misp-circl-feed/feeds/circl/misp/5819948b-b170-4872-b8f6-5934950d210f.json

2862 lines
121 KiB
JSON
Raw Normal View History

2023-04-21 13:25:09 +00:00
{
2023-06-14 17:31:25 +00:00
"type": "bundle",
"id": "bundle--5819948b-b170-4872-b8f6-5934950d210f",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:01.000Z",
"modified": "2016-11-02T08:00:01.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--5819948b-b170-4872-b8f6-5934950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:01.000Z",
"modified": "2016-11-02T08:00:01.000Z",
"name": "OSINT - Flying Dragon Eye: Uyghur Themed Threat Activity",
"published": "2016-11-02T08:03:19Z",
"object_refs": [
"x-misp-attribute--581994d6-aa60-461d-9870-5930950d210f",
"observed-data--58199523-6178-43d6-8b1f-592e950d210f",
"url--58199523-6178-43d6-8b1f-592e950d210f",
"observed-data--58199523-0100-4667-81dc-592e950d210f",
"url--58199523-0100-4667-81dc-592e950d210f",
"observed-data--58199523-3db4-4c81-b411-592e950d210f",
"url--58199523-3db4-4c81-b411-592e950d210f",
"indicator--58199662-6d4c-4bf8-9d4e-69a2950d210f",
"indicator--58199662-0a20-4530-8464-69a2950d210f",
"indicator--58199662-4f08-47d8-aa1e-69a2950d210f",
"indicator--58199663-b44c-4e29-b015-69a2950d210f",
"indicator--58199663-f604-4123-b0c1-69a2950d210f",
"indicator--58199663-3e64-4c5f-b2d9-69a2950d210f",
"indicator--58199663-c4d8-41ac-812f-69a2950d210f",
"indicator--58199664-74ac-4083-b6c9-69a2950d210f",
"indicator--58199664-66a8-477a-8f98-69a2950d210f",
"indicator--58199664-51f8-41dd-a14a-69a2950d210f",
"indicator--58199664-95d0-4232-8769-69a2950d210f",
"indicator--58199664-c480-4c4d-b02b-69a2950d210f",
"indicator--58199665-68f4-440a-8c11-69a2950d210f",
"indicator--58199665-e514-45d4-b192-69a2950d210f",
"indicator--58199665-59c4-4e69-b920-69a2950d210f",
"indicator--58199665-2eac-4570-aa90-69a2950d210f",
"indicator--58199666-07a0-443d-84aa-69a2950d210f",
"indicator--58199666-fec4-48b9-88d1-69a2950d210f",
"indicator--5819969b-6a80-454a-86c3-7756950d210f",
"indicator--58199710-c854-4314-a62c-5936950d210f",
"indicator--58199711-6b68-4151-a624-5936950d210f",
"indicator--58199793-682c-4562-8b4b-5930950d210f",
"indicator--58199793-7cac-4fea-976e-5930950d210f",
"indicator--581997bb-ace0-406a-9f0b-69b0950d210f",
"indicator--581997bc-5918-45e0-9e31-69b0950d210f",
"indicator--581999d8-b7bc-4e14-9b82-5931950d210f",
"indicator--581999ff-a8a8-4c8c-b647-5932950d210f",
"indicator--581999ff-ea9c-4ad2-8984-5932950d210f",
"indicator--58199aae-5a18-4ced-86c8-69b0950d210f",
"indicator--58199aae-14dc-4896-969c-69b0950d210f",
"indicator--58199aae-c690-4324-b536-69b0950d210f",
"indicator--58199aaf-1e80-4115-be88-69b0950d210f",
"indicator--58199aaf-18e8-4d01-8825-69b0950d210f",
"indicator--58199aaf-1df0-4c0d-8ce4-69b0950d210f",
"indicator--58199aaf-1514-452d-b6ee-69b0950d210f",
"indicator--58199ab0-3254-498e-b91c-69b0950d210f",
"indicator--58199ab0-e800-497f-9335-69b0950d210f",
"indicator--58199ab0-341c-4644-ae0c-69b0950d210f",
"indicator--58199ab0-eab8-4ba6-9506-69b0950d210f",
"indicator--58199ab1-0700-4e3e-88a2-69b0950d210f",
"indicator--58199ab1-bb2c-4631-9ef1-69b0950d210f",
"indicator--58199ac5-c9dc-4d15-bd66-5932950d210f",
"indicator--58199b90-8720-459a-9cc4-69b0950d210f",
"indicator--58199b90-a7c4-44fa-9165-69b0950d210f",
"indicator--58199b90-87d0-4d4a-8edd-69b0950d210f",
"indicator--58199b90-ad1c-4a4e-a85a-69b0950d210f",
"indicator--58199b91-80b4-4ef5-b984-69b0950d210f",
"indicator--58199b91-9930-4730-abd7-69b0950d210f",
"indicator--58199b91-41ec-43b9-b895-69b0950d210f",
"indicator--58199b91-8928-4177-8bc6-69b0950d210f",
"indicator--58199b91-8910-4c5b-84d5-69b0950d210f",
"indicator--58199b92-3990-40e3-99ae-69b0950d210f",
"indicator--58199b92-5f60-4bc9-bc55-69b0950d210f",
"indicator--58199b92-1da0-4cd8-aa4a-69b0950d210f",
"indicator--58199b92-fa98-476a-b72c-69b0950d210f",
"indicator--58199b93-fbd0-4a5f-bf4c-69b0950d210f",
"indicator--58199b93-cc98-4b20-8bed-69b0950d210f",
"indicator--58199d01-ddbc-4294-976e-593002de0b81",
"indicator--58199d01-e758-4f49-8c30-593002de0b81",
"observed-data--58199d01-d9a0-4d93-a953-593002de0b81",
"url--58199d01-d9a0-4d93-a953-593002de0b81",
"indicator--58199d02-52cc-4f23-903b-593002de0b81",
"indicator--58199d02-16a8-4a5c-9879-593002de0b81",
"observed-data--58199d02-d948-4059-8c23-593002de0b81",
"url--58199d02-d948-4059-8c23-593002de0b81",
"indicator--58199d03-955c-4de5-9ba9-593002de0b81",
"indicator--58199d03-c30c-48a2-bc88-593002de0b81",
"observed-data--58199d03-0da4-4b22-96c6-593002de0b81",
"url--58199d03-0da4-4b22-96c6-593002de0b81",
"indicator--58199d03-6b38-470f-aaf8-593002de0b81",
"indicator--58199d04-ace4-4566-b96d-593002de0b81",
"observed-data--58199d04-8f68-4815-b5fd-593002de0b81",
"url--58199d04-8f68-4815-b5fd-593002de0b81",
"indicator--58199d04-b1fc-4c68-973e-593002de0b81",
"indicator--58199d04-22e4-42fc-a180-593002de0b81",
"observed-data--58199d05-e6d4-46c7-809f-593002de0b81",
"url--58199d05-e6d4-46c7-809f-593002de0b81",
"indicator--58199d05-a17c-4c0b-8842-593002de0b81",
"indicator--58199d05-3dec-4053-9bd8-593002de0b81",
"observed-data--58199d05-a3d4-4ab0-8d16-593002de0b81",
"url--58199d05-a3d4-4ab0-8d16-593002de0b81",
"indicator--58199d06-8b1c-41bf-9739-593002de0b81",
"indicator--58199d06-2f2c-40dc-b101-593002de0b81",
"observed-data--58199d06-5488-450d-95a0-593002de0b81",
"url--58199d06-5488-450d-95a0-593002de0b81",
"indicator--58199d06-7d04-48bd-9241-593002de0b81",
"indicator--58199d06-0020-414d-adda-593002de0b81",
"observed-data--58199d07-c2c4-4782-9cd6-593002de0b81",
"url--58199d07-c2c4-4782-9cd6-593002de0b81",
"indicator--58199d07-78e4-4225-8b38-593002de0b81",
"indicator--58199d07-36c0-4736-a131-593002de0b81",
"observed-data--58199d07-898c-486b-8f12-593002de0b81",
"url--58199d07-898c-486b-8f12-593002de0b81",
"indicator--58199d07-b870-4c96-a744-593002de0b81",
"indicator--58199d08-c570-45d7-a8ec-593002de0b81",
"observed-data--58199d08-efcc-4637-9a08-593002de0b81",
"url--58199d08-efcc-4637-9a08-593002de0b81",
"indicator--58199d08-6324-4078-8911-593002de0b81",
"indicator--58199d08-8cac-4304-afaf-593002de0b81",
"observed-data--58199d09-9b1c-40a9-8c1b-593002de0b81",
"url--58199d09-9b1c-40a9-8c1b-593002de0b81",
"indicator--58199d09-cb20-4457-b416-593002de0b81",
"observed-data--58199d09-e9f0-446e-85be-593002de0b81",
"url--58199d09-e9f0-446e-85be-593002de0b81",
"indicator--58199d09-2004-4f16-964d-593002de0b81",
"observed-data--58199d0a-66e0-416c-9dcb-593002de0b81",
"url--58199d0a-66e0-416c-9dcb-593002de0b81",
"indicator--58199d0a-a2c4-4ab5-9e4d-593002de0b81",
"observed-data--58199d0a-7e44-45e0-9fa5-593002de0b81",
"url--58199d0a-7e44-45e0-9fa5-593002de0b81",
"indicator--58199d0a-3c70-422f-ab84-593002de0b81",
"observed-data--58199d0a-9d4c-4a30-b875-593002de0b81",
"url--58199d0a-9d4c-4a30-b875-593002de0b81",
"indicator--58199d0b-98f8-44bb-999b-593002de0b81",
"observed-data--58199d0b-a2ac-4420-aa83-593002de0b81",
"url--58199d0b-a2ac-4420-aa83-593002de0b81",
"indicator--58199d0c-45cc-4ac6-816e-593002de0b81",
"observed-data--58199d0c-6ec8-4d0b-a9cc-593002de0b81",
"url--58199d0c-6ec8-4d0b-a9cc-593002de0b81",
"indicator--58199d0d-41e0-4732-9124-593002de0b81",
"observed-data--58199d0d-5df0-4539-9c22-593002de0b81",
"url--58199d0d-5df0-4539-9c22-593002de0b81",
"indicator--58199d0e-6504-460f-8263-593002de0b81",
"observed-data--58199d0e-a3a0-4794-96ac-593002de0b81",
"url--58199d0e-a3a0-4794-96ac-593002de0b81",
"indicator--58199d0f-9834-4d37-9332-593002de0b81",
"observed-data--58199d0f-7bbc-447e-8b45-593002de0b81",
"url--58199d0f-7bbc-447e-8b45-593002de0b81"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"osint:source-type=\"blog-post\"",
"osint:source-type=\"technical-report\"",
"misp-galaxy:tool=\"PlugX\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--581994d6-aa60-461d-9870-5930950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:25:10.000Z",
"modified": "2016-11-02T07:25:10.000Z",
"labels": [
"misp:type=\"comment\"",
"misp:category=\"External analysis\""
],
"x_misp_category": "External analysis",
"x_misp_type": "comment",
"x_misp_value": "This paper documents attempted exploitation activity aimed at Uyghur interests outside of China. Exploitation is being attempted via the usual tactic of spear phishing containing malicious attachments to targets. The exploit code attached used for dropping the malware is older \u00e2\u20ac\u201c CVE-2012-0158 \u00e2\u20ac\u201c and from our vantage point, we have no indication of successful or failed exploitation. Nonetheless, we can obtain targeting information and insight into tactics from the spearphish messages used by the threat actors. Successful exploitation typically results in malware calling back to one or more Uyghur themed domain names. The malware payloads observed to be associated with the Uyghur themed C2 domains so far consist of PlugX, Gh0st RAT, and Saker/Xbox, although there may be others that are yet to be discovered.\r\n\r\nIt is possible that additional targeting well beyond CVE-2012-0158 is at play, although in this case it appears that threat actors still thought they could obtain benefit from using a four-year-old vulnerability that has been widely associated with numerous cyber-espionage operations over the years. This may be due to the weakness of defensive posture among those targeted and an attempt at higher return on investment by using exploit code that might still be adequate considering the targets. Pivots on threat infrastructure suggest that the same or related threat actors have direct or indirect access to other types of exploit code such as the \u00e2\u20ac\u0153Four Element Sword\u00e2\u20ac\u009d builder and the numerous types of malware delivered with it (PlugX, 9002 RAT 3102 variant, T9000, Grabber, Gh0st RAT LURK0 variant and perhaps others), profiled in previous ASERT threat intelligence products."
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58199523-6178-43d6-8b1f-592e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:26:27.000Z",
"modified": "2016-11-02T07:26:27.000Z",
"first_observed": "2016-11-02T07:26:27Z",
"last_observed": "2016-11-02T07:26:27Z",
"number_observed": 1,
"object_refs": [
"url--58199523-6178-43d6-8b1f-592e950d210f"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58199523-6178-43d6-8b1f-592e950d210f",
"value": "https://www.arbornetworks.com/blog/asert/flying-dragon-eye-uyghur-themed-threat-activity/"
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58199523-0100-4667-81dc-592e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:26:27.000Z",
"modified": "2016-11-02T07:26:27.000Z",
"first_observed": "2016-11-02T07:26:27Z",
"last_observed": "2016-11-02T07:26:27Z",
"number_observed": 1,
"object_refs": [
"url--58199523-0100-4667-81dc-592e950d210f"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58199523-0100-4667-81dc-592e950d210f",
"value": "https://www.arbornetworks.com/blog/asert/wp-content/uploads/2016/11/TLP-WHITE-Flying-Dragon-Eye-Uyghur-Themed-Threat-Activity.pdf"
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58199523-3db4-4c81-b411-592e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:26:27.000Z",
"modified": "2016-11-02T07:26:27.000Z",
"first_observed": "2016-11-02T07:26:27Z",
"last_observed": "2016-11-02T07:26:27Z",
"number_observed": 1,
"object_refs": [
"url--58199523-3db4-4c81-b411-592e950d210f"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58199523-3db4-4c81-b411-592e950d210f",
"value": "https://www.arbornetworks.com/blog/asert/wp-content/uploads/2016/09/FlyingDragonEye_IOC.csv"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199662-6d4c-4bf8-9d4e-69a2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:31:46.000Z",
"modified": "2016-11-02T07:31:46.000Z",
"description": "suspicious domain",
"pattern": "[domain-name:value = 'www.turkistanuyghur.top']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:31:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199662-0a20-4530-8464-69a2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:31:46.000Z",
"modified": "2016-11-02T07:31:46.000Z",
"description": "suspicious domain",
"pattern": "[domain-name:value = 'www.yawropauyghur.top']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:31:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199662-4f08-47d8-aa1e-69a2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:31:46.000Z",
"modified": "2016-11-02T07:31:46.000Z",
"description": "suspicious domain",
"pattern": "[domain-name:value = 'www.whitewall.top']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:31:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199663-b44c-4e29-b015-69a2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:31:47.000Z",
"modified": "2016-11-02T07:31:47.000Z",
"description": "suspicious domain",
"pattern": "[domain-name:value = 'dtsx.uygurinfo.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:31:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199663-f604-4123-b0c1-69a2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:31:47.000Z",
"modified": "2016-11-02T07:31:47.000Z",
"description": "suspicious domain",
"pattern": "[domain-name:value = 'ks.uygurinfo.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:31:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199663-3e64-4c5f-b2d9-69a2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:31:47.000Z",
"modified": "2016-11-02T07:31:47.000Z",
"description": "suspicious domain",
"pattern": "[domain-name:value = 'uygurinfo.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:31:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199663-c4d8-41ac-812f-69a2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:31:47.000Z",
"modified": "2016-11-02T07:31:47.000Z",
"description": "suspicious domain",
"pattern": "[domain-name:value = 'tibettimes.top']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:31:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199664-74ac-4083-b6c9-69a2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:31:48.000Z",
"modified": "2016-11-02T07:31:48.000Z",
"description": "suspicious domain",
"pattern": "[domain-name:value = 'www.amerikauyghur.top']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:31:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199664-66a8-477a-8f98-69a2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:31:48.000Z",
"modified": "2016-11-02T07:31:48.000Z",
"description": "suspicious domain",
"pattern": "[domain-name:value = 'www.japanuyghur.top']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:31:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199664-51f8-41dd-a14a-69a2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:31:48.000Z",
"modified": "2016-11-02T07:31:48.000Z",
"description": "suspicious domain",
"pattern": "[domain-name:value = 'www.hotansft.top']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:31:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199664-95d0-4232-8769-69a2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:31:48.000Z",
"modified": "2016-11-02T07:31:48.000Z",
"description": "suspicious domain",
"pattern": "[domain-name:value = 'turkiyeuyghur.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:31:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199664-c480-4c4d-b02b-69a2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:31:48.000Z",
"modified": "2016-11-02T07:31:48.000Z",
"description": "suspicious domain",
"pattern": "[domain-name:value = 'www.tibetimes.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:31:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199665-68f4-440a-8c11-69a2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:31:49.000Z",
"modified": "2016-11-02T07:31:49.000Z",
"description": "suspicious domain",
"pattern": "[domain-name:value = 'freetibet.top']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:31:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199665-e514-45d4-b192-69a2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:31:49.000Z",
"modified": "2016-11-02T07:31:49.000Z",
"description": "suspicious domain",
"pattern": "[domain-name:value = 'russiauyghur.top']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:31:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199665-59c4-4e69-b920-69a2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:31:49.000Z",
"modified": "2016-11-02T07:31:49.000Z",
"description": "suspicious IP",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '59.188.83.144']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:31:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199665-2eac-4570-aa90-69a2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:31:49.000Z",
"modified": "2016-11-02T07:31:49.000Z",
"description": "suspicious IP",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '118.193.225.133']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:31:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199666-07a0-443d-84aa-69a2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:31:50.000Z",
"modified": "2016-11-02T07:31:50.000Z",
"description": "suspicious IP",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '118.193.240.218']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:31:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199666-fec4-48b9-88d1-69a2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:31:50.000Z",
"modified": "2016-11-02T07:31:50.000Z",
"description": "suspicious IP",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '118.193.240.195']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:31:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5819969b-6a80-454a-86c3-7756950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:32:43.000Z",
"modified": "2016-11-02T07:32:43.000Z",
"description": "suspicious email",
"pattern": "[email-message:from_ref.value = '2732115454@qq.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:32:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-src\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199710-c854-4314-a62c-5936950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:34:40.000Z",
"modified": "2016-11-02T07:34:40.000Z",
"description": "PlugX malware",
"pattern": "[file:hashes.MD5 = 'fa85f8a332ac26892a8ad6f21491404a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:34:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199711-6b68-4151-a624-5936950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:34:41.000Z",
"modified": "2016-11-02T07:34:41.000Z",
"description": "PlugX malware",
"pattern": "[file:hashes.SHA256 = 'a351040c0da2837f19b357baea4bffe194b0cd0d86bf262f8be1126e3a9d44d8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:34:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199793-682c-4562-8b4b-5930950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:36:51.000Z",
"modified": "2016-11-02T07:36:51.000Z",
"description": "Gh0stRAT LURK0",
"pattern": "[file:hashes.SHA256 = 'b625e605932196efbc6c80a18f61a71d27d82935209a1abde2ec591973fed31e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:36:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199793-7cac-4fea-976e-5930950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:36:51.000Z",
"modified": "2016-11-02T07:36:51.000Z",
"description": "Gh0stRAT LURK0",
"pattern": "[file:hashes.MD5 = '4edda0e2a8a415272f475f3af4d17dc1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:36:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--581997bb-ace0-406a-9f0b-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:37:31.000Z",
"modified": "2016-11-02T07:37:31.000Z",
"description": "Saker/Xbox",
"pattern": "[file:hashes.SHA256 = 'c39e0fc30c2604b3eb9694591789a8e3d4cee7bcc4f9b03349e10c45304aef59']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:37:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--581997bc-5918-45e0-9e31-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:37:32.000Z",
"modified": "2016-11-02T07:37:32.000Z",
"description": "Saker/Xbox",
"pattern": "[file:hashes.MD5 = '86088922528b4d0a5493046527b29822']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:37:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--581999d8-b7bc-4e14-9b82-5931950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:46:32.000Z",
"modified": "2016-11-02T07:46:32.000Z",
"description": "IP before sinkholing - www.turkiyeuyghur.com - Saker/Xbox",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '210.209.118.87']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:46:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--581999ff-a8a8-4c8c-b647-5932950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:47:11.000Z",
"modified": "2016-11-02T07:47:11.000Z",
"description": "Saker/Xbox",
"pattern": "[file:hashes.SHA256 = '3714058d90b2149169188418773165b620abd1481b47d1551d79679bfe21d28c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:47:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--581999ff-ea9c-4ad2-8984-5932950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:47:11.000Z",
"modified": "2016-11-02T07:47:11.000Z",
"description": "Saker/Xbox",
"pattern": "[file:hashes.MD5 = 'e490174855b8548161613fd5d9955e7a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:47:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199aae-5a18-4ced-86c8-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:50:06.000Z",
"modified": "2016-11-02T07:50:06.000Z",
"description": "Mutex match",
"pattern": "[file:hashes.SHA256 = 'f15840fbade7a5611391193a4a53f63ef465ab451f7783da21cad7303ea3b68c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:50:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199aae-14dc-4896-969c-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:50:06.000Z",
"modified": "2016-11-02T07:50:06.000Z",
"description": "Mutex match",
"pattern": "[file:hashes.MD5 = 'e49e235b301a4316ef58753c093279f0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:50:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199aae-c690-4324-b536-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:50:06.000Z",
"modified": "2016-11-02T07:50:06.000Z",
"description": "Mutex match",
"pattern": "[file:hashes.SHA256 = '97ec795227818fedc70fad9f2df8cb839d9fb75b502f3598614610d4e8e1be78']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:50:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199aaf-1e80-4115-be88-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:50:07.000Z",
"modified": "2016-11-02T07:50:07.000Z",
"description": "Mutex match",
"pattern": "[file:hashes.MD5 = '0ea68dd9463626082bb96ad373bd84e0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:50:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199aaf-18e8-4d01-8825-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:50:07.000Z",
"modified": "2016-11-02T07:50:07.000Z",
"description": "PEHash of Prior samples",
"pattern": "[file:hashes.PEHASH = '59781db8be6bb162f5c8ee8cf950fe191417baa4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:50:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"pehash\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199aaf-1df0-4c0d-8ce4-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:50:07.000Z",
"modified": "2016-11-02T07:50:07.000Z",
"description": "Sample matching PEHash",
"pattern": "[file:hashes.SHA256 = '444c6589ed030da41ba49d20ac38029e5213978fadef2ee94408e4f91395b488']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:50:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199aaf-1514-452d-b6ee-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:50:07.000Z",
"modified": "2016-11-02T07:50:07.000Z",
"description": "Sample matching PEHash",
"pattern": "[file:hashes.MD5 = '1a169a7e52879bad47e2834abfe50361']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:50:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199ab0-3254-498e-b91c-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:50:08.000Z",
"modified": "2016-11-02T07:50:08.000Z",
"description": "Sample matching PEHash",
"pattern": "[file:hashes.SHA256 = 'ef3e7b1c37aef1d8359169cca9409db4709632b9aa8bf44febe0d91e93ab537e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:50:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199ab0-e800-497f-9335-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:50:08.000Z",
"modified": "2016-11-02T07:50:08.000Z",
"description": "Sample matching PEHash",
"pattern": "[file:hashes.MD5 = '731a9761626e39bb84b34343bdae67b0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:50:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199ab0-341c-4644-ae0c-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:50:08.000Z",
"modified": "2016-11-02T07:50:08.000Z",
"description": "Sample matching PEHash",
"pattern": "[file:hashes.SHA256 = '62a033fc586c6220ee0c0ea8ff207ab038776455505fa2137e9591433ada26e1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:50:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199ab0-eab8-4ba6-9506-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:50:08.000Z",
"modified": "2016-11-02T07:50:08.000Z",
"description": "Sample matching PEHash",
"pattern": "[file:hashes.MD5 = '1dc2e57dbf63051608cff83d8b88d352']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:50:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199ab1-0700-4e3e-88a2-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:50:09.000Z",
"modified": "2016-11-02T07:50:09.000Z",
"description": "Sample matching PEHash",
"pattern": "[file:hashes.SHA256 = '087e45f63ce00c4df07f81837eceb0b322773822feee01cfc005e5fc14e50f5e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:50:09Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199ab1-bb2c-4631-9ef1-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:50:09.000Z",
"modified": "2016-11-02T07:50:09.000Z",
"description": "Sample matching PEHash",
"pattern": "[file:hashes.MD5 = 'de07dc9e83bfd445ad7cc58baab671f2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:50:09Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199ac5-c9dc-4d15-bd66-5932950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:50:29.000Z",
"modified": "2016-11-02T07:50:29.000Z",
"description": "suspicious mutex in Saker/Xbox",
"pattern": "[mutex:name = 'pcdebug.1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:50:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"mutex\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199b90-8720-459a-9cc4-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:53:52.000Z",
"modified": "2016-11-02T07:53:52.000Z",
"description": "Google aqsakla Rabiye isming.doc",
"pattern": "[file:hashes.SHA256 = '3f3d0a5aa2799d6afe74c5cb6e077e375078b173263c5ca887ffe2e22164b10f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:53:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199b90-a7c4-44fa-9165-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:53:52.000Z",
"modified": "2016-11-02T07:53:52.000Z",
"description": "agahlandurushname.doc",
"pattern": "[file:hashes.SHA256 = '7b587b104219784e9fd3dc9c13a0f652e73baed01e8c3b24828a92f151f3c698']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:53:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199b90-87d0-4d4a-8edd-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:53:52.000Z",
"modified": "2016-11-02T07:53:52.000Z",
"description": "chaqiriq.doc",
"pattern": "[file:hashes.SHA256 = '4ab388b1310918144ad95e418ebe12251a97cb69fbed3f0dd9f04d780ddd132d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:53:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199b90-ad1c-4a4e-a85a-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:53:52.000Z",
"modified": "2016-11-02T07:53:52.000Z",
"description": "chaqiriq.doc",
"pattern": "[file:hashes.SHA256 = '940d0770e644c152d60a13f9d40015a1089419361de33fe127e032f4bb446c69']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:53:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199b91-80b4-4ef5-b984-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:53:53.000Z",
"modified": "2016-11-02T07:53:53.000Z",
"description": "chqiriq.doc",
"pattern": "[file:hashes.SHA256 = '0c35a508ece0c9269e176b6b278a96f7ca29e04a2ca2319a91b585f27abfe2f6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:53:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199b91-9930-4730-abd7-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:53:53.000Z",
"modified": "2016-11-02T07:53:53.000Z",
"description": "tetqiqat doklati.doc",
"pattern": "[file:hashes.SHA256 = '5e818eeb0cffeb6f65f611a17f522560912ae19372e7f734be6df5e35ba82337']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:53:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199b91-41ec-43b9-b895-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:53:53.000Z",
"modified": "2016-11-02T07:53:53.000Z",
"description": "istepaname.doc",
"pattern": "[file:hashes.SHA256 = 'e55912a134902ab73c52cb42f32051745214275b59a95d565cfcb7560d32f601']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:53:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199b91-8928-4177-8bc6-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:53:53.000Z",
"modified": "2016-11-02T07:53:53.000Z",
"description": "jedwel.doc",
"pattern": "[file:hashes.SHA256 = '45e39db2a877ff2663efc4d66ed4084ffdb6ddb4926112b7c471872208b96767']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:53:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199b91-8910-4c5b-84d5-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:53:53.000Z",
"modified": "2016-11-02T07:53:53.000Z",
"description": "teklipname.doc",
"pattern": "[file:hashes.SHA256 = 'f4fd8554710017caa042b52122d7985c7f510df8e2c26f1ffa6e27233bfe9b54']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:53:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199b92-3990-40e3-99ae-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:53:54.000Z",
"modified": "2016-11-02T07:53:54.000Z",
"description": "Tetqiqat doklati.doc",
"pattern": "[file:hashes.SHA256 = '9feee2a3fe49fe774d414999ac393655255e7c035ffc93bbd031a2331fd89dc8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:53:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199b92-5f60-4bc9-bc55-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:53:54.000Z",
"modified": "2016-11-02T07:53:54.000Z",
"description": "uqturush.doc",
"pattern": "[file:hashes.SHA256 = '3bbf0f821c89ba03d30deb63eec59c8e9e76c20578ad805de9971bdbcd2855d2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:53:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199b92-1da0-4cd8-aa4a-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:53:54.000Z",
"modified": "2016-11-02T07:53:54.000Z",
"description": "malware",
"pattern": "[file:hashes.SHA256 = '69c2da4061890050dc0ca28db6f240c8ed6c4897f4174bcd5d1bca00ade537d5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:53:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199b92-fa98-476a-b72c-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:53:54.000Z",
"modified": "2016-11-02T07:53:54.000Z",
"description": "malware",
"pattern": "[file:hashes.MD5 = '9de14f249afc4e6979d8f2106e405b21']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:53:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199b93-fbd0-4a5f-bf4c-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:53:55.000Z",
"modified": "2016-11-02T07:53:55.000Z",
"description": "malware",
"pattern": "[file:hashes.SHA256 = 'be7a14927ff11536a5bfd6c21d3f4a304659001f1f13b6d90ce0e031522817e5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:53:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199b93-cc98-4b20-8bed-69b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T07:53:55.000Z",
"modified": "2016-11-02T07:53:55.000Z",
"description": "malware",
"pattern": "[file:hashes.MD5 = '2f981ac92284f1c710e53a5a2d41257a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T07:53:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d01-ddbc-4294-976e-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:01.000Z",
"modified": "2016-11-02T08:00:01.000Z",
"description": "uqturush.doc - Xchecked via VT: 3bbf0f821c89ba03d30deb63eec59c8e9e76c20578ad805de9971bdbcd2855d2",
"pattern": "[file:hashes.SHA1 = '3f4719e1132fbe99c61ba2860c01a59c1bb9eee4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d01-e758-4f49-8c30-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:01.000Z",
"modified": "2016-11-02T08:00:01.000Z",
"description": "uqturush.doc - Xchecked via VT: 3bbf0f821c89ba03d30deb63eec59c8e9e76c20578ad805de9971bdbcd2855d2",
"pattern": "[file:hashes.MD5 = 'e680b0b3e1679d64044795ea9800d52e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58199d01-d9a0-4d93-a953-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:01.000Z",
"modified": "2016-11-02T08:00:01.000Z",
"first_observed": "2016-11-02T08:00:01Z",
"last_observed": "2016-11-02T08:00:01Z",
"number_observed": 1,
"object_refs": [
"url--58199d01-d9a0-4d93-a953-593002de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58199d01-d9a0-4d93-a953-593002de0b81",
"value": "https://www.virustotal.com/file/3bbf0f821c89ba03d30deb63eec59c8e9e76c20578ad805de9971bdbcd2855d2/analysis/1457003870/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d02-52cc-4f23-903b-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:02.000Z",
"modified": "2016-11-02T08:00:02.000Z",
"description": "Tetqiqat doklati.doc - Xchecked via VT: 9feee2a3fe49fe774d414999ac393655255e7c035ffc93bbd031a2331fd89dc8",
"pattern": "[file:hashes.SHA1 = '2fd166e52f0a4daa795763eb66207b1a14d8e59e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d02-16a8-4a5c-9879-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:02.000Z",
"modified": "2016-11-02T08:00:02.000Z",
"description": "Tetqiqat doklati.doc - Xchecked via VT: 9feee2a3fe49fe774d414999ac393655255e7c035ffc93bbd031a2331fd89dc8",
"pattern": "[file:hashes.MD5 = '7d808f496a8e66adfa6af76838f1c3a4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58199d02-d948-4059-8c23-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:02.000Z",
"modified": "2016-11-02T08:00:02.000Z",
"first_observed": "2016-11-02T08:00:02Z",
"last_observed": "2016-11-02T08:00:02Z",
"number_observed": 1,
"object_refs": [
"url--58199d02-d948-4059-8c23-593002de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58199d02-d948-4059-8c23-593002de0b81",
"value": "https://www.virustotal.com/file/9feee2a3fe49fe774d414999ac393655255e7c035ffc93bbd031a2331fd89dc8/analysis/1467389786/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d03-955c-4de5-9ba9-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:03.000Z",
"modified": "2016-11-02T08:00:03.000Z",
"description": "teklipname.doc - Xchecked via VT: f4fd8554710017caa042b52122d7985c7f510df8e2c26f1ffa6e27233bfe9b54",
"pattern": "[file:hashes.SHA1 = 'ec8816b82bab16ae26777b17eea95883bea5c3fb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d03-c30c-48a2-bc88-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:03.000Z",
"modified": "2016-11-02T08:00:03.000Z",
"description": "teklipname.doc - Xchecked via VT: f4fd8554710017caa042b52122d7985c7f510df8e2c26f1ffa6e27233bfe9b54",
"pattern": "[file:hashes.MD5 = '190b6d19b3d2088acbd56323dbd98973']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58199d03-0da4-4b22-96c6-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:03.000Z",
"modified": "2016-11-02T08:00:03.000Z",
"first_observed": "2016-11-02T08:00:03Z",
"last_observed": "2016-11-02T08:00:03Z",
"number_observed": 1,
"object_refs": [
"url--58199d03-0da4-4b22-96c6-593002de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58199d03-0da4-4b22-96c6-593002de0b81",
"value": "https://www.virustotal.com/file/f4fd8554710017caa042b52122d7985c7f510df8e2c26f1ffa6e27233bfe9b54/analysis/1467397149/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d03-6b38-470f-aaf8-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:03.000Z",
"modified": "2016-11-02T08:00:03.000Z",
"description": "jedwel.doc - Xchecked via VT: 45e39db2a877ff2663efc4d66ed4084ffdb6ddb4926112b7c471872208b96767",
"pattern": "[file:hashes.SHA1 = '3b59b1b2d5416bbb4a28da2a45414bc0605bcead']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d04-ace4-4566-b96d-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:04.000Z",
"modified": "2016-11-02T08:00:04.000Z",
"description": "jedwel.doc - Xchecked via VT: 45e39db2a877ff2663efc4d66ed4084ffdb6ddb4926112b7c471872208b96767",
"pattern": "[file:hashes.MD5 = '9985b1ab655f26e8a05f8402ad0ea300']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58199d04-8f68-4815-b5fd-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:04.000Z",
"modified": "2016-11-02T08:00:04.000Z",
"first_observed": "2016-11-02T08:00:04Z",
"last_observed": "2016-11-02T08:00:04Z",
"number_observed": 1,
"object_refs": [
"url--58199d04-8f68-4815-b5fd-593002de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58199d04-8f68-4815-b5fd-593002de0b81",
"value": "https://www.virustotal.com/file/45e39db2a877ff2663efc4d66ed4084ffdb6ddb4926112b7c471872208b96767/analysis/1467395826/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d04-b1fc-4c68-973e-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:04.000Z",
"modified": "2016-11-02T08:00:04.000Z",
"description": "istepaname.doc - Xchecked via VT: e55912a134902ab73c52cb42f32051745214275b59a95d565cfcb7560d32f601",
"pattern": "[file:hashes.SHA1 = 'fbc27bcf672d1ea3d4ff9cb3a8fd6a55d92d8b74']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d04-22e4-42fc-a180-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:04.000Z",
"modified": "2016-11-02T08:00:04.000Z",
"description": "istepaname.doc - Xchecked via VT: e55912a134902ab73c52cb42f32051745214275b59a95d565cfcb7560d32f601",
"pattern": "[file:hashes.MD5 = '6d9091def6fbf3ead3136eaa1861113c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58199d05-e6d4-46c7-809f-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:04.000Z",
"modified": "2016-11-02T08:00:04.000Z",
"first_observed": "2016-11-02T08:00:04Z",
"last_observed": "2016-11-02T08:00:04Z",
"number_observed": 1,
"object_refs": [
"url--58199d05-e6d4-46c7-809f-593002de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58199d05-e6d4-46c7-809f-593002de0b81",
"value": "https://www.virustotal.com/file/e55912a134902ab73c52cb42f32051745214275b59a95d565cfcb7560d32f601/analysis/1458644189/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d05-a17c-4c0b-8842-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:05.000Z",
"modified": "2016-11-02T08:00:05.000Z",
"description": "tetqiqat doklati.doc - Xchecked via VT: 5e818eeb0cffeb6f65f611a17f522560912ae19372e7f734be6df5e35ba82337",
"pattern": "[file:hashes.SHA1 = '29283c126924dca11b05af968a1de2ad46e8dc9c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d05-3dec-4053-9bd8-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:05.000Z",
"modified": "2016-11-02T08:00:05.000Z",
"description": "tetqiqat doklati.doc - Xchecked via VT: 5e818eeb0cffeb6f65f611a17f522560912ae19372e7f734be6df5e35ba82337",
"pattern": "[file:hashes.MD5 = 'dad5fca029351bde31de9fff3541fdf5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58199d05-a3d4-4ab0-8d16-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:05.000Z",
"modified": "2016-11-02T08:00:05.000Z",
"first_observed": "2016-11-02T08:00:05Z",
"last_observed": "2016-11-02T08:00:05Z",
"number_observed": 1,
"object_refs": [
"url--58199d05-a3d4-4ab0-8d16-593002de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58199d05-a3d4-4ab0-8d16-593002de0b81",
"value": "https://www.virustotal.com/file/5e818eeb0cffeb6f65f611a17f522560912ae19372e7f734be6df5e35ba82337/analysis/1467970728/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d06-8b1c-41bf-9739-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:06.000Z",
"modified": "2016-11-02T08:00:06.000Z",
"description": "chqiriq.doc - Xchecked via VT: 0c35a508ece0c9269e176b6b278a96f7ca29e04a2ca2319a91b585f27abfe2f6",
"pattern": "[file:hashes.SHA1 = '4d697c3afd6b948ec28b7c4e9b0f1d63577ef170']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d06-2f2c-40dc-b101-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:06.000Z",
"modified": "2016-11-02T08:00:06.000Z",
"description": "chqiriq.doc - Xchecked via VT: 0c35a508ece0c9269e176b6b278a96f7ca29e04a2ca2319a91b585f27abfe2f6",
"pattern": "[file:hashes.MD5 = '740d347f595983b88d8c4b415e900388']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58199d06-5488-450d-95a0-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:06.000Z",
"modified": "2016-11-02T08:00:06.000Z",
"first_observed": "2016-11-02T08:00:06Z",
"last_observed": "2016-11-02T08:00:06Z",
"number_observed": 1,
"object_refs": [
"url--58199d06-5488-450d-95a0-593002de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58199d06-5488-450d-95a0-593002de0b81",
"value": "https://www.virustotal.com/file/0c35a508ece0c9269e176b6b278a96f7ca29e04a2ca2319a91b585f27abfe2f6/analysis/1467385502/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d06-7d04-48bd-9241-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:06.000Z",
"modified": "2016-11-02T08:00:06.000Z",
"description": "chaqiriq.doc - Xchecked via VT: 940d0770e644c152d60a13f9d40015a1089419361de33fe127e032f4bb446c69",
"pattern": "[file:hashes.SHA1 = 'f7eab4176799794121cd9a8b288bcea09ad7e695']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d06-0020-414d-adda-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:06.000Z",
"modified": "2016-11-02T08:00:06.000Z",
"description": "chaqiriq.doc - Xchecked via VT: 940d0770e644c152d60a13f9d40015a1089419361de33fe127e032f4bb446c69",
"pattern": "[file:hashes.MD5 = '24b6088b65b1f67cf04dfadd4719f807']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58199d07-c2c4-4782-9cd6-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:07.000Z",
"modified": "2016-11-02T08:00:07.000Z",
"first_observed": "2016-11-02T08:00:07Z",
"last_observed": "2016-11-02T08:00:07Z",
"number_observed": 1,
"object_refs": [
"url--58199d07-c2c4-4782-9cd6-593002de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58199d07-c2c4-4782-9cd6-593002de0b81",
"value": "https://www.virustotal.com/file/940d0770e644c152d60a13f9d40015a1089419361de33fe127e032f4bb446c69/analysis/1467396978/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d07-78e4-4225-8b38-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:07.000Z",
"modified": "2016-11-02T08:00:07.000Z",
"description": "chaqiriq.doc - Xchecked via VT: 4ab388b1310918144ad95e418ebe12251a97cb69fbed3f0dd9f04d780ddd132d",
"pattern": "[file:hashes.SHA1 = 'e4ad541c4386f24a7ab6e8f9be46e5100c759704']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d07-36c0-4736-a131-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:07.000Z",
"modified": "2016-11-02T08:00:07.000Z",
"description": "chaqiriq.doc - Xchecked via VT: 4ab388b1310918144ad95e418ebe12251a97cb69fbed3f0dd9f04d780ddd132d",
"pattern": "[file:hashes.MD5 = '62d2cdce3736dc5d9a2f036d27ffc780']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58199d07-898c-486b-8f12-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:07.000Z",
"modified": "2016-11-02T08:00:07.000Z",
"first_observed": "2016-11-02T08:00:07Z",
"last_observed": "2016-11-02T08:00:07Z",
"number_observed": 1,
"object_refs": [
"url--58199d07-898c-486b-8f12-593002de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58199d07-898c-486b-8f12-593002de0b81",
"value": "https://www.virustotal.com/file/4ab388b1310918144ad95e418ebe12251a97cb69fbed3f0dd9f04d780ddd132d/analysis/1457591232/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d07-b870-4c96-a744-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:07.000Z",
"modified": "2016-11-02T08:00:07.000Z",
"description": "agahlandurushname.doc - Xchecked via VT: 7b587b104219784e9fd3dc9c13a0f652e73baed01e8c3b24828a92f151f3c698",
"pattern": "[file:hashes.SHA1 = '911d6bcf69b881df38971ae4c0d07c624cea9daf']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d08-c570-45d7-a8ec-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:08.000Z",
"modified": "2016-11-02T08:00:08.000Z",
"description": "agahlandurushname.doc - Xchecked via VT: 7b587b104219784e9fd3dc9c13a0f652e73baed01e8c3b24828a92f151f3c698",
"pattern": "[file:hashes.MD5 = '5ddded4e5686ad25a02db8ef534173f1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58199d08-efcc-4637-9a08-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:08.000Z",
"modified": "2016-11-02T08:00:08.000Z",
"first_observed": "2016-11-02T08:00:08Z",
"last_observed": "2016-11-02T08:00:08Z",
"number_observed": 1,
"object_refs": [
"url--58199d08-efcc-4637-9a08-593002de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58199d08-efcc-4637-9a08-593002de0b81",
"value": "https://www.virustotal.com/file/7b587b104219784e9fd3dc9c13a0f652e73baed01e8c3b24828a92f151f3c698/analysis/1458310333/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d08-6324-4078-8911-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:08.000Z",
"modified": "2016-11-02T08:00:08.000Z",
"description": "Google aqsakla Rabiye isming.doc - Xchecked via VT: 3f3d0a5aa2799d6afe74c5cb6e077e375078b173263c5ca887ffe2e22164b10f",
"pattern": "[file:hashes.SHA1 = '4879022a39c2917e629edffc3af1c57cf81c58ad']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d08-8cac-4304-afaf-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:08.000Z",
"modified": "2016-11-02T08:00:08.000Z",
"description": "Google aqsakla Rabiye isming.doc - Xchecked via VT: 3f3d0a5aa2799d6afe74c5cb6e077e375078b173263c5ca887ffe2e22164b10f",
"pattern": "[file:hashes.MD5 = '5d16e305ef6dc2db9c0ff1b498277e8c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58199d09-9b1c-40a9-8c1b-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:09.000Z",
"modified": "2016-11-02T08:00:09.000Z",
"first_observed": "2016-11-02T08:00:09Z",
"last_observed": "2016-11-02T08:00:09Z",
"number_observed": 1,
"object_refs": [
"url--58199d09-9b1c-40a9-8c1b-593002de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58199d09-9b1c-40a9-8c1b-593002de0b81",
"value": "https://www.virustotal.com/file/3f3d0a5aa2799d6afe74c5cb6e077e375078b173263c5ca887ffe2e22164b10f/analysis/1456781229/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d09-cb20-4457-b416-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:09.000Z",
"modified": "2016-11-02T08:00:09.000Z",
"description": "Sample matching PEHash - Xchecked via VT: 087e45f63ce00c4df07f81837eceb0b322773822feee01cfc005e5fc14e50f5e",
"pattern": "[file:hashes.SHA1 = '24378312a80c9be83f2b7c294a168dd8e030a8b5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:09Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58199d09-e9f0-446e-85be-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:09.000Z",
"modified": "2016-11-02T08:00:09.000Z",
"first_observed": "2016-11-02T08:00:09Z",
"last_observed": "2016-11-02T08:00:09Z",
"number_observed": 1,
"object_refs": [
"url--58199d09-e9f0-446e-85be-593002de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58199d09-e9f0-446e-85be-593002de0b81",
"value": "https://www.virustotal.com/file/087e45f63ce00c4df07f81837eceb0b322773822feee01cfc005e5fc14e50f5e/analysis/1442671182/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d09-2004-4f16-964d-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:09.000Z",
"modified": "2016-11-02T08:00:09.000Z",
"description": "Sample matching PEHash - Xchecked via VT: ef3e7b1c37aef1d8359169cca9409db4709632b9aa8bf44febe0d91e93ab537e",
"pattern": "[file:hashes.SHA1 = '94b9a2835df032a5907cdd6bac8172270a4b7282']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:09Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58199d0a-66e0-416c-9dcb-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:10.000Z",
"modified": "2016-11-02T08:00:10.000Z",
"first_observed": "2016-11-02T08:00:10Z",
"last_observed": "2016-11-02T08:00:10Z",
"number_observed": 1,
"object_refs": [
"url--58199d0a-66e0-416c-9dcb-593002de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58199d0a-66e0-416c-9dcb-593002de0b81",
"value": "https://www.virustotal.com/file/ef3e7b1c37aef1d8359169cca9409db4709632b9aa8bf44febe0d91e93ab537e/analysis/1462788842/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d0a-a2c4-4ab5-9e4d-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:10.000Z",
"modified": "2016-11-02T08:00:10.000Z",
"description": "Sample matching PEHash - Xchecked via VT: 444c6589ed030da41ba49d20ac38029e5213978fadef2ee94408e4f91395b488",
"pattern": "[file:hashes.SHA1 = '9ccf2631deab313232966ec49ddb8be4c6c4467d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58199d0a-7e44-45e0-9fa5-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:10.000Z",
"modified": "2016-11-02T08:00:10.000Z",
"first_observed": "2016-11-02T08:00:10Z",
"last_observed": "2016-11-02T08:00:10Z",
"number_observed": 1,
"object_refs": [
"url--58199d0a-7e44-45e0-9fa5-593002de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58199d0a-7e44-45e0-9fa5-593002de0b81",
"value": "https://www.virustotal.com/file/444c6589ed030da41ba49d20ac38029e5213978fadef2ee94408e4f91395b488/analysis/1441268734/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d0a-3c70-422f-ab84-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:10.000Z",
"modified": "2016-11-02T08:00:10.000Z",
"description": "Mutex match - Xchecked via VT: 97ec795227818fedc70fad9f2df8cb839d9fb75b502f3598614610d4e8e1be78",
"pattern": "[file:hashes.SHA1 = '1142f615293497837744d81e53b8490caf490c27']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58199d0a-9d4c-4a30-b875-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:10.000Z",
"modified": "2016-11-02T08:00:10.000Z",
"first_observed": "2016-11-02T08:00:10Z",
"last_observed": "2016-11-02T08:00:10Z",
"number_observed": 1,
"object_refs": [
"url--58199d0a-9d4c-4a30-b875-593002de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58199d0a-9d4c-4a30-b875-593002de0b81",
"value": "https://www.virustotal.com/file/97ec795227818fedc70fad9f2df8cb839d9fb75b502f3598614610d4e8e1be78/analysis/1442165720/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d0b-98f8-44bb-999b-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:11.000Z",
"modified": "2016-11-02T08:00:11.000Z",
"description": "Mutex match - Xchecked via VT: f15840fbade7a5611391193a4a53f63ef465ab451f7783da21cad7303ea3b68c",
"pattern": "[file:hashes.SHA1 = '9db5c270a803e98b0135d16a1fa51c212de5d07d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58199d0b-a2ac-4420-aa83-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:11.000Z",
"modified": "2016-11-02T08:00:11.000Z",
"first_observed": "2016-11-02T08:00:11Z",
"last_observed": "2016-11-02T08:00:11Z",
"number_observed": 1,
"object_refs": [
"url--58199d0b-a2ac-4420-aa83-593002de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58199d0b-a2ac-4420-aa83-593002de0b81",
"value": "https://www.virustotal.com/file/f15840fbade7a5611391193a4a53f63ef465ab451f7783da21cad7303ea3b68c/analysis/1442165665/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d0c-45cc-4ac6-816e-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:12.000Z",
"modified": "2016-11-02T08:00:12.000Z",
"description": "Saker/Xbox - Xchecked via VT: 3714058d90b2149169188418773165b620abd1481b47d1551d79679bfe21d28c",
"pattern": "[file:hashes.SHA1 = 'f2d65afc2c1f59dc0bd4e1faaa41c0c976195408']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58199d0c-6ec8-4d0b-a9cc-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:12.000Z",
"modified": "2016-11-02T08:00:12.000Z",
"first_observed": "2016-11-02T08:00:12Z",
"last_observed": "2016-11-02T08:00:12Z",
"number_observed": 1,
"object_refs": [
"url--58199d0c-6ec8-4d0b-a9cc-593002de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58199d0c-6ec8-4d0b-a9cc-593002de0b81",
"value": "https://www.virustotal.com/file/3714058d90b2149169188418773165b620abd1481b47d1551d79679bfe21d28c/analysis/1462960434/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d0d-41e0-4732-9124-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:13.000Z",
"modified": "2016-11-02T08:00:13.000Z",
"description": "Saker/Xbox - Xchecked via VT: c39e0fc30c2604b3eb9694591789a8e3d4cee7bcc4f9b03349e10c45304aef59",
"pattern": "[file:hashes.SHA1 = '2dbd9349bcfb243398648e46f9994b727642e7cd']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58199d0d-5df0-4539-9c22-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:13.000Z",
"modified": "2016-11-02T08:00:13.000Z",
"first_observed": "2016-11-02T08:00:13Z",
"last_observed": "2016-11-02T08:00:13Z",
"number_observed": 1,
"object_refs": [
"url--58199d0d-5df0-4539-9c22-593002de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58199d0d-5df0-4539-9c22-593002de0b81",
"value": "https://www.virustotal.com/file/c39e0fc30c2604b3eb9694591789a8e3d4cee7bcc4f9b03349e10c45304aef59/analysis/1471881852/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d0e-6504-460f-8263-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:14.000Z",
"modified": "2016-11-02T08:00:14.000Z",
"description": "Gh0stRAT LURK0 - Xchecked via VT: b625e605932196efbc6c80a18f61a71d27d82935209a1abde2ec591973fed31e",
"pattern": "[file:hashes.SHA1 = 'b6a78ea984a34a3ae00b5aca3445f1c12118029c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58199d0e-a3a0-4794-96ac-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:14.000Z",
"modified": "2016-11-02T08:00:14.000Z",
"first_observed": "2016-11-02T08:00:14Z",
"last_observed": "2016-11-02T08:00:14Z",
"number_observed": 1,
"object_refs": [
"url--58199d0e-a3a0-4794-96ac-593002de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58199d0e-a3a0-4794-96ac-593002de0b81",
"value": "https://www.virustotal.com/file/b625e605932196efbc6c80a18f61a71d27d82935209a1abde2ec591973fed31e/analysis/1462776856/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58199d0f-9834-4d37-9332-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:15.000Z",
"modified": "2016-11-02T08:00:15.000Z",
"description": "PlugX malware - Xchecked via VT: a351040c0da2837f19b357baea4bffe194b0cd0d86bf262f8be1126e3a9d44d8",
"pattern": "[file:hashes.SHA1 = '9a19a983e5c9db7f7675bbb93173699b12df3955']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-11-02T08:00:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58199d0f-7bbc-447e-8b45-593002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-11-02T08:00:15.000Z",
"modified": "2016-11-02T08:00:15.000Z",
"first_observed": "2016-11-02T08:00:15Z",
"last_observed": "2016-11-02T08:00:15Z",
"number_observed": 1,
"object_refs": [
"url--58199d0f-7bbc-447e-8b45-593002de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58199d0f-7bbc-447e-8b45-593002de0b81",
"value": "https://www.virustotal.com/file/a351040c0da2837f19b357baea4bffe194b0cd0d86bf262f8be1126e3a9d44d8/analysis/1458560323/"
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
2023-04-21 13:25:09 +00:00
]
}