misp-circl-feed/feeds/circl/misp/54aea268-ffc4-47e8-b09a-9c33950d210b.json

971 lines
41 KiB
JSON
Raw Normal View History

2023-04-21 13:25:09 +00:00
{
2023-06-14 17:31:25 +00:00
"type": "bundle",
"id": "bundle--54aea268-ffc4-47e8-b09a-9c33950d210b",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-08T00:28:45.000Z",
"modified": "2016-03-08T00:28:45.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--54aea268-ffc4-47e8-b09a-9c33950d210b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-08T00:28:45.000Z",
"modified": "2016-03-08T00:28:45.000Z",
"name": "OSINT - The Connections Between MiniDuke, CosmicDuke and OnionDuke",
"published": "2015-01-15T16:21:51Z",
"object_refs": [
"indicator--54aea2d0-6040-41b3-ba1c-4dc8950d210b",
"indicator--54aea2d0-93f8-4876-a48b-4279950d210b",
"indicator--54aea2ff-204c-42e2-97f4-ba76950d210b",
"indicator--54aea321-b058-4dc6-8192-4284950d210b",
"indicator--54aea34f-f028-4b6c-8269-4afb950d210b",
"indicator--54aea36d-a54c-4e1a-9564-4450950d210b",
"indicator--54aea393-e95c-4571-a5a4-9c33950d210b",
"indicator--54aea3da-68dc-42be-93df-d60e950d210b",
"indicator--54aea3fb-fd1c-40a0-a65e-44c2950d210b",
"indicator--54aea423-dd08-485e-ba92-4156950d210b",
"indicator--54aea44f-1f04-4abd-9576-9c33950d210b",
"x-misp-attribute--54aea46f-776c-4176-b698-ba76950d210b",
"x-misp-attribute--54aea46f-fb0c-41f3-8f12-ba76950d210b",
"x-misp-attribute--54aea46f-3da8-4b16-ba39-ba76950d210b",
"indicator--54aea4a3-4680-4942-9f1a-4d6c950d210b",
"x-misp-attribute--54b6261c-ac2c-402c-87af-d563950d210b",
"x-misp-attribute--54b6261c-bee8-4cbe-8ae2-d563950d210b",
"x-misp-attribute--54b6261c-c028-4c69-a879-d563950d210b",
"indicator--56de1cbd-0be0-4f54-b7c6-4f2e02de0b81",
"indicator--56de1cbd-7bb8-424b-9eec-492902de0b81",
"observed-data--56de1cbe-6240-4b66-91c6-443502de0b81",
"url--56de1cbe-6240-4b66-91c6-443502de0b81",
"indicator--56de1cbe-0240-44bb-9c0c-408202de0b81",
"indicator--56de1cbe-0374-4437-ab8d-467302de0b81",
"observed-data--56de1cbe-33ac-4535-b0d6-475602de0b81",
"url--56de1cbe-33ac-4535-b0d6-475602de0b81",
"indicator--56de1cbf-f5cc-41bc-80f9-4b0902de0b81",
"indicator--56de1cbf-8058-40b1-9b4c-469c02de0b81",
"observed-data--56de1cbf-6e7c-43df-b933-4c7902de0b81",
"url--56de1cbf-6e7c-43df-b933-4c7902de0b81",
"indicator--56de1cc0-b0a4-4846-84a1-452802de0b81",
"indicator--56de1cc0-c030-4e51-adef-475302de0b81",
"observed-data--56de1cc0-1810-4b1d-ac3e-4d0f02de0b81",
"url--56de1cc0-1810-4b1d-ac3e-4d0f02de0b81",
"indicator--56de1cc0-16b8-4f7e-9436-458e02de0b81",
"indicator--56de1cc1-9628-4ff0-9fd0-4fcf02de0b81",
"observed-data--56de1cc1-841c-4ad8-9191-482302de0b81",
"url--56de1cc1-841c-4ad8-9191-482302de0b81",
"indicator--56de1cc1-1540-456c-96d7-448f02de0b81",
"indicator--56de1cc2-68a8-4157-8101-475b02de0b81",
"observed-data--56de1cc2-f9c0-42d4-8042-48e102de0b81",
"url--56de1cc2-f9c0-42d4-8042-48e102de0b81",
"indicator--56de1cc2-9bbc-44f3-beb1-4ddc02de0b81",
"indicator--56de1cc2-9d48-4e9d-8e59-49bc02de0b81",
"observed-data--56de1cc3-85c0-4fb8-acac-448b02de0b81",
"url--56de1cc3-85c0-4fb8-acac-448b02de0b81"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"type:OSINT"
],
"object_marking_refs": [
"marking-definition--34098fce-860f-48ae-8e50-ebd3cc5e41da"
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--54aea2d0-6040-41b3-ba1c-4dc8950d210b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2015-01-08T15:31:28.000Z",
"modified": "2015-01-08T15:31:28.000Z",
"pattern": "[file:name = '\u00e2\u20ac\u0153EU sanctions against Russia over Ukraine crisis\u00e2\u20ac\u0153.docm' AND file:hashes.SHA1 = '82448eb23ea9eb3939b6f24df46789bf7f2d43e3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2015-01-08T15:31:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"filename|sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--54aea2d0-93f8-4876-a48b-4279950d210b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2015-01-08T15:31:28.000Z",
"modified": "2015-01-08T15:31:28.000Z",
"pattern": "[file:name = '\u00e2\u20ac\u0153A Scottish \u00e2\u20ac\u02dcYes\u00e2\u20ac\u2122 to independence\u00e2\u20ac\u0153 .docm' AND file:hashes.SHA1 = 'c86b13378ba2a41684e1f93b4c20e05fc5d3d5a3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2015-01-08T15:31:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"filename|sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--54aea2ff-204c-42e2-97f4-ba76950d210b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2015-01-08T15:32:15.000Z",
"modified": "2015-01-08T15:32:15.000Z",
"description": "32-bit dropper",
"pattern": "[file:hashes.SHA1 = '241075fc1493172c47d881bcbfbf21cfa4daa42d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2015-01-08T15:32:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--54aea321-b058-4dc6-8192-4284950d210b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2015-01-08T15:32:49.000Z",
"modified": "2015-01-08T15:32:49.000Z",
"description": "64-bit dropper",
"pattern": "[file:hashes.SHA1 = '51ac683df63ff71a0003ca17e640bbeaaa14d0aa']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2015-01-08T15:32:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--54aea34f-f028-4b6c-8269-4afb950d210b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2015-01-08T15:33:35.000Z",
"modified": "2015-01-08T15:33:35.000Z",
"description": "CosmicDuke-MiniDuke combo",
"pattern": "[file:hashes.SHA1 = '7ad1bef0ba61dbed98d76d4207676d08c893fc13']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2015-01-08T15:33:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--54aea36d-a54c-4e1a-9564-4450950d210b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2015-01-08T15:34:05.000Z",
"modified": "2015-01-08T15:34:05.000Z",
"description": "OnionDuke limited backdoor",
"pattern": "[file:hashes.SHA1 = 'b491c14d8cfb48636f6095b7b16555e9a575d57f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2015-01-08T15:34:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--54aea393-e95c-4571-a5a4-9c33950d210b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2015-01-08T15:34:43.000Z",
"modified": "2015-01-08T15:34:43.000Z",
"description": "OnionDuke full backdoor",
"pattern": "[file:hashes.SHA1 = 'd433f281cf56015941a1c2cb87066ca62ea1db37']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2015-01-08T15:34:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--54aea3da-68dc-42be-93df-d60e950d210b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2015-01-08T15:35:54.000Z",
"modified": "2015-01-08T15:35:54.000Z",
"description": "Expansion",
"pattern": "[email-message:from_ref.value = 'uibo.lembit@mail.ee']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2015-01-08T15:35:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-src\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--54aea3fb-fd1c-40a0-a65e-44c2950d210b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2015-01-08T15:36:27.000Z",
"modified": "2015-01-08T15:36:27.000Z",
"description": "Expansion",
"pattern": "[email-message:to_refs[*].value = 'uibo.lembit@mail.ee']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2015-01-08T15:36:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-dst\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--54aea423-dd08-485e-ba92-4156950d210b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2015-01-08T15:37:07.000Z",
"modified": "2015-01-08T15:37:07.000Z",
"description": "Expansion",
"pattern": "[email-message:subject = 'EU sanctions against Russia over Ukraine crisis (Estonia\\'s opinion)']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2015-01-08T15:37:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-subject\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--54aea44f-1f04-4abd-9576-9c33950d210b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2015-01-08T15:37:51.000Z",
"modified": "2015-01-08T15:37:51.000Z",
"description": "Expansion",
"pattern": "[email-message:body_multipart[*].body_raw_ref.name = '=?UTF-8?Q?[rep]estonia.doc?=']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2015-01-08T15:37:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-attachment\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--54aea46f-776c-4176-b698-ba76950d210b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2015-01-08T15:38:23.000Z",
"modified": "2015-01-08T15:38:23.000Z",
"labels": [
"misp:type=\"text\"",
"misp:category=\"Other\""
],
"x_misp_category": "Other",
"x_misp_type": "text",
"x_misp_value": "MiniDuke"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--54aea46f-fb0c-41f3-8f12-ba76950d210b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2015-01-08T15:38:23.000Z",
"modified": "2015-01-08T15:38:23.000Z",
"labels": [
"misp:type=\"text\"",
"misp:category=\"Other\""
],
"x_misp_category": "Other",
"x_misp_type": "text",
"x_misp_value": "OnionDuke"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--54aea46f-3da8-4b16-ba39-ba76950d210b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2015-01-08T15:38:23.000Z",
"modified": "2015-01-08T15:38:23.000Z",
"labels": [
"misp:type=\"text\"",
"misp:category=\"Other\""
],
"x_misp_category": "Other",
"x_misp_type": "text",
"x_misp_value": "CosmicDuke"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--54aea4a3-4680-4942-9f1a-4d6c950d210b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2015-01-08T15:39:15.000Z",
"modified": "2015-01-08T15:39:15.000Z",
"pattern": "[email-message:body_multipart[*].body_raw_ref.name = 'World News Digest.docx']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2015-01-08T15:39:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-attachment\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--54b6261c-ac2c-402c-87af-d563950d210b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2015-01-14T08:17:32.000Z",
"modified": "2015-01-14T08:17:32.000Z",
"labels": [
"misp:type=\"text\"",
"misp:category=\"External analysis\""
],
"x_misp_category": "External analysis",
"x_misp_type": "text",
"x_misp_value": "Onion Duke"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--54b6261c-bee8-4cbe-8ae2-d563950d210b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2015-01-14T08:17:32.000Z",
"modified": "2015-01-14T08:17:32.000Z",
"labels": [
"misp:type=\"text\"",
"misp:category=\"External analysis\""
],
"x_misp_category": "External analysis",
"x_misp_type": "text",
"x_misp_value": "Cosmic Duke"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--54b6261c-c028-4c69-a879-d563950d210b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2015-01-14T08:17:32.000Z",
"modified": "2015-01-14T08:17:32.000Z",
"labels": [
"misp:type=\"text\"",
"misp:category=\"External analysis\""
],
"x_misp_category": "External analysis",
"x_misp_type": "text",
"x_misp_value": "Mini Duke"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--56de1cbd-0be0-4f54-b7c6-4f2e02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-08T00:28:45.000Z",
"modified": "2016-03-08T00:28:45.000Z",
"description": "32-bit dropper - Xchecked via VT: 241075fc1493172c47d881bcbfbf21cfa4daa42d",
"pattern": "[file:hashes.SHA256 = '2b15581baf7d69cd3c65a86f20eff813b4cbb9bae7a0362f97e76e21364dabca']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-03-08T00:28:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--56de1cbd-7bb8-424b-9eec-492902de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-08T00:28:45.000Z",
"modified": "2016-03-08T00:28:45.000Z",
"description": "32-bit dropper - Xchecked via VT: 241075fc1493172c47d881bcbfbf21cfa4daa42d",
"pattern": "[file:hashes.MD5 = '01400499ecc7fa6a50cc860179273a7f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-03-08T00:28:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--56de1cbe-6240-4b66-91c6-443502de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-08T00:28:46.000Z",
"modified": "2016-03-08T00:28:46.000Z",
"first_observed": "2016-03-08T00:28:46Z",
"last_observed": "2016-03-08T00:28:46Z",
"number_observed": 1,
"object_refs": [
"url--56de1cbe-6240-4b66-91c6-443502de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--56de1cbe-6240-4b66-91c6-443502de0b81",
"value": "https://www.virustotal.com/file/2b15581baf7d69cd3c65a86f20eff813b4cbb9bae7a0362f97e76e21364dabca/analysis/1445916566/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--56de1cbe-0240-44bb-9c0c-408202de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-08T00:28:46.000Z",
"modified": "2016-03-08T00:28:46.000Z",
"description": "64-bit dropper - Xchecked via VT: 51ac683df63ff71a0003ca17e640bbeaaa14d0aa",
"pattern": "[file:hashes.SHA256 = '71cad7cc4e23d1e03c5d03cd9b48e32126b6bf7374841735ad642b62e2745a2c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-03-08T00:28:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--56de1cbe-0374-4437-ab8d-467302de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-08T00:28:46.000Z",
"modified": "2016-03-08T00:28:46.000Z",
"description": "64-bit dropper - Xchecked via VT: 51ac683df63ff71a0003ca17e640bbeaaa14d0aa",
"pattern": "[file:hashes.MD5 = 'eb48ff76cc7dd24b519c93a0aa250d27']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-03-08T00:28:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--56de1cbe-33ac-4535-b0d6-475602de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-08T00:28:46.000Z",
"modified": "2016-03-08T00:28:46.000Z",
"first_observed": "2016-03-08T00:28:46Z",
"last_observed": "2016-03-08T00:28:46Z",
"number_observed": 1,
"object_refs": [
"url--56de1cbe-33ac-4535-b0d6-475602de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--56de1cbe-33ac-4535-b0d6-475602de0b81",
"value": "https://www.virustotal.com/file/71cad7cc4e23d1e03c5d03cd9b48e32126b6bf7374841735ad642b62e2745a2c/analysis/1445916567/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--56de1cbf-f5cc-41bc-80f9-4b0902de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-08T00:28:47.000Z",
"modified": "2016-03-08T00:28:47.000Z",
"description": "CosmicDuke-MiniDuke combo - Xchecked via VT: 7ad1bef0ba61dbed98d76d4207676d08c893fc13",
"pattern": "[file:hashes.SHA256 = '29585bb17b28e8b15b2a250be9516f416fa7cac84cc24aa4e004f6987323147e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-03-08T00:28:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--56de1cbf-8058-40b1-9b4c-469c02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-08T00:28:47.000Z",
"modified": "2016-03-08T00:28:47.000Z",
"description": "CosmicDuke-MiniDuke combo - Xchecked via VT: 7ad1bef0ba61dbed98d76d4207676d08c893fc13",
"pattern": "[file:hashes.MD5 = '925b37a936304a5914941ac4584e346c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-03-08T00:28:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--56de1cbf-6e7c-43df-b933-4c7902de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-08T00:28:47.000Z",
"modified": "2016-03-08T00:28:47.000Z",
"first_observed": "2016-03-08T00:28:47Z",
"last_observed": "2016-03-08T00:28:47Z",
"number_observed": 1,
"object_refs": [
"url--56de1cbf-6e7c-43df-b933-4c7902de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--56de1cbf-6e7c-43df-b933-4c7902de0b81",
"value": "https://www.virustotal.com/file/29585bb17b28e8b15b2a250be9516f416fa7cac84cc24aa4e004f6987323147e/analysis/1452769402/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--56de1cc0-b0a4-4846-84a1-452802de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-08T00:28:48.000Z",
"modified": "2016-03-08T00:28:48.000Z",
"description": "OnionDuke limited backdoor - Xchecked via VT: b491c14d8cfb48636f6095b7b16555e9a575d57f",
"pattern": "[file:hashes.SHA256 = '366affd094cc63e2c19c5d57a6866b487889dab5d1b07c084fff94262d8a390b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-03-08T00:28:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--56de1cc0-c030-4e51-adef-475302de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-08T00:28:48.000Z",
"modified": "2016-03-08T00:28:48.000Z",
"description": "OnionDuke limited backdoor - Xchecked via VT: b491c14d8cfb48636f6095b7b16555e9a575d57f",
"pattern": "[file:hashes.MD5 = 'c8eb6040fd02d77660d19057a38ff769']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-03-08T00:28:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--56de1cc0-1810-4b1d-ac3e-4d0f02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-08T00:28:48.000Z",
"modified": "2016-03-08T00:28:48.000Z",
"first_observed": "2016-03-08T00:28:48Z",
"last_observed": "2016-03-08T00:28:48Z",
"number_observed": 1,
"object_refs": [
"url--56de1cc0-1810-4b1d-ac3e-4d0f02de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--56de1cc0-1810-4b1d-ac3e-4d0f02de0b81",
"value": "https://www.virustotal.com/file/366affd094cc63e2c19c5d57a6866b487889dab5d1b07c084fff94262d8a390b/analysis/1456819261/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--56de1cc0-16b8-4f7e-9436-458e02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-08T00:28:48.000Z",
"modified": "2016-03-08T00:28:48.000Z",
"description": "OnionDuke full backdoor - Xchecked via VT: d433f281cf56015941a1c2cb87066ca62ea1db37",
"pattern": "[file:hashes.SHA256 = '0102777ec0357655c4313419be3a15c4ca17c4f9cb4a440bfb16195239905ade']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-03-08T00:28:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--56de1cc1-9628-4ff0-9fd0-4fcf02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-08T00:28:49.000Z",
"modified": "2016-03-08T00:28:49.000Z",
"description": "OnionDuke full backdoor - Xchecked via VT: d433f281cf56015941a1c2cb87066ca62ea1db37",
"pattern": "[file:hashes.MD5 = 'd1ce79089578da2d41f1ad901f7b1014']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-03-08T00:28:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload installation"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload installation\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--56de1cc1-841c-4ad8-9191-482302de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-08T00:28:49.000Z",
"modified": "2016-03-08T00:28:49.000Z",
"first_observed": "2016-03-08T00:28:49Z",
"last_observed": "2016-03-08T00:28:49Z",
"number_observed": 1,
"object_refs": [
"url--56de1cc1-841c-4ad8-9191-482302de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--56de1cc1-841c-4ad8-9191-482302de0b81",
"value": "https://www.virustotal.com/file/0102777ec0357655c4313419be3a15c4ca17c4f9cb4a440bfb16195239905ade/analysis/1456923691/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--56de1cc1-1540-456c-96d7-448f02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-08T00:28:49.000Z",
"modified": "2016-03-08T00:28:49.000Z",
"description": "- Xchecked via VT: 82448eb23ea9eb3939b6f24df46789bf7f2d43e3",
"pattern": "[file:hashes.SHA256 = 'abcaf6044d4d591a50ac3328ed8c8ab3ec91929d2f0d7e3bea1ed0cfc92e811d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-03-08T00:28:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--56de1cc2-68a8-4157-8101-475b02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-08T00:28:50.000Z",
"modified": "2016-03-08T00:28:50.000Z",
"description": "- Xchecked via VT: 82448eb23ea9eb3939b6f24df46789bf7f2d43e3",
"pattern": "[file:hashes.MD5 = 'f27ffc3d3ff7a2ddc6728d9495427ee5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-03-08T00:28:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--56de1cc2-f9c0-42d4-8042-48e102de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-08T00:28:50.000Z",
"modified": "2016-03-08T00:28:50.000Z",
"first_observed": "2016-03-08T00:28:50Z",
"last_observed": "2016-03-08T00:28:50Z",
"number_observed": 1,
"object_refs": [
"url--56de1cc2-f9c0-42d4-8042-48e102de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--56de1cc2-f9c0-42d4-8042-48e102de0b81",
"value": "https://www.virustotal.com/file/abcaf6044d4d591a50ac3328ed8c8ab3ec91929d2f0d7e3bea1ed0cfc92e811d/analysis/1444969477/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--56de1cc2-9bbc-44f3-beb1-4ddc02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-08T00:28:50.000Z",
"modified": "2016-03-08T00:28:50.000Z",
"description": "- Xchecked via VT: c86b13378ba2a41684e1f93b4c20e05fc5d3d5a3",
"pattern": "[file:hashes.SHA256 = '1a981bd49b9869a1c81e767ba7418254138272b005dab5c83f3798906ca86570']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-03-08T00:28:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--56de1cc2-9d48-4e9d-8e59-49bc02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-08T00:28:50.000Z",
"modified": "2016-03-08T00:28:50.000Z",
"description": "- Xchecked via VT: c86b13378ba2a41684e1f93b4c20e05fc5d3d5a3",
"pattern": "[file:hashes.MD5 = 'ed463d501c23db34e27bd32902971081']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-03-08T00:28:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--56de1cc3-85c0-4fb8-acac-448b02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-03-08T00:28:51.000Z",
"modified": "2016-03-08T00:28:51.000Z",
"first_observed": "2016-03-08T00:28:51Z",
"last_observed": "2016-03-08T00:28:51Z",
"number_observed": 1,
"object_refs": [
"url--56de1cc3-85c0-4fb8-acac-448b02de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--56de1cc3-85c0-4fb8-acac-448b02de0b81",
"value": "https://www.virustotal.com/file/1a981bd49b9869a1c81e767ba7418254138272b005dab5c83f3798906ca86570/analysis/1425845303/"
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--34098fce-860f-48ae-8e50-ebd3cc5e41da",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:GREEN",
"definition": {
"tlp": "green"
}
}
2023-04-21 13:25:09 +00:00
]
}