:44.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--1f18b9c7-fd52-4946-aa17-6d866bbe492a" ,
"target_ref" : "x-misp-object--05308a13-616d-4518-96e6-6a879c797d45"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--f16b6308-d3f9-47bd-b14d-a28a24582f46" ,
2023-04-21 14:44:17 +00:00
"created" : "2018-08-05T15:10:44.000Z" ,
"modified" : "2018-08-05T15:10:44.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--fa7ddde5-5384-4723-bb39-00e95638691d" ,
"target_ref" : "x-misp-object--aebfb468-c063-40be-94e1-63716a123348"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--4e5117be-3fa4-40b5-ab7f-32f1a637292e" ,
2023-04-21 14:44:17 +00:00
"created" : "2018-08-05T15:10:44.000Z" ,
"modified" : "2018-08-05T15:10:44.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--e73e6cf3-61ba-4b28-b57e-b0e126141bf1" ,
"target_ref" : "x-misp-object--6c2d9377-1c97-42c0-97a0-9f9e4878f812"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--ed29f139-bc65-4c0a-881d-85f64d6a937b" ,
2023-04-21 14:44:17 +00:00
"created" : "2018-08-05T15:10:44.000Z" ,
"modified" : "2018-08-05T15:10:44.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--2cb966ab-da1e-48a0-a09a-2b9a1f142a33" ,
"target_ref" : "x-misp-object--ce0481e6-1fdc-4a29-be69-4d032f657aa2"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--67001122-c3c5-4c1b-be21-05a30653c54a" ,
2023-04-21 14:44:17 +00:00
"created" : "2018-08-05T15:10:44.000Z" ,
"modified" : "2018-08-05T15:10:44.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--b3a2372f-d21e-4ccb-a23b-ffc763c1c41e" ,
"target_ref" : "x-misp-object--2c9ddf5d-caf3-44b3-aa26-a48dcf1158d1"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--656963a3-dcca-4c77-9fcb-90298e46791e" ,
2023-04-21 14:44:17 +00:00
"created" : "2018-08-05T15:10:44.000Z" ,
"modified" : "2018-08-05T15:10:44.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--b7f9bf64-db5e-49ed-9103-bde68b528cc3" ,
"target_ref" : "x-misp-object--0dd1d615-e935-4eec-b381-6883de074d83"
} ,
{
"type" : "marking-definition" ,
"spec_version" : "2.1" ,
"id" : "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ,
"created" : "2017-01-20T00:00:00.000Z" ,
"definition_type" : "tlp" ,
"name" : "TLP:WHITE" ,
"definition" : {
"tlp" : "white"
}
}
]
}