2023-04-21 13:25:09 +00:00
{
2023-06-14 17:31:25 +00:00
"type" : "bundle" ,
"id" : "bundle--568e62b7-0930-4398-a617-4147950d210f" ,
"objects" : [
{
"type" : "identity" ,
"spec_version" : "2.1" ,
"id" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:25.000Z" ,
"modified" : "2016-01-07T13:10:25.000Z" ,
"name" : "CIRCL" ,
"identity_class" : "organization"
} ,
{
"type" : "report" ,
"spec_version" : "2.1" ,
"id" : "report--568e62b7-0930-4398-a617-4147950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:25.000Z" ,
"modified" : "2016-01-07T13:10:25.000Z" ,
"name" : "OSINT - Android-based Smart TVs Hit By Backdoor Spread Via Malicious App" ,
"published" : "2016-01-07T13:16:54Z" ,
"object_refs" : [
"indicator--568e62e2-2f28-49f9-922c-4e83950d210f" ,
"indicator--568e62e2-5ca0-4372-a2ec-416f950d210f" ,
"indicator--568e62e3-eaac-483d-a258-49e5950d210f" ,
"indicator--568e62e3-b858-4036-b895-418d950d210f" ,
"indicator--568e62e3-1f14-4777-88a4-4794950d210f" ,
"x-misp-attribute--568e62f5-5968-4ecd-aa1d-41dd950d210f" ,
"observed-data--568e6301-9e58-4d9e-9d50-4e9d950d210f" ,
"url--568e6301-9e58-4d9e-9d50-4e9d950d210f" ,
"indicator--568e6352-a348-4021-990b-477c950d210f" ,
"indicator--568e6352-e0dc-40ad-bf4f-424a950d210f" ,
"indicator--568e6353-0dcc-4534-a13e-4b35950d210f" ,
"indicator--568e6353-8714-4aa9-b185-4110950d210f" ,
"indicator--568e6383-119c-4873-83ba-4812950d210f" ,
"indicator--568e6384-0c50-48d4-9b78-4ff9950d210f" ,
"indicator--568e6384-77f4-4512-a391-4a53950d210f" ,
"indicator--568e6384-1608-4f0b-bc59-4b7a950d210f" ,
"indicator--568e6384-9bd8-4e0e-91c5-4c8d950d210f" ,
"indicator--568e6385-4588-4e5c-b311-44ee950d210f" ,
"indicator--568e6385-7e78-4e4e-acd1-4704950d210f" ,
"indicator--568e6385-f1f8-455e-8f29-4f7d950d210f" ,
"indicator--568e6386-7f40-4f47-8a4d-4b2b950d210f" ,
"indicator--568e6386-ae48-4da7-a9c3-40f2950d210f" ,
"indicator--568e6386-5374-4aee-92f2-4362950d210f" ,
"indicator--568e6387-1f20-41ae-a99a-4287950d210f" ,
"indicator--568e6387-a9ec-4b7a-888f-4c72950d210f" ,
"indicator--568e6387-9a10-4b21-bea4-48d3950d210f" ,
"indicator--568e6388-0e44-4fae-a102-4992950d210f" ,
"indicator--568e6388-9b68-4542-a92d-415a950d210f" ,
"indicator--568e6388-3c38-466f-88e3-456f950d210f" ,
"indicator--568e6389-8988-40df-a924-4ddf950d210f" ,
"indicator--568e6389-0730-4d66-9ee9-4bd7950d210f" ,
"indicator--568e6389-1fac-4445-998f-48cf950d210f" ,
"indicator--568e6389-08e4-4ba9-ad03-4240950d210f" ,
"indicator--568e638a-f630-453e-b1f6-40ce950d210f" ,
"indicator--568e63c1-1f3c-4f86-8fe9-472e02de0b81" ,
"indicator--568e63c1-e9e8-4778-95f4-4e8902de0b81" ,
"indicator--568e63c1-86ac-45fa-a825-436c02de0b81" ,
"indicator--568e63c2-98d0-45c6-aa02-4f1e02de0b81" ,
"indicator--568e63c2-ce5c-41f6-9f4b-40c802de0b81" ,
"indicator--568e63c2-e168-47d6-8574-4a3902de0b81" ,
"indicator--568e63c2-cfa8-44c7-a0b5-4eb102de0b81" ,
"indicator--568e63c3-fa4c-40ad-9151-4c1d02de0b81" ,
"indicator--568e63c3-4284-4067-ade4-463e02de0b81" ,
"indicator--568e63c3-ae30-49f7-8037-486802de0b81" ,
"indicator--568e63c3-4df4-4e6e-80da-4e8402de0b81" ,
"indicator--568e63c4-b3e8-4caa-b251-417d02de0b81" ,
"indicator--568e63c4-8ce4-4fb6-82c0-481b02de0b81" ,
"indicator--568e63c4-5660-47bd-baa4-48db02de0b81" ,
"indicator--568e63c4-5348-461f-9774-4aa002de0b81" ,
"indicator--568e63c5-2350-498b-9e6d-4ee402de0b81" ,
"indicator--568e63c5-e294-48ca-86c3-4e2102de0b81" ,
"indicator--568e63c5-3dbc-4201-b241-4f2d02de0b81" ,
"indicator--568e63c5-a654-4cc5-a8a2-445902de0b81" ,
"indicator--568e63c6-6e88-4ac6-b70f-42a802de0b81" ,
"indicator--568e63c6-01ac-4fd0-85cb-44f102de0b81" ,
"indicator--568e63c6-eef4-42e1-bf5a-424002de0b81" ,
"indicator--568e63c6-5bf8-4768-81d2-4a7b02de0b81" ,
"indicator--568e63c7-f144-40eb-b943-48b802de0b81" ,
"indicator--568e63c7-eb40-44c7-821e-4aa902de0b81" ,
"indicator--568e63c7-8274-4b09-a7c4-49cb02de0b81" ,
"indicator--568e63c7-8e90-42a2-a409-43e702de0b81" ,
"indicator--568e63c8-74e8-4ae2-954d-4bed02de0b81" ,
"indicator--568e63c8-be7c-45c2-af72-486b02de0b81" ,
"indicator--568e63c8-f2fc-4aa2-8122-422a02de0b81"
] ,
"labels" : [
"Threat-Report" ,
"misp:tool=\"MISP-STIX-Converter\"" ,
"type:OSINT"
] ,
"object_marking_refs" : [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e62e2-2f28-49f9-922c-4e83950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:06:42.000Z" ,
"modified" : "2016-01-07T13:06:42.000Z" ,
"description" : "Sites that serve malware to smart TVs" ,
"pattern" : "[url:value = 'http://pf3a.res4f.com']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:06:42Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e62e2-5ca0-4372-a2ec-416f950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:06:42.000Z" ,
"modified" : "2016-01-07T13:06:42.000Z" ,
"description" : "Sites that serve malware to smart TVs" ,
"pattern" : "[url:value = 'http://www.htvmarket.com']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:06:42Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e62e3-eaac-483d-a258-49e5950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:06:43.000Z" ,
"modified" : "2016-01-07T13:06:43.000Z" ,
"description" : "Sites that serve malware to smart TVs" ,
"pattern" : "[url:value = 'http://mak.wak2p.com']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:06:43Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e62e3-b858-4036-b895-418d950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:06:43.000Z" ,
"modified" : "2016-01-07T13:06:43.000Z" ,
"description" : "Sites that serve malware to smart TVs" ,
"pattern" : "[url:value = 'http://wh.waks2.com']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:06:43Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e62e3-1f14-4777-88a4-4794950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:06:43.000Z" ,
"modified" : "2016-01-07T13:06:43.000Z" ,
"description" : "Sites that serve malware to smart TVs" ,
"pattern" : "[url:value = 'https://sites.google.com/site/htvfanshare/2012summer_collection']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:06:43Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--568e62f5-5968-4ecd-aa1d-41dd950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:07:01.000Z" ,
"modified" : "2016-01-07T13:07:01.000Z" ,
"labels" : [
"misp:type=\"comment\"" ,
"misp:category=\"External analysis\""
] ,
"x_misp_category" : "External analysis" ,
"x_misp_type" : "comment" ,
"x_misp_value" : "With the year-end shopping season over, many consumers now have new various smart gadgets in their homes. One particularly popular usage of this so-called Internet of Things (IoT) are smart TVs. These TVs are more than just passive display devices; many of them can even run Android apps as well. Some may find these features useful, but these capabilities bring their own risks. (This was something we noted two years ago when we first looked some of the issues of smart TVs.)\r\n\r\nApps that allow users to watch channels from other parts of the world (that would otherwise be unavailable via other methods) are something that many users would find useful. However, some of these apps may put users at risk. These apps contain a backdoor that abuses an old flaw (CVE-2014-7911) in Android versions before Lollipop 5.0 (Cupcake 1.5 to Kitkat 4.4W.2). (We detect these malicious apps as ANDROIDOS_ROOTSTV.A.)\r\n\r\nMost smart TVs today use older versions of Android, which still contain this flaw. TV brands that sell vulnerable smart TVs include Changhong, Konka, Mi, Philips, Panasonic, and Sharp. In addition, other Android devices with older versions installed are also at risk: it just happens to be that because of these kinds of apps are mainly used in smart TVs or smart TV boxes."
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--568e6301-9e58-4d9e-9d50-4e9d950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:07:13.000Z" ,
"modified" : "2016-01-07T13:07:13.000Z" ,
"first_observed" : "2016-01-07T13:07:13Z" ,
"last_observed" : "2016-01-07T13:07:13Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--568e6301-9e58-4d9e-9d50-4e9d950d210f"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--568e6301-9e58-4d9e-9d50-4e9d950d210f" ,
"value" : "http://blog.trendmicro.com/trendlabs-security-intelligence/android-based-smart-tvs-hit-by-backdoor-spread-via-malicious-app/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e6352-a348-4021-990b-477c950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:08:34.000Z" ,
"modified" : "2016-01-07T13:08:34.000Z" ,
"description" : "In addition to the websites above, the malware also uses the following download server" ,
"pattern" : "[domain-name:value = 'meiz.le2ui.com']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:08:34Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"hostname\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e6352-e0dc-40ad-bf4f-424a950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:08:34.000Z" ,
"modified" : "2016-01-07T13:08:34.000Z" ,
"description" : "In addition to the websites above, the malware also uses the following download server" ,
"pattern" : "[url:value = 'http://meiz.le2ui.com:80/marketdatas/apk/chinesevideo2.11.1.apk']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:08:34Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e6353-0dcc-4534-a13e-4b35950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:08:35.000Z" ,
"modified" : "2016-01-07T13:08:35.000Z" ,
"description" : "In addition to the websites above, the malware also uses the following download server" ,
"pattern" : "[domain-name:value = 'yaz.e3wsv.com']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:08:35Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"hostname\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e6353-8714-4aa9-b185-4110950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:08:35.000Z" ,
"modified" : "2016-01-07T13:08:35.000Z" ,
"description" : "In addition to the websites above, the malware also uses the following download server" ,
"pattern" : "[url:value = 'http://yaz.e3wsv.com:80/marketdatas/apk/chinesevideo2.11.1.apk']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:08:35Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e6383-119c-4873-83ba-4812950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:09:23.000Z" ,
"modified" : "2016-01-07T13:09:23.000Z" ,
"description" : "Related malware APK" ,
"pattern" : "[file:hashes.SHA1 = '019d4326d3340609b3f8326d51e031cafc6bf9a0']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:09:23Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e6384-0c50-48d4-9b78-4ff9950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:09:24.000Z" ,
"modified" : "2016-01-07T13:09:24.000Z" ,
"description" : "Related malware APK" ,
"pattern" : "[file:hashes.SHA1 = '01a0b3fbf3e4e840e6aa441353ff29e4c5bf3e10']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:09:24Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e6384-77f4-4512-a391-4a53950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:09:24.000Z" ,
"modified" : "2016-01-07T13:09:24.000Z" ,
"description" : "Related malware APK" ,
"pattern" : "[file:hashes.SHA1 = '0637b9116af595e7451dea655a05c32aa89fcbdb']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:09:24Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e6384-1608-4f0b-bc59-4b7a950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:09:24.000Z" ,
"modified" : "2016-01-07T13:09:24.000Z" ,
"description" : "Related malware APK" ,
"pattern" : "[file:hashes.SHA1 = '069138865d4a58b3683f1aa687408b40c92fe9cf']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:09:24Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e6384-9bd8-4e0e-91c5-4c8d950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:09:24.000Z" ,
"modified" : "2016-01-07T13:09:24.000Z" ,
"description" : "Related malware APK" ,
"pattern" : "[file:hashes.SHA1 = '0937b9598a58c6fad80c8e41f08e11e6d036d4b4']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:09:24Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e6385-4588-4e5c-b311-44ee950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:09:25.000Z" ,
"modified" : "2016-01-07T13:09:25.000Z" ,
"description" : "Related malware APK" ,
"pattern" : "[file:hashes.SHA1 = '0c6a075e0cf4e94d57afe085d39423400fa88b7c']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:09:25Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e6385-7e78-4e4e-acd1-4704950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:09:25.000Z" ,
"modified" : "2016-01-07T13:09:25.000Z" ,
"description" : "Related malware APK" ,
"pattern" : "[file:hashes.SHA1 = '2bbcf7511d6953a64f4284f2454dce119bd1063e']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:09:25Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e6385-f1f8-455e-8f29-4f7d950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:09:25.000Z" ,
"modified" : "2016-01-07T13:09:25.000Z" ,
"description" : "Related malware APK" ,
"pattern" : "[file:hashes.SHA1 = '2daabbe1d2213594c2a8017401f4fa82e24a2475']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:09:25Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e6386-7f40-4f47-8a4d-4b2b950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:09:26.000Z" ,
"modified" : "2016-01-07T13:09:26.000Z" ,
"description" : "Related malware APK" ,
"pattern" : "[file:hashes.SHA1 = '396cb2137a6cd6880c96035464712513f44d52b9']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:09:26Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e6386-ae48-4da7-a9c3-40f2950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:09:26.000Z" ,
"modified" : "2016-01-07T13:09:26.000Z" ,
"description" : "Related malware APK" ,
"pattern" : "[file:hashes.SHA1 = '3fd7f0b2e8249ff5f08a82f5df003f2713744824']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:09:26Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e6386-5374-4aee-92f2-4362950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:09:26.000Z" ,
"modified" : "2016-01-07T13:09:26.000Z" ,
"description" : "Related malware APK" ,
"pattern" : "[file:hashes.SHA1 = '583722e9c6bbbf78d7d4d9689679d22ff6a2c4e9']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:09:26Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e6387-1f20-41ae-a99a-4287950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:09:27.000Z" ,
"modified" : "2016-01-07T13:09:27.000Z" ,
"description" : "Related malware APK" ,
"pattern" : "[file:hashes.SHA1 = '6357da20ed2661d9b8943275c515c3bd6b9b46c6']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:09:27Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e6387-a9ec-4b7a-888f-4c72950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:09:27.000Z" ,
"modified" : "2016-01-07T13:09:27.000Z" ,
"description" : "Related malware APK" ,
"pattern" : "[file:hashes.SHA1 = '8f999a80497bc29f633301f7f96489fe9be4eab5']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:09:27Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e6387-9a10-4b21-bea4-48d3950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:09:27.000Z" ,
"modified" : "2016-01-07T13:09:27.000Z" ,
"description" : "Related malware APK" ,
"pattern" : "[file:hashes.SHA1 = '9434f41147eb7259dcf4f1dd8ed7d1209b1546b8']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:09:27Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e6388-0e44-4fae-a102-4992950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:09:28.000Z" ,
"modified" : "2016-01-07T13:09:28.000Z" ,
"description" : "Related malware APK" ,
"pattern" : "[file:hashes.SHA1 = '9ecbff5df641da74910439aefd4ab0596afaff6f']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:09:28Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e6388-9b68-4542-a92d-415a950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:09:28.000Z" ,
"modified" : "2016-01-07T13:09:28.000Z" ,
"description" : "Related malware APK" ,
"pattern" : "[file:hashes.SHA1 = 'a54341b76b88034de6a47bb5904e6c01c53f3cc4']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:09:28Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e6388-3c38-466f-88e3-456f950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:09:28.000Z" ,
"modified" : "2016-01-07T13:09:28.000Z" ,
"description" : "Related malware APK" ,
"pattern" : "[file:hashes.SHA1 = 'bde06adde1d6f4ac3a1865a4314ca45ca807b39c']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:09:28Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e6389-8988-40df-a924-4ddf950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:09:29.000Z" ,
"modified" : "2016-01-07T13:09:29.000Z" ,
"description" : "Related malware APK" ,
"pattern" : "[file:hashes.SHA1 = 'd1af06e54e294dbc106c03650ac8a556c1b1e1e9']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:09:29Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e6389-0730-4d66-9ee9-4bd7950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:09:29.000Z" ,
"modified" : "2016-01-07T13:09:29.000Z" ,
"description" : "Related malware APK" ,
"pattern" : "[file:hashes.SHA1 = 'd1f005e07d5369230d2624de94cfcbdad14cd914']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:09:29Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e6389-1fac-4445-998f-48cf950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:09:29.000Z" ,
"modified" : "2016-01-07T13:09:29.000Z" ,
"description" : "Related malware APK" ,
"pattern" : "[file:hashes.SHA1 = 'd3ab0dd0ac28181e0c531909460dcdd417178d2d']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:09:29Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e6389-08e4-4ba9-ad03-4240950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:09:29.000Z" ,
"modified" : "2016-01-07T13:09:29.000Z" ,
"description" : "Related malware APK" ,
"pattern" : "[file:hashes.SHA1 = 'dbf3a4d820db3974edc8063d852afa40217a9750']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:09:29Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e638a-f630-453e-b1f6-40ce950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:09:30.000Z" ,
"modified" : "2016-01-07T13:09:30.000Z" ,
"description" : "Related malware APK" ,
"pattern" : "[file:hashes.SHA1 = 'fe86ae99ee7b75abf2bce047f4b5f2f1b20d3492']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:09:30Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c1-1f3c-4f86-8fe9-472e02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:25.000Z" ,
"modified" : "2016-01-07T13:10:25.000Z" ,
"description" : "Related malware APK - Xchecked via VT: fe86ae99ee7b75abf2bce047f4b5f2f1b20d3492" ,
"pattern" : "[file:hashes.SHA256 = '5769f8e5133688978b2e2e5878f968aaac88a8c8ba9dff39bafe74d04c21b40c']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:25Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c1-e9e8-4778-95f4-4e8902de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:25.000Z" ,
"modified" : "2016-01-07T13:10:25.000Z" ,
"description" : "Related malware APK - Xchecked via VT: fe86ae99ee7b75abf2bce047f4b5f2f1b20d3492" ,
"pattern" : "[file:hashes.MD5 = '7bc47c8f0c7fa0b175313f3a3ad3684a']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:25Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c1-86ac-45fa-a825-436c02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:25.000Z" ,
"modified" : "2016-01-07T13:10:25.000Z" ,
"pattern" : "[url:value = 'https://www.virustotal.com/file/5769f8e5133688978b2e2e5878f968aaac88a8c8ba9dff39bafe74d04c21b40c/analysis/1451099188/']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:25Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "External analysis"
}
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c2-98d0-45c6-aa02-4f1e02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:26.000Z" ,
"modified" : "2016-01-07T13:10:26.000Z" ,
"description" : "Related malware APK - Xchecked via VT: d1f005e07d5369230d2624de94cfcbdad14cd914" ,
"pattern" : "[file:hashes.SHA256 = 'df8ad96388a470adf83b9c55193fdbaba79221fec5756d99323b68bf2503a209']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:26Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c2-ce5c-41f6-9f4b-40c802de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:26.000Z" ,
"modified" : "2016-01-07T13:10:26.000Z" ,
"description" : "Related malware APK - Xchecked via VT: d1f005e07d5369230d2624de94cfcbdad14cd914" ,
"pattern" : "[file:hashes.MD5 = 'd959d626986bdf760d86d0ae0fccc601']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:26Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c2-e168-47d6-8574-4a3902de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:26.000Z" ,
"modified" : "2016-01-07T13:10:26.000Z" ,
"pattern" : "[url:value = 'https://www.virustotal.com/file/df8ad96388a470adf83b9c55193fdbaba79221fec5756d99323b68bf2503a209/analysis/1451580916/']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:26Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "External analysis"
}
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c2-cfa8-44c7-a0b5-4eb102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:26.000Z" ,
"modified" : "2016-01-07T13:10:26.000Z" ,
"description" : "Related malware APK - Xchecked via VT: d1af06e54e294dbc106c03650ac8a556c1b1e1e9" ,
"pattern" : "[file:hashes.SHA256 = 'd8aca3508ee537c0f5b07c6652f2a771c9d7cddd728196669bfcba93b2e5eb2c']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:26Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c3-fa4c-40ad-9151-4c1d02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:27.000Z" ,
"modified" : "2016-01-07T13:10:27.000Z" ,
"description" : "Related malware APK - Xchecked via VT: d1af06e54e294dbc106c03650ac8a556c1b1e1e9" ,
"pattern" : "[file:hashes.MD5 = 'bac94ec32061d46b175ad3ff5321d122']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:27Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c3-4284-4067-ade4-463e02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:27.000Z" ,
"modified" : "2016-01-07T13:10:27.000Z" ,
"pattern" : "[url:value = 'https://www.virustotal.com/file/d8aca3508ee537c0f5b07c6652f2a771c9d7cddd728196669bfcba93b2e5eb2c/analysis/1452012139/']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:27Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "External analysis"
}
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c3-ae30-49f7-8037-486802de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:27.000Z" ,
"modified" : "2016-01-07T13:10:27.000Z" ,
"description" : "Related malware APK - Xchecked via VT: bde06adde1d6f4ac3a1865a4314ca45ca807b39c" ,
"pattern" : "[file:hashes.SHA256 = '0114edb7dbc86bf3e2fe70589749b1dd4bf06ec87fabd85a83e28e4c45569a24']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:27Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c3-4df4-4e6e-80da-4e8402de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:27.000Z" ,
"modified" : "2016-01-07T13:10:27.000Z" ,
"description" : "Related malware APK - Xchecked via VT: bde06adde1d6f4ac3a1865a4314ca45ca807b39c" ,
"pattern" : "[file:hashes.MD5 = '78dac33206fe0fee2d099a9105f4c571']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:27Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c4-b3e8-4caa-b251-417d02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:28.000Z" ,
"modified" : "2016-01-07T13:10:28.000Z" ,
"pattern" : "[url:value = 'https://www.virustotal.com/file/0114edb7dbc86bf3e2fe70589749b1dd4bf06ec87fabd85a83e28e4c45569a24/analysis/1451374040/']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:28Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "External analysis"
}
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c4-8ce4-4fb6-82c0-481b02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:28.000Z" ,
"modified" : "2016-01-07T13:10:28.000Z" ,
"description" : "Related malware APK - Xchecked via VT: a54341b76b88034de6a47bb5904e6c01c53f3cc4" ,
"pattern" : "[file:hashes.SHA256 = 'b4a8a6b8cd302fe614331d7549ca09b586b0542993d8329d77b65b3cbca3ea37']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:28Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c4-5660-47bd-baa4-48db02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:28.000Z" ,
"modified" : "2016-01-07T13:10:28.000Z" ,
"description" : "Related malware APK - Xchecked via VT: a54341b76b88034de6a47bb5904e6c01c53f3cc4" ,
"pattern" : "[file:hashes.MD5 = '9b435a61b788fb15801a846fdd92ce90']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:28Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c4-5348-461f-9774-4aa002de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:28.000Z" ,
"modified" : "2016-01-07T13:10:28.000Z" ,
"pattern" : "[url:value = 'https://www.virustotal.com/file/b4a8a6b8cd302fe614331d7549ca09b586b0542993d8329d77b65b3cbca3ea37/analysis/1451374146/']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:28Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "External analysis"
}
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c5-2350-498b-9e6d-4ee402de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:29.000Z" ,
"modified" : "2016-01-07T13:10:29.000Z" ,
"description" : "Related malware APK - Xchecked via VT: 9434f41147eb7259dcf4f1dd8ed7d1209b1546b8" ,
"pattern" : "[file:hashes.SHA256 = 'e74ab5be38acd2aa87b3e05aad86e8b9f2fa8bc15c5015b364b8ae810b9d9143']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:29Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c5-e294-48ca-86c3-4e2102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:29.000Z" ,
"modified" : "2016-01-07T13:10:29.000Z" ,
"description" : "Related malware APK - Xchecked via VT: 9434f41147eb7259dcf4f1dd8ed7d1209b1546b8" ,
"pattern" : "[file:hashes.MD5 = '24c2f9014a5ac73134af86917ffc9ae3']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:29Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c5-3dbc-4201-b241-4f2d02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:29.000Z" ,
"modified" : "2016-01-07T13:10:29.000Z" ,
"pattern" : "[url:value = 'https://www.virustotal.com/file/e74ab5be38acd2aa87b3e05aad86e8b9f2fa8bc15c5015b364b8ae810b9d9143/analysis/1451655976/']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:29Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "External analysis"
}
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c5-a654-4cc5-a8a2-445902de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:29.000Z" ,
"modified" : "2016-01-07T13:10:29.000Z" ,
"description" : "Related malware APK - Xchecked via VT: 2bbcf7511d6953a64f4284f2454dce119bd1063e" ,
"pattern" : "[file:hashes.SHA256 = '8963b16b3002bbeeba934d6bfd5194dc7682cdf916c3da2933f93c19de194aab']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:29Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c6-6e88-4ac6-b70f-42a802de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:30.000Z" ,
"modified" : "2016-01-07T13:10:30.000Z" ,
"description" : "Related malware APK - Xchecked via VT: 2bbcf7511d6953a64f4284f2454dce119bd1063e" ,
"pattern" : "[file:hashes.MD5 = 'ef66245c2b082ee69b52176ec5093f5a']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:30Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c6-01ac-4fd0-85cb-44f102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:30.000Z" ,
"modified" : "2016-01-07T13:10:30.000Z" ,
"pattern" : "[url:value = 'https://www.virustotal.com/file/8963b16b3002bbeeba934d6bfd5194dc7682cdf916c3da2933f93c19de194aab/analysis/1451524569/']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:30Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "External analysis"
}
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c6-eef4-42e1-bf5a-424002de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:30.000Z" ,
"modified" : "2016-01-07T13:10:30.000Z" ,
"description" : "Related malware APK - Xchecked via VT: 0c6a075e0cf4e94d57afe085d39423400fa88b7c" ,
"pattern" : "[file:hashes.SHA256 = '26ced0b8c425bad44b14b016fd7ac028adb4fa87593e77f5c9e19705474e8719']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:30Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c6-5bf8-4768-81d2-4a7b02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:30.000Z" ,
"modified" : "2016-01-07T13:10:30.000Z" ,
"description" : "Related malware APK - Xchecked via VT: 0c6a075e0cf4e94d57afe085d39423400fa88b7c" ,
"pattern" : "[file:hashes.MD5 = '0761c655ac70d09b7dd0ef9e4f2df363']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:30Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c7-f144-40eb-b943-48b802de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:31.000Z" ,
"modified" : "2016-01-07T13:10:31.000Z" ,
"pattern" : "[url:value = 'https://www.virustotal.com/file/26ced0b8c425bad44b14b016fd7ac028adb4fa87593e77f5c9e19705474e8719/analysis/1451374070/']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:31Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "External analysis"
}
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c7-eb40-44c7-821e-4aa902de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:31.000Z" ,
"modified" : "2016-01-07T13:10:31.000Z" ,
"description" : "Related malware APK - Xchecked via VT: 0637b9116af595e7451dea655a05c32aa89fcbdb" ,
"pattern" : "[file:hashes.SHA256 = '96d4ad62d42f2fc20e90f0ef6c8afbf83831f5f1592b0cd0ab4fdb4a090ef86b']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:31Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c7-8274-4b09-a7c4-49cb02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:31.000Z" ,
"modified" : "2016-01-07T13:10:31.000Z" ,
"description" : "Related malware APK - Xchecked via VT: 0637b9116af595e7451dea655a05c32aa89fcbdb" ,
"pattern" : "[file:hashes.MD5 = '4d5f96c7b149547a1c9dac98c491d8b8']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:31Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c7-8e90-42a2-a409-43e702de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:31.000Z" ,
"modified" : "2016-01-07T13:10:31.000Z" ,
"pattern" : "[url:value = 'https://www.virustotal.com/file/96d4ad62d42f2fc20e90f0ef6c8afbf83831f5f1592b0cd0ab4fdb4a090ef86b/analysis/1452012192/']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:31Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "External analysis"
}
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c8-74e8-4ae2-954d-4bed02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:32.000Z" ,
"modified" : "2016-01-07T13:10:32.000Z" ,
"description" : "Related malware APK - Xchecked via VT: 019d4326d3340609b3f8326d51e031cafc6bf9a0" ,
"pattern" : "[file:hashes.SHA256 = 'abcf3b1b631f0fa776bf22f1bee8bfc6b95a00b345c103ee82a3d26b466b2dd6']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:32Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c8-be7c-45c2-af72-486b02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:32.000Z" ,
"modified" : "2016-01-07T13:10:32.000Z" ,
"description" : "Related malware APK - Xchecked via VT: 019d4326d3340609b3f8326d51e031cafc6bf9a0" ,
"pattern" : "[file:hashes.MD5 = 'e1924b0c16629a0c6a5c9bdf85c86920']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:32Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--568e63c8-f2fc-4aa2-8122-422a02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-01-07T13:10:32.000Z" ,
"modified" : "2016-01-07T13:10:32.000Z" ,
"pattern" : "[url:value = 'https://www.virustotal.com/file/abcf3b1b631f0fa776bf22f1bee8bfc6b95a00b345c103ee82a3d26b466b2dd6/analysis/1451374062/']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-01-07T13:10:32Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "External analysis"
}
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "marking-definition" ,
"spec_version" : "2.1" ,
"id" : "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ,
"created" : "2017-01-20T00:00:00.000Z" ,
"definition_type" : "tlp" ,
"name" : "TLP:WHITE" ,
"definition" : {
"tlp" : "white"
}
}
2023-04-21 13:25:09 +00:00
]
}