misp-circl-feed/feeds/circl/misp/1d87d97f-b67b-499e-b9c2-3b096c949f81.json

41754 lines
3.7 MiB
JSON
Raw Normal View History

2023-04-21 15:25:09 +02:00
{
2023-06-14 19:31:25 +02:00
"type": "bundle",
"id": "bundle--1d87d97f-b67b-499e-b9c2-3b096c949f81",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:21:11.000Z",
"modified": "2022-01-30T10:21:11.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--1d87d97f-b67b-499e-b9c2-3b096c949f81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:21:11.000Z",
"modified": "2022-01-30T10:21:11.000Z",
"name": "OSINT - AmnestyTech/investigations/master/2021-07-18_nso/pegasus.stix2",
"published": "2022-01-30T10:21:23Z",
"object_refs": [
"indicator--d2876149-02f7-41a1-b755-7ba062b97558",
"indicator--dd01f0f5-7e0f-4478-8460-ca64ac0d2108",
"indicator--2b7c2c5f-a303-4c15-8da3-52575cf261a9",
"indicator--99ee3431-8f4a-468e-8a9d-8fbae1cdf99c",
"indicator--735a0211-376b-45b1-8cf2-a4f3030d87c8",
"indicator--b1d1dbb3-3c15-4bb5-9a2a-07440bf0f6fe",
"indicator--ff4b243f-2eb9-4185-b2cf-b713c125ddf5",
"indicator--9d54eeff-0e39-4ef9-8bc8-a07a78c01389",
"indicator--ecdccbc8-9079-4bfe-a3fc-b0c2c3f27e4e",
"indicator--fb4eefb3-3fb8-448b-b06b-b886cfb1e873",
"indicator--548ef0d9-af25-4775-9552-9f86cd054441",
"indicator--24f3a98e-5928-4b9c-be3c-5cc6a332310a",
"indicator--2e5e3692-9e76-443e-af58-ab68eddaf77a",
"indicator--93bb4900-fea9-4db6-a149-10f5d13afd1a",
"indicator--74ce15e2-2abf-4f53-a5c2-fb5a82561089",
"indicator--90c68ec5-ffa4-4f0e-98d7-2337baa1c736",
"indicator--6c1b9b2d-5386-4f97-b922-e2ed68407830",
"indicator--faf8be77-9bd9-4122-8ea5-dd7df393e792",
"indicator--eb0940a9-e477-4461-a3b9-69f11e5372ce",
"indicator--40bede88-509d-465e-a6b5-922c9099c4d0",
"indicator--6e0d9740-457f-4331-8cab-e2e014c5879b",
"indicator--aa363ce3-9757-4375-a6cf-07aa697a719e",
"indicator--3c20f5ea-ebef-42fd-bde5-df76eac6cb7a",
"indicator--82e6050a-af21-4fcf-9db2-a971b3abba87",
"indicator--24909a97-0cde-4304-9c29-ce0ff43d6731",
"indicator--18342b5b-a59f-4abc-9271-e7f5aed3f54c",
"indicator--64a1957d-2571-4c1a-a2b8-e8901fcb8798",
"indicator--486b0cc0-4d41-4b90-8a8b-32cd94890064",
"indicator--30ba6376-d65b-4faa-8b52-c99b13958a70",
"indicator--815b2111-47d7-4e4a-8e16-768c87e606be",
"indicator--3508ef6e-9d83-4282-98b9-ea899c23677f",
"indicator--fcf93fd3-dd94-43cc-8f7d-f255b51f9435",
"indicator--355f7549-bc09-4a00-a73f-c77006bc789e",
"indicator--8a815d4c-c950-42f9-b9e8-14ca3d75bf1b",
"indicator--dbad1d75-3b95-4f57-a8f8-f12b06d7720e",
"indicator--84a9e8a2-1a16-47b8-8e3b-50b753d28135",
"indicator--7ca5cec8-f166-4654-bff3-5088725d2481",
"indicator--e8e39c98-8487-410b-8d1e-0370dc3219b5",
"indicator--bb1f8c86-0bfe-44b8-abf4-f187c82ddcdb",
"indicator--916eb13f-5041-40b3-acd9-84db530cb9fc",
"indicator--db796c8c-86c6-4814-a8f9-8d55044978fe",
"indicator--fe6675fb-502d-4562-bbf1-6cb074ffc9f1",
"indicator--16f1f707-fa87-4ffb-8301-54eb6fb737c5",
"indicator--781c9f32-bd75-40c7-a05c-4e0d65f9b69b",
"indicator--07670d32-a6d1-4f78-b939-51872c27dec6",
"indicator--79276458-0822-4e9d-8ba2-fbe4b70a2354",
"indicator--bbaf87d8-2a8d-46a2-b18c-01a40af0f30c",
"indicator--dae39265-df86-437b-b509-502bef74dbf3",
"indicator--41436235-32ae-49a1-998b-94f4b4a00f13",
"indicator--a897fd2f-446a-45e5-90b9-c8ab17661f8f",
"indicator--c51e7f73-bc5a-4bd5-a8a3-b8680de9fbff",
"indicator--c0159b3e-1878-4ac1-9a10-188fecede811",
"indicator--249ce7f8-7a70-4289-977e-84d5afd2bcbe",
"indicator--7af631be-249b-4e58-a9df-0d6310d55fbe",
"indicator--ac6fd758-40a9-4872-beb5-8aa1b5a4a560",
"indicator--193c26a4-1218-4e5b-a25d-6fc04382407d",
"indicator--0d678648-e62d-48a6-94c0-cfd6fbce32a9",
"indicator--7791eb16-4d07-4501-994b-82fc16d93314",
"indicator--e8f9dcff-fc69-4505-bcc4-30a7e728b25f",
"indicator--3f64ab44-3b39-449b-9cc4-47eec752a9cd",
"indicator--f6f18373-4297-40f5-a2f4-d91c9dd87fad",
"indicator--17dd6d24-0a9e-4fdd-b874-c5e97468d6e3",
"indicator--a5c26e8f-d39d-4f46-b665-87f8d3410909",
"indicator--1201bb2f-fa30-4849-bc74-928c6f107a18",
"indicator--5bf09052-6593-4f66-928d-bebd591787b5",
"indicator--888039db-f2be-4f74-83e9-1b2b20587c77",
"indicator--d291c0cf-d0d7-4214-a166-e330927cf8c2",
"indicator--8f962d0d-6347-4cab-8f01-251571385736",
"indicator--85de3956-cf89-4ffb-8b8e-fd03904c4e7d",
"indicator--b969e359-f794-4cb7-a1a4-63037d2340ae",
"indicator--46947dfb-40bb-4051-8fff-bc89270b6ea4",
"indicator--e5054c8a-8d7f-49c8-9f43-817197761561",
"indicator--5419907f-03b3-4172-85af-7d58d3f858e2",
"indicator--50e069ec-0939-4110-9ad2-484f3ec42ade",
"indicator--725fc3ee-bd55-4228-a834-2a0729761e8a",
"indicator--addbbcf9-cfe2-42d9-87d4-40d9c35442d2",
"indicator--55c2b1ac-ab29-480e-a7ca-a8558af7a319",
"indicator--26826050-0fdf-4062-b5a0-6a769b6c5fce",
"indicator--932e131c-569d-4df6-b37a-ec01b1ae8f41",
"indicator--41f30e89-68cc-4c16-b874-991f893adc3f",
"indicator--ab096dd2-7554-42ff-a150-fd3574210570",
"indicator--41eef12e-a641-406a-bfb3-b036de2f0837",
"indicator--f7e59a18-6da1-4c9d-8b00-e0563f0dae1f",
"indicator--a99ed9d0-cb93-4b35-870d-36d02b8c3684",
"indicator--2eefd327-eb24-4375-8a93-793c740b85bc",
"indicator--679669ea-a5c3-47af-95a4-5e720780b2dd",
"indicator--c4c4c00c-d561-47e7-8dc0-a12f86517df4",
"indicator--7c6bb3d6-6cc0-40da-be71-68575b5df829",
"indicator--0da78c2b-542c-4c04-9e6b-d631957b8cca",
"indicator--b71f6d30-93e3-4099-886b-38f0875a41ab",
"indicator--61183063-d818-49cf-ad45-79b598e9413a",
"indicator--d6708651-569b-4813-922a-f9ecb5d4fbf1",
"indicator--3ac0829f-0c04-47d2-8165-fa6946925414",
"indicator--ff1d08c3-4faf-4a48-a8cd-cd50f9a067c4",
"indicator--319aa949-e5eb-40f7-a96b-bc5ce40b7da9",
"indicator--19c35f18-f63d-4b44-b3c0-e65bffb51e9b",
"indicator--8c57ae07-801f-4296-a2ea-61aa61f18fcf",
"indicator--047598f4-4419-4fb4-a5a7-f690e360dfa1",
"indicator--268755e8-0d9c-43b7-a8eb-6fc9462f84c8",
"indicator--0474f73b-80d1-49bc-9b5b-d2497c1e6a25",
"indicator--4fcf4a38-3243-444d-a58e-9c4faaeb6835",
"indicator--8a9508dc-53cf-4f4d-989e-81e12108cdb9",
"indicator--7feecd97-c02e-4e22-b7c3-37e40c7c2d74",
"indicator--c96a0718-b249-40ff-83a4-1b9922c392ce",
"indicator--2ba6ff51-97c3-4734-96a1-a24e8ad41e07",
"indicator--51c13f98-f2d6-4614-9d1d-42fc458145d7",
"indicator--ef7e11b5-acdb-4b35-85ff-035e29ee31a7",
"indicator--190f61bb-e2a7-4a78-ab62-1ebd35e4446f",
"indicator--806fa525-31b3-4048-ac5d-0da48cf5c765",
"indicator--25ff9a34-4ec6-4872-8334-5bf701abfac1",
"indicator--45b0deb7-1d8d-4feb-a40a-39ae5d501d47",
"indicator--2ed67348-30ff-437e-a132-855fdd3550a6",
"indicator--f0b90fd9-5231-4b64-9c7b-4e2cc3407d9a",
"indicator--2e4d6cb1-0597-4e8d-81a3-d050f5db4639",
"indicator--a32e4748-1927-4d07-93d3-5a81b5442a52",
"indicator--0971f174-563d-4396-8df0-d9033577fb26",
"indicator--3b8243e9-432b-4026-8a44-ee1d47e152a7",
"indicator--07d31a7b-aaeb-40b3-9111-ff07058c31b4",
"indicator--54683896-bc66-4d0b-aca5-8acb722a8496",
"indicator--7a4687d3-3042-49dc-867a-0d322ef9166d",
"indicator--fb9a2f51-d856-4fc3-8769-3ac04a826453",
"indicator--4ba47017-5b47-48c1-b4c6-cfa22731a044",
"indicator--f9c12dc0-696e-4738-9b52-b622247e7784",
"indicator--f1429c14-1b61-409d-b794-678aa791348f",
"indicator--07e57b71-9459-4689-a294-f80f64c9c2c0",
"indicator--cb41bd0f-b1fa-495e-bb35-945877a36c6b",
"indicator--1d78e18b-2a50-4c93-b60c-6d0e23bfc6e0",
"indicator--378ae806-df1b-4bfd-b1fe-f5566a706ae7",
"indicator--8873609a-cb78-4dc6-81d0-d140e67e587a",
"indicator--280048c9-c9ea-4efa-a07e-ed4f9b9e9710",
"indicator--60944693-2cb7-4cbb-a8a6-2e74d430d6c4",
"indicator--07376039-9c74-4b5e-abd3-9419f7792f1a",
"indicator--b820e2ab-a28c-4fd2-8bff-242386f7dae6",
"indicator--49a3cca7-9ec3-4501-bb5b-29d9849d402f",
"indicator--3e5c29d7-8b3e-4f49-a747-ffd7fa5488a4",
"indicator--2d2eeeb1-5af7-4fa0-b374-5063d3a79e26",
"indicator--c58a7e49-2b17-4de7-81df-dcbe130f249a",
"indicator--90d56a09-6c01-4466-b1b0-c3eff1fc7122",
"indicator--00ef3943-19c0-4bf2-bd8b-12d49d8b6655",
"indicator--99e27eb0-0b3c-495f-97e0-aab498bc2adc",
"indicator--e5cc54cc-632e-4279-9d46-95d2c27aaa52",
"indicator--a9f9af08-2674-460e-bff2-160b63b07ea3",
"indicator--2b4ebd55-3f6a-43ea-991c-d188891dd158",
"indicator--9778ed0c-8614-44e8-aad3-510c5fc607ef",
"indicator--6c490866-6aa6-441c-a75e-1ec0a72304bf",
"indicator--38fb4d60-1cba-4ea6-b9d5-a6704e69b8d6",
"indicator--72013dbd-9a3f-4caf-a251-6527bfd8e0d4",
"indicator--90812e4e-e648-48d5-8119-14c1d4c01586",
"indicator--f8fab374-1ac3-4e8a-9625-cd8d1c659077",
"indicator--af8fa7b6-c2c7-4183-97d6-21e2b54930bf",
"indicator--ede5a867-e889-4973-8301-f6db6c979813",
"indicator--388dc7b8-ea58-4352-b711-6ccd274996ba",
"indicator--12b2fa31-dab8-45e5-bc9a-4d9603e71d76",
"indicator--2a2e0054-55b9-42fb-be69-e04e6a4e61ad",
"indicator--14b68e29-4a16-4db3-a6a0-46d3841e651d",
"indicator--eb2fde6c-b4df-4cab-aaa1-5561be058154",
"indicator--123eb761-f7d7-4e65-89b1-dcd5dfcc60f9",
"indicator--ace1167c-7cac-416a-8899-df0f64d3ff7f",
"indicator--c9f71408-cf6d-4edf-9c0e-6ff80ce926dd",
"indicator--46684351-b750-47ba-ac7c-abcc0cb0c2a8",
"indicator--1fb70bf7-3319-45d9-8556-1c5ea0b4961b",
"indicator--0289e861-6fb0-4979-9bce-1c2bc71ed809",
"indicator--b815f75f-8a4a-4f24-8e10-7208ef6c31d4",
"indicator--19030775-9129-4026-80eb-702045aa4054",
"indicator--2b277b3a-dec4-467b-b319-217c73358bac",
"indicator--65c76ff1-f1b8-48c7-916b-f195ca3dfd52",
"indicator--ddf8be2a-9e3a-4d8e-8a29-7d5da7ca1be5",
"indicator--bc2500eb-2885-4f80-86f6-d0d3c1ca7a3b",
"indicator--4007b2b0-6ec3-4e65-8623-2ef8b7d4155a",
"indicator--bc2ec297-d1a9-4808-a324-4e4fefb9d574",
"indicator--f6ee06e9-d536-4060-b9b6-ace5d35ae34e",
"indicator--a58c40b5-0afe-4b68-bb52-aa486c9acef2",
"indicator--7f2a2636-dec3-4668-a83d-99d15ad71d24",
"indicator--468ab5f0-5056-4b97-acc6-acf969c58aa4",
"indicator--5549f5d2-e7e9-49ba-87fb-16e1ce77e890",
"indicator--2f3a90df-dd83-4cc0-a290-30f1f7b95574",
"indicator--3da700e0-08ba-4d7b-aad1-decb41395599",
"indicator--c86e9411-5c0d-4147-85b9-ed373bdaa449",
"indicator--1a129cd8-efce-42f2-915f-6cf78f73287c",
"indicator--2f0fab10-af3c-4d0e-8fdd-0048acab8529",
"indicator--7c5b8873-e5b6-48f0-a593-adea50c6c415",
"indicator--10bee8b0-2b9e-49e8-a3fa-7953b60fcf1e",
"indicator--8add8f82-3331-4d34-a417-90d34c785d87",
"indicator--f2a0d4e9-cb61-49f5-9b4e-1f5dfce431e4",
"indicator--88f49113-4ee6-4bc7-bbd2-64d685229202",
"indicator--b47ebf40-58ca-45b9-9975-dcffcadd1ef6",
"indicator--d01e0849-3015-4081-b54c-0600c9bed4f8",
"indicator--fe5c5fad-126a-4729-937e-383ab6ec800a",
"indicator--18c3ef1a-bf2d-4587-9f88-79c11bad81c2",
"indicator--9ad3fcd5-8c29-4f37-82d5-c97407973c71",
"indicator--17de605a-da57-458c-9a5c-439788f755b2",
"indicator--0c7b5c04-3325-4349-a11d-2483238302d9",
"indicator--f326eae4-fab2-497d-a1ee-d2ac3436bcef",
"indicator--46acd3e5-5858-44cf-9e7a-aeb6e42ba01e",
"indicator--92a194da-9c43-4734-b731-f561f7030982",
"indicator--6a8edc44-fb6a-4db2-a615-c3d1176fe022",
"indicator--8753edb9-37a5-45a4-a3f4-1af1d0459dbb",
"indicator--64e8c32e-b455-4af4-beb3-130f91db23ed",
"indicator--c323495a-e4be-4a21-ba1a-5f28b76290e2",
"indicator--335d1a73-a867-4b3c-979b-71e77758e0c5",
"indicator--ef613132-bddb-4c08-a7aa-dfb4bedd8c1c",
"indicator--597fc181-0bd1-4abc-b7c6-260bb382dcb0",
"indicator--cf202f23-b191-4d6c-ac61-94ff026fd4f1",
"indicator--3a5c27bc-b59c-4b28-8902-82f746b46bfe",
"indicator--f4a9dc1e-d49c-42a5-928b-323dececf558",
"indicator--f3e1fd10-d064-409e-ab7b-0bdb113725d8",
"indicator--aadc7608-58ab-4787-bc0d-4068af03ebce",
"indicator--0016d5c9-f288-45a6-b756-97e60985d948",
"indicator--22d655f3-ae1d-485c-9f19-10e3ce82340b",
"indicator--ab9488b3-bc53-485d-8ee0-62bcda4cae52",
"indicator--2ecdaff5-6ddf-4ddd-a23e-aaed5e237cb5",
"indicator--23c4ee97-21e7-4e4c-9029-9b422124368c",
"indicator--257f6fd1-6cb8-428c-a6e2-b5e1670382a7",
"indicator--8407c8a0-f99e-4826-b856-cf086ccc2189",
"indicator--62e74224-53ee-46e7-baa0-f72df8dcf750",
"indicator--ab892ee4-5a71-4e82-8c2c-84f9e27c79fb",
"indicator--5ce88937-cddf-45ef-9c0e-db7ae74a7598",
"indicator--a55afc7a-3922-4d63-a8a9-4a6394c3e91b",
"indicator--0b672b8a-4087-4960-b84c-ce002c3ab769",
"indicator--a7fb43c9-dac4-44dc-aa98-77754178f646",
"indicator--f8fc7052-be7f-4dee-8ea2-ef97ea1c2a35",
"indicator--5633093e-7c4a-46fc-bec6-348e3fa34d16",
"indicator--d1f64913-c97b-4e03-90c3-2d71f7fb8e2d",
"indicator--be20a109-badb-4136-9a93-daac85bcaebb",
"indicator--8823931e-2209-4ea3-b833-33699c73a9f0",
"indicator--bb1c3352-4757-45f6-8cfe-c0d293cee0c6",
"indicator--e0cd0c99-081b-4a7b-8458-859df248aadb",
"indicator--5cdf8d70-84d6-4541-b8f9-8b97b94d505c",
"indicator--7bf39c6e-78ae-4352-8010-3b72e7a8fe45",
"indicator--ed9d67df-0431-4315-bae7-2f7a08cdd457",
"indicator--4b222e71-106e-4906-b225-e355adcd0ac4",
"indicator--58a8ac7a-f6fc-4c85-a3a7-4a7a14694055",
"indicator--fac4875c-231d-4c32-872f-e5156289664e",
"indicator--c8c8c2a0-d044-450b-822b-3ef6bbebce2e",
"indicator--e8a7c3e2-39e3-4d44-9ced-f5d8c684b441",
"indicator--ecfdc8df-3292-40dd-80a4-0b351d4f8e2f",
"indicator--6c3d8c47-0552-470c-b1a6-f05978f4baca",
"indicator--27824a56-9ae3-4746-b283-06f3b0d50601",
"indicator--5bd673a2-bc99-4814-aae1-eb27acd3b8c7",
"indicator--305ab304-dae9-4726-bf74-9c23309cbdc7",
"indicator--1874e38a-544f-4a20-a595-423767f4acc9",
"indicator--b5140846-4594-4b6f-b299-df58ceed764b",
"indicator--7cb7092d-b6bc-4410-b5c1-de9e28a89850",
"indicator--dc663697-e83a-44be-b9ca-8f21e58677e0",
"indicator--24a1eac1-315d-4047-9a56-fcde09000803",
"indicator--0b786c9f-5ae4-4d5d-8c45-f56b3770e3c1",
"indicator--77e8a4d1-b5cd-4f43-9f27-4372ce0d3f9f",
"indicator--08e9ef88-ac22-4578-b2f3-83df4b16d65c",
"indicator--3bffd178-88bb-42ff-8e8a-a668d3ebf69a",
"indicator--4b22ae5b-096f-4d6c-990d-3da65f56e37f",
"indicator--8f14607f-36dd-41eb-8416-a894d4c0678d",
"indicator--90dfea4c-f69e-4def-ac40-7bc3e49ab03e",
"indicator--043516cb-15bc-4b46-a595-7d35994c081f",
"indicator--e0bbccca-9a6b-4683-af0d-94e7def67129",
"indicator--08edb930-f187-4f6f-ac37-383112a62922",
"indicator--1f61912f-3442-4e3e-8484-83fe3705e090",
"indicator--1c0ba0d4-8961-4911-ace8-4df868ad6397",
"indicator--a8cb64f4-7de8-4683-8e28-e6b6ff0dac46",
"indicator--e4288eb9-2408-4666-b2fb-7fa30c0445dc",
"indicator--ca472a77-da27-4f48-ac55-683537b96949",
"indicator--2454f87a-75fe-49a8-8f6d-8eec81881372",
"indicator--bfcdde9e-0ef1-4000-816d-f449ce184517",
"indicator--f7f021fe-42e5-4d75-a21d-aa70f3e5cc87",
"indicator--f8003e54-e31f-4124-86cc-feecb27d8940",
"indicator--cdda9c19-04a3-418a-ab69-7d6e454ec4a6",
"indicator--fd47eb8a-f153-4b29-ad31-bc14110a50ca",
"indicator--e72dd421-727d-47ca-85d9-dec0975b5231",
"indicator--de215586-450a-493f-89d2-0d7264a2148f",
"indicator--d9beee0f-97b6-4f80-afb0-1425a90ce633",
"indicator--409b8362-4b0f-4657-a15c-70dce7044023",
"indicator--83770760-0a0e-4ea0-8012-d3a650f67e1b",
"indicator--e4feb189-e19e-4c31-ad78-e0bfc98f402a",
"indicator--665026c8-91b9-4dff-91fc-10571d81034a",
"indicator--1a2bb8fd-5072-45a6-9bbd-66c1611f3c8b",
"indicator--6e2b12fa-ccac-42a5-80da-dddc8eecc8e6",
"indicator--4e9cb43b-5551-4ae9-84a5-d155503df575",
"indicator--690d0477-0a29-47cc-84bf-7606bf53964a",
"indicator--0d568713-f9fa-452a-83f7-26dd4c618e17",
"indicator--ada4436e-a01d-4696-92cd-c80078b1b955",
"indicator--15137b63-ca15-48d5-b450-849bcb4b6f42",
"indicator--959c24f7-f526-422b-ad5e-d5c1fb04d4bd",
"indicator--03d8b18a-02e3-44d9-9c2d-2d97d0b8800b",
"indicator--a7482146-92b3-4e0c-aaad-f219f5d5fde3",
"indicator--e68383b6-7b0c-4312-92f8-edca72bf7acf",
"indicator--3b087ccc-b887-44e8-b2e8-2c382e42415a",
"indicator--57346371-5fe6-402c-a456-c294382c2af0",
"indicator--ae2f9b47-5f52-453d-93f7-ab76c5600daa",
"indicator--8a4de7b9-242f-4331-8bd2-c36cf616a3f6",
"indicator--dca715fe-1c2b-4f47-890d-f1198761fb92",
"indicator--8f750b75-5ae2-4727-bf04-96738e781ca5",
"indicator--c87be93a-faff-431d-9355-6c08e8a9c713",
"indicator--b0f35863-e4d0-487b-99a1-3fd7f80f62ff",
"indicator--18156355-d323-4d34-8d80-73368e5cba67",
"indicator--d7e7e193-58d4-4e1a-a339-376006e03243",
"indicator--235d949f-fc44-465b-aedc-9af8b003ff08",
"indicator--bf35fdb3-21e3-49b6-a941-ac2c0fc72ce3",
"indicator--6cebdb69-a802-457a-9fcc-d052bbb6ea94",
"indicator--940c2cde-b1d2-4d8f-9a82-ca3087d19725",
"indicator--8af0dbca-9926-4f13-a4c7-d142b2c37d2c",
"indicator--87ddb57a-5d59-4cc3-a148-ccd53932272c",
"indicator--225bf086-d23c-449b-bdb3-dee048824c8d",
"indicator--5e766f71-c6c2-4b50-a9b2-f8591a27e9a0",
"indicator--3c40c3d7-6f26-4f1a-852e-49ad302def1a",
"indicator--dcd79f52-ad8e-4b5a-8acd-137f153903ae",
"indicator--bd9856ac-2a0b-4d02-a20a-fced36742d50",
"indicator--da8ba121-83df-43d5-a7e1-9300f483c486",
"indicator--378163b1-25e9-48e5-a2f0-ece293ddec78",
"indicator--b35fa440-bf25-476d-8585-0af01bd56c97",
"indicator--4b092e78-202f-48a3-a47b-4312e3c3980e",
"indicator--db80c109-e926-465d-9cdc-f6bb9706e3cc",
"indicator--bf0b3b5d-be36-428d-902a-15f3973d98a4",
"indicator--fbc0bc14-179d-46a1-b30f-47fe6b4f6310",
"indicator--84c367be-9b09-4233-a180-61b9a9cb35c9",
"indicator--ec0cd681-a3a0-4943-846a-6512fa179a7c",
"indicator--381d98d3-8b91-492a-a268-20323d2c25c3",
"indicator--e7de8a4c-069d-46df-a766-b3a37f6030d6",
"indicator--711523ce-b9b9-4873-93a4-2e81afc71cb8",
"indicator--f49c080e-637b-40db-a37e-ce3e0aa618b7",
"indicator--f87153a4-52c1-4dca-979a-7358d10865a0",
"indicator--621e53e4-d847-41fb-a448-2884cb70e423",
"indicator--7b49ea1e-c836-4fe7-8b51-8f658860d135",
"indicator--b3d58731-b785-4058-9975-76d9f5f89795",
"indicator--c09306a5-4669-4e77-bd97-212931458710",
"indicator--e57763d1-85c8-4a10-952e-40783c32cb1f",
"indicator--0f7f5627-11aa-4876-a4e8-50d0426beefb",
"indicator--d312f025-4958-4a17-aa44-714b3b1722fc",
"indicator--2a53bc3a-3392-416a-8e51-a9e2558f4791",
"indicator--52efe475-7dde-4840-b0df-ca7edcec4d28",
"indicator--8fb02780-e336-40bf-8d12-3351c01bd6a0",
"indicator--9179634d-a077-4f7b-9ca3-fc41ff27f192",
"indicator--22003681-7638-48c6-9b68-203c663af3ec",
"indicator--b775e00d-2029-4eb3-81f7-0d8e6bd74d26",
"indicator--1ccefe4d-250a-44cc-93b4-4361d13fc395",
"indicator--3ddec745-b810-40bc-a1f8-8102f621fbdb",
"indicator--91b59803-39a8-434b-a8f1-8f55b743e904",
"indicator--a7cc2bcd-5504-4983-944c-27d0c810f0e9",
"indicator--85f134e5-ea1e-40f4-94a5-38cbf50cd916",
"indicator--b1f9558e-5556-4630-8869-c56e092bfcc4",
"indicator--de4d3a7e-cbb2-459c-87b5-ec21f7ccdc3b",
"indicator--dea792a9-1b38-4788-a742-cb8c2c94374b",
"indicator--b54a1c20-0b44-42de-9372-94486e829b0f",
"indicator--6ab9fd4c-8f4c-4214-98ec-ae44e6c19b7e",
"indicator--32118bf4-2578-45df-ae7a-fd6281c8aa3f",
"indicator--94e1d79e-697c-457f-b78c-6515bd9ca9b2",
"indicator--395d5a2c-ba22-4d6b-b265-0f2623746644",
"indicator--0a494077-ccbf-4fa2-9263-b13240c8bb39",
"indicator--694ef96f-77ef-4ec1-84b2-e848e7723fb1",
"indicator--ea7f3599-0c24-4163-a54a-3134e6c8713e",
"indicator--3f4f05aa-6b3c-4adb-ab82-1222f23fd173",
"indicator--5a29b4ac-29bc-439f-bd6b-baed5c17e928",
"indicator--3e6aa629-a979-4ee1-9663-42048fe6a880",
"indicator--76047ce1-20a5-42f4-89d1-2ad7f24069e5",
"indicator--1efb782c-a89f-4301-be98-13aa52179e6c",
"indicator--f2ea3c40-508b-4d9c-a5ef-3a7f5802fd10",
"indicator--fea01380-17af-431b-bbb9-7bd1b0c46b9e",
"indicator--87ee7686-24eb-4b96-9405-739493a687d0",
"indicator--0a963e29-7fda-4e94-aadc-f71fe8e67b60",
"indicator--65d6d1e0-a348-4dfa-9809-0a2ae66ef5c5",
"indicator--ad351aed-8f9a-4dda-b166-0b9e134849a3",
"indicator--8d40c220-c53c-4073-9abf-c4419b54b4e7",
"indicator--b40073c2-1c71-4c85-8056-fb6f7a2df044",
"indicator--fdb49033-e4e6-4223-b15d-f8f048b7ae40",
"indicator--eafb15e8-2abc-43c0-b184-3fc21c7537b5",
"indicator--a4c83821-97e9-479f-bd9a-b5ef57cb445f",
"indicator--33f90c0b-d710-4698-b404-255d0a3ddf18",
"indicator--29c9800c-c709-47da-8c1c-5f8d4eef502e",
"indicator--c38ae05c-2948-4751-abe0-3beb67f9e9f5",
"indicator--bba98fa4-1618-46dc-8293-bbf06cf48838",
"indicator--f9cfd7ac-f7ca-48d2-802b-267dd1a944c2",
"indicator--b95be64d-f4cc-4c3b-9ad5-e69b03bc2af1",
"indicator--1ce3590a-0070-47d3-8db5-3e3fa91f5c1c",
"indicator--bac4750e-0d88-4d15-9229-0eddf8c1fda9",
"indicator--594a5714-2768-4ec2-a8a4-c8dcf203add0",
"indicator--8f424ac4-a83b-460f-8082-29b79eb5e0ce",
"indicator--3e23a628-5ed8-4585-9edb-f1a254b7b60d",
"indicator--e695b1ea-011d-440c-97cb-c58d50bf3887",
"indicator--38b2ecd3-1a65-44f8-9e72-4fcdcf20524e",
"indicator--eded81ed-1a2d-40f3-84f7-7670f4276af9",
"indicator--733442f1-9e24-4dc5-b305-22e758235f7d",
"indicator--4894519a-4a99-4290-a03a-693f866b967c",
"indicator--a53b1321-235d-450f-9394-413552b84ffa",
"indicator--c0836514-e3db-4a8d-83c0-9c281aab4c72",
"indicator--26f9165a-ef76-40c6-85db-7f9b113ecfde",
"indicator--77efce99-f2da-4dfa-9b5d-15e7b0e29875",
"indicator--7f0f3777-907b-4c52-90e2-7b5ec0a5bf91",
"indicator--7cb06109-5dd5-41df-8635-b91d9e6a4b5d",
"indicator--6ac16cbc-ad7e-4b82-9ff8-65503f88621a",
"indicator--f03a13f4-7b9e-418e-bec5-56040160168d",
"indicator--67d445aa-d0a5-4b30-a3a4-afa8c69f0746",
"indicator--485d2875-eecb-467a-beb4-33983425fa0d",
"indicator--32f0d87e-1cf1-4d5f-8118-5476a5b1a0d5",
"indicator--fe1af0ee-5e43-4ef9-a258-e1849d9bdd77",
"indicator--a17753c5-329f-45b6-bafd-a4fa78578e75",
"indicator--9019c1bd-5fbb-4500-9bbb-d23af718ef82",
"indicator--c39c03f0-14f6-4641-828c-230d5044369e",
"indicator--1659e817-e537-4be3-a2a1-73a82094ae99",
"indicator--65fc8c9d-9a04-4224-a90b-73b292bbeec9",
"indicator--83087fbc-bd9d-4418-b684-489f085c1594",
"indicator--c71b1699-a02d-4805-9ca3-1f18f75b01b7",
"indicator--62094618-c85d-43d0-9019-85ccac14e30d",
"indicator--a6e1fd2c-a842-4417-bfe9-8d5a148342ed",
"indicator--3e1a7148-681c-4508-a35d-63f753ccd1c5",
"indicator--ebf3a85f-400b-4b46-8727-a9461301a026",
"indicator--3d767059-b83b-4fa3-a8ce-462192db5ea9",
"indicator--e68e511f-2f80-4432-bbaf-5bccceea9931",
"indicator--471bf556-f9ff-4691-a066-f84f6f249f62",
"indicator--ba8ac602-d544-43a7-9154-7106cbefd793",
"indicator--11cdb088-d42b-4093-90b7-110dfc0230e2",
"indicator--3ac57be9-5226-44ea-87ff-2e1bef559eb5",
"indicator--65ed1e19-2049-484d-8875-74009f0ec65f",
"indicator--3a3cf09d-33c4-46bd-acae-a052170164a1",
"indicator--46e79574-9f27-4565-988b-1eac8ed8bec1",
"indicator--836a44f4-327f-4dcf-8d9c-dabb1e3a5f89",
"indicator--1a0c39c4-7796-4470-9a96-fcc9de1c25c2",
"indicator--144ae897-49c3-4bd8-86c1-9473419bebd4",
"indicator--db05ade4-8a95-44f6-afd2-8b4c00491297",
"indicator--ef4a348e-8a36-411a-ae5b-9c755d64d0d8",
"indicator--4fd19542-9b49-40d9-82f0-0b5cf2e34bad",
"indicator--1ee4aedd-7c2d-4987-b510-eb37c31891f3",
"indicator--a47af64a-58e9-46d3-b688-a9a569279b41",
"indicator--eaecfd9e-1980-49a8-a374-9b9b74b7feb1",
"indicator--bf54ea0c-22fc-475a-ada7-fa62dca43a76",
"indicator--2312d7ea-d568-40dd-8691-0bc744123a3a",
"indicator--84dfe692-73ae-4131-a926-13cb5bd374aa",
"indicator--9043ab49-654b-43e3-adfa-3492235c242b",
"indicator--01269b10-6b17-4f3b-8075-c671c2b824f2",
"indicator--f6241421-a444-4ddc-a74f-28a59d8d6276",
"indicator--59f68b0d-f707-49ce-ac71-a3a496d59537",
"indicator--3f0059a7-ec84-487e-bdb7-48c3abf55c1f",
"indicator--d39698c1-c988-4bc0-814d-f71737d03a45",
"indicator--344ed813-bb7c-4802-8054-1220b7915f57",
"indicator--50a69920-f106-4950-b170-bbc8282218e1",
"indicator--df1abfe2-8060-49d7-adb3-1483532b17ff",
"indicator--dc8218ba-05e8-4e58-9d3e-4cea816ebeee",
"indicator--4c649f1d-8f7e-4181-ba79-1e732f934018",
"indicator--4ea6dfc9-c751-4149-b329-fb66ec9ff1ad",
"indicator--8a1b6336-a66e-49e0-a588-b50ad5202914",
"indicator--0a98887a-1830-499e-8c76-44fbff8e347a",
"indicator--67d5f825-3221-46bf-96e9-4f99358084bf",
"indicator--b728aef0-c4d1-4e16-b00f-8e5c827e9b06",
"indicator--38ec932d-533b-4dc2-8f67-d5f79b956155",
"indicator--5a3069f0-e55a-45e0-8d12-b151f3432447",
"indicator--49f1e9fa-2cfd-4891-bbfe-e721b258146c",
"indicator--0e0bfce3-5363-455e-ad8b-8d44fcaaae01",
"indicator--5b3bc009-dcb3-4bfd-b0b5-7b59d7700e9b",
"indicator--e17b50cc-ccbe-4fc0-b4d6-eebfef9dfd8b",
"indicator--81f781f0-becb-40bd-a0d7-12123ccb1a0c",
"indicator--609b616d-3d54-4932-8fad-f82a4e4ec56d",
"indicator--aa4dfd12-3148-46c2-b19c-db8f829646ca",
"indicator--3d174a65-85bd-435b-a4d0-b5fa19f2e584",
"indicator--0b366738-7897-431e-851f-18fd9c055d5f",
"indicator--bea5ad77-383b-4902-84cb-27543e2bd75e",
"indicator--5543a6e9-777f-4f56-8e1d-2a45aebc9b6c",
"indicator--d549ac87-d373-418c-8cf0-7ab7dbd99c48",
"indicator--7ea4351b-3194-4d16-a13b-28177849266f",
"indicator--a86d4f3e-76cd-4e69-915e-d8c23533dc9c",
"indicator--6ab45640-8e92-427e-a827-595c6bb88be8",
"indicator--c0a68434-d43d-4b06-9b91-745ded4438fb",
"indicator--0daa65d4-4b4e-4650-998c-8d47cab55493",
"indicator--f0e249ca-699f-4f7c-aa91-9fd07d7de01e",
"indicator--f5771552-35d0-4914-8420-585ce6f66e94",
"indicator--e423b908-f134-40ca-b69d-29b83e296335",
"indicator--e3936498-4011-44ad-8be1-30f19e5959e8",
"indicator--495d643c-065e-4f24-ae85-7c28c02030cd",
"indicator--5d4d988f-4c5e-4fa0-933e-dd442fd520a0",
"indicator--aa652146-3742-45c7-b051-588264178ee7",
"indicator--f9307b57-6de5-4159-9d6e-6f0e20975820",
"indicator--672acf20-1aab-4bb0-956f-e82bedcc5c77",
"indicator--eb11fdec-3a30-4dfb-a12e-95d15e18bd83",
"indicator--b37c93e9-432b-4c61-9e1c-e4e9756994b1",
"indicator--2d6ba30a-6af2-408a-8596-6d971325a53b",
"indicator--e1fbd15c-ea60-4194-bc3d-140c553e4863",
"indicator--3791b2b2-e1d3-44bd-9aa6-565e871a064d",
"indicator--0937df4b-c6ad-47c8-9c14-97f7660553f6",
"indicator--5295bf55-9021-43d7-a63c-3dde92008795",
"indicator--11a95771-0c2c-4462-a02c-d89ce2a26c69",
"indicator--3d6a272e-ad46-4f59-aad5-609e5e54a1c3",
"indicator--fec3c5bb-bcb5-4854-891c-e148b609ca61",
"indicator--9ec55a01-7f90-4022-9212-cb0ea4158d69",
"indicator--245d2c16-ea23-4855-8357-591ecbbcc438",
"indicator--acbd4b82-f534-4452-afe7-f3c0bd3241ae",
"indicator--65e40fe8-6705-46e7-a865-a8ceec756d60",
"indicator--ee7a0164-6dd9-446b-a4c5-25ef20029c7d",
"indicator--57217cc3-fcff-4f16-90fe-d998b60300f3",
"indicator--72043de7-f54b-4a62-8063-2ecd5e9c2e5a",
"indicator--3329dcbb-e88b-4dcc-b9a8-d7c0d0ecc928",
"indicator--5e190002-3a20-45ef-91c9-88cfca84544c",
"indicator--ea860c3c-ba77-4eb7-a45e-47c569eee521",
"indicator--7b26a7e7-5357-4265-822d-0724b3f6c5ae",
"indicator--e40956bf-e095-44a1-ab21-56660e0bd306",
"indicator--2f45582a-7a15-4e93-ab3d-c5d1af8721fe",
"indicator--92d99229-b136-4809-a220-035eb659aff5",
"indicator--1f01b0a4-ef6d-45b3-b7be-d3b1a81bd332",
"indicator--5754e0b8-e6aa-4146-b664-9dc4c21daff3",
"indicator--c46a13db-bc57-482c-9f25-e0151672dcb3",
"indicator--9ac588b3-7840-4d9a-a8c9-fbf8e679062b",
"indicator--48ff6db2-c9ba-4252-85b9-5469e545c4dd",
"indicator--64470ebf-88ae-4a87-a241-59648881758b",
"indicator--7b88c7b6-f813-4b5e-8c63-0630e3874ab4",
"indicator--6380f99f-9308-43e7-bc94-1cf77db59539",
"indicator--a97e1749-584f-4ada-9596-b319f403caef",
"indicator--33874155-24be-45b0-8ff2-b097a04cf018",
"indicator--4ace1419-4506-491e-a0ef-6478f2b390cc",
"indicator--f79e9f30-8548-47f7-aa61-678622202ee4",
"indicator--ab94087b-3613-4fd5-8647-ed52b97fba20",
"indicator--c3faffcc-aa80-4493-95e2-b23f74fb3013",
"indicator--c3425e6b-a5ae-48eb-bb88-5ca943a30b46",
"indicator--079c6faf-d1b5-459a-aa27-61bd25cee30c",
"indicator--751e05ff-b71b-4167-bbf1-8da7e1946fbe",
"indicator--ba969e52-c78d-4440-bb5b-68f747c3f2eb",
"indicator--927fcc46-0897-4fb1-9aff-8fc4b4a14a53",
"indicator--247ad3f1-5caa-4908-8dd2-32cd2891ea39",
"indicator--a910bfa0-b5be-4d73-a320-ec6180d9ff15",
"indicator--3f4db324-d12e-4bef-a98e-da14840034c6",
"indicator--1040bebc-70d7-455b-80f5-6220c4621e1c",
"indicator--63f448b1-3b64-4ff0-a99d-3f42725428e4",
"indicator--1e61d2c4-51bc-444c-87c0-311a2abff8e5",
"indicator--ff10598d-334a-442e-9f93-00fc3cde4914",
"indicator--abb35c98-33f0-430e-a634-23e9b919490d",
"indicator--55f4e791-3e7c-49af-927e-6a598d26b914",
"indicator--5e708106-7594-4471-89b5-4f333dfa1db3",
"indicator--188b47ba-1289-4294-9d5f-0de968866324",
"indicator--5e222138-c12a-4d61-af2c-ffbf75baa0fc",
"indicator--22d90268-3a23-4346-881d-613e65413abb",
"indicator--24604261-7f29-4d5b-8868-86a14428d764",
"indicator--bb298998-7310-432c-8608-3372bb4ab5da",
"indicator--a4eecad1-08f6-4e93-b488-391fb9af49bc",
"indicator--c494f5e7-0665-4f49-8c3e-1be09e7e8a71",
"indicator--d6682592-f0df-4c57-95a2-32cd1f688153",
"indicator--ef7c2fdf-7dae-4ccd-b89a-26c235f4acd6",
"indicator--a1229068-9dad-4580-9268-a5e571d0800a",
"indicator--ee73ecc7-25f3-4770-97b2-35c1f605199b",
"indicator--d17564b7-132d-4998-98b8-ceb5a467e9f5",
"indicator--5855c962-46b6-4e53-83f8-d439f609d3a8",
"indicator--2fb64cfa-c6a1-4eab-8608-3af9a0bbb2a2",
"indicator--099b967d-a634-4718-aac6-a40a65501c19",
"indicator--03103b1c-1494-4222-b2fb-ba7a5bb75472",
"indicator--f61a010c-827e-4987-a3ec-21b6839a5540",
"indicator--7b09bb69-36fe-4944-8931-66cb2aa269ff",
"indicator--4ba0cf53-4653-4d10-9f15-33b88e02463b",
"indicator--51ab49c4-1fa0-4d03-a4a3-5420ecde41d7",
"indicator--29dcb1b5-6cd6-430c-9d91-53a4352f5e7f",
"indicator--59ee084e-bdcf-4883-9434-b937aafd8d0c",
"indicator--ffb1db0c-ff20-45b4-8280-dabb69e46361",
"indicator--83cda513-b369-4f68-889b-cdf1936f0615",
"indicator--57e041bd-6deb-496b-bec2-3e928a949c77",
"indicator--d9846f4d-966d-4f8e-8bb4-6111625362d5",
"indicator--f3f33d81-606e-45d0-98e8-7368247339a4",
"indicator--2c9ede02-2e02-4c87-b7ed-8a526709992c",
"indicator--92759c72-4f46-40ec-9b4a-ddd16c7670bb",
"indicator--1cf7a2a0-a9d6-4182-bc99-6be9ec78ce1b",
"indicator--7c23ecd5-9320-4444-b2d8-eb8897e790e9",
"indicator--ec782700-4da8-405e-87ee-6e38ebb2fb71",
"indicator--0c491e34-14b9-4afb-99bb-c41346c5e5ab",
"indicator--d52d1213-a191-474b-aa75-c8ba95a3ef91",
"indicator--5f5d1eaf-6dd9-493c-99c0-c11b798c15cb",
"indicator--763d6a66-1579-45a0-b50a-3053eedd5827",
"indicator--fa647d63-77a0-4633-b410-1c50c7502b51",
"indicator--cf007f4c-f812-492a-a90f-38b57b56bbb2",
"indicator--0ac95376-dd08-40cf-adc0-650783aa61fb",
"indicator--dc1d3666-7e9c-401b-aa4e-b0643d5e4553",
"indicator--84349892-ddbd-4462-8df2-19407e69f6a3",
"indicator--7e37513e-46fc-4a62-968d-a83af00b1b9c",
"indicator--cadd3a86-4818-4f43-a1cc-71e6edd8a087",
"indicator--453c2cac-d83d-4146-9ba2-104f9b0fabff",
"indicator--dd386e9c-64c3-4a59-9e24-9bb8c73eaa87",
"indicator--9ccdf900-9bf7-40ad-9eb1-18cac76a1b8a",
"indicator--cb899021-d62c-481d-bffd-3e88fcbc3d64",
"indicator--df06a20d-b40f-4c1b-940e-9e136efec62a",
"indicator--05821c60-7bef-4f60-86cc-8f74069b277b",
"indicator--940f0a6e-89f9-417c-a9a6-8138a51020cb",
"indicator--22721966-693f-412b-b2d2-2b6aa01c99ce",
"indicator--823a7e7c-0bc0-4119-9563-8cd191645495",
"indicator--9ce00308-85df-47f5-bf57-a97a519d9ea0",
"indicator--688530e9-b371-459b-8780-e04b259374d9",
"indicator--c65fd5dd-dacf-4248-9faf-b1b3b1ce4db8",
"indicator--69ff046d-54d8-41d6-bc3a-70c335722eee",
"indicator--cddd9f1e-335a-4560-90f1-dfb63fa14228",
"indicator--229bf209-7fec-45ad-bb22-8df9c46d93c7",
"indicator--3176b86b-c822-4d12-8c1c-5be5cc7e7c2f",
"indicator--abd67f6b-e1f6-47fa-aa27-a35fa582278f",
"indicator--00c7499d-736e-4bc9-bbe6-8e93d2965033",
"indicator--911a0ced-69e9-4161-bc0e-a98cff55dc57",
"indicator--241a430d-1fbb-46ad-b1c5-af6fc0389b11",
"indicator--aef9f2f6-2dae-49ba-bcc2-4f41d650d45c",
"indicator--1ba053e3-2bc6-4728-82dd-87aa5d1a952f",
"indicator--2d1e56e5-0624-4f3d-a877-df4cc5f944df",
"indicator--691ae150-df2d-4cfe-b8e4-b66202b2f2ca",
"indicator--5f54d168-6d4c-4aaf-b7cb-a4736072b948",
"indicator--9e198545-a03e-438c-8686-00460ae3431a",
"indicator--ce23b5dc-c27f-42ff-a307-90b86524b30b",
"indicator--cb579619-e3c5-41fe-ba5a-658db0a3feae",
"indicator--bd6940dd-716d-4f31-827b-111a4031b488",
"indicator--eb165f57-05d6-45b9-8aa1-fbe0b449fae6",
"indicator--35e1895e-e738-4e6c-b18d-2c81694d026d",
"indicator--10e7948d-11e9-4122-b1f7-0bb318224061",
"indicator--b217bf7e-5e11-4f36-85bc-eccb11f9dc95",
"indicator--bf87e0d1-4ddc-4f68-97bc-16a53868ab60",
"indicator--349a9968-d8b8-46ad-8c10-2288df9c393f",
"indicator--036d2a06-dcba-46b9-86ca-ea8cef47836f",
"indicator--35bf5c08-eca1-4234-901e-c5b40c1b7143",
"indicator--7051cb44-f5cf-497f-ba77-eee596d8c715",
"indicator--b97f8819-ac4d-44c4-99ed-81ff69849cda",
"indicator--9028a6f0-d5b2-4411-bac3-843f0cd17155",
"indicator--782b842f-2660-48b6-9d19-da1cb4667d1e",
"indicator--b0ff83a4-d99c-4d25-b438-77c90452768f",
"indicator--287847c3-cd21-482a-b4ca-d77348a71831",
"indicator--bc9d14a6-2afc-492e-abc1-42ffec0f216b",
"indicator--6d574d0e-10f2-4400-be6f-a8525e7f88f6",
"indicator--01106bd1-19c9-4c7e-96b5-8493c6bc990e",
"indicator--30f47b7c-83eb-4f36-b560-ba5493dbe9f6",
"indicator--94e0cc12-7e4a-4afd-856d-e8e86820b232",
"indicator--883eb51e-9175-4be2-9968-51b15238d758",
"indicator--5bb2ab59-05a6-4a9a-9488-603e291cdb4b",
"indicator--79ed537b-4d8a-40ec-9684-0ecae459e148",
"indicator--a5bd4af4-a989-4f98-ad96-16e35a7d38d3",
"indicator--a322d967-04eb-4094-91dd-2259b5524824",
"indicator--74448a45-b26e-499b-8c3b-e6a69225f3e9",
"indicator--1d42e30f-7208-470f-b532-f194c6b33706",
"indicator--5edb31e9-5776-42d2-ac61-249be4f8f157",
"indicator--e27451bd-3f68-4e54-868c-f1f4d8c42fe7",
"indicator--a563140e-c2bc-409f-b616-47563165cb4b",
"indicator--b298afd8-0e10-4045-9502-5b56f83aa11f",
"indicator--23234491-c861-468b-b439-6b3b559d07a5",
"indicator--6243d71a-e0c1-41cf-a8ab-6bebe8acc5d7",
"indicator--4f62a60e-650b-4c0b-b235-4b92af3f86b8",
"indicator--5e861c1b-ccbe-4250-9399-234e16e756ba",
"indicator--947434e9-68b1-4862-8ed0-adbcafefb798",
"indicator--8d697f2e-a34d-4681-b0c1-9bc1f58ed4ea",
"indicator--9c20a94b-5745-4e30-976b-0cc9612001f5",
"indicator--4dcad8f5-e328-4bc8-8586-c121403be15c",
"indicator--36cba722-2368-4a85-ad2a-d10615a176a3",
"indicator--01bd4cb9-84d6-495f-ad28-4342f9045199",
"indicator--3f3eb5e0-fa47-4fe0-9260-96ac090fe12d",
"indicator--56cad97f-00bb-4d7c-a790-ec6726d48b77",
"indicator--783cc1a6-b57a-4aae-ae8e-1f7bdbbfaac2",
"indicator--53bb80df-1951-4467-a155-5c256cf2913c",
"indicator--76cdd245-bf2f-4740-96af-1d1fb0273f54",
"indicator--626cf7a5-c004-44bd-b6b6-111b28e39f37",
"indicator--e2c5c2b1-131e-41fb-ba74-141a1cb95e94",
"indicator--daac28cf-5d6b-4fd6-ae86-063710a9adcd",
"indicator--eccfecc5-7959-45dc-afa6-5b5063a6001f",
"indicator--a2bfa09f-eee7-4f62-b7ed-ba5f1002c56a",
"indicator--cb5eee7d-8d51-455d-85e0-0c94a5b016f2",
"indicator--c2792d17-8ca6-4ce3-a0ad-a942c4e3ea50",
"indicator--f5dbe0cf-6e21-40cb-8098-31e26028cbe9",
"indicator--698751b6-7ec8-4f36-ba19-1da6ea462eac",
"indicator--00697f97-1fb4-42df-8ab0-499e79662bc4",
"indicator--de10402f-8583-45dc-9457-a1bf3fbb1501",
"indicator--2bd1c992-aa3b-495e-b6d1-3bc87caf5659",
"indicator--8c4da263-d85d-4abd-af3d-c02bc7aa3b91",
"indicator--5c899ffd-604c-4038-9797-25365d470eca",
"indicator--4342c5ab-2391-496f-9ea1-c57e9227d125",
"indicator--e773db32-0216-4970-8ec8-9d936a938080",
"indicator--488f9c6b-3e21-4aab-8d24-e5f0b67ee0a1",
"indicator--29f5c526-ce3e-4bd5-a6fb-fec5e42265c2",
"indicator--ed0714a7-2f4e-4c18-b3d5-0164a65c4410",
"indicator--7ee95f0d-d33c-44f4-bbe2-45fc859eab04",
"indicator--434922d3-7966-4e2c-9c0b-383346514e7a",
"indicator--2c81d890-ddc0-4f19-9d05-e6511c99b447",
"indicator--0855ff6d-ab50-4f2a-a36f-bf5ee277832a",
"indicator--aff75f92-a69c-4c7b-af8e-9436d5c4be35",
"indicator--d62bf9e7-d8e9-49c4-a85d-52766a294242",
"indicator--7968a758-f2d0-4c94-9d21-595037da9bd4",
"indicator--1613116b-ec77-43de-a293-04faa6fd555d",
"indicator--643de34d-0b08-4a16-8388-ebd16eb05eb8",
"indicator--4dd984e1-7b4c-4f1e-a4ca-0aa79d873def",
"indicator--f73509ca-1c62-4ba1-ab07-7719779a6125",
"indicator--660ebd0e-3809-462c-a9bb-c14b832403f1",
"indicator--90ed8935-266d-4e3e-b825-f72fed66b859",
"indicator--2cacf404-e5b5-45aa-848e-3701df42a06c",
"indicator--d7fdb92f-e935-4ce0-82f0-12469e4d0942",
"indicator--fb8c1ac1-8c49-4f20-95f0-b1642eb00dd4",
"indicator--b7acec3a-1279-4512-822c-b20c3db1f679",
"indicator--5bb2f384-2878-4431-8b26-93e35b198d6d",
"indicator--51efcf28-ddf0-4e75-baf5-f948c272e371",
"indicator--5863d074-b78c-42a7-b978-ee1f68cb7a8c",
"indicator--56e2f349-f9f8-41b7-9ab4-efbcf8c42256",
"indicator--61f63fec-e987-4f9b-861f-df80272fabfc",
"indicator--1316e708-d7a7-4226-a258-d887e5866f9e",
"indicator--74b0bf44-b8ee-4771-8f3b-5be4afbbd171",
"indicator--f1ab4a84-51d6-474d-a04c-321c26c931cb",
"indicator--607a7891-6d25-4a6d-b81d-5a747bc989a6",
"indicator--1bfeb735-d67f-4673-9268-6e8492e472fb",
"indicator--35c9ac93-14f3-470b-9d40-3e24ca4fa3fb",
"indicator--355d8ae8-86f2-46e5-aad2-f4376d64fe94",
"indicator--52868668-9dc6-459e-ac2e-df2837a779a6",
"indicator--d5414b67-daae-4967-9e15-7ba561d01c7f",
"indicator--d2d01908-3c30-4b55-bbd6-81e740bcbc45",
"indicator--0cec3f93-c5e8-47b4-ab31-cd53c74ae728",
"indicator--8686ede2-19ba-43e5-978d-fc5f9d5a46e4",
"indicator--413c99ca-2b32-4591-a251-30f9a234d2a9",
"indicator--0cec4178-e7d0-49c3-a028-125dfdbf4dcb",
"indicator--f035d10b-cb5f-49cc-b3ff-0591bb101877",
"indicator--27ed7ab4-2493-43ac-a1df-dda809b94773",
"indicator--ad07954c-95c0-4f9c-bbcf-1a834f151686",
"indicator--49598928-8661-4c3a-b3d1-14a9797e4920",
"indicator--60039f80-80f4-45af-8dd8-ac3e10dbfb03",
"indicator--f852ccfa-91e5-4390-924b-49ea18e6308b",
"indicator--a252147f-2250-4827-92e3-e5f1b8cb8a82",
"indicator--da74740c-6ad4-40da-b8c5-14e5e7834ead",
"indicator--cdc4bc44-4d2f-47d1-8652-37cf7224c83f",
"indicator--f3d909f5-63f5-4388-b4fb-a42110577f34",
"indicator--bbaa006d-b151-4519-8ec4-6b4e40357102",
"indicator--66f728a3-7de1-4e6b-a2e1-b4c8396de17f",
"indicator--e2aa21bc-f3f0-49ec-bef7-67815f54c66b",
"indicator--22681913-86f2-4611-a2e2-3357ac4c1dc9",
"indicator--00f937a5-3f82-4360-ad51-aff4ee953957",
"indicator--974eb63a-e1ed-4902-b519-d2034ee4b0ed",
"indicator--4d6802f2-f3d4-45d8-8ab9-78e950771045",
"indicator--dad6e84e-9c01-4cee-93ca-f418a0aa4b4a",
"indicator--68d562bb-6fdb-41dc-8b40-bb1ded847f00",
"indicator--d441567b-2a57-41e6-928a-9e57fbfc2416",
"indicator--dcf2adfd-bc33-4d48-992e-75d848cec0cb",
"indicator--9a36daf0-366c-42e0-9e6b-9429c0d1e585",
"indicator--27ac7de4-071d-45eb-8e86-0ac9667fbb69",
"indicator--5db56912-551b-47da-8599-ac93f26f41f5",
"indicator--2d0b55ce-afb1-47a6-bb50-30e6bce5887a",
"indicator--522b9d14-eb89-48f7-b3ef-3b7b8412853c",
"indicator--dd925ff0-e0df-4406-9af0-abc75fa0028f",
"indicator--ca4defb4-f281-42d0-9bfa-dc1fdfc4127d",
"indicator--99f56aae-a25e-4ee1-b7ea-a6acccf8e740",
"indicator--270251f6-f6ef-42c6-92d7-f250bb703001",
"indicator--785a4e21-9789-4a84-9fa9-22fffbd687bf",
"indicator--1f5a2b89-d108-4901-95f7-3716801cac23",
"indicator--c8543af4-e68d-4634-b1b6-3a1fd2a0034e",
"indicator--e22ad461-4f65-4554-b708-6b13bf464960",
"indicator--120cdaf0-a3a9-4d59-a646-6571165afb8b",
"indicator--79d82f77-dc84-40b6-848e-0d44046486c6",
"indicator--682c0618-2750-48f5-a7f0-8b00fbbbf393",
"indicator--1c29cdab-798b-4a85-a8fb-3f7991c539c7",
"indicator--42bd5662-36bc-4e9d-95e4-3aa520dc22d1",
"indicator--a284d59d-e106-4738-82a7-bf0dcfe19bce",
"indicator--75f0614e-15a0-4a4e-b544-e1c37853ec82",
"indicator--32200d7c-069e-4e0d-828d-e2796f91e8e2",
"indicator--3b5e197b-29b9-4a25-aad2-a4cf6973a4f3",
"indicator--b78c0c8d-efdd-43a9-b93f-ea1184d00674",
"indicator--3758aa50-e970-4dd5-8f7c-a212593b257f",
"indicator--c687c7e2-512a-4604-9d02-21c7ad8dcb4c",
"indicator--925c47cd-0479-4ccf-828a-f14e355231e5",
"indicator--70f1dcd5-c7db-437a-be51-d81580252c7e",
"indicator--ae29d008-0257-4e1b-b94a-42caf9e994c2",
"indicator--bbb292dc-482d-4a2d-858d-987868a97fff",
"indicator--549078eb-5b6a-4543-969e-d377ba146119",
"indicator--d721cf8a-4def-4298-bae5-39c103baf31d",
"indicator--b819837d-2fd5-434c-846c-480bc75fec63",
"indicator--f34c46d9-8001-4721-b627-7d7797cc835d",
"indicator--e82c503d-2404-4e27-a47d-c6d499f66ff8",
"indicator--74f8bc63-4c18-4ceb-9b28-a4a05f3f8616",
"indicator--3dc69c89-808d-471b-adc9-7164c852b4ca",
"indicator--03493a46-610e-4fcd-98cd-a7d4182138a0",
"indicator--86740af9-0870-4ece-b5a4-740a6caf1bdc",
"indicator--b5dd54f7-7d4e-4343-baa3-4a5ea8859f80",
"indicator--7a487ad7-f652-45b6-b195-26755b5e5ed9",
"indicator--5fafcdc7-6f24-48e5-83b2-83db34f2e209",
"indicator--8f242c1b-8c95-4845-b9be-359e3f73371c",
"indicator--ff7e237a-a102-410b-9a1d-a03de23efa72",
"indicator--f3c439a6-127e-4191-bf8f-c830317ad999",
"indicator--af32e4ff-a9dd-4f83-b2b5-a6a84a737554",
"indicator--379ede23-beb7-4b54-ba92-56ca1f18efaa",
"indicator--d1e2edef-6ee4-4274-8edd-1663c7158d80",
"indicator--c50a7be3-309c-427b-8ab2-528fddbaaebd",
"indicator--859679f7-e4c9-412d-80c6-5a42957cff99",
"indicator--cbe4afdf-4c8d-4a2d-a6d6-26a2a7745301",
"indicator--9f06fe4f-dee3-42b2-bbb6-3aed4ed94d56",
"indicator--c5527a05-5328-4e00-866f-f9c328a0e965",
"indicator--9b297264-524a-4036-a1a0-2861d269de27",
"indicator--599ef08e-f2a6-4ff3-ae67-b8aea6e92725",
"indicator--afa2f219-4a83-474d-b427-3ebec09e5929",
"indicator--66671132-488c-45b1-8657-057362794825",
"indicator--ebc628ef-a55b-4de7-aa83-1caf333a6025",
"indicator--10ffb71b-2b9a-4f43-bbfc-37975ea4f46b",
"indicator--24dc4cbd-3507-4fb7-b5f6-90d44b871703",
"indicator--5af38f41-30f8-47bd-8487-13cbea4c5e3b",
"indicator--9e4f3bd9-4d9e-4815-90fa-cee5e2590988",
"indicator--80a6bbcb-ec6a-4a8a-95bf-5574d0c09e31",
"indicator--301a73c5-c904-42a8-ae12-5ba6b8afb025",
"indicator--ac19a5ff-7b5d-4183-ba44-8b232b4fbc68",
"indicator--50ef1ff9-7c4c-4566-80eb-dcaeea5ceecd",
"indicator--d6600b64-5276-4e7c-af61-72a4ee922287",
"indicator--95c907fc-50c8-41da-80e0-2708a1d4c9e6",
"indicator--708c395b-8baf-4637-9e7d-aaf663843979",
"indicator--4f2ad64f-06a5-4b82-a090-a9991001878c",
"indicator--35bdb674-ee2b-4a94-b8dc-10b779efe3aa",
"indicator--b9647764-75c6-42bd-8d4d-792d609fa89e",
"indicator--de1c5c91-57f3-4cf6-bdd1-d54dcc8f8849",
"indicator--179159d4-186d-42f4-85cc-933612836a0d",
"indicator--e334fca4-3b3b-45b9-a96b-004921cb16ec",
"indicator--554952c6-1023-4494-adee-ed37789f0595",
"indicator--65bc19f4-7da0-4c42-b1f6-bdbd5a4744bd",
"indicator--0cf7cd4d-c6ae-47df-8c4e-00e1f72829d0",
"indicator--45112e4a-d9e0-4298-a95a-0824b756f4ef",
"indicator--a487f565-d6ec-4dff-be5e-724e6e3e461f",
"indicator--ae0337f1-7ea4-464c-97e7-5865bc124b94",
"indicator--65275fc7-9257-4583-9514-5e84c29b4fd5",
"indicator--e16002a5-e1ec-4bd5-a46a-16f5d01f3b5e",
"indicator--7d0b97cc-ff27-4cfe-99d2-22b3bdaaf182",
"indicator--481b08e7-5f59-402a-98cd-507f51e094cc",
"indicator--37c26148-7ede-43f8-9a4d-555543520dd1",
"indicator--42795e11-1f4d-4c35-80e8-c63fb3da3805",
"indicator--623f3a6c-77eb-4999-a411-3283268fa2b0",
"indicator--ba71ffe8-2696-4421-9801-c0c3a10cb5e4",
"indicator--edab5903-ac2f-4f1e-841d-abae714d5677",
"indicator--5fd245dc-0436-4918-96b1-372419fc3655",
"indicator--a3cdbbe0-9c9b-44e0-94c7-9833146d46a5",
"indicator--7f31080b-f6c3-4ed6-9b15-f0a403ceae3d",
"indicator--3da48195-da71-42c6-93ac-0dee2e84dafe",
"indicator--d6d4097c-7404-4604-b57a-c935edf1e790",
"indicator--f1420d06-00df-47e1-b6a5-62fd15899ef8",
"indicator--bcd45cf3-cdd3-42de-a420-e21b52679af0",
"indicator--95cd53f2-8bd5-4ea8-b2d8-b5c4c1a3e096",
"indicator--f4b236cb-587f-41c7-91c1-36755ccbb698",
"indicator--c4337560-fe53-4759-a161-15928d3a0013",
"indicator--d120e759-1758-4a8b-b3e9-882a7d272269",
"indicator--58512388-b70b-4272-9929-3eab76c575db",
"indicator--b5906374-6395-4723-82df-1bb2aa903980",
"indicator--0a0e517d-7e88-4491-94c4-0e41a0715fa6",
"indicator--97bea3c0-22a5-48d0-ba5c-b8f4f562b081",
"indicator--619bc0d9-a089-4db3-b6cd-238fafc62c33",
"indicator--566fa82b-e65e-4095-b54d-05edf52b41f9",
"indicator--bc060fd1-704f-4961-af6a-e3642e6ad4bd",
"indicator--fb319d6d-833b-40e0-99a7-b99a5e71f22f",
"indicator--7fe1eaf7-76f8-48c5-a367-4caaa27aca89",
"indicator--03ee666d-617f-47e6-af6b-bb2a801e164b",
"indicator--be9bb353-dde4-4925-a7a7-9ce7aedc9457",
"indicator--7e1cef6c-20e4-4d89-b631-362f4b4867bd",
"indicator--ab36bf13-8d3b-4866-9780-22bba3b37697",
"indicator--3cb8efbd-6c94-4ede-b145-37f13b9542f9",
"indicator--b8ddf417-afa8-4cfd-a48e-2777773dc8d3",
"indicator--85d81353-0713-4bba-8741-35ed6abb5a4a",
"indicator--b74190ce-48dd-48c9-a8c7-8e07cad33259",
"indicator--4d868f3e-467e-43a8-9117-976dba699af1",
"indicator--6e3f4084-0a16-4c30-928a-aac2ac4137da",
"indicator--1b9ca975-16ca-4bb7-9625-03fa0d35258f",
"indicator--ce0279d2-a3ff-4ac6-908b-3f6c35511310",
"indicator--1ab9d7ac-4ede-4052-8a8b-65d94e5444ca",
"indicator--879973e7-49ab-4912-94fe-0c19b0db9d3d",
"indicator--9f818600-fafe-4472-b427-93598e8e3861",
"indicator--5732f8e4-d1cc-48a2-a02f-70e4cc4bc655",
"indicator--8d4c58fa-7575-44e7-b8a4-2795a5da4a33",
"indicator--d1ade4e6-65e7-4e6e-94b7-f7eaa964f04f",
"indicator--f2a55bbe-9a74-4f2a-a5e3-f5aa9b4af0aa",
"indicator--887e2d31-a92a-4b4f-a4f9-46e0593da1af",
"indicator--f3717a65-7c42-442f-b730-2d50224585e6",
"indicator--a51c0e97-6ac8-4a4d-922b-0250ab9aa540",
"indicator--4dc1723c-2c61-49b4-b77b-b7aed7b52e17",
"indicator--9aee8791-a50f-42da-b134-edd004989f5e",
"indicator--4281e878-9bea-48b0-b82c-35b6d386d360",
"indicator--299cb53e-9c5d-4319-90fa-47a2e30f6f18",
"indicator--6db3db68-758d-4e40-b8e3-84057e26e9a3",
"indicator--cf58196c-8588-437c-b3cb-c655f66e2ba5",
"indicator--f59bbc8e-81f7-4f01-b130-2e3667a09d84",
"indicator--b293608d-55fb-416e-95be-7cfce7b4ebac",
"indicator--acec6af3-7325-4e85-8d81-b48bb3bef64e",
"indicator--b43d6c9f-cf82-4d4e-bb0a-72f24551768f",
"indicator--97518e7f-22ab-4947-b516-55e458c77ba2",
"indicator--5c74f795-e3ff-483c-b277-68fe375b609e",
"indicator--6c032601-0033-489b-b3ce-295c0384bf3e",
"indicator--4735342a-a3bc-4745-a295-b60d6db8ea84",
"indicator--a084af2b-3dab-463f-8c80-76de75504111",
"indicator--ec9d68b0-3388-4712-81d7-92be47d1855f",
"indicator--1b758905-2b7c-4c54-9c2a-7f482084b8d5",
"indicator--d7e1e623-d3ca-4b15-ba4c-a44d23070864",
"indicator--a2ed50af-9155-4979-916d-16de8c47d0c8",
"indicator--ce395a55-0bd6-4f23-a72d-61ebce04b36e",
"indicator--8003efc4-6ebc-42bb-b57f-fc9807c33fff",
"indicator--ee7b8358-06fd-4ef1-87ec-3825471cbce7",
"indicator--6aa4ebd3-d197-42b0-bba3-9cb807c85505",
"indicator--601f0a9a-6f41-4c73-85da-926bfb2044d5",
"indicator--72ed222a-c1a6-4146-b358-0872f7d5cde8",
"indicator--43887458-f7a8-408d-9a99-f6a02cc74bfb",
"indicator--9c7b03fa-1bc8-4e38-bbe8-0099f61ee91a",
"indicator--c086ed69-61a0-4a79-a7ff-1a3b42e4424a",
"indicator--5994e86f-e3c2-42ba-990b-44aa1154e0e4",
"indicator--01798717-5348-4769-9e38-7c4bbefc0646",
"indicator--92c4ec78-204f-497e-96ad-ff4a178dfbcd",
"indicator--d1999c1d-4690-48f9-bb0a-27e6544c4c93",
"indicator--4c2141a1-2b90-47ca-a73c-6d7701ad5d3c",
"indicator--f45f2fa2-4484-454e-bf0a-39c8ea0f1e09",
"indicator--96a71938-98ec-49d7-98ad-2a5140ee048f",
"indicator--91a54106-9dd0-45e7-a5d0-38c230da355c",
"indicator--12b16a85-bdf8-4b26-a2cf-7533f2bdc741",
"indicator--e7b09ead-da92-43b3-96ad-8ffdafc5a57a",
"indicator--2f2f2b44-fe46-48d1-9a98-e57b6d44a66e",
"indicator--097cd8cf-2b6c-42e0-9b55-b65aa0b77dff",
"indicator--a998a301-ff29-4fb2-aaf0-2135ceb3913e",
"indicator--6f901d89-33fa-4369-be58-4ee0bc3f636e",
"indicator--414fb951-0108-4b71-81c0-0508d9739832",
"indicator--f8685c62-345e-42e6-8460-e2e3e8d1b3cc",
"indicator--98b143bb-6791-4ed2-af48-f87ff56b28d1",
"indicator--f0858df9-a248-4d56-8a08-5b1aa8098c29",
"indicator--0f9ed636-c773-4ee5-a756-6fc75a1199e1",
"indicator--75300e87-c7ed-448a-aef3-a442bd2efe95",
"indicator--d148e68f-707f-4b23-a18b-e398902a6a7f",
"indicator--e44de8b7-bb5d-4691-9cb7-193f0b0dbbba",
"indicator--3359cb43-d0d2-42db-9eb4-cd19e3501627",
"indicator--593d2caf-e351-4863-8a30-d729a7fcdcb7",
"indicator--6cb5070f-54c7-4ff2-8a57-4ef48ce023c0",
"indicator--27438073-f190-4c12-a840-ce8af9502339",
"indicator--97615b47-0839-4b91-9fac-ce86af0433d9",
"indicator--8f3b008e-e04f-415c-bd72-fe6005b88b98",
"indicator--5dd57222-51fa-4909-8366-a1366c3143d8",
"indicator--0651d1ae-61a7-4ed0-b2ad-d214e93ca57a",
"indicator--47ca025d-6bc2-4db7-a85d-722ec2c7935b",
"indicator--ede77820-344e-49b5-94a2-0bcad3c86b0e",
"indicator--bcf3a866-8c2b-42b9-b951-b6f00f3f6d5d",
"indicator--8ec1b945-6b6a-48b4-b508-1933b08b4d93",
"indicator--30ca9e2d-5c6d-4115-ba8a-8a9b4cc531d0",
"indicator--0e12fe5a-d447-492e-bb79-a2fbbcf89aeb",
"indicator--2e5db451-9499-4245-8aa7-19885e92796d",
"indicator--efddb832-e679-4fcb-a0e8-6e62f8e88e5c",
"indicator--47926c83-d696-4eca-9633-2dbd4c8f93a9",
"indicator--1446bf65-d459-4621-975d-85b854cd8a43",
"indicator--6fc2aa26-c64f-46c6-9c8c-159c7dec812c",
"indicator--ea5fb9e0-53ca-420b-92b4-c99e28314604",
"indicator--ba5154a0-65f2-4d62-9b05-fead9a98893e",
"indicator--a0ef768d-04fa-4a01-95f3-0a5f2ecd301c",
"indicator--e6fcae66-af81-4f9d-90b8-4d4a515dbaf0",
"indicator--be1ff7a8-0cba-4416-8670-18661154ce43",
"indicator--bd855da7-9782-4ff0-8080-f18111fe0df1",
"indicator--a9d9c4f8-828d-42e3-b78c-46ad32a707f1",
"indicator--f810e8b2-0744-4abe-85a7-f02cd5804386",
"indicator--d646fb99-b554-4a5c-9427-64b3804c3f9c",
"indicator--83dca16c-5819-4071-864e-f6cc805023ef",
"indicator--444a3a95-8304-44b9-973e-0f179fe402ad",
"indicator--b67357e6-65e6-42b9-952c-ea34518fec21",
"indicator--5e5dcf8e-99e2-447c-92ea-5a62a60134cf",
"indicator--78e959dd-4da7-4dce-86f6-877b44d3a66b",
"indicator--0a074e90-239a-4efb-ba2d-153b63396866",
"indicator--6eb2717d-7e96-48b4-936b-b5c81283d043",
"indicator--f4d171d6-6600-4ca4-a674-2a55a7b59c21",
"indicator--198ebb25-43e3-4fda-9473-aa1633726e66",
"indicator--285bed28-0601-43cb-8955-1ad398d8a115",
"indicator--89f09fdb-4395-4ac5-9538-2e68d0ebc5d9",
"indicator--f90e7376-608f-4cc2-a529-f491ce91edd0",
"indicator--91ea60f8-f3fb-4f37-bbf9-7d114976948f",
"indicator--23a0e69c-05cc-4499-8fe1-1e9293afd041",
"indicator--4e424b5c-15c5-4cc3-a69e-2e274450a2b1",
"indicator--5bbe260e-dfab-4149-9325-7d69c94e87da",
"indicator--09ec1dd1-368b-4889-bc71-a95f74bd1907",
"indicator--bccc4661-3efb-4661-bee1-ff24e0aeb09c",
"indicator--e6bb8ea4-143a-4a65-8e71-d2c568e49729",
"indicator--6a13b3c9-4bb4-45d3-aabc-0f258ed42138",
"indicator--b8c74ed4-482e-4d07-9d86-c7134dd36d18",
"indicator--7748653c-96ec-4581-a932-ef8cc2fd5d3c",
"indicator--823c2630-da21-4152-9284-4716683669ba",
"indicator--5aa1a61a-0544-4527-bb8f-7a382e1deb01",
"indicator--bc15816d-e013-4c7e-a659-e3009634bd89",
"indicator--f9e8780f-c96e-45a6-8c7f-248bec54c14b",
"indicator--86395cc9-501e-4cb3-8c0f-922ef15a1765",
"indicator--c1d406e9-5cb1-4572-a08a-92075a180dd1",
"indicator--b501f084-ccf2-4ae8-8042-6d277ec8fb96",
"indicator--5e734c2b-c3b1-44fa-bfda-89b3f6f2419c",
"indicator--cdbd887c-0fc7-4998-9d02-e542acbddc62",
"indicator--23bc47d1-d614-4f33-a0dd-6304e2f3dd56",
"indicator--1179e639-bb86-476f-850d-465228ad27e6",
"indicator--822878d5-7c36-46d4-912b-35574e893970",
"indicator--4213e9cc-a5be-445a-9b85-fcc1c5b97a21",
"indicator--d561158a-0b95-44c8-89d7-383df5bbe116",
"indicator--10bf856a-3bc0-48d1-aeb6-b32612e8da82",
"indicator--d718288b-f74d-497c-94df-8bc4078dd799",
"indicator--d20916da-55f0-4542-9f70-003b64291edf",
"indicator--baedf5a5-1726-4936-a8c1-944c58b3e25c",
"indicator--f96e9878-5250-465a-aa0d-7d57624b8979",
"indicator--fe2489e0-7f1f-4273-bbee-9f235d5d02e7",
"indicator--2268bf8a-e571-4c8b-9ff5-79747520dd68",
"indicator--e5e20afc-89a2-4620-a7ec-05c7a2b41274",
"indicator--d68156f8-3df5-4f9f-88d8-f40d73283888",
"indicator--f4f1c8e4-213e-469b-bd57-ed79525d2227",
"indicator--f0a7df93-707f-44fb-a1b5-594b9e50ce20",
"indicator--c7999cc5-3c19-46d1-80e8-9f040aef8403",
"indicator--ba35b686-bdba-4716-b301-4f20e28c479b",
"indicator--18f6802d-b987-4040-93b0-cc39c88a2341",
"indicator--b25f32d6-cffb-4a48-8ad7-81e26425a46d",
"indicator--13b06bf2-555c-484f-91dc-7d9c3ea98f71",
"indicator--ad5b417d-bd25-4bb6-afd4-4ddd787eb9b2",
"indicator--08b042bd-970d-4faa-a41c-d316709969f6",
"indicator--ed3243b4-d49d-4dfa-bc5a-7bb7c138e6d9",
"indicator--494bbd46-59f1-4d35-af51-6ac4adf17269",
"indicator--78fea2fb-919d-4e6a-a258-2a0b07fc53ec",
"indicator--41771121-80cf-48c1-a9af-51bbe508492f",
"indicator--11e1f2fb-4118-44ac-a668-1e45b7a7e2a0",
"indicator--3f9f8bec-0d60-458d-a278-e33dd353fa94",
"indicator--25a4757c-0c04-4225-8116-d10bc8aa085e",
"indicator--b4316b29-db5c-4fd4-a042-0d7469a54d5c",
"indicator--1059f7da-aaa7-419e-a0b8-328b7c8cfe2e",
"indicator--2664b13c-ffe2-4714-9f7b-fbcae96d6322",
"indicator--f196a8b8-014f-4a97-b88b-675bb2c9880b",
"indicator--575db869-33d7-441d-a426-1849fa4278ab",
"indicator--7766b2f0-d763-4451-a210-095ca44abf0f",
"indicator--d1553b38-408b-4d1f-b131-aa0413aa567a",
"indicator--22fdc9ff-4283-41cc-b225-34e3aa31e050",
"indicator--5f1165dc-3766-41e7-8747-58c662cd3c6b",
"indicator--12a4d880-7558-4a69-a3f2-49ab80e554eb",
"indicator--17b4b677-9e88-492f-9bb3-e7262e088d13",
"indicator--85452c42-f9a6-4fa6-a98f-475f5b2e3732",
"indicator--3b615542-3a46-4b94-b95e-8179ccb2fd11",
"indicator--36cf21b6-8a5f-45b6-86cf-15b977e82a70",
"indicator--d8670537-5ed1-46d6-a2fb-56b2c1140eae",
"indicator--ecc516b4-ba96-452d-aad1-40a49df1fb2f",
"indicator--df1bd0da-8b3b-4e59-b559-2adb5e15c00e",
"indicator--ad2f0c05-6186-487a-a955-f4c4bc04112f",
"indicator--6f3369bb-3e35-43e2-b485-dfaebdaab0ef",
"indicator--a6c20bd0-b386-410d-8c80-3108380c18fb",
"indicator--7b476bb7-7c0c-40fb-80dc-666fa5005c3e",
"indicator--1618f6cc-c4b9-44a8-bec0-e2c178793121",
"indicator--9a5a24e2-d528-4549-b6b6-49be7da398bf",
"indicator--441a440c-7c86-4def-a3a5-60d4962f0b57",
"indicator--e9491369-baf6-4dde-a75a-17edcf03d3be",
"indicator--d64d3eb8-1153-4bdf-a15d-d69cd9dd176e",
"indicator--a9370a47-7948-4399-a499-f0c013ba818a",
"indicator--0c3dd7a5-2724-470e-87e6-ced04df7838e",
"indicator--f41f9ae5-0baf-4f22-b3c1-63c12f01eedf",
"indicator--8ee23f69-0a7d-4759-829b-88dd3bde6088",
"indicator--7ffd38d1-8aea-4361-9c4e-f1cd81e627dc",
"indicator--16503b94-4ed7-4cfa-8e0a-286eeb6584a4",
"indicator--bbe5568f-d459-4ff2-8b28-68306fd4b6e3",
"indicator--4c0f125a-8b77-4438-8e0f-89116afea6e6",
"indicator--3e863ba3-0e74-450a-a4aa-afad7d32b093",
"indicator--e0d17291-eca3-43c9-8d2f-af6ac1f96068",
"indicator--4517939b-5003-4ca4-a51e-47b4314fbc24",
"indicator--c327a60a-b904-4f1e-a43e-4b572a0c5f3e",
"indicator--c853cfd5-2286-4efa-9ea7-2b9bb7353f07",
"indicator--96445998-eaea-4357-b655-b15a275b5f56",
"indicator--16e8f8cb-2d19-4ab2-b776-0566fb944fcb",
"indicator--13202eea-8dcc-4a19-869d-d854d9c605f3",
"indicator--d3bba865-50a3-4c1b-9aea-f3a8cbc7b433",
"indicator--aa6fcf6e-1793-44b6-b958-60fbb854e153",
"indicator--03a49503-567f-4167-9c67-7a27ddb89e0e",
"indicator--e97ce1f4-a226-4bf7-aea8-bf99a70d31eb",
"indicator--e666e66b-a6b6-44bb-9905-0eecb18c4174",
"indicator--85904315-a901-452c-b28e-90f0e13a2fcf",
"indicator--c5fca04e-f99e-498a-811f-2c41bed2e397",
"indicator--41398d01-9971-470c-a492-b16b01f60be8",
"indicator--2b50d782-1787-46c1-9755-50574d12997b",
"indicator--94d8ef4a-becd-46e4-9013-7d822bd155b9",
"indicator--1b52dc34-c363-40c2-a023-ba00419fdbb2",
"indicator--0e5a4ef4-5424-4a8d-b401-6a28a08de689",
"indicator--19b91264-3f74-4f1a-9a5d-63e750a10301",
"indicator--7c4622b0-654c-4f4c-b02f-e42a6047877b",
"indicator--c181464f-62f2-405c-95b9-7cafe86bb68a",
"indicator--ac5e4a8e-4461-44d6-86d6-b34bf3128061",
"indicator--e353c947-f063-4e0b-93e9-03f774f938ed",
"indicator--9d607b8f-b985-4646-9cc6-12bab51a032c",
"indicator--8a5b329e-f49e-4a76-9d18-b122d9c34e28",
"indicator--5ae28f37-e7e8-4c4e-a8eb-988f7fd38faa",
"indicator--0d302d1c-6bd1-4c78-8d47-9f3b9138c23f",
"indicator--412ce275-11f5-4c6b-a307-323d4b92b04c",
"indicator--6112ad9e-8617-495c-b68f-5eaf1ca4e61c",
"indicator--a62bbd21-633e-4702-972b-ed5f60c6ef8b",
"indicator--98ac7487-6df2-4f80-8346-d7a0536fa095",
"indicator--fc40d1aa-a5d2-4b11-8a00-5c19f1fcb074",
"indicator--853c7f53-dd00-40b1-8bdd-87d195d58da1",
"indicator--2b118094-a43d-4e39-bf0a-82d5053934af",
"indicator--4f56a64b-5dff-4ac0-a729-950a5fea491e",
"indicator--cbda3914-2671-48fd-819f-4b68d8ac3766",
"indicator--74135ad5-8868-4181-b03f-d75bd7c9ba8c",
"indicator--3bb79ed3-2747-44f6-8ba4-c89b46833b04",
"indicator--6a02b116-5050-4500-8288-7aac6e8a84d7",
"indicator--f13528ae-a304-456a-9258-7dee638e9d0f",
"indicator--47a7ad32-e34e-49b5-8191-f67ab221e65f",
"indicator--648495a7-8e7c-4c5f-86f6-7bcae580730f",
"indicator--42f168af-ffb1-4583-8868-b58e4bbd5830",
"indicator--bf20e9f7-ce25-4974-a3e9-26668215b5ad",
"indicator--99c179b6-2360-4649-931e-6db77f7c3adc",
"indicator--a6d45692-b579-440c-b4e2-8e3c969e64df",
"indicator--7e0f6c19-5001-46e1-843b-d85457dd18bf",
"indicator--bf7ce923-6027-44b5-aab2-42d8c774d9ae",
"indicator--af938c14-87d4-41f8-9086-c6d92535a3ac",
"indicator--30d0b9fa-19b9-4569-b620-a12986c3f36f",
"indicator--6d176d0e-634a-48c8-bd1e-a69a9eb6e3f7",
"indicator--c98c0a45-73ee-4a13-9e5c-962d0ca037d2",
"indicator--2c78fab5-5356-4a1a-8f35-68dac0f93b43",
"indicator--8223daa6-8539-4aa6-bec1-2afd64a62f28",
"indicator--77ce929c-e9cc-45e6-9612-39acbbf06ea8",
"indicator--1b186fdd-9c91-45f7-a0a4-bcc462807f09",
"indicator--65e7409c-34a2-45f4-8c5b-e721e02353f0",
"indicator--6c78fcb6-cb49-45fb-a98d-e85979f7fb6c",
"indicator--dbabc564-e453-4bf9-bfaa-63ce0470d634",
"indicator--22ee4096-a9ee-4bf1-8847-b68dfedb3a6d",
"indicator--7e3f2c7e-3bdb-4813-a620-e4be7df96823",
"indicator--3ea59ff1-e09e-4a6b-9e33-c9f3ee511fa4",
"indicator--3ff02b1c-efb3-48dc-a961-168f220fe284",
"indicator--cb97efda-9ae0-4d8e-96e6-ab14a4b6a562",
"indicator--0f3d02f5-9ca3-471b-b878-0b7057323e3d",
"indicator--594aee3c-dfe4-48a1-889a-b028a7949bbe",
"indicator--c4d80fe4-0f89-40c8-a1da-5a522a329640",
"indicator--f088142c-2906-452e-9991-9278d86cdf0f",
"indicator--12c1542c-00b0-47fc-a028-d428b1db267d",
"indicator--ddef72d1-dd8b-4a6c-9531-6b990f63c28c",
"indicator--141d4cfa-09c5-49d4-9cec-4b30d0998e55",
"indicator--828e1c75-91f5-49be-a7d7-12cf537accc2",
"indicator--471991fe-6c49-4939-8d75-79a226b6ec3f",
"indicator--00edcfbf-4f55-4336-99b2-422c669d5383",
"indicator--2b6ec346-2e77-49f2-af54-aec193dc33cf",
"indicator--5448d3f2-d99d-4e30-98c2-8712ba62870b",
"indicator--89af884d-568c-4ece-8bc0-90f20ae24874",
"indicator--cb84e03f-d880-45d2-8aa2-96098c2d2bb4",
"indicator--10023e04-990a-4cb9-bd73-55bf364fb34c",
"indicator--24dd2518-b6c5-49bb-8071-22c36aaa3945",
"indicator--6c662994-72fd-4a63-9d4d-1f369733df01",
"indicator--f0ae788a-433f-477f-bee6-c4d3673fdab3",
"indicator--d0771027-22c8-4f2e-8e2c-914b301ef949",
"indicator--96a703b5-72ec-4555-9f1c-330109d7b0f0",
"indicator--3ba2c798-05fe-4782-a87e-d0bccaa8921b",
"indicator--ddfdd444-9951-44f4-a011-76a2db7d631b",
"indicator--04a4548f-fa41-4729-aabf-cd489480c2eb",
"indicator--d97e99d5-b9d5-4684-8832-ecbdaa04c497",
"indicator--fc6adcb6-7efc-4b26-9a29-e0c0f7cd98a5",
"indicator--ce33b6ab-672d-472d-b15e-3668e2e22e95",
"indicator--b547df95-5bd6-4fa4-9ced-05b4fdd225eb",
"indicator--c9caba25-eb53-44e1-a3bb-f52d957ee931",
"indicator--0a10b4b5-b62f-4740-88f0-20ac269213e9",
"indicator--209830a4-216a-4cac-8c07-e188d4325805",
"indicator--e974f627-1c61-436f-9110-3b0af11527de",
"indicator--78ef3f46-7b68-4ac5-8b10-8eda572d18ed",
"indicator--4f17785e-27d9-4c73-9407-3e9437b0b313",
"indicator--c9b94f9f-9612-4741-8b2c-58c357b492b5",
"indicator--1cd1a98a-0a9f-4cb5-bf93-60cac6056a95",
"indicator--aa386cde-b5a7-4a91-acec-56c331eae253",
"indicator--a8f8db03-5f0c-4c60-9e04-e2fbd2eedfa7",
"indicator--114bf58b-7171-434c-83a1-7861e9eaf5b6",
"indicator--436bcb2b-dcc6-452d-bea7-b6d427a279df",
"indicator--ddeb0c73-b837-4100-a1d0-b93c2af8b6e7",
"indicator--a4d62650-d21a-4255-9137-664b086c8531",
"indicator--5d98f9e7-b180-48ae-bcef-11a37753ba12",
"indicator--cd288d20-ac44-450b-8995-eba33c97cc91",
"indicator--966f8239-52ed-449d-8d4a-dd271d72d133",
"indicator--b367047b-08da-48b6-b06c-ef95bfd00b6d",
"indicator--f5ac62bc-9e8d-42c5-a799-fa6e174e079a",
"indicator--5fa20756-cba1-4902-9d47-82f5f23c147d",
"indicator--34349177-07cd-4d6b-b3b3-4b71419c8084",
"indicator--2dbdbf88-2df5-4ee8-b34f-0b5a5725e5a5",
"indicator--99e9b8e8-16e1-4517-9947-a29fc9bbb8b5",
"indicator--7f8c2ae2-8bcd-4ced-a71c-0d6376bd9351",
"indicator--71c4c28d-4c0b-45e0-8061-27ac9d155069",
"indicator--daf921a0-6c45-458a-ad7a-9b865c43e7cf",
"indicator--f0d633ca-8a17-4717-ba01-1dc4d9493712",
"indicator--3976d88d-4fbe-452c-b67f-13e823554250",
"indicator--60d88f2e-cbfe-4186-9aa0-5958498a48ae",
"indicator--5617bcd6-bd18-4e72-9fba-5d98eac9288c",
"indicator--27ddba04-7f0d-425f-a85b-fccdc4f2dbdd",
"indicator--ad9f5da9-7453-4459-8de8-c848dac33808",
"indicator--542f8e15-b9b4-482c-854f-825bec1766e4",
"indicator--76a3c03b-94f4-4352-9e61-d4fba6d7be0c",
"indicator--59da8d39-14e9-4ddb-996f-6a9b37e13c52",
"indicator--1021c4d6-713e-453c-93b9-aa18e5592f4d",
"indicator--85494971-b471-45d6-9cc4-753446000d9b",
"indicator--93cbcda7-1bdb-4732-8ffa-0e3a2d34e4a5",
"indicator--aa594761-0a03-4565-88b8-8fec9eeb79f6",
"indicator--c400e414-222b-4b84-afae-727c287bc26d",
"indicator--095c99d4-0036-4c27-b45c-ddac89650a15",
"indicator--03bbca6f-ecbb-4e3b-adbf-b493b8d4906d",
"indicator--0345afec-0e4d-49d2-81cb-432a73e9dfb6",
"indicator--43ff864a-e87e-4dd4-96cb-824dee8cc068",
"indicator--649f1330-89cc-4d59-869e-22553bd99872",
"indicator--cc09a229-dccb-41b8-bb43-3d3c99d811d2",
"indicator--5d2a235d-f862-448a-8ba7-cd94e820171b",
"indicator--f26ce3d2-3374-47f9-b937-6155ee8d2129",
"indicator--5cbd14a9-dcd2-4b26-8f60-d5133f25053d",
"indicator--b1efcc05-c42d-4196-b869-6cdf5ac73831",
"indicator--0735c21d-6485-447b-a4f1-34e7db1cc582",
"indicator--24ebe4c6-300d-4c60-9e9a-41729a213256",
"indicator--f0bedd90-af3c-4e79-bbc6-aa3602afe251",
"indicator--31d532c7-854e-4c74-a6cf-3c13dbf223d0",
"indicator--d9f9e19d-6abd-4cba-ab2f-bfd80db34151",
"indicator--a306286b-bf93-4d10-9ac8-edb7d8cc64e1",
"indicator--e341363a-318b-4610-9db7-f47b9c7060ca",
"indicator--8a154716-3b87-4b09-9907-f661387aeca6",
"indicator--54d543c6-6ce9-403e-8ca1-86989d432a31",
"indicator--97c797c3-f97b-4779-b65c-b265b4a7c69c",
"indicator--74107ecb-9661-4a25-9b0e-ceefe0b1ede8",
"indicator--451ad9fd-534e-48d1-b931-072f79df2756",
"indicator--64dfd0e0-ac06-4415-a4e0-e2fe51a604ec",
"indicator--050e3ea9-6af8-4984-98b9-a63e568361d0",
"indicator--69d6fc65-2f3b-4e70-99fd-c30734a00f67",
"indicator--0176d136-608d-48e4-9dc0-422a3f760550",
"indicator--f981f887-e437-4e88-98b6-45429559c77c",
"indicator--593e11d2-1d4c-48c7-973f-b2a3344b646d",
"indicator--532172dd-4283-4735-9d79-ba6d81ca2016",
"indicator--323d55e6-a11c-41db-955a-6e54b25769bd",
"indicator--7400283d-e44e-4625-accf-1480afca1d4f",
"indicator--c794b649-ab4a-45af-88b3-c53b279d5d57",
"indicator--79fac352-0397-41f3-9194-d8586a032626",
"indicator--b3dbc333-dea1-4584-82a6-6b2b8859e339",
"indicator--d141107c-b639-4324-89cd-c3f747e92cd8",
"indicator--04c13357-ea04-42a9-bc8f-b80ff7665fec",
"indicator--5eb576e8-95ad-4ed1-aee0-23f80585c4b6",
"indicator--a8bfcf72-14c4-4ef2-8142-6535a26511d0",
"indicator--8d983694-640b-4fcf-b582-725826cfbdca",
"indicator--3852abd1-b427-46b3-a352-d9ac0464e629",
"indicator--b816938a-d0be-47cd-9714-9472234af2a1",
"indicator--1095a341-fa9c-459e-a4ec-c6a24ca6eb89",
"indicator--9c40d34a-c7cb-4c15-8078-c054fac92b3a",
"indicator--7862ab24-31d9-4b65-844f-0deda0845b3b",
"indicator--ba27cbc0-10fe-42dd-9ed2-277edfb39e08",
"indicator--e959da0f-fda0-4973-b773-919dbb690e57",
"indicator--26d3f0a2-9eff-4d41-96f2-81dcfd7ba106",
"indicator--f96307f1-24b4-4bc7-affa-090b4a345309",
"indicator--704b12d6-ff1f-4ec8-bde9-78c52c11d2bd",
"indicator--7d23737b-7130-45dd-9b50-b0142f0118cc",
"indicator--47d3fd8f-5ce9-4a97-8ce9-11a7ad480d94",
"indicator--801635d5-32f7-4ef6-82e8-ae1664cbbe1f",
"indicator--5d354f92-533e-45d7-a57f-a1386b0212c2",
"indicator--38691f00-78bc-41d1-a549-40256915cbcc",
"indicator--be212ddc-5f30-4720-81cb-9a6f17fe8272",
"indicator--cb22d402-8080-474c-9ede-13bd82bf480a",
"indicator--8c2f7295-cef2-45c1-bfe6-5986451ede75",
"indicator--0b15361e-d77c-4d2d-b9c2-bc2e076d7a18",
"indicator--2c7a29da-618b-4240-9bba-bbfe27bc990d",
"indicator--b00241b3-be43-400f-94eb-2cbfc72c3cc5",
"indicator--f98cb115-be36-46fd-9211-b592a8db9a01",
"indicator--23710e68-42a5-49ce-965f-d6e464f4e4ce",
"indicator--5cf5e95e-2c4f-4b5a-b06c-01bffed9a12d",
"indicator--cc9b34d4-f215-4c9f-9d7a-1a3daf810d81",
"indicator--0c0527ff-1b1f-4d77-8162-e7182fe2d823",
"indicator--4a2ba3ab-9ccb-4251-bc5e-2c2b95abc844",
"indicator--86dd5cc5-d590-4394-9ac1-9bb9ece05d69",
"indicator--b58fedc4-334f-4c06-800f-f0d5bd6bb78d",
"indicator--2fc34b15-2f5f-4abb-bd18-484f83090195",
"indicator--5bac66db-c1d0-4928-b5a5-dd3abcec9501",
"indicator--7b7a2e1e-6d28-4fb5-b2e4-6846cca1eba0",
"indicator--274d9e69-85cc-4fe2-b06e-f8c06c3c3b1b",
"indicator--4cb932d0-21ca-49c4-b746-cb4b15bae57a",
"indicator--f0c017c6-9aa2-4d1c-95be-39b4bf66d52f",
"indicator--9e1ce3d4-c430-4d2a-a7bd-e90888ef8647",
"indicator--5193f3cc-05e1-496c-b057-c284b41c2ebc",
"indicator--48183468-9530-4e96-ab8a-59f57bedb12f",
"indicator--515dadcc-dfd4-40da-b690-cf78ce720781",
"indicator--25817fa2-0dec-4108-8261-da10b5465d03",
"indicator--2d52a557-87e4-4c10-9ec6-05f7158f742f",
"indicator--94f425b3-e411-4887-9a52-aba25acad06c",
"indicator--c325ee09-9fdf-4a66-aa34-eee971ce40cf",
"indicator--b970d6d1-3994-47af-9226-1c581e775ebd",
"indicator--f55cac44-cabc-4131-8b2a-b2cbad202ef8",
"indicator--86cb85ae-59c4-4620-b94c-e98313abbcd0",
"indicator--2a031ca5-6866-4aa7-8643-f264c5f6c86b",
"indicator--bdd0d0d7-f981-492e-a8e7-e0944186b18a",
"indicator--e936a786-646c-45e6-8994-b6f65a9d6aa1",
"indicator--b497ea80-a846-4e04-a339-492ca187363d",
"indicator--d1fe8a25-7a12-4f72-90e7-f297f7475a43",
"indicator--cc70fe4c-46c3-47e3-b9e5-7353a667c1bf",
"indicator--e1283bc4-7d87-49d0-b56f-b0340fd0dd23",
"indicator--dd7ba303-7374-421b-a684-1c3e671cce8a",
"indicator--8da5ba2e-524f-4afa-bee9-bc8cc8d9a74e",
"indicator--3e1fe5cb-6b9f-480b-b337-4253e8975bcd",
"indicator--e496fa2e-2144-4574-b1c0-d59c755b8ce1",
"indicator--5cdf49ba-770f-4ffa-98fa-da63aa2f4989",
"indicator--237156d9-5bbc-4937-a4c9-8cd3bf575db1",
"indicator--760fabf1-75aa-4f73-a928-a087b6866b1c",
"indicator--9144a5e6-67e0-4f67-8692-6d3dab2b3790",
"indicator--28d7f243-d4d5-4060-9c07-9cc1faf0e9cd",
"indicator--5800fba0-0820-43af-8f1c-b55baa32312e",
"indicator--85932d38-5623-4186-bad1-ec94d8c32db2",
"indicator--2b33954f-4dde-4325-aa14-4f0a81ddaf56",
"indicator--d2443540-ebed-4ef3-974c-2b678149e99c",
"indicator--5571bf5a-16a5-4337-b831-cb4332159143",
"indicator--9055dec3-bc55-4dbb-b21d-2d4a3517d79e",
"indicator--ebf3a9c3-6c80-43e4-913e-6b6095a53cdb",
"indicator--02924caf-336d-4331-89ad-836909cfc5a0",
"indicator--3b3f3f2e-29e5-4464-8de5-08eb0ea5e935",
"indicator--c990be60-0d81-47fc-ab0c-ca74607dd9de",
"indicator--c3f62e4b-53e2-4e61-a06c-2fb300f5f0c7",
"indicator--382005a3-686d-4959-9ec6-a454b8735680",
"indicator--3e400817-a2c7-4bab-9148-017ce5d8a875",
"indicator--7eae48da-ed35-4eaf-9e2b-8b36d9ad8566",
"indicator--99a00d80-ef48-4b28-9ecf-a4e9c6b3ccf2",
"indicator--5a9c117c-bd61-4acc-b65f-f924273d7ae5",
"indicator--f18b6a04-2c8c-4920-96f5-5acf3985c94c",
"indicator--e1795844-8b81-4b9b-9606-8e3e2dcb81d5",
"indicator--07593c42-927d-4a18-a495-5351f0e56625",
"indicator--7a497f1d-7ef8-4a6e-b161-98595254cbf1",
"indicator--6a438f6c-3c40-4fe8-82e3-39dc8c55b6dc",
"indicator--6a988b6c-5a40-46bc-8c3b-44e31105f114",
"indicator--8a6bb65e-243b-4c46-85bf-fe17488820f8",
"indicator--d336f085-c499-4021-9263-03d8c8bda8aa",
"indicator--3629b608-857c-4bcf-a813-db965b13d8e0",
"indicator--e6e7f346-32a5-40c5-9443-b1fc41670a55",
"indicator--f658bf5a-3e79-4611-9c06-d05a2d41c6a5",
"indicator--b2afbbc7-0fb6-4ff3-9451-1fc3773ed6bf",
"indicator--ce873b52-b747-4fa4-b7b6-aaf9ca3a047c",
"indicator--fdee160a-cfd9-42eb-8386-6c86ca51ad28",
"indicator--e83ce12a-5cd4-42aa-8013-dfd3481f7d39",
"indicator--9292f9c6-56ac-4011-9742-1794301a03db",
"indicator--73fa7876-9ecb-4c14-8360-232cf1535446",
"indicator--8552209c-d6ed-46dc-b17d-2724dde673ce",
"indicator--45968981-ee97-4d89-9efc-332868011968",
"indicator--2bb64583-1c5e-475f-ba12-8a4587ed95c7",
"indicator--e272d40d-af90-4c77-92cc-cc189388ab95",
"indicator--3e278133-250b-42c8-83e0-eb28e126ebb7",
"indicator--a289af4b-a547-4ebb-8f62-fd633d46a4a6",
"indicator--90c1d0b8-40b9-4e06-9a6d-ebc78ff15bc6",
"indicator--91e2aa3d-6482-4292-a51a-9863110f89ee",
"indicator--0e5b9fa3-1228-4d00-bf05-7a110ab2790b",
"indicator--fbf25dd2-c5b6-4bcb-b65c-a2ec62a8dcbf",
"indicator--ab1056d8-64ee-40cd-9c99-4b10d0c5cb85",
"indicator--903750f5-a831-4906-9e0d-c463ee717e25",
"indicator--f83ae931-96ef-4145-8844-6fbc75dd0fa3",
"indicator--668ba1a8-9406-4330-8637-3b59de851fe4",
"indicator--9b353458-ef3c-4a6b-8415-3dc04c8d6658",
"indicator--6655f8e7-b7c1-449c-9f69-94b754743763",
"indicator--7e677e70-e9ac-463e-a532-6e436fa1c423",
"indicator--3d831420-0211-444c-b5ab-508b2cfb312d",
"indicator--8da7e901-5e6e-4ccc-9597-d0932a65f6c7",
"indicator--e2a571d7-b353-4cc7-aa14-f10cee07776c",
"indicator--6a624abc-06c0-4af1-b673-77d98b118a93",
"indicator--56d35989-0e1d-468a-ab3f-55137d131d10",
"indicator--5a48653d-65ab-4dba-b5da-1249cc4e6c5c",
"indicator--93cd3f68-d2be-4db4-a050-faf409425bd4",
"indicator--6c535f32-cf92-4011-ab6c-794dc943ca07",
"indicator--66a7398e-41d0-4314-8569-6b095d2dfc89",
"indicator--bbea6352-516a-41b2-9282-865f0625af3b",
"indicator--b651f8da-e872-4892-ad79-6af4f31f94c1",
"indicator--1fe16827-223d-4ca1-b8e1-1638bd05a513",
"indicator--aaf4f0c6-bcde-4168-80f8-b4ca2e2c6792",
"indicator--02ead1ec-b699-497e-a608-9215f007166d",
"indicator--db611efc-9388-4702-b07f-fdd9be2f0d46",
"indicator--96e5492e-1c8c-4f7e-863a-5a08acedcf55",
"indicator--456ec29e-7346-408f-b5e6-1cfdf30db797",
"indicator--3c33df7e-ab19-4f79-8d54-6449ba48250f",
"indicator--a80a7e0e-e996-4443-bcd1-02dcc9c3016d",
"indicator--15baf385-6d4c-4278-951d-28c13a29ee0b",
"indicator--fd6f2e1b-a0b1-4c6b-b857-dd0ce249a3de",
"indicator--8d2f3c70-ee6a-464c-bdd7-9308088ebb81",
"indicator--5462df54-58f4-4a86-b38a-9cf37b127f63",
"indicator--87f6b4f7-b8da-4392-a90d-b277797366d7",
"indicator--1eaa8bdb-4f8d-4f1c-98a2-821b11861ecc",
"indicator--52a327b0-4c30-4877-824b-f3299ad41507",
"indicator--e2d47fb8-da49-4c0f-9bbd-7a44043ea429",
"indicator--4177f67f-30ce-4e32-bfeb-377450482b80",
"indicator--1625af30-a63e-4cf7-9d1c-7ab818039b44",
"indicator--4eb3cfa2-f489-4133-9a3c-a3ef78e03b16",
"indicator--f55585aa-1077-426b-aa30-8bc3de4b952c",
"indicator--bf334ef2-593f-40bc-aea8-02fb7c8cddef",
"indicator--f7d2ca32-876c-4547-a6b1-ce0e2ff64024",
"indicator--07961acb-c2bf-4291-82a5-4db7d7304b59",
"indicator--fdc44ee3-987d-4796-8d43-0e44b4dc1c87",
"indicator--b2fb4b30-fb66-463c-9f34-4c062498d649",
"indicator--70e298e1-0375-4eba-9aa9-71ef7e047cb1",
"indicator--c259c889-f564-449b-8a3a-4875c1dba7cc",
"indicator--78509fa8-43d7-47e9-9dfb-74417cff39a1",
"indicator--dcd67081-3f39-4d62-9486-f56f89ab6465",
"indicator--c08ecc08-33fd-4417-ab0c-3517094fb99a",
"indicator--9400815a-df3e-430c-bb22-b5872503d6b9",
"indicator--7ca1716e-00d7-4c33-b584-cf15976dfafe",
"indicator--b3d4e5b9-7329-4158-829a-58429232142f",
"indicator--2b7146e7-3dee-40f8-808b-8217e626955e",
"indicator--5c3db6c1-cd19-4086-9ee3-d7588bd315ad",
"indicator--3e4156ce-979d-4ba6-9af7-ae117d1ea60c",
"indicator--e2c39b52-201e-4bb8-b8af-c45b327512e9",
"indicator--c4836304-4502-480b-97d5-5afc4d914f95",
"indicator--430559de-bf82-4a6e-89f7-8670c2bc6942",
"indicator--b83174bc-2ab7-4fe3-97fa-fe09a95673e1",
"indicator--8965a8a8-cf4b-43f3-b319-990603c3e34b",
"indicator--14c5957c-950b-4d3a-bf4f-868ec60d0fd5",
"indicator--22bba8db-19de-48a1-af88-087fd13cb762",
"indicator--0825e3b8-f583-453d-a74f-a72e85f7552a",
"indicator--03519905-c422-4ba3-8b45-dc0970e7d06f",
"indicator--fc7acc4b-3308-414a-89bb-26e50c054b5a",
"indicator--32ac34c6-6818-42f7-a115-0b5fd4caac5c",
"indicator--b1d97b17-e44c-47db-8e9f-d93fba705b8a",
"indicator--2145a967-8447-4f97-b40f-1408d8e9a434",
"indicator--3d89e48a-4767-482c-b30e-46e5df021042",
"indicator--0a1ee421-7888-4374-8d13-d5b9d7d29bb5",
"indicator--c2af13ea-cb83-4a8c-bf03-d524c38fc5a4",
"indicator--afadbb9e-0151-40da-abd2-1b1a1bcfdc70",
"indicator--149a72c0-1711-4719-9b5b-38d3413eb8bf",
"indicator--1fe27be2-cc96-43f6-9ae0-9c92a99bbe4e",
"indicator--2a4facd2-2937-4f92-aca9-abfb3b10aec0",
"indicator--e4a0a998-5254-4836-880a-f5d102ba9251",
"indicator--71187481-cf37-4659-8373-9b9482d4b180",
"indicator--ff43684d-38e0-4eb0-ad25-422ef3336b0e",
"indicator--b0aa9971-67ae-4562-bbd1-c9c89339ca16",
"indicator--fd68b841-e47e-4f67-bb3f-d3665ccbb3ca",
"indicator--a1fa9ad2-f7a3-4180-8248-6dfbd43a9e3d",
"indicator--2a73aedb-2109-4c82-8d38-3954dfc08bc7",
"indicator--041593b0-f979-4424-a0f6-7e9abf2c6ab1",
"indicator--30f3cc8c-5be4-4241-88d3-ecb3e6127b0b",
"indicator--b4d403ec-6622-474a-8d46-43aaae35fa24",
"indicator--79bd0608-ac86-4065-887b-5548c29b7973",
"indicator--13fdbd2b-a5cf-4780-9298-18e52ec03206",
"indicator--1dfb7399-4dca-4cab-b169-7c3223306f28",
"indicator--87143c7e-83e6-4f7d-a004-422d9e2ba958",
"indicator--827a4263-2714-46c5-b130-4dbedc76283d",
"indicator--214f84f8-3250-4745-b848-de3656b1c1eb",
"indicator--37a5a73a-c291-4559-91ff-7ebaa67524c9",
"indicator--8177199d-5ae9-4779-8ef1-01914d439d62",
"indicator--bda29ac7-198d-4f66-b048-21472b69bfb8",
"indicator--ba3d7b11-7eab-4f8a-b967-2bb8e87f7aaf",
"indicator--c031b055-04c2-43d1-bfcb-aa77688bbb6e",
"indicator--31172de1-85a1-41c4-b91f-59bdf8d0423b",
"indicator--0f84b136-cb23-4ce8-bc34-b10702c16bc7",
"indicator--096802c5-6198-41a0-9c7d-20722f1d281a",
"indicator--a959bc69-12b5-4dae-b5bb-0a249851dc44",
"indicator--ee8cb39a-f4b5-451e-b699-59b0924a3494",
"indicator--34c975e2-ee46-4747-8cd3-b9999e22dd83",
"indicator--25973a92-5ff0-4699-ba1b-e8b82cf9c74c",
"indicator--18847d30-797f-482a-aff2-b5e3b0673d2c",
"indicator--67dc68ff-60f3-4611-b4bf-23b656cd43f2",
"indicator--ecc188de-a10d-4923-8060-90ef996cb8d6",
"indicator--0f4637ae-0155-478e-b174-2a07fd9b9f57",
"indicator--de8d89ca-8cef-4e56-8157-c146cec9e09d",
"indicator--09d2a6fb-3218-476e-b2e3-02034bb06a75",
"indicator--4cafc758-643a-4989-bfdd-5100bff0a296",
"indicator--226ab9c0-e0e7-4acb-b772-8040bc8881c8",
"indicator--54f4a82f-42b8-4905-9876-57ec41635887",
"indicator--3b024007-6ed9-4763-9e68-8354aaa31121",
"indicator--6fefdca2-f04d-4733-a69e-4141d5ac2e4b",
"indicator--77cc3abc-684b-4a23-a73c-6ebd016bab95",
"indicator--c055c37a-0d30-4adb-9966-0db3394e861c",
"indicator--1721a3bc-c2a1-43fe-9907-eb8d3ba53a96",
"indicator--2e596920-60b5-4c50-a5d1-708139645604",
"indicator--cdc9ab70-6488-45ec-8ed2-aaf20d51b911",
"indicator--034e2036-617d-45e6-aa92-be31360b751d",
"indicator--f4f1051d-a000-41b3-bbfb-615884f3f52a",
"indicator--06a47149-2140-4c00-bad3-0234fffa9685",
"indicator--71e8b1df-a356-410e-ace1-4789a17b09aa",
"indicator--95b593d0-a556-49ce-81fe-819a07fae156",
"indicator--cd9ecd45-ee0d-4c42-91f5-492a224d84fe",
"indicator--019d6d40-1d30-4aee-b67a-9e17b1b12dc6",
"indicator--c9b37883-99f5-45f7-bbed-d6a1f34577b2",
"indicator--0d3eb062-137f-44dc-baee-c549c4f37ada",
"indicator--48035a8a-7377-467d-8a0a-c936d476dc16",
"indicator--25ed7e0a-b597-48c8-843a-0ce58bd3c59c",
"x-misp-object--89facb9b-dc63-4b87-8bc5-3f5f8770a898",
"x-misp-object--1f77a6c1-99a6-4c10-96c8-11c659ecf670",
"x-misp-object--14dec6e7-2ca5-407c-b095-ca01a30217bf",
"x-misp-object--2da9176e-a657-4e41-bd5b-336493569783",
"x-misp-object--d62c1fd0-b64c-4df6-ba11-92e1ea6cdc63",
"x-misp-object--024151a1-411c-44a5-9dcf-f9341badb3f9",
"x-misp-object--aaeb8f60-0506-4695-8502-24c680a1bf47",
"x-misp-object--7beae0a8-3b22-409b-894f-72d4f5bf513c",
"x-misp-object--fdc3cc6a-dc53-4af1-b9f8-6c1955a951d6",
"x-misp-object--997f1a43-4be2-4163-8bb0-d4d3d9e2cb8e",
"x-misp-object--31dc1d35-da34-4dca-a785-7376eb2e0a18",
"x-misp-object--8579e1a0-4847-46d4-9439-dfddc4e36fb5",
"x-misp-object--5f1179dc-0784-4b50-a1f2-171bdddd8300",
"x-misp-object--6aea95e7-61ff-450b-b96a-68477b2320a9",
"x-misp-object--bf25aed9-3d41-4359-ad42-818493d4996d",
"x-misp-object--c193cc7d-38db-4fc7-b6b0-0955cfc64782",
"x-misp-object--db139fc2-73fd-4322-88f7-e90f2938fa65",
"x-misp-object--9cdd3328-f23d-4d62-923e-425d597e4ee8",
"x-misp-object--d319e7ce-02db-40a7-84cc-a6bc51877cf6",
"x-misp-object--2afc2dc6-21a5-4aef-9413-42fff8f04eb0",
"x-misp-object--b4538565-5fe7-4b0e-b536-fce0e35e116f",
"x-misp-object--1ed3a07b-b377-4053-aebb-3be97d7974af",
"x-misp-object--ac30ff08-467b-4836-884e-883ea1ab5496",
"x-misp-object--785a8901-a25f-40e2-9ff3-3ff887b02d99",
"x-misp-object--8e749a71-b3c7-4c37-99cc-000e132b02d0",
"x-misp-object--ef6d1f90-bba4-4053-86df-e45c35c69101",
"x-misp-object--c0f7608c-75fe-4078-a872-c678b98c3ca9",
"x-misp-object--4a39829a-d91b-4dc5-b8ce-48b1e143a8d1",
"x-misp-object--947beb48-79d4-4828-800b-abdd0a1bee11",
"x-misp-object--358c71de-dae9-471a-96c6-a167e83cc59d",
"x-misp-object--960073fd-4e32-44bb-9262-6f583c9b059a",
"x-misp-object--7f14f058-3695-4323-be01-9c406145e493",
"x-misp-object--2f00c242-648c-4599-8699-aa04e507d117",
"x-misp-object--191fa57c-f7d7-4aba-aac1-4a46822f3767",
"x-misp-object--6a531d18-52fd-457b-9a01-3f40bf9b94f1",
"x-misp-object--c52e8d2a-10d9-428a-9e19-3fe5ac774296",
"x-misp-object--c70a1085-f4c7-4229-8ae8-a859df26d033",
"x-misp-object--8e3a96c4-b0ed-46c5-b745-29e6f8fed1fd",
"x-misp-object--ac8280b4-ca0c-4533-98c7-56a321937716",
"x-misp-object--2b6d40a3-3cc1-423e-895c-5c6eaa9b421d",
"x-misp-object--d6245dcf-3af5-443a-b4ed-d0645e446a83",
"x-misp-object--982f1b29-2d50-421c-8503-9500cdc810db",
"x-misp-object--dbf3dd2c-0a05-48fe-8802-4aa5e634c7dd",
"x-misp-object--483a9b53-99c6-4e8c-abc5-d9c6c2dd0c78",
"x-misp-object--dabeb1e1-e1d1-4ce0-a955-bae1ee14a42c",
"x-misp-object--e79a5e9c-7d07-426b-aa03-400d72ed7dea",
"x-misp-object--ca448f92-bf4c-4289-aa5e-c7b5774fdad0",
"x-misp-object--183cb945-8bfb-4eac-a6ae-40858b53804d",
"x-misp-object--98038661-4697-4ce3-95c0-ee856be9db6b",
"x-misp-object--f8f12e6d-f685-42d0-8601-b1c88ac5acd1",
"x-misp-object--20bc80e6-da2f-4d34-8f8d-3fcbb0810736",
"x-misp-object--65e24ce8-53f7-443d-9c89-c479ea56ec3a",
"x-misp-object--6a5e758f-767f-4a54-8f1c-f4cdc8d7c055",
"x-misp-object--fcac0d19-df04-4d21-b2be-e84a152714d7",
"x-misp-object--78f16204-ba60-4db6-8a19-a07b7f1d213e",
"x-misp-object--97f87e13-f554-4a99-b1df-087cbc9b7477",
"x-misp-object--4ea4fb4f-131c-40eb-9806-4fc0e81441aa",
"x-misp-object--e7fe8194-4417-43e9-8282-a045e3d8a205",
"x-misp-object--d4202a72-6367-47d0-9151-d3d9773c3ad3",
"x-misp-object--76131054-623f-4f66-ac00-d3c85ba678dd",
"x-misp-object--d59a9736-8497-4889-a9d6-2acc4ad20643",
"x-misp-object--585c8c4d-94d4-4693-92ea-71fa34be3878",
"x-misp-object--7913963a-e647-48de-9619-57387e64e5fd",
"x-misp-object--47c3e55d-efb0-48e4-b597-d1fb59e877c8",
"x-misp-object--9f2146c2-614a-4e40-99e2-90b7b14298fa",
"x-misp-object--9036ca8f-946c-4f23-9653-040d7a59a364",
"x-misp-object--baa01d92-2cee-4677-a0af-c2d64c1181d1",
"x-misp-object--52f5a576-7d3d-49fd-8a41-3bf8cdcd8dcb",
"x-misp-object--5301ef1a-bb86-4f77-bbd3-7214a4907262",
"x-misp-object--b0268e9b-16db-45ec-863f-7fd736144e79",
"x-misp-object--271dfc17-0b5d-44cc-9d45-ebb1fe21a14d",
"x-misp-object--fbd54f8e-0348-4c27-9e2d-711c68bcf45b",
"x-misp-object--1eb24dc3-0199-4091-b84d-09b35db7b6c4",
"x-misp-object--fd1827ff-0f4e-491e-9612-91ff2ae19d69",
"x-misp-object--23a58e12-005c-4e0b-a31c-4b54d60bc597",
"x-misp-object--6dd63fed-294b-4074-a9af-1fc0a063e09f"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"type:OSINT",
"osint:lifetime=\"perpetual\"",
"osint:certainty=\"50\"",
"misp-galaxy:mitre-malware=\"Pegasus for iOS - S0289\"",
"misp-galaxy:surveillance-vendor=\"NSO group\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d2876149-02f7-41a1-b755-7ba062b97558",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'social-life.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dd01f0f5-7e0f-4478-8460-ca64ac0d2108",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'yourbestclothes.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2b7c2c5f-a303-4c15-8da3-52575cf261a9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'changesstarted.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--99ee3431-8f4a-468e-8a9d-8fbae1cdf99c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'oldmywater.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--735a0211-376b-45b1-8cf2-a4f3030d87c8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'mgifweb.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b1d1dbb3-3c15-4bb5-9a2a-07440bf0f6fe",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'better-deal.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ff4b243f-2eb9-4185-b2cf-b713c125ddf5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'startupsservices.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9d54eeff-0e39-4ef9-8bc8-a07a78c01389",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'whats-new.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ecdccbc8-9079-4bfe-a3fc-b0c2c3f27e4e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'beststores4u.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fb4eefb3-3fb8-448b-b06b-b886cfb1e873",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'stopmysms.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--548ef0d9-af25-4775-9552-9f86cd054441",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'breaking-extranews.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--24f3a98e-5928-4b9c-be3c-5cc6a332310a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'shoppingdailydeals.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2e5e3692-9e76-443e-af58-ab68eddaf77a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'emonitoring-paczki.pl']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--93bb4900-fea9-4db6-a149-10f5d13afd1a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'webupdater.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--74ce15e2-2abf-4f53-a5c2-fb5a82561089",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'mozsafety.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--90c68ec5-ffa4-4f0e-98d7-2337baa1c736",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'pc-views.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6c1b9b2d-5386-4f97-b922-e2ed68407830",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'domain-redirect.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--faf8be77-9bd9-4122-8ea5-dd7df393e792",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'actu24.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--eb0940a9-e477-4461-a3b9-69f11e5372ce",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'working-online.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--40bede88-509d-465e-a6b5-922c9099c4d0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'gostatspro.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6e0d9740-457f-4331-8cab-e2e014c5879b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'weddingbandsoft.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--aa363ce3-9757-4375-a6cf-07aa697a719e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'boxes-mix.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3c20f5ea-ebef-42fd-bde5-df76eac6cb7a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'webexaminer.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--82e6050a-af21-4fcf-9db2-a971b3abba87",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'insta-foto.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--24909a97-0cde-4304-9c29-ce0ff43d6731",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'dowhatyouneed.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--18342b5b-a59f-4abc-9271-e7f5aed3f54c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'arabworldnews.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--64a1957d-2571-4c1a-a2b8-e8901fcb8798",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'sockstubename.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--486b0cc0-4d41-4b90-8a8b-32cd94890064",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'site-redirecting.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--30ba6376-d65b-4faa-8b52-c99b13958a70",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'holecatorange.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--815b2111-47d7-4e4a-8e16-768c87e606be",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'cellular-updates.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3508ef6e-9d83-4282-98b9-ea899c23677f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'birdbathmorning.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fcf93fd3-dd94-43cc-8f7d-f255b51f9435",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'remove-client.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--355f7549-bc09-4a00-a73f-c77006bc789e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'actorsshop.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8a815d4c-c950-42f9-b9e8-14ca3d75bf1b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'islamic-news-today.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dbad1d75-3b95-4f57-a8f8-f12b06d7720e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'merchant-businesses.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--84a9e8a2-1a16-47b8-8e3b-50b753d28135",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'flashobligation.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7ca5cec8-f166-4654-bff3-5088725d2481",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'urspanishteacher.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e8e39c98-8487-410b-8d1e-0370dc3219b5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'dancersing.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bb1f8c86-0bfe-44b8-abf4-f187c82ddcdb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'hearsmugglergarden.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--916eb13f-5041-40b3-acd9-84db530cb9fc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'newarrivals.club']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--db796c8c-86c6-4814-a8f9-8d55044978fe",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'scriptsinstallers.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fe6675fb-502d-4562-bbf1-6cb074ffc9f1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'sportupdates.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--16f1f707-fa87-4ffb-8301-54eb6fb737c5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'catsndogsproducts.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--781c9f32-bd75-40c7-a05c-4e0d65f9b69b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'oplata-shtraf.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--07670d32-a6d1-4f78-b939-51872c27dec6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'rentalindustries.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--79276458-0822-4e9d-8ba2-fbe4b70a2354",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'wintertimes.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bbaf87d8-2a8d-46a2-b18c-01a40af0f30c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'checkinonlinehere.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dae39265-df86-437b-b509-502bef74dbf3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'cablegirls.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--41436235-32ae-49a1-998b-94f4b4a00f13",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'hairdresseraroundme.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a897fd2f-446a-45e5-90b9-c8ab17661f8f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'maymknch2026.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c51e7f73-bc5a-4bd5-a8a3-b8680de9fbff",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'a-resolver.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c0159b3e-1878-4ac1-9a10-188fecede811",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'nouvelles247.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--249ce7f8-7a70-4289-977e-84d5afd2bcbe",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'takemallelectric.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7af631be-249b-4e58-a9df-0d6310d55fbe",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'phonering4you.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ac6fd758-40a9-4872-beb5-8aa1b5a4a560",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'conference-ballroom.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--193c26a4-1218-4e5b-a25d-6fc04382407d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'golf-news.live']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0d678648-e62d-48a6-94c0-cfd6fbce32a9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'wordstore.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7791eb16-4d07-4501-994b-82fc16d93314",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'betterapplesearch.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e8f9dcff-fc69-4505-bcc4-30a7e728b25f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:42.000Z",
"modified": "2022-01-30T10:18:42.000Z",
"pattern": "[domain-name:value = 'whatcanidowithbirds.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3f64ab44-3b39-449b-9cc4-47eec752a9cd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'whereismybonus.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f6f18373-4297-40f5-a2f4-d91c9dd87fad",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'doitforthefame-now.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--17dd6d24-0a9e-4fdd-b874-c5e97468d6e3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'appsgratis.com.mx']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a5c26e8f-d39d-4f46-b665-87f8d3410909",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'possibilitytotransfer.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1201bb2f-fa30-4849-bc74-928c6f107a18",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'zednewszm.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5bf09052-6593-4f66-928d-bebd591787b5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'staysystem.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--888039db-f2be-4f74-83e9-1b2b20587c77",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'like-the-rest.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d291c0cf-d0d7-4214-a166-e330927cf8c2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'accounts.mx']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8f962d0d-6347-4cab-8f01-251571385736",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'windyone.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--85de3956-cf89-4ffb-8b8e-fd03904c4e7d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'permalinking.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b969e359-f794-4cb7-a1a4-63037d2340ae",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'mymensaje-sms.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--46947dfb-40bb-4051-8fff-bc89270b6ea4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'newandroidapps.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e5054c8a-8d7f-49c8-9f43-817197761561",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'domain-control.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5419907f-03b3-4172-85af-7d58d3f858e2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'greenbusnoise.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--50e069ec-0939-4110-9ad2-484f3ec42ade",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'doorcoffeebrown.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--725fc3ee-bd55-4228-a834-2a0729761e8a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'enoughtoday.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--addbbcf9-cfe2-42d9-87d4-40d9c35442d2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'feature-publish.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--55c2b1ac-ab29-480e-a7ca-a8558af7a319",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'allfadiha.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--26826050-0fdf-4062-b5a0-6a769b6c5fce",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'shia-voice.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--932e131c-569d-4df6-b37a-ec01b1ae8f41",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'music-headphones.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--41f30e89-68cc-4c16-b874-991f893adc3f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'editorscolumn.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ab096dd2-7554-42ff-a150-fd3574210570",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'wallagainsthall.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--41eef12e-a641-406a-bfb3-b036de2f0837",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'autoredirect.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f7e59a18-6da1-4c9d-8b00-e0563f0dae1f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'islam-world.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a99ed9d0-cb93-4b35-870d-36d02b8c3684",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'now-online.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2eefd327-eb24-4375-8a93-793c740b85bc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'fwupdating.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--679669ea-a5c3-47af-95a4-5e720780b2dd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'eardooraround.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c4c4c00c-d561-47e7-8dc0-a12f86517df4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'landflatheart.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7c6bb3d6-6cc0-40da-be71-68575b5df829",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'dnslogs.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0da78c2b-542c-4c04-9e6b-d631957b8cca",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'varietyjobspaid.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b71f6d30-93e3-4099-886b-38f0875a41ab",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'mobilebrowsing.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--61183063-d818-49cf-ad45-79b598e9413a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'eyestoip.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d6708651-569b-4813-922a-f9ecb5d4fbf1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'active-folders.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3ac0829f-0c04-47d2-8165-fa6946925414",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'itsthebrowser.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ff1d08c3-4faf-4a48-a8cd-cd50f9a067c4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'notificationsneeded.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--319aa949-e5eb-40f7-a96b-bc5ce40b7da9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'safe-mondays.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--19c35f18-f63d-4b44-b3c0-e65bffb51e9b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'nightscloudwant.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8c57ae07-801f-4296-a2ea-61aa61f18fcf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'brand-tech.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--047598f4-4419-4fb4-a5a7-f690e360dfa1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'cheapapartmentsaroundme.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--268755e8-0d9c-43b7-a8eb-6fc9462f84c8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'postainf.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0474f73b-80d1-49bc-9b5b-d2497c1e6a25",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'atlaslions.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4fcf4a38-3243-444d-a58e-9c4faaeb6835",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'webprotector.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8a9508dc-53cf-4f4d-989e-81e12108cdb9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'jeeyarworld.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7feecd97-c02e-4e22-b7c3-37e40c7c2d74",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'akhbar-aliqtisad.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c96a0718-b249-40ff-83a4-1b9922c392ce",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'monawa3ate.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2ba6ff51-97c3-4734-96a1-a24e8ad41e07",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'webpageupdate.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--51c13f98-f2d6-4614-9d1d-42fc458145d7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'reklamas.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ef7e11b5-acdb-4b35-85ff-035e29ee31a7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'righttriangle.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--190f61bb-e2a7-4a78-ab62-1ebd35e4446f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'yourbestefforts.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--806fa525-31b3-4048-ac5d-0da48cf5c765",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'bl33pon6373.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--25ff9a34-4ec6-4872-8334-5bf701abfac1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'preventadmission.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--45b0deb7-1d8d-4feb-a40a-39ae5d501d47",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'buymanuel.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2ed67348-30ff-437e-a132-855fdd3550a6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'directurl-loading.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f0b90fd9-5231-4b64-9c7b-4e2cc3407d9a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'bundlestofear.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2e4d6cb1-0597-4e8d-81a3-d050f5db4639",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'done.events']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a32e4748-1927-4d07-93d3-5a81b5442a52",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'online-loading.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0971f174-563d-4396-8df0-d9033577fb26",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'redirect-link.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3b8243e9-432b-4026-8a44-ee1d47e152a7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'openingquestion.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--07d31a7b-aaeb-40b3-9111-ff07058c31b4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'securedlogin.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--54683896-bc66-4d0b-aca5-8acb722a8496",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'todaysdeals4u.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7a4687d3-3042-49dc-867a-0d322ef9166d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'email-plans.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fb9a2f51-d856-4fc3-8769-3ac04a826453",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:43.000Z",
"modified": "2022-01-30T10:18:43.000Z",
"pattern": "[domain-name:value = 'deportesinfo.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4ba47017-5b47-48c1-b4c6-cfa22731a044",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'manoraonline.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f9c12dc0-696e-4738-9b52-b622247e7784",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'fatpop.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f1429c14-1b61-409d-b794-678aa791348f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'mybrightidea.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--07e57b71-9459-4689-a294-f80f64c9c2c0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'url2all.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cb41bd0f-b1fa-495e-bb35-945877a36c6b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'reception-desk.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1d78e18b-2a50-4c93-b60c-6d0e23bfc6e0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'snoweverywhere.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--378ae806-df1b-4bfd-b1fe-f5566a706ae7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'e-loading.biz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8873609a-cb78-4dc6-81d0-d140e67e587a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'takecarhomes.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--280048c9-c9ea-4efa-a07e-ed4f9b9e9710",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'license-updater.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--60944693-2cb7-4cbb-a8a6-2e74d430d6c4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'donefordeal.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--07376039-9c74-4b5e-abd3-9419f7792f1a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'brighttooth.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b820e2ab-a28c-4fd2-8bff-242386f7dae6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'dns-direct.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--49a3cca7-9ec3-4501-bb5b-29d9849d402f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'bullgame.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3e5c29d7-8b3e-4f49-a747-ffd7fa5488a4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'clickrighthere.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2d2eeeb1-5af7-4fa0-b374-5063d3a79e26",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'newenvelope.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c58a7e49-2b17-4de7-81df-dcbe130f249a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'cleanmiddle.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--90d56a09-6c01-4466-b1b0-c3eff1fc7122",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'in-weather.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--00ef3943-19c0-4bf2-bd8b-12d49d8b6655",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'deal4unow.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--99e27eb0-0b3c-495f-97e0-aab498bc2adc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'univision.click']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e5cc54cc-632e-4279-9d46-95d2c27aaa52",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'eltiempo-news.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a9f9af08-2674-460e-bff2-160b63b07ea3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'handcraftedformat.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2b4ebd55-3f6a-43ea-991c-d188891dd158",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'economic-news.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9778ed0c-8614-44e8-aad3-510c5fc607ef",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'savemoretime.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6c490866-6aa6-441c-a75e-1ec0a72304bf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'proudmorale.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--38fb4d60-1cba-4ea6-b9d5-a6704e69b8d6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'saladsaroundme.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--72013dbd-9a3f-4caf-a251-6527bfd8e0d4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'sendingurl.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--90812e4e-e648-48d5-8119-14c1d4c01586",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'pageredirect.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f8fab374-1ac3-4e8a-9625-cd8d1c659077",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'booking-tables.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--af8fa7b6-c2c7-4183-97d6-21e2b54930bf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'asrarrarabiya.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ede5a867-e889-4973-8301-f6db6c979813",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'feeltrail.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--388dc7b8-ea58-4352-b711-6ccd274996ba",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'gulfca.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--12b2fa31-dab8-45e5-bc9a-4d9603e71d76",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'dogopics.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2a2e0054-55b9-42fb-be69-e04e6a4e61ad",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'instangram.com.mx']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--14b68e29-4a16-4db3-a6a0-46d3841e651d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'nbrowser.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--eb2fde6c-b4df-4cab-aaa1-5561be058154",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'gettingurl.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--123eb761-f7d7-4e65-89b1-dcd5dfcc60f9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'netvisualizer.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ace1167c-7cac-416a-8899-df0f64d3ff7f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'yourgreatestsmartphone.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c9f71408-cf6d-4edf-9c0e-6ff80ce926dd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'pourcentfilers.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--46684351-b750-47ba-ac7c-abcc0cb0c2a8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'waffleswithnutella.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1fb70bf7-3319-45d9-8556-1c5ea0b4961b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'laptop-parts.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0289e861-6fb0-4979-9bce-1c2bc71ed809",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'classic-furnitures.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b815f75f-8a4a-4f24-8e10-7208ef6c31d4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'raresound.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--19030775-9129-4026-80eb-702045aa4054",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'secured-url.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2b277b3a-dec4-467b-b319-217c73358bac",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'fallsjuice.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--65c76ff1-f1b8-48c7-916b-f195ca3dfd52",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'timelesscelebrity.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ddf8be2a-9e3a-4d8e-8a29-7d5da7ca1be5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'tibetnews365.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bc2500eb-2885-4f80-86f6-d0d3c1ca7a3b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'cryptocurrecny.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4007b2b0-6ec3-4e65-8623-2ef8b7d4155a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'wewantflowersnow.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bc2ec297-d1a9-4808-a324-4e4fefb9d574",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'bulbazaur.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f6ee06e9-d536-4060-b9b6-ace5d35ae34e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'devicer.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a58c40b5-0afe-4b68-bb52-aa486c9acef2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'authenticated-origin.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7f2a2636-dec3-4668-a83d-99d15ad71d24",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'accountsections.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--468ab5f0-5056-4b97-acc6-acf969c58aa4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'web-page.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5549f5d2-e7e9-49ba-87fb-16e1ce77e890",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'pride-industry.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2f3a90df-dd83-4cc0-a290-30f1f7b95574",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'additional-costs.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3da700e0-08ba-4d7b-aad1-decb41395599",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'beanbounce.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c86e9411-5c0d-4147-85b9-ed373bdaa449",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'clients-access.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1a129cd8-efce-42f2-915f-6cf78f73287c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'turkishairines.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2f0fab10-af3c-4d0e-8fdd-0048acab8529",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'stars4sale.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7c5b8873-e5b6-48f0-a593-adea50c6c415",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'redirectdoor.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--10bee8b0-2b9e-49e8-a3fa-7953b60fcf1e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:44.000Z",
"modified": "2022-01-30T10:18:44.000Z",
"pattern": "[domain-name:value = 'sparepresence.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8add8f82-3331-4d34-a417-90d34c785d87",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'syncingprocess.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f2a0d4e9-cb61-49f5-9b4e-1f5dfce431e4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'loschismescalientes.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--88f49113-4ee6-4bc7-bbd2-64d685229202",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'domain-resolver.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b47ebf40-58ca-45b9-9975-dcffcadd1ef6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'flashtraininggoal.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d01e0849-3015-4081-b54c-0600c9bed4f8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'fantastic-gardens.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fe5c5fad-126a-4729-937e-383ab6ec800a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'leprotestant.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--18c3ef1a-bf2d-4587-9f88-79c11bad81c2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'feelbonesbag.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9ad3fcd5-8c29-4f37-82d5-c97407973c71",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'hothdwallpaperz.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--17de605a-da57-458c-9a5c-439788f755b2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'redirectload.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0c7b5c04-3325-4349-a11d-2483238302d9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'arab-share.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f326eae4-fab2-497d-a1ee-d2ac3436bcef",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'old-glasses.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--46acd3e5-5858-44cf-9e7a-aeb6e42ba01e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'formatpainter.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--92a194da-9c43-4734-b731-f561f7030982",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'ipurlredirect.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6a8edc44-fb6a-4db2-a615-c3d1176fe022",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'the-only-way-out.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8753edb9-37a5-45a4-a3f4-1af1d0459dbb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'fb-accounts.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--64e8c32e-b455-4af4-beb3-130f91db23ed",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'smoothurl.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c323495a-e4be-4a21-ba1a-5f28b76290e2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'gulf-news.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--335d1a73-a867-4b3c-979b-71e77758e0c5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'supportonline4me.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ef613132-bddb-4c08-a7aa-dfb4bedd8c1c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'social-exercise.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--597fc181-0bd1-4abc-b7c6-260bb382dcb0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'urlsync.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cf202f23-b191-4d6c-ac61-94ff026fd4f1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'domainloading.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3a5c27bc-b59c-4b28-8902-82f746b46bfe",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'mydailycooking.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f4a9dc1e-d49c-42a5-928b-323dececf558",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'smarttarfi.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f3e1fd10-d064-409e-ab7b-0bdb113725d8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'youaresostupid.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--aadc7608-58ab-4787-bc0d-4068af03ebce",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'guardnotes.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0016d5c9-f288-45a6-b756-97e60985d948",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'websiteconnecting.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--22d655f3-ae1d-485c-9f19-10e3ce82340b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'kaspi-payment.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ab9488b3-bc53-485d-8ee0-62bcda4cae52",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'dancinglife.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2ecdaff5-6ddf-4ddd-a23e-aaed5e237cb5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'redirecteur.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--23c4ee97-21e7-4e4c-9029-9b422124368c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'coffee2go.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--257f6fd1-6cb8-428c-a6e2-b5e1670382a7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'aircraftsxhibition.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8407c8a0-f99e-4826-b856-cf086ccc2189",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'web-domain.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--62e74224-53ee-46e7-baa0-f72df8dcf750",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'android-updates.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ab892ee4-5a71-4e82-8c2c-84f9e27c79fb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'betterhandsblack.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5ce88937-cddf-45ef-9c0e-db7ae74a7598",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'contentsbycase.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a55afc7a-3922-4d63-a8a9-4a6394c3e91b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'littlefrogalarm.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0b672b8a-4087-4960-b84c-ce002c3ab769",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'zm-banks.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a7fb43c9-dac4-44dc-aa98-77754178f646",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'dnsroof.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f8fc7052-be7f-4dee-8ea2-ef97ea1c2a35",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'handymanwood.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5633093e-7c4a-46fc-bec6-348e3fa34d16",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'receiptpending.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d1f64913-c97b-4e03-90c3-2d71f7fb8e2d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'deter-individuals.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--be20a109-badb-4136-9a93-daac85bcaebb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'speedservicenow.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8823931e-2209-4ea3-b833-33699c73a9f0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'gate-sync.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bb1c3352-4757-45f6-8cfe-c0d293cee0c6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'redirect-net.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e0cd0c99-081b-4a7b-8458-859df248aadb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'manydnsnow.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5cdf8d70-84d6-4541-b8f9-8b97b94d505c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'modifytimezone.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7bf39c6e-78ae-4352-8010-3b72e7a8fe45",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'orange-updates.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ed9d67df-0431-4315-bae7-2f7a08cdd457",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'sms-center.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4b222e71-106e-4906-b225-e355adcd0ac4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'ooredoodeals.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58a8ac7a-f6fc-4c85-a3a7-4a7a14694055",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'holdstory.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fac4875c-231d-4c32-872f-e5156289664e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'posta.news']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c8c8c2a0-d044-450b-822b-3ef6bbebce2e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'myukadventures.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e8a7c3e2-39e3-4d44-9ced-f5d8c684b441",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'yourhotelreservation.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ecfdc8df-3292-40dd-80a4-0b351d4f8e2f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'redirectchannel.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6c3d8c47-0552-470c-b1a6-f05978f4baca",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'loading-domain.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--27824a56-9ae3-4746-b283-06f3b0d50601",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'starreturned.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5bd673a2-bc99-4814-aae1-eb27acd3b8c7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:45.000Z",
"modified": "2022-01-30T10:18:45.000Z",
"pattern": "[domain-name:value = 'loadingpage4.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--305ab304-dae9-4726-bf74-9c23309cbdc7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'portredirect.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1874e38a-544f-4a20-a595-423767f4acc9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'zsports-info.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b5140846-4594-4b6f-b299-df58ceed764b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'just-one-left.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7cb7092d-b6bc-4410-b5c1-de9e28a89850",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'mygreathat.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dc663697-e83a-44be-b9ca-8f21e58677e0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'parties-fun.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--24a1eac1-315d-4047-9a56-fcde09000803",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'presidentialagent.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0b786c9f-5ae4-4d5d-8c45-f56b3770e3c1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'remove-from-mailing-list.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--77e8a4d1-b5cd-4f43-9f27-4372ce0d3f9f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'maphonortea.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--08e9ef88-ac22-4578-b2f3-83df4b16d65c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'normalseason.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3bffd178-88bb-42ff-8e8a-a668d3ebf69a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'phonemetrics.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4b22ae5b-096f-4d6c-990d-3da65f56e37f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'network-bots.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8f14607f-36dd-41eb-8416-a894d4c0678d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'allthegamesyouneed.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--90dfea4c-f69e-4def-ac40-7bc3e49ab03e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'mixershake.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--043516cb-15bc-4b46-a595-7d35994c081f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'businesssupportme.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e0bbccca-9a6b-4683-af0d-94e7def67129",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'nouveau-president.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--08edb930-f187-4f6f-ac37-383112a62922",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'pastesbin.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1f61912f-3442-4e3e-8484-83fe3705e090",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'severalheroes.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1c0ba0d4-8961-4911-ace8-4df868ad6397",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'forward-page.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a8cb64f4-7de8-4683-8e28-e6b6ff0dac46",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'trade-agreement.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e4288eb9-2408-4666-b2fb-7fa30c0445dc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'urlreload.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ca472a77-da27-4f48-ac55-683537b96949",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'newmodel.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2454f87a-75fe-49a8-8f6d-8eec81881372",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'specialgifts4all.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bfcdde9e-0ef1-4000-816d-f449ce184517",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'playwithusonline.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f7f021fe-42e5-4d75-a21d-aa70f3e5cc87",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'appleleaveit.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f8003e54-e31f-4124-86cc-feecb27d8940",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'fastfixs.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cdda9c19-04a3-418a-ab69-7d6e454ec4a6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'discoveredworld-news.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fd47eb8a-f153-4b29-ad31-bc14110a50ca",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'kingdom-news.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e72dd421-727d-47ca-85d9-dec0975b5231",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'moyfoto.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--de215586-450a-493f-89d2-0d7264a2148f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'toggletools.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d9beee0f-97b6-4f80-afb0-1425a90ce633",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'miralo-rapidamente.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--409b8362-4b0f-4657-a15c-70dce7044023",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'send2url.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--83770760-0a0e-4ea0-8012-d3a650f67e1b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'medical-updates.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e4feb189-e19e-4c31-ad78-e0bfc98f402a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'allergiesandcooking.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--665026c8-91b9-4dff-91fc-10571d81034a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'linksnew.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1a2bb8fd-5072-45a6-9bbd-66c1611f3c8b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'liam-ryan.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6e2b12fa-ccac-42a5-80da-dddc8eecc8e6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'domainport.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4e9cb43b-5551-4ae9-84a5-d155503df575",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'vanillaandcream.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--690d0477-0a29-47cc-84bf-7606bf53964a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'blockedsituation.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0d568713-f9fa-452a-83f7-26dd4c618e17",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'kra.center']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ada4436e-a01d-4696-92cd-c80078b1b955",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'shtraf.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--15137b63-ca15-48d5-b450-849bcb4b6f42",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'companybreakfast.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--959c24f7-f526-422b-ad5e-d5c1fb04d4bd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'nightevents.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--03d8b18a-02e3-44d9-9c2d-2d97d0b8800b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'freshsaladtoday.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a7482146-92b3-4e0c-aaad-f219f5d5fde3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'heavy-flood.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e68383b6-7b0c-4312-92f8-edca72bf7acf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'ideas-telcel.com.mx']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3b087ccc-b887-44e8-b2e8-2c382e42415a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'mainredirecter.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--57346371-5fe6-402c-a456-c294382c2af0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'muslim-world.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ae2f9b47-5f52-453d-93f7-ab76c5600daa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'myfiles.photos']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8a4de7b9-242f-4331-8bd2-c36cf616a3f6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'onthegoodtime.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dca715fe-1c2b-4f47-890d-f1198761fb92",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'travelight.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8f750b75-5ae2-4727-bf04-96738e781ca5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'findmyass.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c87be93a-faff-431d-9355-6c08e8a9c713",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'netstatistics.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b0f35863-e4d0-487b-99a1-3fd7f80f62ff",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'loadthatpage.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--18156355-d323-4d34-8d80-73368e5cba67",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'downgradeproduct.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d7e7e193-58d4-4e1a-a339-376006e03243",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'updating-url.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--235d949f-fc44-465b-aedc-9af8b003ff08",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'wonderfulinsights.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bf35fdb3-21e3-49b6-a941-ac2c0fc72ce3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'externalprivacy.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6cebdb69-a802-457a-9fcc-d052bbb6ea94",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'photo-my.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--940c2cde-b1d2-4d8f-9a82-ca3087d19725",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'domainsearching.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8af0dbca-9926-4f13-a4c7-d142b2c37d2c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'cashtowebmail.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--87ddb57a-5d59-4cc3-a148-ccd53932272c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'getoutofyourmind.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--225bf086-d23c-449b-bdb3-dee048824c8d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'cheapmotelz.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5e766f71-c6c2-4b50-a9b2-f8591a27e9a0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:46.000Z",
"modified": "2022-01-30T10:18:46.000Z",
"pattern": "[domain-name:value = 'umbrellacover.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3c40c3d7-6f26-4f1a-852e-49ad302def1a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'neverwayneck.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dcd79f52-ad8e-4b5a-8acd-137f153903ae",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'optionalshift.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bd9856ac-2a0b-4d02-a20a-fced36742d50",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'surprising-sites.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--da8ba121-83df-43d5-a7e1-9300f483c486",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'web-only.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--378163b1-25e9-48e5-a2f0-ece293ddec78",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'flights-todays.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b35fa440-bf25-476d-8585-0af01bd56c97",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'whereismyhand.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4b092e78-202f-48a3-a47b-4312e3c3980e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'unlockaccount.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--db80c109-e926-465d-9cdc-f6bb9706e3cc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'pathtogo.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bf0b3b5d-be36-428d-902a-15f3973d98a4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'closefly.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fbc0bc14-179d-46a1-b30f-47fe6b4f6310",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'cellphone-inside.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--84c367be-9b09-4233-a180-61b9a9cb35c9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'dearlegendseed.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ec0cd681-a3a0-4943-846a-6512fa179a7c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'updatingpage.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--381d98d3-8b91-492a-a268-20323d2c25c3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'mylovelypet.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e7de8a4c-069d-46df-a766-b3a37f6030d6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'myshop4u.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--711523ce-b9b9-4873-93a4-2e81afc71cb8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'takethat.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f49c080e-637b-40db-a37e-ce3e0aa618b7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = '301-redirecting.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f87153a4-52c1-4dca-979a-7358d10865a0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'news-gazette.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--621e53e4-d847-41fb-a448-2884cb70e423",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'allbeautifularts.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7b49ea1e-c836-4fe7-8b51-8f658860d135",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'eurasianupdate.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b3d58731-b785-4058-9975-76d9f5f89795",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'fashioncontainer.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c09306a5-4669-4e77-bd97-212931458710",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'varietyregistrar.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e57763d1-85c8-4a10-952e-40783c32cb1f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'securisurf.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0f7f5627-11aa-4876-a4e8-50d0426beefb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'pleaseusenew.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d312f025-4958-4a17-aa44-714b3b1722fc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'pprocessor.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2a53bc3a-3392-416a-8e51-a9e2558f4791",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'coolasiankitchen.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--52efe475-7dde-4840-b0df-ca7edcec4d28",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'health-club.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8fb02780-e336-40bf-8d12-3351c01bd6a0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'opposedarrangement.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9179634d-a077-4f7b-9ca3-fc41ff27f192",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'massagetax.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--22003681-7638-48c6-9b68-203c663af3ec",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'select-edition.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b775e00d-2029-4eb3-81f7-0d8e6bd74d26",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'lowervalues.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1ccefe4d-250a-44cc-93b4-4361d13fc395",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'hmizat.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3ddec745-b810-40bc-a1f8-8102f621fbdb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'cloudads.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--91b59803-39a8-434b-a8f1-8f55b743e904",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'earsstrawsfive.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a7cc2bcd-5504-4983-944c-27d0c810f0e9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'confusedmachine.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--85f134e5-ea1e-40f4-94a5-38cbf50cd916",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'advert-track.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b1f9558e-5556-4630-8869-c56e092bfcc4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'noodlegray.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--de4d3a7e-cbb2-459c-87b5-ec21f7ccdc3b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'safecrusade.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dea792a9-1b38-4788-a742-cb8c2c94374b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'theshopclub.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b54a1c20-0b44-42de-9372-94486e829b0f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 't-support.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6ab9fd4c-8f4c-4214-98ec-ae44e6c19b7e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'findmylunch.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--32118bf4-2578-45df-ae7a-fd6281c8aa3f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'mygummyjelly.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--94e1d79e-697c-457f-b78c-6515bd9ca9b2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'pridetomyself.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--395d5a2c-ba22-4d6b-b265-0f2623746644",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'displaytag.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0a494077-ccbf-4fa2-9263-b13240c8bb39",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'weather4free.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--694ef96f-77ef-4ec1-84b2-e848e7723fb1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'moneycoincurrency.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ea7f3599-0c24-4163-a54a-3134e6c8713e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'redirectit.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3f4f05aa-6b3c-4adb-ab82-1222f23fd173",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'redirectingurl.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a29b4ac-29bc-439f-bd6b-baed5c17e928",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'nosemorningnine.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3e6aa629-a979-4ee1-9663-42048fe6a880",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'industry-specialist.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--76047ce1-20a5-42f4-89d1-2ad7f24069e5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'clicktrack247.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1efb782c-a89f-4301-be98-13aa52179e6c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'maghrebfoot.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f2ea3c40-508b-4d9c-a5ef-3a7f5802fd10",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'chocollife.me']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fea01380-17af-431b-bbb9-7bd1b0c46b9e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'rewards-club.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--87ee7686-24eb-4b96-9405-739493a687d0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'urlscanner.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0a963e29-7fda-4e94-aadc-f71fe8e67b60",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'bestday-sales.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--65d6d1e0-a348-4dfa-9809-0a2ae66ef5c5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'xchangerates247.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ad351aed-8f9a-4dda-b166-0b9e134849a3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'xn--noki-t5b.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8d40c220-c53c-4073-9abf-c4419b54b4e7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'holdingspider.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b40073c2-1c71-4c85-8056-fb6f7a2df044",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'boysrbabies.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fdb49033-e4e6-4223-b15d-f8f048b7ae40",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'cell-mcel.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--eafb15e8-2abc-43c0-b184-3fc21c7537b5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'm-resume.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a4c83821-97e9-479f-bd9a-b5ef57cb445f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'motordeal.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--33f90c0b-d710-4698-b404-255d0a3ddf18",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:47.000Z",
"modified": "2022-01-30T10:18:47.000Z",
"pattern": "[domain-name:value = 'fadewallwine.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--29c9800c-c709-47da-8c1c-5f8d4eef502e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'holiday4u.work']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c38ae05c-2948-4751-abe0-3beb67f9e9f5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'vastdealsnow.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bba98fa4-1618-46dc-8293-bbf06cf48838",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'sputnik-news.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f9cfd7ac-f7ca-48d2-802b-267dd1a944c2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'mobile-softs.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b95be64d-f4cc-4c3b-9ad5-e69b03bc2af1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'qaoffers.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1ce3590a-0070-47d3-8db5-3e3fa91f5c1c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'whynotyesterday.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bac4750e-0d88-4d15-9229-0eddf8c1fda9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'inbox-messages.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--594a5714-2768-4ec2-a8a4-c8dcf203add0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'dns-upload.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8f424ac4-a83b-460f-8082-29b79eb5e0ce",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'notisms.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3e23a628-5ed8-4585-9edb-f1a254b7b60d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'oneleadingchat.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e695b1ea-011d-440c-97cb-c58d50bf3887",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'cool-smartphone-apps.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--38b2ecd3-1a65-44f8-9e72-4fcdcf20524e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'arrowowner.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--eded81ed-1a2d-40f3-84f7-7670f4276af9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'bulk-theft.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--733442f1-9e24-4dc5-b305-22e758235f7d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'rentmotors.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4894519a-4a99-4290-a03a-693f866b967c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'fishingtrickz.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a53b1321-235d-450f-9394-413552b84ffa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'reload-url.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c0836514-e3db-4a8d-83c0-9c281aab4c72",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'handcreamforyou.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--26f9165a-ef76-40c6-85db-7f9b113ecfde",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'papervoice.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--77efce99-f2da-4dfa-9b5d-15e7b0e29875",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'allthecolorsyoulike.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7f0f3777-907b-4c52-90e2-7b5ec0a5bf91",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'servingshade.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7cb06109-5dd5-41df-8635-b91d9e6a4b5d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'loading-images.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6ac16cbc-ad7e-4b82-9ff8-65503f88621a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'checkboxfee.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f03a13f4-7b9e-418e-bec5-56040160168d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'newscurrent.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--67d445aa-d0a5-4b30-a3a4-afa8c69f0746",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'cssgraphics.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--485d2875-eecb-467a-beb4-33983425fa0d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'bestsushiever.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--32f0d87e-1cf1-4d5f-8118-5476a5b1a0d5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'expiredsession.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fe1af0ee-5e43-4ef9-a258-e1849d9bdd77",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'chatresponses.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a17753c5-329f-45b6-bafd-a4fa78578e75",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'foto-top.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9019c1bd-5fbb-4500-9bbb-d23af718ef82",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'sms-zone.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c39c03f0-14f6-4641-828c-230d5044369e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'url-redirect.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1659e817-e537-4be3-a2a1-73a82094ae99",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'thesimplestairs.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--65fc8c9d-9a04-4224-a90b-73b292bbeec9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'carrefour-des-affaires.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--83087fbc-bd9d-4418-b684-489f085c1594",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'bicyclerentalnow.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c71b1699-a02d-4805-9ca3-1f18f75b01b7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'bussybeesallover.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--62094618-c85d-43d0-9019-85ccac14e30d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'recordinglamping.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a6e1fd2c-a842-4417-bfe9-8d5a148342ed",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'speechenforce.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3e1a7148-681c-4508-a35d-63f753ccd1c5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'muftyat.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ebf3a85f-400b-4b46-8727-a9461301a026",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'promotionlove.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3d767059-b83b-4fa3-a8ce-462192db5ea9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'carpetdignity.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e68e511f-2f80-4432-bbaf-5bccceea9931",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'squaretables.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--471bf556-f9ff-4691-a066-f84f6f249f62",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'networkingloading.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ba8ac602-d544-43a7-9154-7106cbefd793",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'pochta-info.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--11cdb088-d42b-4093-90b7-110dfc0230e2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'one-isnot-enough.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3ac57be9-5226-44ea-87ff-2e1bef559eb5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'touristvaca.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--65ed1e19-2049-484d-8875-74009f0ec65f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'same-old.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3a3cf09d-33c4-46bd-acae-a052170164a1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'topoems.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--46e79574-9f27-4565-988b-1eac8ed8bec1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'papers2go.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--836a44f4-327f-4dcf-8d9c-dabb1e3a5f89",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'face-image.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1a0c39c4-7796-4470-9a96-fcc9de1c25c2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'motiontastebad.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--144ae897-49c3-4bd8-86c1-9473419bebd4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'addresstimeframe.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--db05ade4-8a95-44f6-afd2-8b4c00491297",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'muzicclips.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ef4a348e-8a36-411a-ae5b-9c755d64d0d8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'outletsaroundme.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4fd19542-9b49-40d9-82f0-0b5cf2e34bad",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'exchangenames.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1ee4aedd-7c2d-4987-b510-eb37c31891f3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'noti-global.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a47af64a-58e9-46d3-b688-a9a569279b41",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'reseausocialsolutions.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--eaecfd9e-1980-49a8-a374-9b9b74b7feb1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'nation24.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bf54ea0c-22fc-475a-ada7-fa62dca43a76",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'willpurpleshe.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2312d7ea-d568-40dd-8691-0bc744123a3a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'legyelvodas.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--84dfe692-73ae-4131-a926-13cb5bd374aa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'breakthenews.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9043ab49-654b-43e3-adfa-3492235c242b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'uaenews.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--01269b10-6b17-4f3b-8075-c671c2b824f2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'particularmechanic.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f6241421-a444-4ddc-a74f-28a59d8d6276",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'hitrafficip.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--59f68b0d-f707-49ce-ac71-a3a496d59537",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:48.000Z",
"modified": "2022-01-30T10:18:48.000Z",
"pattern": "[domain-name:value = 'mercedesbenz-vip.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3f0059a7-ec84-487e-bdb7-48c3abf55c1f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'flynewfries.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d39698c1-c988-4bc0-814d-f71737d03a45",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'content-blocking.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--344ed813-bb7c-4802-8054-1220b7915f57",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'photo-afisha.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--50a69920-f106-4950-b170-bbc8282218e1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'techhelping.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--df1abfe2-8060-49d7-adb3-1483532b17ff",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'ilovemybeatifulnails.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dc8218ba-05e8-4e58-9d3e-4cea816ebeee",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'thehoteloffers.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4c649f1d-8f7e-4181-ba79-1e732f934018",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'onlinefreework.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4ea6dfc9-c751-4149-b329-fb66ec9ff1ad",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'tentrosegain.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8a1b6336-a66e-49e0-a588-b50ad5202914",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'xtremelivesupport.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0a98887a-1830-499e-8c76-44fbff8e347a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'welcomehosting.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--67d5f825-3221-46bf-96e9-4f99358084bf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'currentwestpeople.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b728aef0-c4d1-4e16-b00f-8e5c827e9b06",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'leadersnews.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--38ec932d-533b-4dc2-8f67-d5f79b956155",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'unsubscribed.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a3069f0-e55a-45e0-8d12-b151f3432447",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'limitedfeature.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--49f1e9fa-2cfd-4891-bbfe-e721b258146c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'gearstereotype.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0e0bfce3-5363-455e-ad8b-8d44fcaaae01",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'url-hoster.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b3bc009-dcb3-4bfd-b0b5-7b59d7700e9b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'mymanagement-service.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e17b50cc-ccbe-4fc0-b4d6-eebfef9dfd8b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'winfoxflip.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--81f781f0-becb-40bd-a0d7-12123ccb1a0c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'sabafon.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--609b616d-3d54-4932-8fad-f82a4e4ec56d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = '7style.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--aa4dfd12-3148-46c2-b19c-db8f829646ca",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'start2playnow.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3d174a65-85bd-435b-a4d0-b5fa19f2e584",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'findmyplants.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0b366738-7897-431e-851f-18fd9c055d5f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'bustimer.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bea5ad77-383b-4902-84cb-27543e2bd75e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'getpoints.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5543a6e9-777f-4f56-8e1d-2a45aebc9b6c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'productsall.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d549ac87-d373-418c-8cf0-7ab7dbd99c48",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'icloudcacher.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7ea4351b-3194-4d16-a13b-28177849266f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'websitetosubmit.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a86d4f3e-76cd-4e69-915e-d8c23533dc9c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'holdmydoor.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6ab45640-8e92-427e-a827-595c6bb88be8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'tradeexchanging.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c0a68434-d43d-4b06-9b91-745ded4438fb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'popagency.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0daa65d4-4b4e-4650-998c-8d47cab55493",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'topten-news.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f0e249ca-699f-4f7c-aa91-9fd07d7de01e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'bankportal.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f5771552-35d0-4914-8420-585ce6f66e94",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'skillsforest.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e423b908-f134-40ca-b69d-29b83e296335",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'icecreamlovesme.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e3936498-4011-44ad-8be1-30f19e5959e8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'cottondecay.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--495d643c-065e-4f24-ae85-7c28c02030cd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'rainingcats.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5d4d988f-4c5e-4fa0-933e-dd442fd520a0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'directlyforuse.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--aa652146-3742-45c7-b051-588264178ee7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'bigseatsout.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f9307b57-6de5-4159-9d6e-6f0e20975820",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'chickenwaves.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--672acf20-1aab-4bb0-956f-e82bedcc5c77",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'labonneforme.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--eb11fdec-3a30-4dfb-a12e-95d15e18bd83",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'social-rights.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b37c93e9-432b-4c61-9e1c-e4e9756994b1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'systemtrees.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2d6ba30a-6af2-408a-8596-6d971325a53b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'starting-from0.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e1fbd15c-ea60-4194-bc3d-140c553e4863",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'welovemorningcoffees.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3791b2b2-e1d3-44bd-9aa6-565e871a064d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'howtomakeavocadotoastandegg.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0937df4b-c6ad-47c8-9c14-97f7660553f6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'ecommerce-ads.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5295bf55-9021-43d7-a63c-3dde92008795",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'equal-gravity.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--11a95771-0c2c-4462-a02c-d89ce2a26c69",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'ad-generator.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3d6a272e-ad46-4f59-aad5-609e5e54a1c3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'buypresent4me.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fec3c5bb-bcb5-4854-891c-e148b609ca61",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'axis-indication.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9ec55a01-7f90-4022-9212-cb0ea4158d69",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'allafricaninfo.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--245d2c16-ea23-4855-8357-591ecbbcc438",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'alawaeltech.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--acbd4b82-f534-4452-afe7-f3c0bd3241ae",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'newsofthemoment.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--65e40fe8-6705-46e7-a865-a8ceec756d60",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'webview-redirect.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ee7a0164-6dd9-446b-a4c5-25ef20029c7d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'thehighesttemple.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--57217cc3-fcff-4f16-90fe-d998b60300f3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'hracingtips.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--72043de7-f54b-4a62-8063-2ecd5e9c2e5a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'zm-weather.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3329dcbb-e88b-4dcc-b9a8-d7c0d0ecc928",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'asrararablya.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5e190002-3a20-45ef-91c9-88cfca84544c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'domains-resolver.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ea860c3c-ba77-4eb7-a45e-47c569eee521",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'everyuse.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7b26a7e7-5357-4265-822d-0724b3f6c5ae",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'computer-set.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e40956bf-e095-44a1-ab21-56660e0bd306",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:49.000Z",
"modified": "2022-01-30T10:18:49.000Z",
"pattern": "[domain-name:value = 'physicalcheetah.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2f45582a-7a15-4e93-ab3d-c5d1af8721fe",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'urlconfig.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--92d99229-b136-4809-a220-035eb659aff5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'ajelnews.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1f01b0a4-ef6d-45b3-b7be-d3b1a81bd332",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'lookitupnow.website']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5754e0b8-e6aa-4146-b664-9dc4c21daff3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = '456h612i458g.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c46a13db-bc57-482c-9f25-e0151672dcb3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'apiapple.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9ac588b3-7840-4d9a-a8c9-fbf8e679062b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'ok-group.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--48ff6db2-c9ba-4252-85b9-5469e545c4dd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'buildingcarpet.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--64470ebf-88ae-4a87-a241-59648881758b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'navywalls.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7b88c7b6-f813-4b5e-8c63-0630e3874ab4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'databasemeans.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6380f99f-9308-43e7-bc94-1cf77db59539",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'hotels-review.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a97e1749-584f-4ada-9596-b319f403caef",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'humblebenefit.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--33874155-24be-45b0-8ff2-b097a04cf018",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'webtunnels.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4ace1419-4506-491e-a0ef-6478f2b390cc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'lost-n-found.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f79e9f30-8548-47f7-aa61-678622202ee4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'greensmallcanvas.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ab94087b-3613-4fd5-8647-ed52b97fba20",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'domain-security.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c3faffcc-aa80-4493-95e2-b23f74fb3013",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'donateaflower.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c3425e6b-a5ae-48eb-bb88-5ca943a30b46",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'updatingwebpage.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--079c6faf-d1b5-459a-aa27-61bd25cee30c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'cdnwa.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--751e05ff-b71b-4167-bbf1-8da7e1946fbe",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'noveletters.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ba969e52-c78d-4440-bb5b-68f747c3f2eb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'ikomek.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--927fcc46-0897-4fb1-9aff-8fc4b4a14a53",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'leavehomego.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--247ad3f1-5caa-4908-8dd2-32cd2891ea39",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'urlregistrar.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a910bfa0-b5be-4d73-a320-ec6180d9ff15",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'brownandblueeyes.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3f4db324-d12e-4bef-a98e-da14840034c6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'cartsafer.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1040bebc-70d7-455b-80f5-6220c4621e1c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'arabnews365.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--63f448b1-3b64-4ff0-a99d-3f42725428e4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'tommyfame.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1e61d2c4-51bc-444c-87c0-311a2abff8e5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'viva-droid.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ff10598d-334a-442e-9f93-00fc3cde4914",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'vault-encryption.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--abb35c98-33f0-430e-a634-23e9b919490d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'healthykids-food.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--55f4e791-3e7c-49af-927e-6a598d26b914",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'islamiyaat.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5e708106-7594-4471-89b5-4f333dfa1db3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'htmlmetrics.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--188b47ba-1289-4294-9d5f-0de968866324",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'secretgirlfriend.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5e222138-c12a-4d61-af2c-ffbf75baa0fc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'mosque-salah.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--22d90268-3a23-4346-881d-613e65413abb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'uidebol.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--24604261-7f29-4d5b-8868-86a14428d764",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'newredirect.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bb298998-7310-432c-8608-3372bb4ab5da",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'url-direct.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a4eecad1-08f6-4e93-b488-391fb9af49bc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'whereisthehat.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c494f5e7-0665-4f49-8c3e-1be09e7e8a71",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'globalnews247.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d6682592-f0df-4c57-95a2-32cd1f688153",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'welovelollipops.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ef7c2fdf-7dae-4ccd-b89a-26c235f4acd6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'freshandsoftbread.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a1229068-9dad-4580-9268-a5e571d0800a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'mz-vodacom.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ee73ecc7-25f3-4770-97b2-35c1f605199b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'cookiescom.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d17564b7-132d-4998-98b8-ceb5a467e9f5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'funintheuk.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5855c962-46b6-4e53-83f8-d439f609d3a8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'pizzatoyourplace.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2fb64cfa-c6a1-4eab-8608-3af9a0bbb2a2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'vipmasajes.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--099b967d-a634-4718-aac6-a40a65501c19",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'networkingproperty.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--03103b1c-1494-4222-b2fb-ba7a5bb75472",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'mydarkarms.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f61a010c-827e-4987-a3ec-21b6839a5540",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'avocadofight.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7b09bb69-36fe-4944-8931-66cb2aa269ff",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'moneydigitalcurrency.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4ba0cf53-4653-4d10-9f15-33b88e02463b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'redirecting-url.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--51ab49c4-1fa0-4d03-a4a3-5420ecde41d7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'extend-list.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--29dcb1b5-6cd6-430c-9d91-53a4352f5e7f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'politiques-infos.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--59ee084e-bdcf-4883-9434-b937aafd8d0c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'web-hoster.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ffb1db0c-ff20-45b4-8280-dabb69e46361",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'moregatesthere.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--83cda513-b369-4f68-889b-cdf1936f0615",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'humandiven.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--57e041bd-6deb-496b-bec2-3e928a949c77",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'walltome.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d9846f4d-966d-4f8e-8bb4-6111625362d5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'outgoingurl.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f3f33d81-606e-45d0-98e8-7368247339a4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'mobile-update.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2c9ede02-2e02-4c87-b7ed-8a526709992c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'sec-checker.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--92759c72-4f46-40ec-9b4a-ddd16c7670bb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'urlpage-redirect.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1cf7a2a0-a9d6-4182-bc99-6be9ec78ce1b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'classstylemap.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7c23ecd5-9320-4444-b2d8-eb8897e790e9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'awardpractice.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ec782700-4da8-405e-87ee-6e38ebb2fb71",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'pickcard.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0c491e34-14b9-4afb-99bb-c41346c5e5ab",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'network190.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d52d1213-a191-474b-aa75-c8ba95a3ef91",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'albumphotopro.biz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5f5d1eaf-6dd9-493c-99c0-c11b798c15cb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'babies-bottles.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--763d6a66-1579-45a0-b50a-3053eedd5827",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:50.000Z",
"modified": "2022-01-30T10:18:50.000Z",
"pattern": "[domain-name:value = 'webadv.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fa647d63-77a0-4633-b410-1c50c7502b51",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'good-games.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cf007f4c-f812-492a-a90f-38b57b56bbb2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'promosdereve.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0ac95376-dd08-40cf-adc0-650783aa61fb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'securedloading.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dc1d3666-7e9c-401b-aa4e-b0643d5e4553",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'redirect2url.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--84349892-ddbd-4462-8df2-19407e69f6a3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'mondaymornings.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7e37513e-46fc-4a62-968d-a83af00b1b9c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'adscreator.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cadd3a86-4818-4f43-a1cc-71e6edd8a087",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'icrcworld.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--453c2cac-d83d-4146-9ba2-104f9b0fabff",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'buildurlife.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dd386e9c-64c3-4a59-9e24-9bb8c73eaa87",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'redirectool.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9ccdf900-9bf7-40ad-9eb1-18cac76a1b8a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'updatedcharges.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cb899021-d62c-481d-bffd-3e88fcbc3d64",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'housesfurniture.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--df06a20d-b40f-4c1b-940e-9e136efec62a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'discountmarkets.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--05821c60-7bef-4f60-86cc-8f74069b277b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'forgetjustit.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--940f0a6e-89f9-417c-a9a6-8138a51020cb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'winter-balance.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--22721966-693f-412b-b2d2-2b6aa01c99ce",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'cheapsolutions4u.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--823a7e7c-0bc0-4119-9563-8cd191645495",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'painruncart.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9ce00308-85df-47f5-bf57-a97a519d9ea0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'smscentro.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--688530e9-b371-459b-8780-e04b259374d9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'do-itonyour-own.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c65fd5dd-dacf-4248-9faf-b1b3b1ce4db8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'infospotpro.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--69ff046d-54d8-41d6-bc3a-70c335722eee",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'conditionalcell.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cddd9f1e-335a-4560-90f1-dfb63fa14228",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'hot-motors.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--229bf209-7fec-45ad-bb22-8df9c46d93c7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'finditout-now.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3176b86b-c822-4d12-8c1c-5be5cc7e7c2f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'nothernkivu.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--abd67f6b-e1f6-47fa-aa27-a35fa582278f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'bestpresents4all.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--00c7499d-736e-4bc9-bbe6-8e93d2965033",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'kaidee.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--911a0ced-69e9-4161-bc0e-a98cff55dc57",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'globalsupporteam.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--241a430d-1fbb-46ad-b1c5-af6fc0389b11",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'looking-for-two.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--aef9f2f6-2dae-49ba-bcc2-4f41d650d45c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'urlupdates.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1ba053e3-2bc6-4728-82dd-87aa5d1a952f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'urlconnection.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2d1e56e5-0624-4f3d-a877-df4cc5f944df",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'bestcandyever.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--691ae150-df2d-4cfe-b8e4-b66202b2f2ca",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'adjustlocalsettings.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5f54d168-6d4c-4aaf-b7cb-a4736072b948",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'reloading-page1.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9e198545-a03e-438c-8686-00460ae3431a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'check-my-internetspeed.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ce23b5dc-c27f-42ff-a307-90b86524b30b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'clockmarkcoffee.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cb579619-e3c5-41fe-ba5a-658db0a3feae",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'secure-access10.mx']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bd6940dd-716d-4f31-827b-111a4031b488",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'remove-subscription.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--eb165f57-05d6-45b9-8aa1-fbe0b449fae6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'updatedchargers.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--35e1895e-e738-4e6c-b18d-2c81694d026d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'tookcheckout.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--10e7948d-11e9-4122-b1f7-0bb318224061",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'easybett.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b217bf7e-5e11-4f36-85bc-eccb11f9dc95",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'standartsheet.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bf87e0d1-4ddc-4f68-97bc-16a53868ab60",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'theredirect.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--349a9968-d8b8-46ad-8c10-2288df9c393f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'newipconfig.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--036d2a06-dcba-46b9-86ca-ea8cef47836f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'appsjuegos.com.mx']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--35bf5c08-eca1-4234-901e-c5b40c1b7143",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'funinthesun4u.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7051cb44-f5cf-497f-ba77-eee596d8c715",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'myself-dns.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b97f8819-ac4d-44c4-99ed-81ff69849cda",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'playfantasticsplastic.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9028a6f0-d5b2-4411-bac3-843f0cd17155",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'topadblocker.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--782b842f-2660-48b6-9d19-da1cb4667d1e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'getagift.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b0ff83a4-d99c-4d25-b438-77c90452768f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'sync-cdn.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--287847c3-cd21-482a-b4ca-d77348a71831",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'blindlydivision.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bc9d14a6-2afc-492e-abc1-42ffec0f216b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = '800health.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6d574d0e-10f2-4400-be6f-a8525e7f88f6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'urldefender.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--01106bd1-19c9-4c7e-96b5-8493c6bc990e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'e-prokuror.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--30f47b7c-83eb-4f36-b560-ba5493dbe9f6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'hundredsofdesigns.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--94e0cc12-7e4a-4afd-856d-e8e86820b232",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'myheartbuild.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--883eb51e-9175-4be2-9968-51b15238d758",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'performinghost.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5bb2ab59-05a6-4a9a-9488-603e291cdb4b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'ticket-selections.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--79ed537b-4d8a-40ec-9684-0ecae459e148",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'opera-van.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a5bd4af4-a989-4f98-ad96-16e35a7d38d3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'pay-city.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a322d967-04eb-4094-91dd-2259b5524824",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'casia-news.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--74448a45-b26e-499b-8c3b-e6a69225f3e9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'data-formula.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1d42e30f-7208-470f-b532-f194c6b33706",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'purchaseusingcoins.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5edb31e9-5776-42d2-ac61-249be4f8f157",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'link-scan.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e27451bd-3f68-4e54-868c-f1f4d8c42fe7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'poweredbycpanel.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a563140e-c2bc-409f-b616-47563165cb4b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:51.000Z",
"modified": "2022-01-30T10:18:51.000Z",
"pattern": "[domain-name:value = 'existingpass.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b298afd8-0e10-4045-9502-5b56f83aa11f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'sendhtml.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--23234491-c861-468b-b439-6b3b559d07a5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'last-chainleash.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6243d71a-e0c1-41cf-a8ab-6bebe8acc5d7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'energy-dispatch.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4f62a60e-650b-4c0b-b235-4b92af3f86b8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'storageseminar.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5e861c1b-ccbe-4250-9399-234e16e756ba",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'adeal4u.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--947434e9-68b1-4862-8ed0-adbcafefb798",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'mailappzone.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8d697f2e-a34d-4681-b0c1-9bc1f58ed4ea",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'nerdtvfan.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9c20a94b-5745-4e30-976b-0cc9612001f5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'ex-forexlive.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4dcad8f5-e328-4bc8-8586-c121403be15c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'damanhealth.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--36cba722-2368-4a85-ad2a-d10615a176a3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'howtoexplorebirds.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--01bd4cb9-84d6-495f-ad28-4342f9045199",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'wasted-nights.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3f3eb5e0-fa47-4fe0-9260-96ac090fe12d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'towebsite.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--56cad97f-00bb-4d7c-a790-ec6726d48b77",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'becomeiguana.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--783cc1a6-b57a-4aae-ae8e-1f7bdbbfaac2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'blackberry.org.mx']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--53bb80df-1951-4467-a155-5c256cf2913c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'related-ads.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--76cdd245-bf2f-4740-96af-1d1fb0273f54",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'islam-today.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--626cf7a5-c004-44bd-b6b6-111b28e39f37",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'operations-shifts.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e2c5c2b1-131e-41fb-ba74-141a1cb95e94",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'gettingchances.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--daac28cf-5d6b-4fd6-ae86-063710a9adcd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'suitcasesmellnice.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--eccfecc5-7959-45dc-afa6-5b5063a6001f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'vider-image.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a2bfa09f-eee7-4f62-b7ed-ba5f1002c56a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'butterdogchange.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cb5eee7d-8d51-455d-85e0-0c94a5b016f2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'housing-update.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c2792d17-8ca6-4ce3-a0ad-a942c4e3ea50",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'updateapps.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f5dbe0cf-6e21-40cb-8098-31e26028cbe9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'knowseminar.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--698751b6-7ec8-4f36-ba19-1da6ea462eac",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'nicevibezaction.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--00697f97-1fb4-42df-8ab0-499e79662bc4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'maingreatessay.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--de10402f-8583-45dc-9457-a1bf3fbb1501",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'bestfoods.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2bd1c992-aa3b-495e-b6d1-3bc87caf5659",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'thainews.asia']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8c4da263-d85d-4abd-af3d-c02bc7aa3b91",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'legsfriesears.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5c899ffd-604c-4038-9797-25365d470eca",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'freelancers-team.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4342c5ab-2391-496f-9ea1-c57e9227d125",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'homemadecandies.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e773db32-0216-4970-8ec8-9d936a938080",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'authlovebirth.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--488f9c6b-3e21-4aab-8d24-e5f0b67ee0a1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'alive2plunge.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--29f5c526-ce3e-4bd5-a6fb-fec5e42265c2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'jaimelire.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ed0714a7-2f4e-4c18-b3d5-0164a65c4410",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'track-your-fedex-package.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7ee95f0d-d33c-44f4-bbe2-45fc859eab04",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'kingdom-deals.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--434922d3-7966-4e2c-9c0b-383346514e7a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'greatcitymore.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2c81d890-ddc0-4f19-9d05-e6511c99b447",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'picture4us.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0855ff6d-ab50-4f2a-a36f-bf5ee277832a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'remove-from-mailinglist.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--aff75f92-a69c-4c7b-af8e-9436d5c4be35",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'globalcoverage.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d62bf9e7-d8e9-49c4-a85d-52766a294242",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'silverodgone.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7968a758-f2d0-4c94-9d21-595037da9bd4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'hardthinmetal.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1613116b-ec77-43de-a293-04faa6fd555d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'top100vidz.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--643de34d-0b08-4a16-8388-ebd16eb05eb8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'homeishere.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4dd984e1-7b4c-4f1e-a4ca-0aa79d873def",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'managedsnap.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f73509ca-1c62-4ba1-ab07-7719779a6125",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'politica504.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--660ebd0e-3809-462c-a9bb-c14b832403f1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'topcontactco.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--90ed8935-266d-4e3e-b825-f72fed66b859",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'research-archive.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2cacf404-e5b5-45aa-848e-3701df42a06c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'loading-url.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d7fdb92f-e935-4ce0-82f0-12469e4d0942",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'youliehow.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fb8c1ac1-8c49-4f20-95f0-b1642eb00dd4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'pay-penalty.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b7acec3a-1279-4512-822c-b20c3db1f679",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'readingbooksnow.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5bb2f384-2878-4431-8b26-93e35b198d6d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'waterforplants.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--51efcf28-ddf0-4e75-baf5-f948c272e371",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'quitmyjob.xyz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5863d074-b78c-42a7-b978-ee1f68cb7a8c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'rockstarpony.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--56e2f349-f9f8-41b7-9ab4-efbcf8c42256",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'paynfly.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--61f63fec-e987-4f9b-861f-df80272fabfc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'notresante-infos.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1316e708-d7a7-4226-a258-d887e5866f9e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'fadi7apress.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--74b0bf44-b8ee-4771-8f3b-5be4afbbd171",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'stopsms.biz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f1ab4a84-51d6-474d-a04c-321c26c931cb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'free-local-events.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--607a7891-6d25-4a6d-b81d-5a747bc989a6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'myseesea.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1bfeb735-d67f-4673-9268-6e8492e472fb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:52.000Z",
"modified": "2022-01-30T10:18:52.000Z",
"pattern": "[domain-name:value = 'upgrade-sim-card.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--35c9ac93-14f3-470b-9d40-3e24ca4fa3fb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'newsdirect.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--355d8ae8-86f2-46e5-aad2-f4376d64fe94",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'net-protector.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--52868668-9dc6-459e-ac2e-df2837a779a6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'publishbig.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d5414b67-daae-4967-9e15-7ba561d01c7f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'starbuckscoffeeweb.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d2d01908-3c30-4b55-bbd6-81e740bcbc45",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'losnegocios.biz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0cec3f93-c5e8-47b4-ab31-cd53c74ae728",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'yummyfoodallover.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8686ede2-19ba-43e5-978d-fc5f9d5a46e4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'myshoesforever.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--413c99ca-2b32-4591-a251-30f9a234d2a9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'go-trip.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0cec4178-e7d0-49c3-a028-125dfdbf4dcb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'ourorder.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f035d10b-cb5f-49cc-b3ff-0591bb101877",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'mykaspi.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--27ed7ab4-2493-43ac-a1df-dda809b94773",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'dramatic-challenge.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ad07954c-95c0-4f9c-bbcf-1a834f151686",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'redirectconnection.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--49598928-8661-4c3a-b3d1-14a9797e4920",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'loading-ads.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--60039f80-80f4-45af-8dd8-ac3e10dbfb03",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'welovebigcakes.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f852ccfa-91e5-4390-924b-49ea18e6308b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'without-additional.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a252147f-2250-4827-92e3-e5f1b8cb8a82",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'iwantitallnow.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--da74740c-6ad4-40da-b8c5-14e5e7834ead",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'ar-tweets.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cdc4bc44-4d2f-47d1-8652-37cf7224c83f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'tastyteaflavors.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f3d909f5-63f5-4388-b4fb-a42110577f34",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'ilovemymilf.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bbaa006d-b151-4519-8ec4-6b4e40357102",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'quran-quote.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--66f728a3-7de1-4e6b-a2e1-b4c8396de17f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'agilityprocessing.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e2aa21bc-f3f0-49ec-bef7-67815f54c66b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'turkeynewsupdates.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--22681913-86f2-4611-a2e2-3357ac4c1dc9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'dhcpserver.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--00f937a5-3f82-4360-ad51-aff4ee953957",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'operatingnews.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--974eb63a-e1ed-4902-b519-d2034ee4b0ed",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'gulf-financials.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4d6802f2-f3d4-45d8-8ab9-78e950771045",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'igiheonline.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dad6e84e-9c01-4cee-93ca-f418a0aa4b4a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'normal-brain.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--68d562bb-6fdb-41dc-8b40-bb1ded847f00",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'preferring.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d441567b-2a57-41e6-928a-9e57fbfc2416",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'info24.live']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dcf2adfd-bc33-4d48-992e-75d848cec0cb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'horsefingercoffee.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9a36daf0-366c-42e0-9e6b-9429c0d1e585",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'allladiesloveme.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--27ac7de4-071d-45eb-8e86-0ac9667fbb69",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'centersession.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5db56912-551b-47da-8599-ac93f26f41f5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'flying-free.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2d0b55ce-afb1-47a6-bb50-30e6bce5887a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'goroskop.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--522b9d14-eb89-48f7-b3ef-3b7b8412853c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'nsoqa.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dd925ff0-e0df-4406-9af0-abc75fa0028f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'com-reports.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ca4defb4-f281-42d0-9bfa-dc1fdfc4127d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'bestperfumesnow.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--99f56aae-a25e-4ee1-b7ea-a6acccf8e740",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'traffic-updates.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--270251f6-f6ef-42c6-92d7-f250bb703001",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'newcooking.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--785a4e21-9789-4a84-9fa9-22fffbd687bf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'e-sveiciens.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1f5a2b89-d108-4901-95f7-3716801cac23",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'websconnector.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c8543af4-e68d-4634-b1b6-3a1fd2a0034e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'cellular-updates.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e22ad461-4f65-4554-b708-6b13bf464960",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'judgeauthority.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--120cdaf0-a3a9-4d59-a646-6571165afb8b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'coolmath4us.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--79d82f77-dc84-40b6-848e-0d44046486c6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'hillsaround.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--682c0618-2750-48f5-a7f0-8b00fbbbf393",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'user-registration.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1c29cdab-798b-4a85-a8fb-3f7991c539c7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'freeshoemoon.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--42bd5662-36bc-4e9d-95e4-3aa520dc22d1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'outletstore.tech']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a284d59d-e106-4738-82a7-bf0dcfe19bce",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'untoldinfo.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--75f0614e-15a0-4a4e-b544-e1c37853ec82",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'trackyourfedexpackage.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--32200d7c-069e-4e0d-828d-e2796f91e8e2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'transferlights.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3b5e197b-29b9-4a25-aad2-a4cf6973a4f3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'redirectshare.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b78c0c8d-efdd-43a9-b93f-ea1184d00674",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'verify-app.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3758aa50-e970-4dd5-8f7c-a212593b257f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'letyoufall.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c687c7e2-512a-4604-9d02-21c7ad8dcb4c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'afriquenouvelle.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--925c47cd-0479-4ccf-828a-f14e355231e5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'investigationews.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--70f1dcd5-c7db-437a-be51-d81580252c7e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'adsload.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ae29d008-0257-4e1b-b94a-42caf9e994c2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'traveltogether.link']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bbb292dc-482d-4a2d-858d-987868a97fff",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'wraptext.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--549078eb-5b6a-4543-969e-d377ba146119",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'foodiez.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d721cf8a-4def-4298-bae5-39c103baf31d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'freedominfo.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b819837d-2fd5-434c-846c-480bc75fec63",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'investormanage.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f34c46d9-8001-4721-b627-7d7797cc835d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'glittercases.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e82c503d-2404-4e27-a47d-c6d499f66ff8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:53.000Z",
"modified": "2022-01-30T10:18:53.000Z",
"pattern": "[domain-name:value = 'bitforeat.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--74f8bc63-4c18-4ceb-9b28-a4a05f3f8616",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'appointments-online.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3dc69c89-808d-471b-adc9-7164c852b4ca",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'fbsecurity.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--03493a46-610e-4fcd-98cd-a7d4182138a0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'somuchrain.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--86740af9-0870-4ece-b5a4-740a6caf1bdc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'morning-maps.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b5dd54f7-7d4e-4343-baa3-4a5ea8859f80",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'whypillyellow.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7a487ad7-f652-45b6-b195-26755b5e5ed9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'donateyouroldclothes.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5fafcdc7-6f24-48e5-83b2-83db34f2e209",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'news-flash.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8f242c1b-8c95-4845-b9be-359e3f73371c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'fiestamaghreb.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ff7e237a-a102-410b-9a1d-a03de23efa72",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'host-redirect.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f3c439a6-127e-4191-bf8f-c830317ad999",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'twiitter.com.mx']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--af32e4ff-a9dd-4f83-b2b5-a6a84a737554",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'alljazeera.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--379ede23-beb7-4b54-ba92-56ca1f18efaa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'transferbase.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d1e2edef-6ee4-4274-8edd-1663c7158d80",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'url-loading.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c50a7be3-309c-427b-8ab2-528fddbaaebd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'newandfresh.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--859679f7-e4c9-412d-80c6-5a42957cff99",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'web-scanner.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cbe4afdf-4c8d-4a2d-a6d6-26a2a7745301",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'dogfoodstorage.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9f06fe4f-dee3-42b2-bbb6-3aed4ed94d56",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'rockbreakdown.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c5527a05-5328-4e00-866f-f9c328a0e965",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'hotinfosource.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9b297264-524a-4036-a1a0-2861d269de27",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'vie-en-islam.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--599ef08e-f2a6-4ff3-ae67-b8aea6e92725",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'internetmobilespeed.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--afa2f219-4a83-474d-b427-3ebec09e5929",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'so-this-is.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--66671132-488c-45b1-8657-057362794825",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'documentpro.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ebc628ef-a55b-4de7-aa83-1caf333a6025",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'spiritualbrakes.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--10ffb71b-2b9a-4f43-bbfc-37975ea4f46b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'url-redirect.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--24dc4cbd-3507-4fb7-b5f6-90d44b871703",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'onlineshopzm.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5af38f41-30f8-47bd-8487-13cbea4c5e3b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'mosquesfinder.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9e4f3bd9-4d9e-4815-90fa-cee5e2590988",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'top10gifts4men.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--80a6bbcb-ec6a-4a8a-95bf-5574d0c09e31",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'cupscars.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--301a73c5-c904-42a8-ae12-5ba6b8afb025",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'cnn-africa.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ac19a5ff-7b5d-4183-ba44-8b232b4fbc68",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'applicationcreation.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--50ef1ff9-7c4c-4566-80eb-dcaeea5ceecd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'cellphonesprices.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d6600b64-5276-4e7c-af61-72a4ee922287",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'timeofflife.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--95c907fc-50c8-41da-80e0-2708a1d4c9e6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'designednetwork.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--708c395b-8baf-4637-9e7d-aaf663843979",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'secureyouradd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4f2ad64f-06a5-4b82-a090-a9991001878c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'urlpush.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--35bdb674-ee2b-4a94-b8dc-10b779efe3aa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'bubblesweetcake.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b9647764-75c6-42bd-8d4d-792d609fa89e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'delivery-24-7.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--de1c5c91-57f3-4cf6-bdd1-d54dcc8f8849",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'goodcookingonline.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--179159d4-186d-42f4-85cc-933612836a0d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'sportssaint.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e334fca4-3b3b-45b9-a96b-004921cb16ec",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'myfreecharge.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--554952c6-1023-4494-adee-ed37789f0595",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'sergek.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--65bc19f4-7da0-4c42-b1f6-bdbd5a4744bd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'domain-routing.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0cf7cd4d-c6ae-47df-8c4e-00e1f72829d0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'cryptopcoinz.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--45112e4a-d9e0-4298-a95a-0824b756f4ef",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'sslbind.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a487f565-d6ec-4dff-be5e-724e6e3e461f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'telecom-info.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ae0337f1-7ea4-464c-97e7-5865bc124b94",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'methodslocal.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--65275fc7-9257-4583-9514-5e84c29b4fd5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'web-loading.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e16002a5-e1ec-4bd5-a46a-16f5d01f3b5e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'wishdownget.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7d0b97cc-ff27-4cfe-99d2-22b3bdaaf182",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'superlinks4u.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--481b08e7-5f59-402a-98cd-507f51e094cc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'mapupdatezone.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--37c26148-7ede-43f8-9a4d-555543520dd1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'syncmap.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--42795e11-1f4d-4c35-80e8-c63fb3da3805",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'cellularupdates.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--623f3a6c-77eb-4999-a411-3283268fa2b0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'news-alert.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ba71ffe8-2696-4421-9801-c0c3a10cb5e4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'onlytoday.biz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--edab5903-ac2f-4f1e-841d-abae714d5677",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'theastafrican.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5fd245dc-0436-4918-96b1-372419fc3655",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'pride-industry.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a3cdbbe0-9c9b-44e0-94c7-9833146d46a5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'daily-sport.news']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7f31080b-f6c3-4ed6-9b15-f0a403ceae3d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'mobi-up.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3da48195-da71-42c6-93ac-0dee2e84dafe",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'onlycart.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d6d4097c-7404-4604-b57a-c935edf1e790",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'telephonequality.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f1420d06-00df-47e1-b6a5-62fd15899ef8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'fetchlink.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bcd45cf3-cdd3-42de-a420-e21b52679af0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:54.000Z",
"modified": "2022-01-30T10:18:54.000Z",
"pattern": "[domain-name:value = 'domesticwindow.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--95cd53f2-8bd5-4ea8-b2d8-b5c4c1a3e096",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'whereismytree.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f4b236cb-587f-41c7-91c1-36755ccbb698",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'teachskate.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c4337560-fe53-4759-a161-15928d3a0013",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'walkerpost.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d120e759-1758-4a8b-b3e9-882a7d272269",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'breakfastisgood.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58512388-b70b-4272-9929-3eab76c575db",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'around-theglobe.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b5906374-6395-4723-82df-1bb2aa903980",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'web-check.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0a0e517d-7e88-4491-94c4-0e41a0715fa6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'tvshowcusting.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--97bea3c0-22a5-48d0-ba5c-b8f4f562b081",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'strangegloom.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--619bc0d9-a089-4db3-b6cd-238fafc62c33",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'extrahoney.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--566fa82b-e65e-4095-b54d-05edf52b41f9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'tahmilmilafate.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bc060fd1-704f-4961-af6a-e3642e6ad4bd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'phonestats.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fb319d6d-833b-40e0-99a7-b99a5e71f22f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'beautifulhousesaroundme.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7fe1eaf7-76f8-48c5-a367-4caaa27aca89",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'csomagodjott.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--03ee666d-617f-47e6-af6b-bb2a801e164b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'multiplecurrencies.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--be9bb353-dde4-4925-a7a7-9ce7aedc9457",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'allthemakeupyouneed.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7e1cef6c-20e4-4d89-b631-362f4b4867bd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'tobepure.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ab36bf13-8d3b-4866-9780-22bba3b37697",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'egov-segek.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3cb8efbd-6c94-4ede-b145-37f13b9542f9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'clubloading.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b8ddf417-afa8-4cfd-a48e-2777773dc8d3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'thebestclassicalmusic.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--85d81353-0713-4bba-8741-35ed6abb5a4a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'yourlastchance.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b74190ce-48dd-48c9-a8c7-8e07cad33259",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'event-reg.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4d868f3e-467e-43a8-9117-976dba699af1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'redirect-traffic.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6e3f4084-0a16-4c30-928a-aac2ac4137da",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'cheaphostingtoday.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1b9ca975-16ca-4bb7-9625-03fa0d35258f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'mobilephonesme.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ce0279d2-a3ff-4ac6-908b-3f6c35511310",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'cell-abonnes.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1ab9d7ac-4ede-4052-8a8b-65d94e5444ca",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'newdailycoupons.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--879973e7-49ab-4912-94fe-0c19b0db9d3d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'redirect-service.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9f818600-fafe-4472-b427-93598e8e3861",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'coffecups.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5732f8e4-d1cc-48a2-a02f-70e4cc4bc655",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'scriptincluded.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8d4c58fa-7575-44e7-b8a4-2795a5da4a33",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'link-crawler.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d1ade4e6-65e7-4e6e-94b7-f7eaa964f04f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'linking-page.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f2a55bbe-9a74-4f2a-a5e3-f5aa9b4af0aa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'chormnet3.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--887e2d31-a92a-4b4f-a4f9-46e0593da1af",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'insertfilters.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f3717a65-7c42-442f-b730-2d50224585e6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'dns-analytics.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a51c0e97-6ac8-4a4d-922b-0250ab9aa540",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'colorsoflife.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4dc1723c-2c61-49b4-b77b-b7aed7b52e17",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'my-privacy.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9aee8791-a50f-42da-b134-edd004989f5e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'medicalcircle.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4281e878-9bea-48b0-b82c-35b6d386d360",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'unavailableentry.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--299cb53e-9c5d-4319-90fa-47a2e30f6f18",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'expired-getway.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6db3db68-758d-4e40-b8e3-84057e26e9a3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'megacenter.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cf58196c-8588-437c-b3cb-c655f66e2ba5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'viewhdvideos.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f59bbc8e-81f7-4f01-b130-2e3667a09d84",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = '3driving.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b293608d-55fb-416e-95be-7cfce7b4ebac",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'natural-ice.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--acec6af3-7325-4e85-8d81-b48bb3bef64e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'columbus-parking.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b43d6c9f-cf82-4d4e-bb0a-72f24551768f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'ipjackets.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--97518e7f-22ab-4947-b516-55e458c77ba2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'deadwordsstory.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5c74f795-e3ff-483c-b277-68fe375b609e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'reflectextension.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6c032601-0033-489b-b3ce-295c0384bf3e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'contacting-customer.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4735342a-a3bc-4745-a295-b60d6db8ea84",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'httpaccess.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a084af2b-3dab-463f-8c80-76de75504111",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'pleaseusenew.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ec9d68b0-3388-4712-81d7-92be47d1855f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'mealrentyard.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1b758905-2b7c-4c54-9c2a-7f482084b8d5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'unsubscribeinhere.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d7e1e623-d3ca-4b15-ba4c-a44d23070864",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'catbrushcable.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a2ed50af-9155-4979-916d-16de8c47d0c8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'qualityfeeling.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ce395a55-0bd6-4f23-a72d-61ebce04b36e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'onlygossip.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8003efc4-6ebc-42bb-b57f-fc9807c33fff",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'normal-strength.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ee7b8358-06fd-4ef1-87ec-3825471cbce7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'lifenoonkid.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6aa4ebd3-d197-42b0-bba3-9cb807c85505",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'onlywebsite.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--601f0a9a-6f41-4c73-85da-926bfb2044d5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'redirectprotocol.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--72ed222a-c1a6-4146-b358-0872f7d5cde8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:55.000Z",
"modified": "2022-01-30T10:18:55.000Z",
"pattern": "[domain-name:value = 'offresimmobilier.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--43887458-f7a8-408d-9a99-f6a02cc74bfb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'securesmsing.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9c7b03fa-1bc8-4e38-bbe8-0099f61ee91a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'hellomymommy.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c086ed69-61a0-4a79-a7ff-1a3b42e4424a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'extractsight.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5994e86f-e3c2-42ba-990b-44aa1154e0e4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = '24-7clinic.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--01798717-5348-4769-9e38-7c4bbefc0646",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'websiteeco.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--92c4ec78-204f-497e-96ad-ff4a178dfbcd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'accomodation-tastes.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d1999c1d-4690-48f9-bb0a-27e6544c4c93",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'getphotosinstant.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4c2141a1-2b90-47ca-a73c-6d7701ad5d3c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'apiwacdn.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f45f2fa2-4484-454e-bf0a-39c8ea0f1e09",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'catfoodstorage.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--96a71938-98ec-49d7-98ad-2a5140ee048f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'signpetition.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--91a54106-9dd0-45e7-a5d0-38c230da355c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'landstofree.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--12b16a85-bdf8-4b26-a2cf-7533f2bdc741",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'web-config.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e7b09ead-da92-43b3-96ad-8ffdafc5a57a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'allthesongsyoulike.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2f2f2b44-fe46-48d1-9a98-e57b6d44a66e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'only-news.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--097cd8cf-2b6c-42e0-9b55-b65aa0b77dff",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'highclassdining.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a998a301-ff29-4fb2-aaf0-2135ceb3913e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'roadwide.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6f901d89-33fa-4369-be58-4ee0bc3f636e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'securlaw.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--414fb951-0108-4b71-81c0-0508d9739832",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'traffic-pay.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f8685c62-345e-42e6-8460-e2e3e8d1b3cc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'redirectweburl.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--98b143bb-6791-4ed2-af48-f87ff56b28d1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'trililihihi.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f0858df9-a248-4d56-8a08-5b1aa8098c29",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'saltyapplepie.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0f9ed636-c773-4ee5-a756-6fc75a1199e1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'free247downloads.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--75300e87-c7ed-448a-aef3-a442bd2efe95",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'infospress.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d148e68f-707f-4b23-a18b-e398902a6a7f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'mynewbesttime.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e44de8b7-bb5d-4691-9cb7-193f0b0dbbba",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = '1minto-start.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3359cb43-d0d2-42db-9eb4-cd19e3501627",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'foudefoot.live']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--593d2caf-e351-4863-8a30-d729a7fcdcb7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'newsofgames.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6cb5070f-54c7-4ff2-8a57-4ef48ce023c0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'woodhome4u.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--27438073-f190-4c12-a840-ce8af9502339",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'pine-sales.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--97615b47-0839-4b91-9fac-ce86af0433d9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'maghrebfunny.biz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8f3b008e-e04f-415c-bd72-fe6005b88b98",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'klientuserviss.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5dd57222-51fa-4909-8366-a1366c3143d8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'site-lock.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0651d1ae-61a7-4ed0-b2ad-d214e93ca57a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'myfundsdns.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--47ca025d-6bc2-4db7-a85d-722ec2c7935b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'reachcomputer.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ede77820-344e-49b5-94a2-0bcad3c86b0e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'puffyteddybear.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bcf3a866-8c2b-42b9-b951-b6f00f3f6d5d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'smsmensaje.mx']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8ec1b945-6b6a-48b4-b508-1933b08b4d93",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'ourperfume.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--30ca9e2d-5c6d-4115-ba8a-8a9b4cc531d0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'host-one-more.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0e12fe5a-d447-492e-bb79-a2fbbcf89aeb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'clubmovistar.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2e5db451-9499-4245-8aa7-19885e92796d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'management-help.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--efddb832-e679-4fcb-a0e8-6e62f8e88e5c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'cheaptransporting.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--47926c83-d696-4eca-9633-2dbd4c8f93a9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'khaleejtimes.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1446bf65-d459-4621-975d-85b854cd8a43",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'colorfulnotebooks.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6fc2aa26-c64f-46c6-9c8c-159c7dec812c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'raw-console.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ea5fb9e0-53ca-420b-92b4-c99e28314604",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'glassesofwine.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ba5154a0-65f2-4d62-9b05-fead9a98893e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'projectgoals.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a0ef768d-04fa-4a01-95f3-0a5f2ecd301c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'upkeepno.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e6fcae66-af81-4f9d-90b8-4d4a515dbaf0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'sunday-deals.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--be1ff7a8-0cba-4416-8670-18661154ce43",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'growstart.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bd855da7-9782-4ff0-8080-f18111fe0df1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'kenyasms.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a9d9c4f8-828d-42e3-b78c-46ad32a707f1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'bestheadphones4u.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f810e8b2-0744-4abe-85a7-f02cd5804386",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'facebook-accounts.com.mx']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d646fb99-b554-4a5c-9427-64b3804c3f9c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'witness-delay.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--83dca16c-5819-4071-864e-f6cc805023ef",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'rosesforus.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--444a3a95-8304-44b9-973e-0f179fe402ad",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'karbalaeyat.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b67357e6-65e6-42b9-952c-ea34518fec21",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'av-scanner.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5e5dcf8e-99e2-447c-92ea-5a62a60134cf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'cryptokoinz.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--78e959dd-4da7-4dce-86f6-877b44d3a66b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'bestadventures4u.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0a074e90-239a-4efb-ba2d-153b63396866",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'loisiragogo.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6eb2717d-7e96-48b4-936b-b5c81283d043",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'accountcanceled.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f4d171d6-6600-4ca4-a674-2a55a7b59c21",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:56.000Z",
"modified": "2022-01-30T10:18:56.000Z",
"pattern": "[domain-name:value = 'bestsalesaroundme.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--198ebb25-43e3-4fda-9473-aa1633726e66",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'pageisloading.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--285bed28-0601-43cb-8955-1ad398d8a115",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'webresourcer.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--89f09fdb-4395-4ac5-9538-2e68d0ebc5d9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'motivation-go.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f90e7376-608f-4cc2-a529-f491ce91edd0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'short-address.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--91ea60f8-f3fb-4f37-bbf9-7d114976948f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'foodforyou.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--23a0e69c-05cc-4499-8fe1-1e9293afd041",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'effectivespeech.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4e424b5c-15c5-4cc3-a69e-2e274450a2b1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'easy-pay.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5bbe260e-dfab-4149-9325-7d69c94e87da",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'iusacell-movil.com.mx']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--09ec1dd1-368b-4889-bc71-a95f74bd1907",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'services-sync.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bccc4661-3efb-4661-bee1-ff24e0aeb09c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'redirect-tunnel.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e6bb8ea4-143a-4a65-8e71-d2c568e49729",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'redirectnet.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6a13b3c9-4bb4-45d3-aabc-0f258ed42138",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'tiketon.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b8c74ed4-482e-4d07-9d86-c7134dd36d18",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'balancewreckpoint.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7748653c-96ec-4581-a932-ef8cc2fd5d3c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'everycolor-inside.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--823c2630-da21-4152-9284-4716683669ba",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'redirectgate.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa1a61a-0544-4527-bb8f-7a382e1deb01",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'behindaquarium.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bc15816d-e013-4c7e-a659-e3009634bd89",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'discountads.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f9e8780f-c96e-45a6-8c7f-248bec54c14b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'waitingtoload.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--86395cc9-501e-4cb3-8c0f-922ef15a1765",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'flights-report.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c1d406e9-5cb1-4572-a08a-92075a180dd1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'redirect-systems.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b501f084-ccf2-4ae8-8042-6d277ec8fb96",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'detailrush.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5e734c2b-c3b1-44fa-bfda-89b3f6f2419c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'chocolateicecreamlovers.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cdbd887c-0fc7-4998-9d02-e542acbddc62",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'noor-alhedaya.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--23bc47d1-d614-4f33-a0dd-6304e2f3dd56",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'a-redirect.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1179e639-bb86-476f-850d-465228ad27e6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'auditorcast.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--822878d5-7c36-46d4-912b-35574e893970",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'discountstores.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4213e9cc-a5be-445a-9b85-fcc1c5b97a21",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'goodthoughts4u.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d561158a-0b95-44c8-89d7-383df5bbe116",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'boldconclusion.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--10bf856a-3bc0-48d1-aeb6-b32612e8da82",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'girlimstill.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d718288b-f74d-497c-94df-8bc4078dd799",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'fashionpark.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d20916da-55f0-4542-9f70-003b64291edf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'keynotepalm.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--baedf5a5-1726-4936-a8c1-944c58b3e25c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'eliminateadjust.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f96e9878-5250-465a-aa0d-7d57624b8979",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'arabworld.biz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fe2489e0-7f1f-4273-bbee-9f235d5d02e7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'centrasia-news.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2268bf8a-e571-4c8b-9ff5-79747520dd68",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'exoticsendurance.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e5e20afc-89a2-4620-a7ec-05c7a2b41274",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'smallridebar.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d68156f8-3df5-4f9f-88d8-f40d73283888",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'apigraphs.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f4f1c8e4-213e-469b-bd57-ed79525d2227",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'newip-info.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f0a7df93-707f-44fb-a1b5-594b9e50ce20",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'reload-url.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c7999cc5-3c19-46d1-80e8-9f040aef8403",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'mirrorgossip.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ba35b686-bdba-4716-b301-4f20e28c479b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'hotelstax.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--18f6802d-b987-4040-93b0-cc39c88a2341",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'tinyurler.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b25f32d6-cffb-4a48-8ad7-81e26425a46d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'vamizi.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--13b06bf2-555c-484f-91dc-7d9c3ea98f71",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'urbestfriends.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ad5b417d-bd25-4bb6-afd4-4ddd787eb9b2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'entire-cases.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--08b042bd-970d-4faa-a41c-d316709969f6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'telangana-news24.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ed3243b4-d49d-4dfa-bc5a-7bb7c138e6d9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'cars-to-buy.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--494bbd46-59f1-4d35-af51-6ac4adf17269",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'uptownfun.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--78fea2fb-919d-4e6a-a258-2a0b07fc53ec",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'unionofteenagers.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--41771121-80cf-48c1-a9af-51bbe508492f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'convertedversion.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--11e1f2fb-4118-44ac-a668-1e45b7a7e2a0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'web-developper.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3f9f8bec-0d60-458d-a278-e33dd353fa94",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'loadingurl.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--25a4757c-0c04-4225-8116-d10bc8aa085e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'seriousprotection.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b4316b29-db5c-4fd4-a042-0d7469a54d5c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'findgoodfood.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1059f7da-aaa7-419e-a0b8-328b7c8cfe2e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'reloadinput.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2664b13c-ffe2-4714-9f7b-fbcae96d6322",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'egov-sergek.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f196a8b8-014f-4a97-b88b-675bb2c9880b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'viedechretien.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--575db869-33d7-441d-a426-1849fa4278ab",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'objectreduction.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7766b2f0-d763-4451-a210-095ca44abf0f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'fashion-live.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d1553b38-408b-4d1f-b131-aa0413aa567a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'smallperfumerain.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--22fdc9ff-4283-41cc-b225-34e3aa31e050",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'vkan-profile.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5f1165dc-3766-41e7-8747-58c662cd3c6b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'standstock.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--12a4d880-7558-4a69-a3f2-49ab80e554eb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'indrive.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--17b4b677-9e88-492f-9bb3-e7262e088d13",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'levelsteelwhite.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--85452c42-f9a6-4fa6-a98f-475f5b2e3732",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'gossipsbollywoods.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3b615542-3a46-4b94-b95e-8179ccb2fd11",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:57.000Z",
"modified": "2022-01-30T10:18:57.000Z",
"pattern": "[domain-name:value = 'fastdirect.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--36cf21b6-8a5f-45b6-86cf-15b977e82a70",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'reseufun.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d8670537-5ed1-46d6-a2fb-56b2c1140eae",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'redirectmotion.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ecc516b4-ba96-452d-aad1-40a49df1fb2f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'ticket-aviata.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--df1bd0da-8b3b-4e59-b559-2adb5e15c00e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'breakingnewsasia.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ad2f0c05-6186-487a-a955-f4c4bc04112f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'crosslocated.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6f3369bb-3e35-43e2-b485-dfaebdaab0ef",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'donateabox.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a6c20bd0-b386-410d-8c80-3108380c18fb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'redirection-url.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7b476bb7-7c0c-40fb-80dc-666fa5005c3e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'purple-enveloppe.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1618f6cc-c4b9-44a8-bec0-e2c178793121",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'noti-hot.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9a5a24e2-d528-4549-b6b6-49be7da398bf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'akhbar-arabia.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--441a440c-7c86-4def-a3a5-60d4962f0b57",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'live-once.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e9491369-baf6-4dde-a75a-17edcf03d3be",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'redirectingpage.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d64d3eb8-1153-4bdf-a15d-d69cd9dd176e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'loading-page.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a9370a47-7948-4399-a499-f0c013ba818a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'checkboxcart.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0c3dd7a5-2724-470e-87e6-ced04df7838e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'bahrainsms.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f41f9ae5-0baf-4f22-b3c1-63c12f01eedf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'neutralpages.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8ee23f69-0a7d-4759-829b-88dd3bde6088",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'uniquesite.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7ffd38d1-8aea-4361-9c4e-f1cd81e627dc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'randomlane.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--16503b94-4ed7-4cfa-8e0a-286eeb6584a4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'pub-dns.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bbe5568f-d459-4ff2-8b28-68306fd4b6e3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'noonstore.sale']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4c0f125a-8b77-4438-8e0f-89116afea6e6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'viewstracker.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3e863ba3-0e74-450a-a4aa-afad7d32b093",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'politicalpress.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e0d17291-eca3-43c9-8d2f-af6ac1f96068",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'optionstoreplace.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4517939b-5003-4ca4-a51e-47b4314fbc24",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'raininscreen.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c327a60a-b904-4f1e-a43e-4b572a0c5f3e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'soccerstreamingstars.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c853cfd5-2286-4efa-9ea7-2b9bb7353f07",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'news-news.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--96445998-eaea-4357-b655-b15a275b5f56",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'url-configure.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--16e8f8cb-2d19-4ab2-b776-0566fb944fcb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'firebulletfan.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--13202eea-8dcc-4a19-869d-d854d9c605f3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'calculatesymbols.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d3bba865-50a3-4c1b-9aea-f3a8cbc7b433",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'miles-club.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--aa6fcf6e-1793-44b6-b958-60fbb854e153",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'findmymind.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--03a49503-567f-4167-9c67-7a27ddb89e0e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'dnsprotector.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e97ce1f4-a226-4bf7-aea8-bf99a70d31eb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'ad-switcher.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e666e66b-a6b6-44bb-9905-0eecb18c4174",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'driventicket.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--85904315-a901-452c-b28e-90f0e13a2fcf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = '911hig11carcay959454.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c5fca04e-f99e-498a-811f-2c41bed2e397",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'ppcisdead.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--41398d01-9971-470c-a492-b16b01f60be8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'crimebackfire.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2b50d782-1787-46c1-9755-50574d12997b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'leggingsjustforyou.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--94d8ef4a-becd-46e4-9013-7d822bd155b9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'femmedaffaire.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1b52dc34-c363-40c2-a023-ba00419fdbb2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'web-spider.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0e5a4ef4-5424-4a8d-b401-6a28a08de689",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'financecomments.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--19b91264-3f74-4f1a-9a5d-63e750a10301",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'summermover.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7c4622b0-654c-4f4c-b02f-e42a6047877b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'urlredirect.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c181464f-62f2-405c-95b9-7cafe86bb68a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'odnoklass-profile.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ac5e4a8e-4461-44d6-86d6-b34bf3128061",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'baramije.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e353c947-f063-4e0b-93e9-03f774f938ed",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'eurosportnews.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9d607b8f-b985-4646-9cc6-12bab51a032c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'mypostservice.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8a5b329e-f49e-4a76-9d18-b122d9c34e28",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'global-redirect.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5ae28f37-e7e8-4c4e-a8eb-988f7fd38faa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'countrytrips.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0d302d1c-6bd1-4c78-8d47-9f3b9138c23f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'y0utube.com.mx']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--412ce275-11f5-4c6b-a307-323d4b92b04c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'tahmilmilafate.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6112ad9e-8617-495c-b68f-5eaf1ca4e61c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'tablereservation.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a62bbd21-633e-4702-972b-ed5f60c6ef8b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'sharepassageset.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--98ac7487-6df2-4f80-8346-d7a0536fa095",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'gadgetproof.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fc40d1aa-a5d2-4b11-8a00-5c19f1fcb074",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'trendsymbol.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--853c7f53-dd00-40b1-8bdd-87d195d58da1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'tripleclickpays.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2b118094-a43d-4e39-bf0a-82d5053934af",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'organicdiamonds.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4f56a64b-5dff-4ac0-a729-950a5fea491e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'muziclovers.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cbda3914-2671-48fd-819f-4b68d8ac3766",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'business-today.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--74135ad5-8868-4181-b03f-d75bd7c9ba8c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'all-sales.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3bb79ed3-2747-44f6-8ba4-c89b46833b04",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'martinipicnic.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6a02b116-5050-4500-8288-7aac6e8a84d7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'prioritytrail.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f13528ae-a304-456a-9258-7dee638e9d0f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'unusualneighbor.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--47a7ad32-e34e-49b5-8191-f67ab221e65f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:58.000Z",
"modified": "2022-01-30T10:18:58.000Z",
"pattern": "[domain-name:value = 'nationalleagues.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--648495a7-8e7c-4c5f-86f6-7bcae580730f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'black-bricks.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--42f168af-ffb1-4583-8868-b58e4bbd5830",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'filingwarranty.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bf20e9f7-ce25-4974-a3e9-26668215b5ad",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'bulktheft.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--99c179b6-2360-4649-931e-6db77f7c3adc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'webstrings.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a6d45692-b579-440c-b4e2-8e3c969e64df",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'poweredlock.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7e0f6c19-5001-46e1-843b-d85457dd18bf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'paywithcrytpo.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bf7ce923-6027-44b5-aab2-42d8c774d9ae",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = '14-tracking.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--af938c14-87d4-41f8-9086-c6d92535a3ac",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'mobileweatherweb.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--30d0b9fa-19b9-4569-b620-a12986c3f36f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'layerprotect.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6d176d0e-634a-48c8-bd1e-a69a9eb6e3f7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'storelive.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c98c0a45-73ee-4a13-9e5c-962d0ca037d2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'rapidredirecting.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2c78fab5-5356-4a1a-8f35-68dac0f93b43",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'service-update.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8223daa6-8539-4aa6-bec1-2afd64a62f28",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'track-your-fedex-package.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--77ce929c-e9cc-45e6-9612-39acbbf06ea8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'reservationszone.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1b186fdd-9c91-45f7-a0a4-bcc462807f09",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'accountnotify.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--65e7409c-34a2-45f4-8c5b-e721e02353f0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'practicehazard.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6c78fcb6-cb49-45fb-a98d-e85979f7fb6c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'rhymeshey.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dbabc564-e453-4bf9-bfaa-63ce0470d634",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'top10leadsgen.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--22ee4096-a9ee-4bf1-8847-b68dfedb3a6d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'resolutionsbox.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7e3f2c7e-3bdb-4813-a620-e4be7df96823",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'layoutfill.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3ea59ff1-e09e-4a6b-9e33-c9f3ee511fa4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'websitereconnecting.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3ff02b1c-efb3-48dc-a961-168f220fe284",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'activate-discount.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cb97efda-9ae0-4d8e-96e6-ab14a4b6a562",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'puttylearning.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0f3d02f5-9ca3-471b-b878-0b7057323e3d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'in2date.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--594aee3c-dfe4-48a1-889a-b028a7949bbe",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'panelbreed.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c4d80fe4-0f89-40c8-a1da-5a522a329640",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'redirigir.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f088142c-2906-452e-9991-9278d86cdf0f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'yourbestvaca.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--12c1542c-00b0-47fc-a028-d428b1db267d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'kurjerserviss.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ddef72d1-dd8b-4a6c-9531-6b990f63c28c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'statisticsdb.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--141d4cfa-09c5-49d4-9cec-4b30d0998e55",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'urlviaweb.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--828e1c75-91f5-49be-a7d7-12cf537accc2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'xn--telegrm-qbd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--471991fe-6c49-4939-8d75-79a226b6ec3f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'moneyxchanges.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--00edcfbf-4f55-4336-99b2-422c669d5383",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'privo7799add.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2b6ec346-2e77-49f2-af54-aec193dc33cf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'rosegoldjewerly.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5448d3f2-d99d-4e30-98c2-8712ba62870b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'crowndecoration.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--89af884d-568c-4ece-8bc0-90f20ae24874",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'findouthere.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cb84e03f-d880-45d2-8aa2-96098c2d2bb4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'mcel.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--10023e04-990a-4cb9-bd73-55bf364fb34c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'revolution-news.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--24dd2518-b6c5-49bb-8071-22c36aaa3945",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'sunrise-brink.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6c662994-72fd-4a63-9d4d-1f369733df01",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'chistedeldia.mx']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f0ae788a-433f-477f-bee6-c4d3673fdab3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'utensils.pro']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d0771027-22c8-4f2e-8e2c-914b301ef949",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'destinytool.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--96a703b5-72ec-4555-9f1c-330109d7b0f0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'bottlehere.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3ba2c798-05fe-4782-a87e-d0bccaa8921b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'findgroupon.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ddfdd444-9951-44f4-a011-76a2db7d631b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'reloadpage.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--04a4548f-fa41-4729-aabf-cd489480c2eb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'regionews.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d97e99d5-b9d5-4684-8832-ecbdaa04c497",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'gdfr.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fc6adcb6-7efc-4b26-9a29-e0c0f7cd98a5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'transfer-rate.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ce33b6ab-672d-472d-b15e-3668e2e22e95",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'moneycheesecolor.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b547df95-5bd6-4fa4-9ced-05b4fdd225eb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'cornclean.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c9caba25-eb53-44e1-a3bb-f52d957ee931",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'xchange4u.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0a10b4b5-b62f-4740-88f0-20ac269213e9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'ehistorybooks.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--209830a4-216a-4cac-8c07-e188d4325805",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'fallround.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e974f627-1c61-436f-9110-3b0af11527de",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'cheapcardonline.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--78ef3f46-7b68-4ac5-8b10-8eda572d18ed",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'whatsappsupport.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4f17785e-27d9-4c73-9407-3e9437b0b313",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'authenticangry.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c9b94f9f-9612-4741-8b2c-58c357b492b5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'scannerservices.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1cd1a98a-0a9f-4cb5-bf93-60cac6056a95",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'videotubbe.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--aa386cde-b5a7-4a91-acec-56c331eae253",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'erty.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a8f8db03-5f0c-4c60-9e04-e2fbd2eedfa7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'noloveforyou.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--114bf58b-7171-434c-83a1-7861e9eaf5b6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'regularhours.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--436bcb2b-dcc6-452d-bea7-b6d427a279df",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'crownsafe.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ddeb0c73-b837-4100-a1d0-b93c2af8b6e7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:18:59.000Z",
"modified": "2022-01-30T10:18:59.000Z",
"pattern": "[domain-name:value = 'income-tax.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:18:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a4d62650-d21a-4255-9137-664b086c8531",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'htmlstats.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5d98f9e7-b180-48ae-bcef-11a37753ba12",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'bargainservice.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cd288d20-ac44-450b-8995-eba33c97cc91",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'funnytvclips.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--966f8239-52ed-449d-8d4a-dd271d72d133",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'directbegins.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b367047b-08da-48b6-b06c-ef95bfd00b6d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'newworld-news.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f5ac62bc-9e8d-42c5-a799-fa6e174e079a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'wedding-strategy.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5fa20756-cba1-4902-9d47-82f5f23c147d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'howisurday.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--34349177-07cd-4d6b-b3b3-4b71419c8084",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'moh-online.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2dbdbf88-2df5-4ee8-b34f-0b5a5725e5a5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'sweetcup.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--99e9b8e8-16e1-4517-9947-a29fc9bbb8b5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'mergeandcenter.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7f8c2ae2-8bcd-4ced-a71c-0d6376bd9351",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'halal-place.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--71c4c28d-4c0b-45e0-8061-27ac9d155069",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'shortredirect.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--daf921a0-6c45-458a-ad7a-9b865c43e7cf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'mystulchik.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f0d633ca-8a17-4717-ba01-1dc4d9493712",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'thoughtfulbundle.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3976d88d-4fbe-452c-b67f-13e823554250",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'bulksender.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--60d88f2e-cbfe-4186-9aa0-5958498a48ae",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'redstarnews.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5617bcd6-bd18-4e72-9fba-5d98eac9288c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'preferenceviews.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--27ddba04-7f0d-425f-a85b-fccdc4f2dbdd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'newnhotapps.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ad9f5da9-7453-4459-8de8-c848dac33808",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'mcel-update.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--542f8e15-b9b4-482c-854f-825bec1766e4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'networkinfo.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--76a3c03b-94f4-4352-9e61-d4fba6d7be0c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'transferkeep.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--59da8d39-14e9-4ddb-996f-6a9b37e13c52",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'bytlo.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1021c4d6-713e-453c-93b9-aa18e5592f4d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'dotroomeight.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--85494971-b471-45d6-9cc4-753446000d9b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'todoinfonet.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--93cbcda7-1bdb-4732-8ffa-0e3a2d34e4a5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'ezdropshipping.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--aa594761-0a03-4565-88b8-8fec9eeb79f6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'redemptionphrase.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c400e414-222b-4b84-afae-727c287bc26d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'cpr-appointments.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--095c99d4-0036-4c27-b45c-ddac89650a15",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'coolbbqtools.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--03bbca6f-ecbb-4e3b-adbf-b493b8d4906d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'hdsoccerstream.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0345afec-0e4d-49d2-81cb-432a73e9dfb6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'alignmentdisabled.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--43ff864a-e87e-4dd4-96cb-824dee8cc068",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'besthotelsaroundme.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--649f1330-89cc-4d59-869e-22553bd99872",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'bitanalysis.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cc09a229-dccb-41b8-bb43-3d3c99d811d2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'mozillaname.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5d2a235d-f862-448a-8ba7-cd94e820171b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'upload-now.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f26ce3d2-3374-47f9-b937-6155ee8d2129",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'workshopmanager.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5cbd14a9-dcd2-4b26-8f60-d5133f25053d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'clubsforus.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b1efcc05-c42d-4196-b869-6cdf5ac73831",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'bitfadepens.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0735c21d-6485-447b-a4f1-34e7db1cc582",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'sendingurl.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--24ebe4c6-300d-4c60-9e9a-41729a213256",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'sportupdates.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f0bedd90-af3c-4e79-bbc6-aa3602afe251",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'br-hashtags.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--31d532c7-854e-4c74-a6cf-3c13dbf223d0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'funinat.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d9f9e19d-6abd-4cba-ab2f-bfd80db34151",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'productsview.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a306286b-bf93-4d10-9ac8-edb7d8cc64e1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'ineediscounts.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e341363a-318b-4610-9db7-f47b9c7060ca",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'br-travels.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8a154716-3b87-4b09-9907-f661387aeca6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'planeocean.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--54d543c6-6ce9-403e-8ca1-86989d432a31",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'videosdownload.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--97c797c3-f97b-4779-b65c-b265b4a7c69c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'online-dailynews.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--74107ecb-9661-4a25-9b0e-ceefe0b1ede8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'pickuchu.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--451ad9fd-534e-48d1-b931-072f79df2756",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'weatherapi.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--64dfd0e0-ac06-4415-a4e0-e2fe51a604ec",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'whatsapp-app.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--050e3ea9-6af8-4984-98b9-a63e568361d0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'googleplay-store.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--69d6fc65-2f3b-4e70-99fd-c30734a00f67",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'thespaclub.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0176d136-608d-48e4-9dc0-422a3f760550",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'revoke-dashboard.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f981f887-e437-4e88-98b6-45429559c77c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'fundum8430.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--593e11d2-1d4c-48c7-973f-b2a3344b646d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'accountant-audio.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--532172dd-4283-4735-9d79-ba6d81ca2016",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'sunsetdnsnow.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--323d55e6-a11c-41db-955a-6e54b25769bd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'searchunit.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7400283d-e44e-4625-accf-1480afca1d4f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'youcantpass.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c794b649-ab4a-45af-88b3-c53b279d5d57",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'meanspursuit.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--79fac352-0397-41f3-9194-d8586a032626",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'saveurday.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b3dbc333-dea1-4584-82a6-6b2b8859e339",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'unonoticias.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d141107c-b639-4324-89cd-c3f747e92cd8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:00.000Z",
"modified": "2022-01-30T10:19:00.000Z",
"pattern": "[domain-name:value = 'koramaghreb.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--04c13357-ea04-42a9-bc8f-b80ff7665fec",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'qaintqa.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5eb576e8-95ad-4ed1-aee0-23f80585c4b6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'mamba-live.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a8bfcf72-14c4-4ef2-8142-6535a26511d0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'bbc-africa.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8d983694-640b-4fcf-b582-725826cfbdca",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'advert-time.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3852abd1-b427-46b3-a352-d9ac0464e629",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'park4free.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b816938a-d0be-47cd-9714-9472234af2a1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'relatedspams.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1095a341-fa9c-459e-a4ec-c6a24ca6eb89",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'hatsampledc.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9c40d34a-c7cb-4c15-8078-c054fac92b3a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'billednorth.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7862ab24-31d9-4b65-844f-0deda0845b3b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'glasstaken.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ba27cbc0-10fe-42dd-9ed2-277edfb39e08",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'restaurantsstar.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e959da0f-fda0-4973-b773-919dbb690e57",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'nomorewarnow.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--26d3f0a2-9eff-4d41-96f2-81dcfd7ba106",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'scaryaudience.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f96307f1-24b4-4bc7-affa-090b4a345309",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'hotelsauto.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--704b12d6-ff1f-4ec8-bde9-78c52c11d2bd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'fabric-shops.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7d23737b-7130-45dd-9b50-b0142f0118cc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'thankstossl.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--47d3fd8f-5ce9-4a97-8ce9-11a7ad480d94",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'expiringdate.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--801635d5-32f7-4ef6-82e8-ae1664cbbe1f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'trialvariable.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5d354f92-533e-45d7-a57f-a1386b0212c2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'novosti247.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--38691f00-78bc-41d1-a549-40256915cbcc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'tomorrowpastno.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--be212ddc-5f30-4720-81cb-9a6f17fe8272",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'web-viewer.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cb22d402-8080-474c-9ede-13bd82bf480a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'tricksinswiss.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8c2f7295-cef2-45c1-bfe6-5986451ede75",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'akhbara-aalawsat.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0b15361e-d77c-4d2d-b9c2-bc2e076d7a18",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'websupporter.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2c7a29da-618b-4240-9bba-bbfe27bc990d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'dns-1.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b00241b3-be43-400f-94eb-2cbfc72c3cc5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'android-core.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f98cb115-be36-46fd-9211-b592a8db9a01",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'watersport4u.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--23710e68-42a5-49ce-965f-d6e464f4e4ce",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'fofopiko.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5cf5e95e-2c4f-4b5a-b06c-01bffed9a12d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'operations-delivery.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cc9b34d4-f215-4c9f-9d7a-1a3daf810d81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'browser-update.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0c0527ff-1b1f-4d77-8162-e7182fe2d823",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'nosalternatives.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4a2ba3ab-9ccb-4251-bc5e-2c2b95abc844",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'aalaan.tv']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--86dd5cc5-d590-4394-9ac1-9bb9ece05d69",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'movie-tickets.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b58fedc4-334f-4c06-800f-f0d5bd6bb78d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'bunchi.club']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2fc34b15-2f5f-4abb-bd18-484f83090195",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'painting-walls.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5bac66db-c1d0-4928-b5a5-dd3abcec9501",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'legyelvodas.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7b7a2e1e-6d28-4fb5-b2e4-6846cca1eba0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'readirectly.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--274d9e69-85cc-4fe2-b06e-f8c06c3c3b1b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'exchangenerate.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4cb932d0-21ca-49c4-b746-cb4b15bae57a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'intim-media.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f0c017c6-9aa2-4d1c-95be-39b4bf66d52f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'asrararabiya.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9e1ce3d4-c430-4d2a-a7bd-e90888ef8647",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'fitness-for-ever.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5193f3cc-05e1-496c-b057-c284b41c2ebc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'keepthiseasy.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--48183468-9530-4e96-ab8a-59f57bedb12f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'getspeednows.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--515dadcc-dfd4-40da-b690-cf78ce720781",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'redirect-protocol.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--25817fa2-0dec-4108-8261-da10b5465d03",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'port-connection.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2d52a557-87e4-4c10-9ec6-05f7158f742f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'sms-sending.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--94f425b3-e411-4887-9a52-aba25acad06c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'realmythtrend.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c325ee09-9fdf-4a66-aa34-eee971ce40cf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'looklifewhite.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b970d6d1-3994-47af-9226-1c581e775ebd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'blogreseller.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f55cac44-cabc-4131-8b2a-b2cbad202ef8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'tunnelprotocol.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--86cb85ae-59c4-4620-b94c-e98313abbcd0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'fashion-online.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2a031ca5-6866-4aa7-8643-f264c5f6c86b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'shuturl.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bdd0d0d7-f981-492e-a8e7-e0944186b18a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'adjust-local-settings.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e936a786-646c-45e6-8994-b6f65a9d6aa1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'connecting-to.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b497ea80-a846-4e04-a339-492ca187363d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'newsofficial.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d1fe8a25-7a12-4f72-90e7-f297f7475a43",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'practical-basis.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cc70fe4c-46c3-47e3-b9e5-7353a667c1bf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'mixsinger.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e1283bc4-7d87-49d0-b56f-b0340fd0dd23",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'findavoucher.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dd7ba303-7374-421b-a684-1c3e671cce8a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'alpharythme.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8da5ba2e-524f-4afa-bee9-bc8cc8d9a74e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'vivrechezsoi.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3e1fe5cb-6b9f-480b-b337-4253e8975bcd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'breaking-news.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e496fa2e-2144-4574-b1c0-d59c755b8ce1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'mysadaga.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5cdf49ba-770f-4ffa-98fa-da63aa2f4989",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:01.000Z",
"modified": "2022-01-30T10:19:01.000Z",
"pattern": "[domain-name:value = 'primarystrike.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--237156d9-5bbc-4937-a4c9-8cd3bf575db1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'sweet-water.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--760fabf1-75aa-4f73-a928-a087b6866b1c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'websites4yourhost.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9144a5e6-67e0-4f67-8692-6d3dab2b3790",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'dashboardprompt.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--28d7f243-d4d5-4060-9c07-9cc1faf0e9cd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'lonely-place.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5800fba0-0820-43af-8f1c-b55baa32312e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'latest-songs.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--85932d38-5623-4186-bad1-ec94d8c32db2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'cdnupdateweb.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2b33954f-4dde-4325-aa14-4f0a81ddaf56",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'somewarmremember.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d2443540-ebed-4ef3-974c-2b678149e99c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'elitecarz.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5571bf5a-16a5-4337-b831-cb4332159143",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'girlsyoulike.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9055dec3-bc55-4dbb-b21d-2d4a3517d79e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'alluneed4home.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ebf3a9c3-6c80-43e4-913e-6b6095a53cdb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'cookiesoutthere.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--02924caf-336d-4331-89ad-836909cfc5a0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'knowingfun.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3b3f3f2e-29e5-4464-8de5-08eb0ea5e935",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'redirect-webpage.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c990be60-0d81-47fc-ab0c-ca74607dd9de",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'smokeshowshoe.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c3f62e4b-53e2-4e61-a06c-2fb300f5f0c7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'russian4u.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--382005a3-686d-4959-9ec6-a454b8735680",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'prikol-girls.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3e400817-a2c7-4bab-9148-017ce5d8a875",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'gadgetsshop.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7eae48da-ed35-4eaf-9e2b-8b36d9ad8566",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'hotelsurvey.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--99a00d80-ef48-4b28-9ecf-a4e9c6b3ccf2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'mymobile-cell.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a9c117c-bd61-4acc-b65f-f924273d7ae5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'xn--nissn-3jc.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f18b6a04-2c8c-4920-96f5-5acf3985c94c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'externaltransfers.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e1795844-8b81-4b9b-9606-8e3e2dcb81d5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'youintelligence.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--07593c42-927d-4a18-a495-5351f0e56625",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'gumclockberry.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7a497f1d-7ef8-4a6e-b161-98595254cbf1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'autodiscount.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6a438f6c-3c40-4fe8-82e3-39dc8c55b6dc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'curiousrabbitgame.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6a988b6c-5a40-46bc-8c3b-44e31105f114",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'rockmusic4u.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8a6bb65e-243b-4c46-85bf-fe17488820f8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'yousunhard.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d336f085-c499-4021-9263-03d8c8bda8aa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'preventsusing.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3629b608-857c-4bcf-a813-db965b13d8e0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'moh-followup.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e6e7f346-32a5-40c5-9443-b1fc41670a55",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'redcrossworld.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f658bf5a-3e79-4611-9c06-d05a2d41c6a5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'loadingpage1.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b2afbbc7-0fb6-4ff3-9451-1fc3773ed6bf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'redirectking.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ce873b52-b747-4fa4-b7b6-aaf9ca3a047c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'novoicenoprob.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fdee160a-cfd9-42eb-8386-6c86ca51ad28",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'pageupdate.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e83ce12a-5cd4-42aa-8013-dfd3481f7d39",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'emiratesfoundation.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9292f9c6-56ac-4011-9742-1794301a03db",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'tengrinews.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--73fa7876-9ecb-4c14-8360-232cf1535446",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = '365redirect.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8552209c-d6ed-46dc-b17d-2724dde673ce",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'doitformom.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--45968981-ee97-4d89-9efc-332868011968",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'volcanosregion.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2bb64583-1c5e-475f-ba12-8a4587ed95c7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'exploreemail.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e272d40d-af90-4c77-92cc-cc189388ab95",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'cashandlife.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3e278133-250b-42c8-83e0-eb28e126ebb7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'updating-link.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a289af4b-a547-4ebb-8f62-fd633d46a4a6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'mideast-today.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--90c1d0b8-40b9-4e06-9a6d-ebc78ff15bc6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'offspringperform.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--91e2aa3d-6482-4292-a51a-9863110f89ee",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'beethoventopsymphonies.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0e5b9fa3-1228-4d00-bf05-7a110ab2790b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'mosque-salah.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fbf25dd2-c5b6-4bcb-b65c-a2ec62a8dcbf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'files-downloads.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ab1056d8-64ee-40cd-9c99-4b10d0c5cb85",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'diningip.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--903750f5-a831-4906-9e0d-c463ee717e25",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'addmyid.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f83ae931-96ef-4145-8844-6fbc75dd0fa3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'currentscan.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--668ba1a8-9406-4330-8637-3b59de851fe4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'pincattape.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9b353458-ef3c-4a6b-8415-3dc04c8d6658",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'updating-url.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6655f8e7-b7c1-449c-9f69-94b754743763",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'strategyroles.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7e677e70-e9ac-463e-a532-6e436fa1c423",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'formattingcells.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3d831420-0211-444c-b5ab-508b2cfb312d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'egov-online.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8da7e901-5e6e-4ccc-9597-d0932a65f6c7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'page-host.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e2a571d7-b353-4cc7-aa14-f10cee07776c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'happiness4us.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6a624abc-06c0-4af1-b673-77d98b118a93",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'redirectingurl.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--56d35989-0e1d-468a-ab3f-55137d131d10",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'bestfriendneedshelp.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a48653d-65ab-4dba-b5da-1249cc4e6c5c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'tlgr-me.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--93cd3f68-d2be-4db4-a050-faf409425bd4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'blackwhitebags.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6c535f32-cf92-4011-ab6c-794dc943ca07",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:02.000Z",
"modified": "2022-01-30T10:19:02.000Z",
"pattern": "[domain-name:value = 'greenwatermovement.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--66a7398e-41d0-4314-8569-6b095d2dfc89",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'lawlowvat.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bbea6352-516a-41b2-9282-865f0625af3b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'keepiptext.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b651f8da-e872-4892-ad79-6af4f31f94c1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'coupedumondepro.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1fe16827-223d-4ca1-b8e1-1638bd05a513",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'template-iso.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--aaf4f0c6-bcde-4168-80f8-b4ca2e2c6792",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'banca-movil.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--02ead1ec-b699-497e-a608-9215f007166d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'searchjustdont.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--db611efc-9388-4702-b07f-fdd9be2f0d46",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'walkhatclock.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--96e5492e-1c8c-4f7e-863a-5a08acedcf55",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'newtarrifs.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--456ec29e-7346-408f-b5e6-1cfdf30db797",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'calendarsapp.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3c33df7e-ab19-4f79-8d54-6449ba48250f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'weakdistance.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a80a7e0e-e996-4443-bcd1-02dcc9c3016d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'thecoffeeilove.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--15baf385-6d4c-4278-951d-28c13a29ee0b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'redirectcheck.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fd6f2e1b-a0b1-4c6b-b857-dd0ce249a3de",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'familyabroad.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8d2f3c70-ee6a-464c-bdd7-9308088ebb81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'diagram-shape.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5462df54-58f4-4a86-b38a-9cf37b127f63",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'buildyourdata.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--87f6b4f7-b8da-4392-a90d-b277797366d7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'candlealbum.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1eaa8bdb-4f8d-4f1c-98a2-821b11861ecc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'noti-hoy.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--52a327b0-4c30-4877-824b-f3299ad41507",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'lesportail.biz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e2d47fb8-da49-4c0f-9bbd-7a44043ea429",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'volcanodistance.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4177f67f-30ce-4e32-bfeb-377450482b80",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'lifedonor.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1625af30-a63e-4cf7-9d1c-7ab818039b44",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'look-outsidenow.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4eb3cfa2-f489-4133-9a3c-a3ef78e03b16",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'localgreenflowers.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f55585aa-1077-426b-aa30-8bc3de4b952c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'foodeveryhour.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bf334ef2-593f-40bc-aea8-02fb7c8cddef",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'stationfunds.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f7d2ca32-876c-4547-a6b1-ce0e2ff64024",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'trianglerank.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--07961acb-c2bf-4291-82a5-4db7d7304b59",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'sunnydaylight.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fdc44ee3-987d-4796-8d43-0e44b4dc1c87",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'add-client.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b2fb4b30-fb66-463c-9f34-4c062498d649",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'entertainmentinat.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--70e298e1-0375-4eba-9aa9-71ef7e047cb1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'istgr-foto.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c259c889-f564-449b-8a3a-4875c1dba7cc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:03.000Z",
"modified": "2022-01-30T10:19:03.000Z",
"pattern": "[domain-name:value = 'mylogfrog.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--78509fa8-43d7-47e9-9dfb-74417cff39a1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'noextramoney.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dcd67081-3f39-4d62-9486-f56f89ab6465",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'renewal-control.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c08ecc08-33fd-4417-ab0c-3517094fb99a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'loading-pag.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9400815a-df3e-430c-bb22-b5872503d6b9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'benjamin-taganga.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7ca1716e-00d7-4c33-b584-cf15976dfafe",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'bdaynotes.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b3d4e5b9-7329-4158-829a-58429232142f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'web-loading.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2b7146e7-3dee-40f8-808b-8217e626955e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'page-info.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5c3db6c1-cd19-4086-9ee3-d7588bd315ad",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'assembled-battery.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3e4156ce-979d-4ba6-9af7-ae117d1ea60c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'eyesunderspray.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e2c39b52-201e-4bb8-b8af-c45b327512e9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'diaspora-news.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c4836304-4502-480b-97d5-5afc4d914f95",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'quota-reader.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--430559de-bf82-4a6e-89f7-8670c2bc6942",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'eura-cell.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b83174bc-2ab7-4fe3-97fa-fe09a95673e1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'popularmessages.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8965a8a8-cf4b-43f3-b319-990603c3e34b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'music-electric.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--14c5957c-950b-4d3a-bf4f-868ec60d0fd5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'lesbonnesaffaires.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--22bba8db-19de-48a1-af88-087fd13cb762",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'elementscart.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0825e3b8-f583-453d-a74f-a72e85f7552a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'dnsmachinefork.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--03519905-c422-4ba3-8b45-dc0970e7d06f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'web-url.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fc7acc4b-3308-414a-89bb-26e50c054b5a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'nation-news.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--32ac34c6-6818-42f7-a115-0b5fd4caac5c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'hellomydaddy.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b1d97b17-e44c-47db-8e9f-d93fba705b8a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'robotscan.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2145a967-8447-4f97-b40f-1408d8e9a434",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'findmyfriendsnow.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3d89e48a-4767-482c-b30e-46e5df021042",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'nuevaidea.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0a1ee421-7888-4374-8d13-d5b9d7d29bb5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'leleader.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c2af13ea-cb83-4a8c-bf03-d524c38fc5a4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'loveandhatenow.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--afadbb9e-0151-40da-abd2-1b1a1bcfdc70",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'audienceflake.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--149a72c0-1711-4719-9b5b-38d3413eb8bf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'un-limitededitions.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1fe27be2-cc96-43f6-9ae0-9c92a99bbe4e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'celebrateyourdaynow.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2a4facd2-2937-4f92-aca9-abfb3b10aec0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'estatearea.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e4a0a998-5254-4836-880a-f5d102ba9251",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'bubblesmoke.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--71187481-cf37-4659-8373-9b9482d4b180",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'theway2get.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ff43684d-38e0-4eb0-ad25-422ef3336b0e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'managingincluded.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b0aa9971-67ae-4562-bbd1-c9c89339ca16",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'simplycode.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fd68b841-e47e-4f67-bb3f-d3665ccbb3ca",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'results-house.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a1fa9ad2-f7a3-4180-8248-6dfbd43a9e3d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'topbraingames4u.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2a73aedb-2109-4c82-8d38-3954dfc08bc7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'forward5costume.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--041593b0-f979-4424-a0f6-7e9abf2c6ab1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'megaticket.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--30f3cc8c-5be4-4241-88d3-ecb3e6127b0b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'webprotocol.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b4d403ec-6622-474a-8d46-43aaae35fa24",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'lizzardsnail.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--79bd0608-ac86-4065-887b-5548c29b7973",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'biggunsarefun.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--13fdbd2b-a5cf-4780-9298-18e52ec03206",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'couponshops.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1dfb7399-4dca-4cab-b169-7c3223306f28",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'social-artist.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--87143c7e-83e6-4f7d-a004-422d9e2ba958",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'chubaka.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--827a4263-2714-46c5-b130-4dbedc76283d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'functionalcover.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--214f84f8-3250-4745-b848-de3656b1c1eb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'alldaycooking.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--37a5a73a-c291-4559-91ff-7ebaa67524c9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'cloudbiggest.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8177199d-5ae9-4779-8ef1-01914d439d62",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'theappanalytics.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bda29ac7-198d-4f66-b048-21472b69bfb8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'healthyguess.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ba3d7b11-7eab-4f8a-b967-2bb8e87f7aaf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'shortfb.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c031b055-04c2-43d1-bfcb-aa77688bbb6e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'goodflowersinside.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--31172de1-85a1-41c4-b91f-59bdf8d0423b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'mobile-updates.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0f84b136-cb23-4ce8-bc34-b10702c16bc7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'onetreeinheaven.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--096802c5-6198-41a0-9c7d-20722f1d281a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'turismo-aqui.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a959bc69-12b5-4dae-b5bb-0a249851dc44",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:04.000Z",
"modified": "2022-01-30T10:19:04.000Z",
"pattern": "[domain-name:value = 'shipment-status.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ee8cb39a-f4b5-451e-b699-59b0924a3494",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[domain-name:value = 'magicalipone.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--34c975e2-ee46-4747-8cd3-b9999e22dd83",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[domain-name:value = 'smser.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--25973a92-5ff0-4699-ba1b-e8b82cf9c74c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[domain-name:value = 'keyindoors.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--18847d30-797f-482a-aff2-b5e3b0673d2c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[domain-name:value = 'biscuit-taste.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--67dc68ff-60f3-4611-b4bf-23b656cd43f2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[domain-name:value = 'dnsclocknow.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ecc188de-a10d-4923-8060-90ef996cb8d6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[domain-name:value = 'thefuturearticle.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0f4637ae-0155-478e-b174-2a07fd9b9f57",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[domain-name:value = 'travel-foryou.online']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--de8d89ca-8cef-4e56-8157-c146cec9e09d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[domain-name:value = 'dinneraroundyou.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--09d2a6fb-3218-476e-b2e3-02034bb06a75",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[domain-name:value = 'moz-noticias.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4cafc758-643a-4989-bfdd-5100bff0a296",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[domain-name:value = 'redirect-connection.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--226ab9c0-e0e7-4acb-b772-8040bc8881c8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[domain-name:value = 'dental-care-spa.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--54f4a82f-42b8-4905-9876-57ec41635887",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[domain-name:value = 'mysuperheadphones.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3b024007-6ed9-4763-9e68-8354aaa31121",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[file:name = 'roleaccountd.plist']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"filename\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6fefdca2-f04d-4733-a69e-4141d5ac2e4b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[email-message:from_ref.value = 'bekkerfredi@gmail.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-src\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--77cc3abc-684b-4a23-a73c-6ebd016bab95",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[email-message:from_ref.value = 'oskarschalcher@outlook.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-src\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c055c37a-0d30-4adb-9966-0db3394e861c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[email-message:from_ref.value = 'taylorjade0303@gmail.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-src\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1721a3bc-c2a1-43fe-9907-eb8d3ba53a96",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[email-message:from_ref.value = 'benjiburns8@gmail.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-src\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2e596920-60b5-4c50-a5d1-708139645604",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[email-message:from_ref.value = 'emmaholm575@gmail.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-src\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cdc9ab70-6488-45ec-8ed2-aaf20d51b911",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[email-message:from_ref.value = 'bogaardlisa803@gmail.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-src\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--034e2036-617d-45e6-aa92-be31360b751d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[email-message:from_ref.value = 'emmadavies8266@gmail.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-src\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f4f1051d-a000-41b3-bbfb-615884f3f52a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[email-message:from_ref.value = 'jessicadavies1345@outlook.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-src\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--06a47149-2140-4c00-bad3-0234fffa9685",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[email-message:from_ref.value = 'filip.bl82@gmail.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-src\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--71e8b1df-a356-410e-ace1-4789a17b09aa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[email-message:from_ref.value = 'kleinleon1987@gmail.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-src\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--95b593d0-a556-49ce-81fe-819a07fae156",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[email-message:from_ref.value = 'k.williams.enny74@gmail.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-src\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cd9ecd45-ee0d-4c42-91f5-492a224d84fe",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[email-message:from_ref.value = 'naomiwerff772@gmail.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-src\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--019d6d40-1d30-4aee-b67a-9e17b1b12dc6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[email-message:from_ref.value = 'linakeller2203@gmail.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-src\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c9b37883-99f5-45f7-bbed-d6a1f34577b2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[email-message:from_ref.value = 'lee.85.holland@gmail.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-src\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0d3eb062-137f-44dc-baee-c549c4f37ada",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[email-message:from_ref.value = 'herbruud2@gmail.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-src\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--48035a8a-7377-467d-8a0a-c936d476dc16",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[email-message:from_ref.value = 'vincent.dahl76@gmail.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-src\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--25ed7e0a-b597-48c8-843a-0ce58bd3c59c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:05.000Z",
"modified": "2022-01-30T10:19:05.000Z",
"pattern": "[email-message:from_ref.value = 'bergers.o79@gmail.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2022-01-30T10:19:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-src\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\"",
"misp-galaxy:malpedia=\"Chrysaor\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus - MOB-S0005\"",
"misp-galaxy:mitre-mobile-attack-malware=\"Pegasus\"",
"misp-galaxy:tool=\"Chrysaor\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--89facb9b-dc63-4b87-8bc5-3f5f8770a898",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "confinstalld",
"category": "Other",
"uuid": "75016808-7926-414c-a684-4855a42eb2f8"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--1f77a6c1-99a6-4c10-96c8-11c659ecf670",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "ReminderIntentsUIExtension",
"category": "Other",
"uuid": "5453eea1-ba82-4f1b-a63c-ed551834ccd2"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--14dec6e7-2ca5-407c-b095-ca01a30217bf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "wifip2ppd",
"category": "Other",
"uuid": "0fed724d-03e6-47b7-8d96-28888810781b"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--2da9176e-a657-4e41-bd5b-336493569783",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "bfrgbd",
"category": "Other",
"uuid": "6ee02cfe-ab40-4cf1-87ef-47479de3a693"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--d62c1fd0-b64c-4df6-ba11-92e1ea6cdc63",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "eventfssd",
"category": "Other",
"uuid": "16288ff8-82d6-4f7a-99c8-3a9d4b92f453"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--024151a1-411c-44a5-9dcf-f9341badb3f9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "ckeblld",
"category": "Other",
"uuid": "498c4149-861f-4cdd-b073-60a238832013"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--aaeb8f60-0506-4695-8502-24c680a1bf47",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "comnetd",
"category": "Other",
"uuid": "7c56a0ed-9966-43c4-ae05-833b3aed9044"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--7beae0a8-3b22-409b-894f-72d4f5bf513c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "actmanaged",
"category": "Other",
"uuid": "acfcde73-11f5-42d7-a793-67c32a57c754"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--fdc3cc6a-dc53-4af1-b9f8-6c1955a951d6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "updaterd",
"category": "Other",
"uuid": "b6702a1c-6d6a-471a-b9fc-a00dc2fbd89c"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--997f1a43-4be2-4163-8bb0-d4d3d9e2cb8e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "bundpwrd",
"category": "Other",
"uuid": "87d560f0-3023-41f2-ada9-403915d45b00"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--31dc1d35-da34-4dca-a785-7376eb2e0a18",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "tisppd",
"category": "Other",
"uuid": "37009ba1-b1af-4888-8ebf-77c959cffd80"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--8579e1a0-4847-46d4-9439-dfddc4e36fb5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "ctrlfs",
"category": "Other",
"uuid": "a7e7556f-1b6f-44e5-8366-cbde84a3209e"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--5f1179dc-0784-4b50-a1f2-171bdddd8300",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "eventstorpd",
"category": "Other",
"uuid": "4b833aea-7000-4314-a08b-1c0d41908229"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--6aea95e7-61ff-450b-b96a-68477b2320a9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "libbmanaged",
"category": "Other",
"uuid": "87e97db5-ac71-4f90-aff7-b6d001930f53"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--bf25aed9-3d41-4359-ad42-818493d4996d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "vm_stats",
"category": "Other",
"uuid": "924b2af1-db6e-4d8c-8d3b-f7e40a2f7fb8"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--c193cc7d-38db-4fc7-b6b0-0955cfc64782",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "boardframed",
"category": "Other",
"uuid": "3b957d23-706f-498e-8c06-394e93963ad1"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--db139fc2-73fd-4322-88f7-e90f2938fa65",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "misbrigd",
"category": "Other",
"uuid": "c16cd93f-a035-4a9f-aa8e-29ba8cc0d4df"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--9cdd3328-f23d-4d62-923e-425d597e4ee8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "comsercvd",
"category": "Other",
"uuid": "b7437592-57cb-48be-88f5-5d751bd55916"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--d319e7ce-02db-40a7-84cc-a6bc51877cf6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "pstid",
"category": "Other",
"uuid": "6c531d10-bf07-4b5a-948d-788b631cfe38"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--2afc2dc6-21a5-4aef-9413-42fff8f04eb0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "llmdwatchd",
"category": "Other",
"uuid": "a5c67b07-3413-4056-8744-4efa31402c39"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--b4538565-5fe7-4b0e-b536-fce0e35e116f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "otpgrefd",
"category": "Other",
"uuid": "3220569d-54bd-4a71-9a07-ff38a43d0f73"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--1ed3a07b-b377-4053-aebb-3be97d7974af",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "PDPDialogs",
"category": "Other",
"uuid": "733fe76f-855d-4362-8f95-72dbeb69a457"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--ac30ff08-467b-4836-884e-883ea1ab5496",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "pcsd",
"category": "Other",
"uuid": "6807385c-12de-41cc-b6f6-90829ca3845c"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--785a8901-a25f-40e2-9ff3-3ff887b02d99",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "rolexd",
"category": "Other",
"uuid": "47ad53d5-8761-48bd-9433-b6cc10f64c6b"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--8e749a71-b3c7-4c37-99cc-000e132b02d0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "xpccfd",
"category": "Other",
"uuid": "6f3d5c6e-f738-47f7-a88c-803dd3ba552a"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--ef6d1f90-bba4-4053-86df-e45c35c69101",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "nehelprd",
"category": "Other",
"uuid": "af47aae4-b62b-4041-8ea4-cb3a47fec1d1"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--c0f7608c-75fe-4078-a872-c678b98c3ca9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "dhcp4d",
"category": "Other",
"uuid": "9ab1142b-6f58-4b37-912a-05109032af0c"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--4a39829a-d91b-4dc5-b8ce-48b1e143a8d1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "ckkeyrollfd",
"category": "Other",
"uuid": "72bd64d2-4ca9-421b-a69c-1e995ef09bee"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--947beb48-79d4-4828-800b-abdd0a1bee11",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "bluetoothfs",
"category": "Other",
"uuid": "4a1bd805-86b5-4dbb-a20a-d6bc04a70dbf"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--358c71de-dae9-471a-96c6-a167e83cc59d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "natgd",
"category": "Other",
"uuid": "7d9172c9-d1b1-4d35-872a-ad18e03890f6"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--960073fd-4e32-44bb-9262-6f583c9b059a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "brstaged",
"category": "Other",
"uuid": "c314ca07-246c-40ad-ba08-37e091b2a555"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--7f14f058-3695-4323-be01-9c406145e493",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "com.apple.rapports.events",
"category": "Other",
"uuid": "df4364f6-9120-46d9-b3be-f9679ad6782d"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--2f00c242-648c-4599-8699-aa04e507d117",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "libtouchregd",
"category": "Other",
"uuid": "c7fde405-8b92-457a-ad4f-4b4c1a65d2a1"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--191fa57c-f7d7-4aba-aac1-4a46822f3767",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "com.apple.Mappit.SnapshotService",
"category": "Other",
"uuid": "3695e64e-af53-4fc3-92bf-c94a087ecfde"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--6a531d18-52fd-457b-9a01-3f40bf9b94f1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "Diagnosticd",
"category": "Other",
"uuid": "0c68128e-7d31-421f-949c-fa34b981804b"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--c52e8d2a-10d9-428a-9e19-3fe5ac774296",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "fservernetd",
"category": "Other",
"uuid": "cd15c93a-7355-4699-a9cf-e7d67910aaab"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--c70a1085-f4c7-4229-8ae8-a859df26d033",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "contextstoremgrd",
"category": "Other",
"uuid": "de5630da-1ace-4cbb-a834-b8deb6f581f0"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--8e3a96c4-b0ed-46c5-b745-29e6f8fed1fd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "rlaccountd",
"category": "Other",
"uuid": "17d2f14b-bcbc-4ead-a776-5f8551f3baa8"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--ac8280b4-ca0c-4533-98c7-56a321937716",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "cfprefssd",
"category": "Other",
"uuid": "74134a9c-6394-44c7-ad2e-b82902097ee7"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--2b6d40a3-3cc1-423e-895c-5c6eaa9b421d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "corecomnetd",
"category": "Other",
"uuid": "176c6da0-01cd-496c-8b69-ba807906358b"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--d6245dcf-3af5-443a-b4ed-d0645e446a83",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "Diagnostic-2543",
"category": "Other",
"uuid": "4fa6d3e2-ec47-4eda-b2c3-47f5b79f3469"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--982f1b29-2d50-421c-8503-9500cdc810db",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "roleaboutd",
"category": "Other",
"uuid": "e8ad3c9a-c665-4455-a279-642ca40bdf08"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--dbf3dd2c-0a05-48fe-8802-4aa5e634c7dd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "gssdp",
"category": "Other",
"uuid": "82500e09-b4a8-40ed-aad9-ee31e32a3241"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--483a9b53-99c6-4e8c-abc5-d9c6c2dd0c78",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "locserviced",
"category": "Other",
"uuid": "076787b8-755e-497b-a6aa-c1f08544d2cb"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--dabeb1e1-e1d1-4ce0-a955-bae1ee14a42c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "neagentd",
"category": "Other",
"uuid": "0f6b0d31-11b2-459d-a1c1-76f4e24f2dfb"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e79a5e9c-7d07-426b-aa03-400d72ed7dea",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "keybrd",
"category": "Other",
"uuid": "3666d6ee-d061-4b08-94d4-9683af358ff2"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--ca448f92-bf4c-4289-aa5e-c7b5774fdad0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "gatekeeperd",
"category": "Other",
"uuid": "eda7b8eb-fdf9-4017-bfa2-a22bb1714736"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--183cb945-8bfb-4eac-a6ae-40858b53804d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "ABSCarryLog",
"category": "Other",
"uuid": "dcdd6794-65b6-4a3f-b962-db2f6aa9e925"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--98038661-4697-4ce3-95c0-ee856be9db6b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "aggregatenotd",
"category": "Other",
"uuid": "9e4a2ea8-b3e7-4062-828b-9611cfd4f597"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f8f12e6d-f685-42d0-8601-b1c88ac5acd1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "fmld",
"category": "Other",
"uuid": "01402172-913a-4189-b792-4eb782fbc456"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--20bc80e6-da2f-4d34-8f8d-3fcbb0810736",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "launchrexd",
"category": "Other",
"uuid": "2fe16af0-fcaa-4643-8af7-077d95c33db7"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--65e24ce8-53f7-443d-9c89-c479ea56ec3a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "mobileargd",
"category": "Other",
"uuid": "f8357902-e237-4ba6-acd9-f5f29e42670a"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--6a5e758f-767f-4a54-8f1c-f4cdc8d7c055",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "msgacntd",
"category": "Other",
"uuid": "43fdead7-4117-4bd7-889a-6b90fd8dee5c"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--fcac0d19-df04-4d21-b2be-e84a152714d7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "lobbrogd",
"category": "Other",
"uuid": "f6d91797-8942-439c-8f11-53d70fe4fce4"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--78f16204-ba60-4db6-8a19-a07b7f1d213e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "eventsfssd",
"category": "Other",
"uuid": "cf7f94d8-f363-479b-bf78-568427483ad2"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--97f87e13-f554-4a99-b1df-087cbc9b7477",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "setframed",
"category": "Other",
"uuid": "abd550a5-9dc3-4f5f-aeef-5b39c86dc900"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--4ea4fb4f-131c-40eb-9806-4fc0e81441aa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "mptbd",
"category": "Other",
"uuid": "724937ee-5f52-4327-85fa-7c00d0c19a30"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e7fe8194-4417-43e9-8282-a045e3d8a205",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "fnotifyd",
"category": "Other",
"uuid": "f4de385c-8a9b-447d-aaa5-dea99d4ca363"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--d4202a72-6367-47d0-9151-d3d9773c3ad3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "launchafd",
"category": "Other",
"uuid": "10a59668-8d8e-4acb-b299-30686ead7e23"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--76131054-623f-4f66-ac00-d3c85ba678dd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "faskeepd",
"category": "Other",
"uuid": "cb80f96b-f554-4ae5-bcd9-8d6e55e8d218"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--d59a9736-8497-4889-a9d6-2acc4ad20643",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "MobileSMSd",
"category": "Other",
"uuid": "5e6d70da-2cc6-46be-97f1-47519bac331e"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--585c8c4d-94d4-4693-92ea-71fa34be3878",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "appccntd",
"category": "Other",
"uuid": "de5f917c-0a9f-471b-a800-8ddcbd5ea951"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--7913963a-e647-48de-9619-57387e64e5fd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "bh",
"category": "Other",
"uuid": "dfdd5e7f-c90a-480a-af71-f4564e965db1"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--47c3e55d-efb0-48e4-b597-d1fb59e877c8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "fdlibframed",
"category": "Other",
"uuid": "ce4d80f0-b0c3-40d9-9813-57376fc62716"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--9f2146c2-614a-4e40-99e2-90b7b14298fa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "Diagnostics-2543",
"category": "Other",
"uuid": "d2f671b8-4b04-4595-abbb-15cc90cc50db"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--9036ca8f-946c-4f23-9653-040d7a59a364",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "frtipd",
"category": "Other",
"uuid": "88d3f6b2-6310-4b53-a03b-072e43ecd42a"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--baa01d92-2cee-4677-a0af-c2d64c1181d1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "accountpfd",
"category": "Other",
"uuid": "3cfa9a82-7694-4500-a3f4-0e86d6d01afd"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--52f5a576-7d3d-49fd-8a41-3bf8cdcd8dcb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "JarvisPluginMgr",
"category": "Other",
"uuid": "df976d6b-2752-4e50-8a0b-6810c0bf3528"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--5301ef1a-bb86-4f77-bbd3-7214a4907262",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "roleaccountd",
"category": "Other",
"uuid": "bc0df282-12f3-458c-b963-6229d137f2a0"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--b0268e9b-16db-45ec-863f-7fd736144e79",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "seraccountd",
"category": "Other",
"uuid": "ff5f987a-0675-4e09-92c2-329e2710ace1"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--271dfc17-0b5d-44cc-9d45-ebb1fe21a14d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "stagingd",
"category": "Other",
"uuid": "f462df4c-1623-4be7-b382-e1e90a4dd748"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--fbd54f8e-0348-4c27-9e2d-711c68bcf45b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "smmsgingd",
"category": "Other",
"uuid": "0fd7e3bf-cafd-4c69-ae05-e19a7d57b9ef"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--1eb24dc3-0199-4091-b84d-09b35db7b6c4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "netservcomd",
"category": "Other",
"uuid": "7b53a473-5efb-48f4-ae2b-de9e6ca0ceda"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--fd1827ff-0f4e-491e-9612-91ff2ae19d69",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "CommsCenterRootHelper",
"category": "Other",
"uuid": "f1bd3f72-d408-4f11-bcba-64c7ddacefcf"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--23a58e12-005c-4e0b-a31c-4b54d60bc597",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2021-12-06T18:29:40.000Z",
"modified": "2021-12-06T18:29:40.000Z",
"labels": [
"misp:name=\"process\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "name",
"value": "logseld",
"category": "Other",
"uuid": "d89d40ac-cbe2-43b2-8632-b567d996088d"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "process"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--6dd63fed-294b-4074-a9af-1fc0a063e09f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2022-01-30T10:19:06.000Z",
"modified": "2022-01-30T10:19:06.000Z",
"labels": [
"misp:name=\"original-imported-file\"",
"misp:meta-category=\"file\""
],
"x_misp_attributes": [
{
"type": "attachment",
"object_relation": "imported-sample",
"value": "pegasus.stix2",
"category": "External analysis",
"uuid": "d98b9fd7-cc10-4c66-b63a-1320a4719f5f",
"data": "ewogICAgInR5cGUiOiAiYnVuZGxlIiwKICAgICJpZCI6ICJidW5kbGUtLTFkODdkOTdmLWI2N2ItNDk5ZS1iOWMyLTNiMDk2Yzk0OWY4MSIsCiAgICAib2JqZWN0cyI6IFsKICAgICAgICB7CiAgICAgICAgICAgICJ0eXBlIjogIm1hbHdhcmUiLAogICAgICAgICAgICAic3BlY192ZXJzaW9uIjogIjIuMSIsCiAgICAgICAgICAgICJpZCI6ICJtYWx3YXJlLS03MDE1ZDhlNC03YTFkLTQxYzAtYmRjZC0wOGVkOWEwZmJiMzIiLAogICAgICAgICAgICAiY3JlYXRlZCI6ICIyMDIxLTEyLTA2VDE4OjI5OjM5Ljc5MTg4WiIsCiAgICAgICAgICAgICJtb2RpZmllZCI6ICIyMDIxLTEyLTA2VDE4OjI5OjM5Ljc5MTg4WiIsCiAgICAgICAgICAgICJuYW1lIjogIlBlZ2FzdXMiLAogICAgICAgICAgICAiZGVzY3JpcHRpb24iOiAiSU9DcyBmb3IgUGVnYXN1cyIsCiAgICAgICAgICAgICJpc19mYW1pbHkiOiBmYWxzZQogICAgICAgIH0sCiAgICAgICAgewogICAgICAgICAgICAidHlwZSI6ICJpbmRpY2F0b3IiLAogICAgICAgICAgICAic3BlY192ZXJzaW9uIjogIjIuMSIsCiAgICAgICAgICAgICJpZCI6ICJpbmRpY2F0b3ItLWQyODc2MTQ5LTAyZjctNDFhMS1iNzU1LTdiYTA2MmI5NzU1OCIsCiAgICAgICAgICAgICJjcmVhdGVkIjogIjIwMjEtMTItMDZUMTg6Mjk6MzkuNzkyMDI2WiIsCiAgICAgICAgICAgICJtb2RpZmllZCI6ICIyMDIxLTEyLTA2VDE4OjI5OjM5Ljc5MjAyNloiLAogICAgICAgICAgICAiaW5kaWNhdG9yX3R5cGVzIjogWwogICAgICAgICAgICAgICAgIm1hbGljaW91cy1hY3Rpdml0eSIKICAgICAgICAgICAgXSwKICAgICAgICAgICAgInBhdHRlcm4iOiAiW2RvbWFpbi1uYW1lOnZhbHVlPSdzb2NpYWwtbGlmZS5pbmZvJ10iLAogICAgICAgICAgICAicGF0dGVybl90eXBlIjogInN0aXgiLAogICAgICAgICAgICAicGF0dGVybl92ZXJzaW9uIjogIjIuMSIsCiAgICAgICAgICAgICJ2YWxpZF9mcm9tIjogIjIwMjEtMTItMDZUMTg6Mjk6MzkuNzkyMDI2WiIKICAgICAgICB9LAogICAgICAgIHsKICAgICAgICAgICAgInR5cGUiOiAicmVsYXRpb25zaGlwIiwKICAgICAgICAgICAgInNwZWNfdmVyc2lvbiI6ICIyLjEiLAogICAgICAgICAgICAiaWQiOiAicmVsYXRpb25zaGlwLS04NmJiMWRlNy1jNzE0LTRhODktOGYzZC1jYjZlMWNlN2E0NzciLAogICAgICAgICAgICAiY3JlYXRlZCI6ICIyMDIxLTEyLTA2VDE4OjI5OjM5Ljc5ODc1MVoiLAogICAgICAgICAgICAibW9kaWZpZWQiOiAiMjAyMS0xMi0wNlQxODoyOTozOS43OTg3NTFaIiwKICAgICAgICAgICAgInJlbGF0aW9uc2hpcF90eXBlIjogImluZGljYXRlcyIsCiAgICAgICAgICAgICJzb3VyY2VfcmVmIjogImluZGljYXRvci0tZDI4NzYxNDktMDJmNy00MWExLWI3NTUtN2JhMDYyYjk3NTU4IiwKICAgICAgICAgICAgInRhcmdldF9yZWYiOiAibWFsd2FyZS0tNzAxNWQ4ZTQtN2ExZC00MWMwLWJkY2QtMDhlZDlhMGZiYjMyIgogICAgICAgIH0sCiAgICAgICAgewogICAgICAgICAgICAidHlwZSI6ICJpbmRpY2F0b3IiLAogICAgICAgICAgICAic3BlY192ZXJzaW9uIjogIjIuMSIsCiAgICAgICAgICAgICJpZCI6ICJpbmRpY2F0b3ItLWRkMDFmMGY1LTdlMGYtNDQ3OC04NDYwLWNhNjRhYzBkMjEwOCIsCiAgICAgICAgICAgICJjcmVhdGVkIjogIjIwMjEtMTItMDZUMTg6Mjk6MzkuNzk4OTE0WiIsCiAgICAgICAgICAgICJtb2RpZmllZCI6ICIyMDIxLTEyLTA2VDE4OjI5OjM5Ljc5ODkxNFoiLAogICAgICAgICAgICAiaW5kaWNhdG9yX3R5cGVzIjogWwogICAgICAgICAgICAgICAgIm1hbGljaW91cy1hY3Rpdml0eSIKICAgICAgICAgICAgXSwKICAgICAgICAgICAgInBhdHRlcm4iOiAiW2RvbWFpbi1uYW1lOnZhbHVlPSd5b3VyYmVzdGNsb3RoZXMuY29tJ10iLAogICAgICAgICAgICAicGF0dGVybl90eXBlIjogInN0aXgiLAogICAgICAgICAgICAicGF0dGVybl92ZXJzaW9uIjogIjIuMSIsCiAgICAgICAgICAgICJ2YWxpZF9mcm9tIjogIjIwMjEtMTItMDZUMTg6Mjk6MzkuNzk4OTE0WiIKICAgICAgICB9LAogICAgICAgIHsKICAgICAgICAgICAgInR5cGUiOiAicmVsYXRpb25zaGlwIiwKICAgICAgICAgICAgInNwZWNfdmVyc2lvbiI6ICIyLjEiLAogICAgICAgICAgICAiaWQiOiAicmVsYXRpb25zaGlwLS00NzY0MDI5YS1mODU2LTRmODMtODU5OC0yZmQ2Y2VkMTMwODQiLAogICAgICAgICAgICAiY3JlYXRlZCI6ICIyMDIxLTEyLTA2VDE4OjI5OjM5LjgwMDAxOFoiLAogICAgICAgICAgICAibW9kaWZpZWQiOiAiMjAyMS0xMi0wNlQxODoyOTozOS44MDAwMThaIiwKICAgICAgICAgICAgInJlbGF0aW9uc2hpcF90eXBlIjogImluZGljYXRlcyIsCiAgICAgICAgICAgICJzb3VyY2VfcmVmIjogImluZGljYXRvci0tZGQwMWYwZjUtN2UwZi00NDc4LTg0NjAtY2E2NGFjMGQyMTA4IiwKICAgICAgICAgICAgInRhcmdldF9yZWYiOiAibWFsd2FyZS0tNzAxNWQ4ZTQtN2ExZC00MWMwLWJkY2QtMDhlZDlhMGZiYjMyIgogICAgICAgIH0sCiAgICAgICAgewogICAgICAgICAgICAidHlwZSI6ICJpbmRpY2F0b3IiLAogICAgICAgICAgICAic3BlY192ZXJzaW9uIjogIjIuMSIsCiAgICAgICAgICAgICJpZCI6ICJpbmRpY2F0b3ItLTJiN2MyYzVmLWEzMDMtNGMxNS04ZGEzLTUyNTc1Y2YyNjFhOSIsCiAgICAgICAgICAgICJjcmVhdGVkIjogIjIwMjEtMTItMDZUMTg6Mjk6MzkuODAwMTI4WiIsCiAgICAgICAgICAgICJtb2RpZmllZCI6ICIyMDIxLTEyLTA2VDE4OjI5OjM5LjgwMDEyOFoiLAogICAgICAgICAgICAiaW5kaWNhdG9yX3R5cGVzIjogWwogICAgICAgICAgICAgICAgIm1hbGljaW91cy1hY3Rpdml0eSIKICAgICAgICAgICAgXSwKICAgICAgICAgICAgInBhdHRlcm4iOiAiW2RvbWFpbi1uYW1lOnZhbHVlPSdjaGFuZ2Vzc3RhcnRlZC5uZXQnXSIsCiAgICAgICAgICAgICJwYXR0ZXJuX3R5cGUiOiAic3RpeCIsCiAgICAgICAgICAgICJwYXR0ZXJuX3ZlcnNpb24iOiAiMi4xIiwKICAgICAgICAgICAgInZhbGlkX2Zyb20iOiAiMjAyMS0xMi0wNlQxODoyOTozOS44MDAxMjhaIgogICAgIC
},
{
"type": "text",
"object_relation": "format",
"value": "STIX 2.0",
"category": "Other",
"uuid": "6594fb6c-02d7-4a73-8f07-95440ab4bfea"
}
],
"x_misp_meta_category": "file",
"x_misp_name": "original-imported-file"
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
2023-04-21 15:25:09 +02:00
]
}