2023-04-21 13:25:09 +00:00
{
2023-06-14 17:31:25 +00:00
"type" : "bundle" ,
"id" : "bundle--355c00b3-a85f-4a6c-850f-95bc7357abd1" ,
"objects" : [
{
"type" : "identity" ,
"spec_version" : "2.1" ,
"id" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2020-09-22T12:21:42.000Z" ,
"modified" : "2020-09-22T12:21:42.000Z" ,
"name" : "CIRCL" ,
"identity_class" : "organization"
} ,
{
"type" : "report" ,
"spec_version" : "2.1" ,
"id" : "report--355c00b3-a85f-4a6c-850f-95bc7357abd1" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2020-09-22T12:21:42.000Z" ,
"modified" : "2020-09-22T12:21:42.000Z" ,
"name" : "Linux/CDRThief\u2009\u2014\u2009Indicators of Compromise - Who is calling? CDRThief targets Linux VoIP softswitches" ,
"published" : "2020-09-22T12:23:24Z" ,
"object_refs" : [
"indicator--50cd9c70-16e3-4d80-a63f-6a8cccc82068" ,
"indicator--3e5b904b-5895-4b38-a3fe-3f1c45556e2d" ,
"indicator--0e0e63a2-2df9-48bf-a051-033dc07e1c28" ,
"indicator--4bc87d38-3261-47a3-8aed-2f4e6d6a90b9" ,
"observed-data--d0bc874d-f910-42af-8487-49d59744ac09" ,
"url--d0bc874d-f910-42af-8487-49d59744ac09" ,
"indicator--e709726a-d154-43ef-86c7-18eb24a81774" ,
"indicator--7bba10cd-0db9-4236-8351-3e592852b524" ,
"indicator--23f961d6-6059-47a4-854e-9122fe8ad07e" ,
"indicator--509ee329-28fd-433e-866e-8756879ee048" ,
"indicator--19c40342-9c51-4d22-863a-aa043f160819" ,
"indicator--3f66f469-98f7-40d5-b7a8-f8107c5f494a" ,
"indicator--bc967985-2f6a-4ddd-bdf2-65742ffc89c6" ,
"indicator--a753b1c5-18cd-4f49-903a-dbec8618f0c6" ,
"indicator--d4470b8f-b772-415b-a89a-b22c25431d9f" ,
"indicator--aeb2152e-d589-4dce-8691-2eb1b25b0430" ,
"observed-data--b520b0c5-ba26-4f60-8ad4-77a9dd37987e" ,
"url--b520b0c5-ba26-4f60-8ad4-77a9dd37987e" ,
"x-misp-object--88331ce0-09ff-4c8a-93c5-3e27fc8e287c" ,
"indicator--f782bda7-4bcb-4ad0-8c2f-2c5f18863652" ,
"x-misp-object--b53bd1ed-b1e6-46ac-b34d-3bbe67107eae" ,
"indicator--0bc9fcae-fc75-4910-a8c0-61949bd76bb9" ,
"x-misp-object--32b7a65f-d4d2-4920-a244-29c98222f6ff" ,
"indicator--10b7197c-b557-4d29-a593-8f81e682c400" ,
"x-misp-object--1752315a-8a3b-4114-badf-c204312c304b" ,
"indicator--4e2be21d-c114-470c-8845-572d708cdbec" ,
"x-misp-object--25558597-1dd5-4fb9-99b6-53db526d0e6e" ,
2023-12-14 13:47:04 +00:00
"relationship--3fc857e3-a3b9-42fd-9f02-13c389a8e488" ,
"relationship--5af45631-9018-453c-adeb-e6029e4b5ad2" ,
"relationship--4fbb5498-3b53-4649-9ee9-882afe2f46b7" ,
"relationship--b8d825aa-5ee0-4e5e-ac4e-ebf2c360f278"
2023-06-14 17:31:25 +00:00
] ,
"labels" : [
"Threat-Report" ,
"misp:tool=\"MISP-STIX-Converter\"" ,
"type:OSINT" ,
"osint:lifetime=\"perpetual\"" ,
"osint:certainty=\"50\""
] ,
"object_marking_refs" : [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--50cd9c70-16e3-4d80-a63f-6a8cccc82068" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2020-09-22T12:15:24.000Z" ,
"modified" : "2020-09-22T12:15:24.000Z" ,
"pattern" : "[file:hashes.SHA1 = 'cc373d633a16817f7d21372c56955923c9dda825']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2020-09-22T12:15:24Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--3e5b904b-5895-4b38-a3fe-3f1c45556e2d" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2020-09-22T12:15:24.000Z" ,
"modified" : "2020-09-22T12:15:24.000Z" ,
"description" : "(UPX packed)" ,
"pattern" : "[file:hashes.SHA1 = '8e2624da4d209abd3364d90f7bc08230f84510db']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2020-09-22T12:15:24Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--0e0e63a2-2df9-48bf-a051-033dc07e1c28" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2020-09-22T12:15:24.000Z" ,
"modified" : "2020-09-22T12:15:24.000Z" ,
"pattern" : "[file:hashes.SHA1 = 'fc7ccabb239ad6fd22472e5b7bb6a5773b7a3dac']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2020-09-22T12:15:24Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--4bc87d38-3261-47a3-8aed-2f4e6d6a90b9" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2020-09-22T12:15:24.000Z" ,
"modified" : "2020-09-22T12:15:24.000Z" ,
"description" : "(Corrupted)" ,
"pattern" : "[file:hashes.SHA1 = '8532e858eb24ae38632091d2d790a1299b7bbc87']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2020-09-22T12:15:24Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--d0bc874d-f910-42af-8487-49d59744ac09" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2020-09-22T12:15:44.000Z" ,
"modified" : "2020-09-22T12:15:44.000Z" ,
"first_observed" : "2020-09-22T12:15:44Z" ,
"last_observed" : "2020-09-22T12:15:44Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--d0bc874d-f910-42af-8487-49d59744ac09"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--d0bc874d-f910-42af-8487-49d59744ac09" ,
"value" : "https://github.com/eset/malware-ioc/tree/master/cdrthief"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--e709726a-d154-43ef-86c7-18eb24a81774" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2020-09-22T12:16:04.000Z" ,
"modified" : "2020-09-22T12:16:04.000Z" ,
"description" : "C&C servers" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '119.29.173.65']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2020-09-22T12:16:04Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--7bba10cd-0db9-4236-8351-3e592852b524" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2020-09-22T12:16:04.000Z" ,
"modified" : "2020-09-22T12:16:04.000Z" ,
"description" : "C&C servers" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '129.211.157.244']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2020-09-22T12:16:04Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--23f961d6-6059-47a4-854e-9122fe8ad07e" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2020-09-22T12:16:04.000Z" ,
"modified" : "2020-09-22T12:16:04.000Z" ,
"description" : "C&C servers" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '129.226.134.180']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2020-09-22T12:16:04Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--509ee329-28fd-433e-866e-8756879ee048" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2020-09-22T12:16:04.000Z" ,
"modified" : "2020-09-22T12:16:04.000Z" ,
"description" : "C&C servers" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '150.109.79.136']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2020-09-22T12:16:04Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--19c40342-9c51-4d22-863a-aa043f160819" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2020-09-22T12:16:04.000Z" ,
"modified" : "2020-09-22T12:16:04.000Z" ,
"description" : "C&C servers" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '34.94.199.142']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2020-09-22T12:16:04Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--3f66f469-98f7-40d5-b7a8-f8107c5f494a" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2020-09-22T12:16:04.000Z" ,
"modified" : "2020-09-22T12:16:04.000Z" ,
"description" : "C&C servers" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '35.236.173.187']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2020-09-22T12:16:04Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--bc967985-2f6a-4ddd-bdf2-65742ffc89c6" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2020-09-22T12:16:57.000Z" ,
"modified" : "2020-09-22T12:16:57.000Z" ,
"pattern" : "[mutex:name = '/dev/shm/.bin']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2020-09-22T12:16:57Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Artifacts dropped"
}
] ,
"labels" : [
"misp:type=\"mutex\"" ,
"misp:category=\"Artifacts dropped\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--a753b1c5-18cd-4f49-903a-dbec8618f0c6" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2020-09-22T12:16:57.000Z" ,
"modified" : "2020-09-22T12:16:57.000Z" ,
"pattern" : "[mutex:name = '/dev/shm/.linux']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2020-09-22T12:16:57Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Artifacts dropped"
}
] ,
"labels" : [
"misp:type=\"mutex\"" ,
"misp:category=\"Artifacts dropped\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--d4470b8f-b772-415b-a89a-b22c25431d9f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2020-09-22T12:17:30.000Z" ,
"modified" : "2020-09-22T12:17:30.000Z" ,
"pattern" : "[file:name = '/dev/shm/callservice']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2020-09-22T12:17:30Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Artifacts dropped"
}
] ,
"labels" : [
"misp:type=\"filename\"" ,
"misp:category=\"Artifacts dropped\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--aeb2152e-d589-4dce-8691-2eb1b25b0430" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2020-09-22T12:17:30.000Z" ,
"modified" : "2020-09-22T12:17:30.000Z" ,
"pattern" : "[file:name = '/dev/shm/sys.png']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2020-09-22T12:17:30Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Artifacts dropped"
}
] ,
"labels" : [
"misp:type=\"filename\"" ,
"misp:category=\"Artifacts dropped\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--b520b0c5-ba26-4f60-8ad4-77a9dd37987e" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2020-09-22T12:21:25.000Z" ,
"modified" : "2020-09-22T12:21:25.000Z" ,
"first_observed" : "2020-09-22T12:21:25Z" ,
"last_observed" : "2020-09-22T12:21:25Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--b520b0c5-ba26-4f60-8ad4-77a9dd37987e"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--b520b0c5-ba26-4f60-8ad4-77a9dd37987e" ,
"value" : "https://www.welivesecurity.com/2020/09/10/who-callin-cdrthief-linux-voip-softswitches/"
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--88331ce0-09ff-4c8a-93c5-3e27fc8e287c" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2020-09-22T12:19:10.000Z" ,
"modified" : "2020-09-22T12:19:10.000Z" ,
"labels" : [
"misp:name=\"crypto-material\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "text" ,
"object_relation" : "text" ,
"value" : "-----BEGIN PUBLIC KEY-----\r\nMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCQ3k3GgS3FX4pI7s9x0krBYqbMcSaw4BPY91Ln\r\ntt5/X8s9l0BC6PUTbQcUzs6PPXhKKTx8ph5CYQqdWynxOLJah0FMMRYxS8d0HX+Qx9eWUeKRHm2E\r\nAtZQjdHxqTJ9EBpHYWV4RrWmeoOsWAOisvedlb23O0E55e8rrGGrZLhPbwIDAQAB\r\n-----END PUBLIC KEY-----" ,
"category" : "Other" ,
"uuid" : "d54175fd-fa8c-4446-8b2c-548791780397"
} ,
{
"type" : "text" ,
"object_relation" : "type" ,
"value" : "RSA" ,
"category" : "Other" ,
"uuid" : "a31298ce-323c-49c0-84d7-2662b873a082"
} ,
{
"type" : "text" ,
"object_relation" : "origin" ,
"value" : "malware-extraction" ,
"category" : "Other" ,
"uuid" : "82b73e68-5afe-4e5c-9c52-38242f13c139"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "crypto-material"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--f782bda7-4bcb-4ad0-8c2f-2c5f18863652" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2020-09-22T12:20:29.000Z" ,
"modified" : "2020-09-22T12:20:29.000Z" ,
"pattern" : "[file:hashes.MD5 = '7124c56ab6d8133e2ed2042fb8c2248e' AND file:hashes.SHA1 = 'cc373d633a16817f7d21372c56955923c9dda825' AND file:hashes.SHA256 = '665acb48f9ad6317806231e52e5d3d05e91a93b20f40771a55e634192e8b094b']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2020-09-22T12:20:29Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--b53bd1ed-b1e6-46ac-b34d-3bbe67107eae" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2020-09-22T12:20:29.000Z" ,
"modified" : "2020-09-22T12:20:29.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2020-09-22T10:56:34+00:00" ,
"category" : "Other" ,
"uuid" : "9a8f52cd-f16e-49e5-a1ed-d019bbbd082d"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/gui/file/665acb48f9ad6317806231e52e5d3d05e91a93b20f40771a55e634192e8b094b/detection/f-665acb48f9ad6317806231e52e5d3d05e91a93b20f40771a55e634192e8b094b-1600772194" ,
"category" : "Payload delivery" ,
"uuid" : "1fa1ca4e-2145-4caf-8ab8-4ad2c1052100"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "32/62" ,
"category" : "Payload delivery" ,
"uuid" : "80c0cf1c-41e3-4ffa-9e48-374af830eaa4"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--0bc9fcae-fc75-4910-a8c0-61949bd76bb9" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2020-09-22T12:20:29.000Z" ,
"modified" : "2020-09-22T12:20:29.000Z" ,
"pattern" : "[file:hashes.MD5 = '926c77d3d9fdad7217a9b49bdf033336' AND file:hashes.SHA1 = '8e2624da4d209abd3364d90f7bc08230f84510db' AND file:hashes.SHA256 = 'ffe88d3012c15a680a506f0382264ea763ff2d426bf4ad3caf03111d47d9a80c']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2020-09-22T12:20:29Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--32b7a65f-d4d2-4920-a244-29c98222f6ff" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2020-09-22T12:20:29.000Z" ,
"modified" : "2020-09-22T12:20:29.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2020-09-22T10:56:43+00:00" ,
"category" : "Other" ,
"comment" : "(UPX packed)" ,
"uuid" : "7d174551-08ad-4371-819b-4f5ff30ea7e7"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/gui/file/ffe88d3012c15a680a506f0382264ea763ff2d426bf4ad3caf03111d47d9a80c/detection/f-ffe88d3012c15a680a506f0382264ea763ff2d426bf4ad3caf03111d47d9a80c-1600772203" ,
"category" : "Payload delivery" ,
"comment" : "(UPX packed)" ,
"uuid" : "da28f735-72f5-4fe2-9789-adae6df6294f"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "27/60" ,
"category" : "Payload delivery" ,
"comment" : "(UPX packed)" ,
"uuid" : "83b1dbb1-0edf-4939-80d1-7a0635d14587"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--10b7197c-b557-4d29-a593-8f81e682c400" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2020-09-22T12:20:29.000Z" ,
"modified" : "2020-09-22T12:20:29.000Z" ,
"pattern" : "[file:hashes.MD5 = '444a5116c6e2b37b33066be16f3e7e6d' AND file:hashes.SHA1 = '8532e858eb24ae38632091d2d790a1299b7bbc87' AND file:hashes.SHA256 = 'af75687cb030418c3196d6535d10479bc45e4248d60d3427230381e0d09e5ca4']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2020-09-22T12:20:29Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--1752315a-8a3b-4114-badf-c204312c304b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2020-09-22T12:20:29.000Z" ,
"modified" : "2020-09-22T12:20:29.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2020-09-22T10:56:33+00:00" ,
"category" : "Other" ,
"comment" : "(Corrupted)" ,
"uuid" : "f1afdfdd-941e-4136-a79c-19c30e0c3301"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/gui/file/af75687cb030418c3196d6535d10479bc45e4248d60d3427230381e0d09e5ca4/detection/f-af75687cb030418c3196d6535d10479bc45e4248d60d3427230381e0d09e5ca4-1600772193" ,
"category" : "Payload delivery" ,
"comment" : "(Corrupted)" ,
"uuid" : "46b3ca6a-2d76-4117-9317-92c3c5dd32d8"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "25/62" ,
"category" : "Payload delivery" ,
"comment" : "(Corrupted)" ,
"uuid" : "df800269-bf3b-432d-b8b3-aea329ae0be8"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--4e2be21d-c114-470c-8845-572d708cdbec" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2020-09-22T12:20:29.000Z" ,
"modified" : "2020-09-22T12:20:29.000Z" ,
"pattern" : "[file:hashes.MD5 = '3339b8c4a522548b67fca732c54fa232' AND file:hashes.SHA1 = 'fc7ccabb239ad6fd22472e5b7bb6a5773b7a3dac' AND file:hashes.SHA256 = '6b15cf51e4dff3e25b805173eef88940dbeb52b2662bd265450e6e54d5bb84d6']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2020-09-22T12:20:29Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--25558597-1dd5-4fb9-99b6-53db526d0e6e" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2020-09-22T12:20:29.000Z" ,
"modified" : "2020-09-22T12:20:29.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2020-09-22T10:56:24+00:00" ,
"category" : "Other" ,
"uuid" : "baf23e87-428f-4974-8764-e4bbcd5ea9b4"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/gui/file/6b15cf51e4dff3e25b805173eef88940dbeb52b2662bd265450e6e54d5bb84d6/detection/f-6b15cf51e4dff3e25b805173eef88940dbeb52b2662bd265450e6e54d5bb84d6-1600772184" ,
"category" : "Payload delivery" ,
"uuid" : "b397af60-d203-4dfe-bfad-d67bc45763ff"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "30/61" ,
"category" : "Payload delivery" ,
"uuid" : "f9400666-419d-444a-b2dd-bf8ea02c78e6"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2023-12-14 13:47:04 +00:00
"id" : "relationship--3fc857e3-a3b9-42fd-9f02-13c389a8e488" ,
2023-06-14 17:31:25 +00:00
"created" : "1970-01-01T00:00:00.000Z" ,
"modified" : "1970-01-01T00:00:00.000Z" ,
2023-04-21 13:25:09 +00:00
"relationship_type" : "analysed-with" ,
2023-06-14 17:31:25 +00:00
"source_ref" : "indicator--f782bda7-4bcb-4ad0-8c2f-2c5f18863652" ,
"target_ref" : "x-misp-object--b53bd1ed-b1e6-46ac-b34d-3bbe67107eae"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2023-12-14 13:47:04 +00:00
"id" : "relationship--5af45631-9018-453c-adeb-e6029e4b5ad2" ,
2023-06-14 17:31:25 +00:00
"created" : "1970-01-01T00:00:00.000Z" ,
"modified" : "1970-01-01T00:00:00.000Z" ,
2023-04-21 13:25:09 +00:00
"relationship_type" : "analysed-with" ,
2023-06-14 17:31:25 +00:00
"source_ref" : "indicator--0bc9fcae-fc75-4910-a8c0-61949bd76bb9" ,
"target_ref" : "x-misp-object--32b7a65f-d4d2-4920-a244-29c98222f6ff"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2023-12-14 13:47:04 +00:00
"id" : "relationship--4fbb5498-3b53-4649-9ee9-882afe2f46b7" ,
2023-06-14 17:31:25 +00:00
"created" : "1970-01-01T00:00:00.000Z" ,
"modified" : "1970-01-01T00:00:00.000Z" ,
2023-04-21 13:25:09 +00:00
"relationship_type" : "analysed-with" ,
2023-06-14 17:31:25 +00:00
"source_ref" : "indicator--10b7197c-b557-4d29-a593-8f81e682c400" ,
"target_ref" : "x-misp-object--1752315a-8a3b-4114-badf-c204312c304b"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2023-12-14 13:47:04 +00:00
"id" : "relationship--b8d825aa-5ee0-4e5e-ac4e-ebf2c360f278" ,
2023-06-14 17:31:25 +00:00
"created" : "1970-01-01T00:00:00.000Z" ,
"modified" : "1970-01-01T00:00:00.000Z" ,
2023-04-21 13:25:09 +00:00
"relationship_type" : "analysed-with" ,
2023-06-14 17:31:25 +00:00
"source_ref" : "indicator--4e2be21d-c114-470c-8845-572d708cdbec" ,
"target_ref" : "x-misp-object--25558597-1dd5-4fb9-99b6-53db526d0e6e"
} ,
{
"type" : "marking-definition" ,
"spec_version" : "2.1" ,
"id" : "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ,
"created" : "2017-01-20T00:00:00.000Z" ,
"definition_type" : "tlp" ,
"name" : "TLP:WHITE" ,
"definition" : {
"tlp" : "white"
}
}
2023-04-21 13:25:09 +00:00
]
}