misp-circl-feed/feeds/circl/misp/58996c01-5948-4776-bc9f-4216950d210f.json

837 lines
36 KiB
JSON
Raw Normal View History

2023-04-21 13:25:09 +00:00
{
2023-06-14 17:31:25 +00:00
"type": "bundle",
"id": "bundle--58996c01-5948-4776-bc9f-4216950d210f",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-24T09:16:37.000Z",
"modified": "2017-02-24T09:16:37.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--58996c01-5948-4776-bc9f-4216950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-24T09:16:37.000Z",
"modified": "2017-02-24T09:16:37.000Z",
"name": "OSINT - When A Pony Walks Out Of A Pub",
"published": "2017-02-24T16:00:38Z",
"object_refs": [
"observed-data--58996c22-8218-4d72-8cbd-43a3950d210f",
"url--58996c22-8218-4d72-8cbd-43a3950d210f",
"x-misp-attribute--58996c33-13ac-492f-a3b9-46dc950d210f",
"indicator--58996c61-82f0-4dfb-b824-4d81950d210f",
"indicator--58996c62-0b14-4823-a56c-4514950d210f",
"indicator--58996c63-ed10-4933-944c-4faf950d210f",
"indicator--58996c64-04fc-4b79-8555-4eb9950d210f",
"indicator--58996c65-6cec-47fc-b053-48f3950d210f",
"indicator--58996c66-5c50-4199-9592-4da3950d210f",
"indicator--58996c67-5324-4a23-a81f-4fc3950d210f",
"indicator--58996c68-d6d8-4822-9a30-4e32950d210f",
"indicator--58996c69-80d0-4ecb-9a50-4d4f950d210f",
"indicator--58996c6a-0478-4c6a-9227-403a950d210f",
"indicator--58996c6a-3940-4317-bd3e-4e5c950d210f",
"indicator--58996c6b-d2f4-4906-ae76-4e1f950d210f",
"indicator--58996c6c-257c-47ee-a443-4984950d210f",
"indicator--58996ca9-42a4-4d3d-bed6-4fe0950d210f",
"indicator--58996caa-2898-4e2a-b3f3-4aa3950d210f",
"indicator--58996cab-69d4-42c5-8483-42e5950d210f",
"indicator--58996cab-b9d4-48e3-84c5-4870950d210f",
"indicator--58996cac-0e60-42b7-a43f-4814950d210f",
"indicator--58996cf8-bc7c-4413-bff0-4a1d02de0b81",
"indicator--58996cf9-51d4-4ad8-bc37-45d102de0b81",
"observed-data--58996cf9-9a7c-40df-b751-444202de0b81",
"url--58996cf9-9a7c-40df-b751-444202de0b81",
"indicator--58996cfa-64d4-402e-9ce3-4b7c02de0b81",
"indicator--58996cfb-6388-411b-a740-41a302de0b81",
"observed-data--58996cfc-d058-4024-a0de-47cb02de0b81",
"url--58996cfc-d058-4024-a0de-47cb02de0b81",
"indicator--58996cfc-e528-414d-b766-44ec02de0b81",
"indicator--58996cfd-1d94-41fd-9cca-41e102de0b81",
"observed-data--58996cfe-2598-4470-b1cf-4c8702de0b81",
"url--58996cfe-2598-4470-b1cf-4c8702de0b81",
"indicator--58996cff-b21c-4734-8788-41d702de0b81",
"indicator--58996d00-f794-49a3-98ac-481c02de0b81",
"observed-data--58996d00-630c-4917-a08e-4b8e02de0b81",
"url--58996d00-630c-4917-a08e-4b8e02de0b81"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58996c22-8218-4d72-8cbd-43a3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:45:36.000Z",
"modified": "2017-02-07T06:45:36.000Z",
"first_observed": "2017-02-07T06:45:36Z",
"last_observed": "2017-02-07T06:45:36Z",
"number_observed": 1,
"object_refs": [
"url--58996c22-8218-4d72-8cbd-43a3950d210f"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\"",
"osint:source-type=\"blog-post\"",
"admiralty-scale:source-reliability=\"b\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58996c22-8218-4d72-8cbd-43a3950d210f",
"value": "http://blog.talosintel.com/2017/02/pony-pub-files.html"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--58996c33-13ac-492f-a3b9-46dc950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:41:55.000Z",
"modified": "2017-02-07T06:41:55.000Z",
"labels": [
"misp:type=\"text\"",
"misp:category=\"External analysis\""
],
"x_misp_category": "External analysis",
"x_misp_type": "text",
"x_misp_value": "Talos has observed a small email campaign leveraging the use of Microsoft Publisher files. These .pub files are normally used for the publishing of documents such as newsletters, allowing users to create such documents using familiar office functions such as mail merging. Unlike other applications within the Microsoft Office suite, Microsoft Publisher does not support a 'Protected View' mode. This is a read only mode which can help end users remain protected from malicious document files. Microsoft Publisher is included and installed by default in Office 365.\r\n\r\nThe file used in this campaign was aimed at infecting the victim with the, well known, Pony malware. Whilst Pony is well documented in technical capability it has not been known to use the .pub file format until now. Pony is a credential harvesting piece of malware with other trojan capabilities. In addition to credential harvesting, it is also commonly deployed as a malware loader and used to infect systems with additional malware in multi-stage infection chains. Pony is still used heavily as the sources of multiple Pony versions leaked thus making it much easier for other malicious actors to implement Pony into their infection chain."
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58996c61-82f0-4dfb-b824-4d81950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:42:41.000Z",
"modified": "2017-02-07T06:42:41.000Z",
"description": "payload",
"pattern": "[url:value = 'http://5.200.52.198/flex/3435dde3r.exe']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-02-07T06:42:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58996c62-0b14-4823-a56c-4514950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:42:42.000Z",
"modified": "2017-02-07T06:42:42.000Z",
"description": "Pony CC",
"pattern": "[url:value = 'http://195.22.127.233/rec/fre.php']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-02-07T06:42:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58996c63-ed10-4933-944c-4faf950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:42:43.000Z",
"modified": "2017-02-07T06:42:43.000Z",
"description": "Pony CC",
"pattern": "[url:value = 'http://kbfvzoboss.bid/alien/fre.php']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-02-07T06:42:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58996c64-04fc-4b79-8555-4eb9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:42:44.000Z",
"modified": "2017-02-07T06:42:44.000Z",
"description": "Pony CC",
"pattern": "[url:value = 'http://alphastand.win/alien/fre.php']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-02-07T06:42:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58996c65-6cec-47fc-b053-48f3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:42:45.000Z",
"modified": "2017-02-07T06:42:45.000Z",
"description": "Pony CC",
"pattern": "[url:value = 'http://alphastand.top/alien/fre.php']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-02-07T06:42:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58996c66-5c50-4199-9592-4da3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:42:46.000Z",
"modified": "2017-02-07T06:42:46.000Z",
"description": "Pony CC",
"pattern": "[url:value = 'http://alphastand.trade/alien/fre.php']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-02-07T06:42:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58996c67-5324-4a23-a81f-4fc3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:42:47.000Z",
"modified": "2017-02-07T06:42:47.000Z",
"description": "Pony CC",
"pattern": "[url:value = 'http://195.22.127.233:80/rec/fre.php']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-02-07T06:42:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58996c68-d6d8-4822-9a30-4e32950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:42:48.000Z",
"modified": "2017-02-07T06:42:48.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.200.52.198']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-02-07T06:42:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58996c69-80d0-4ecb-9a50-4d4f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:42:49.000Z",
"modified": "2017-02-07T06:42:49.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '195.22.127.233']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-02-07T06:42:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58996c6a-0478-4c6a-9227-403a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:42:50.000Z",
"modified": "2017-02-07T06:42:50.000Z",
"pattern": "[domain-name:value = 'kbfvzoboss.bid']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-02-07T06:42:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58996c6a-3940-4317-bd3e-4e5c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:42:50.000Z",
"modified": "2017-02-07T06:42:50.000Z",
"pattern": "[domain-name:value = 'alphastand.win']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-02-07T06:42:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58996c6b-d2f4-4906-ae76-4e1f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:42:51.000Z",
"modified": "2017-02-07T06:42:51.000Z",
"pattern": "[domain-name:value = 'alphastand.top']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-02-07T06:42:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58996c6c-257c-47ee-a443-4984950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:42:52.000Z",
"modified": "2017-02-07T06:42:52.000Z",
"pattern": "[domain-name:value = 'alphastand.trade']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-02-07T06:42:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58996ca9-42a4-4d3d-bed6-4fe0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:43:53.000Z",
"modified": "2017-02-07T06:43:53.000Z",
"description": "skbmt_fax45.pub",
"pattern": "[file:hashes.SHA256 = '3cfd8919f095e048e0f24a41c2f132328f0d0efe19581b308d9d2d3ffad40c29']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-02-07T06:43:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58996caa-2898-4e2a-b3f3-4aa3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:43:54.000Z",
"modified": "2017-02-07T06:43:54.000Z",
"description": "skbmt_faxreport34.pub",
"pattern": "[file:hashes.SHA256 = '36baccd2a4fc4f683c839283123a75de61b01ce93205f4a34975263e9c66aaed']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-02-07T06:43:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58996cab-69d4-42c5-8483-42e5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:43:55.000Z",
"modified": "2017-02-07T06:43:55.000Z",
"description": "letten.js",
"pattern": "[file:hashes.SHA256 = '42d0990daba69fa5068a6910d0eac487f3d308ce7e28799a959dace8d84125d7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-02-07T06:43:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58996cab-b9d4-48e3-84c5-4870950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:43:55.000Z",
"modified": "2017-02-07T06:43:55.000Z",
"description": "payload",
"pattern": "[file:hashes.SHA256 = 'd214c89af1929af1171ac40999b14a4f6fbcfd13b88cade392853a2c61057122']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-02-07T06:43:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58996cac-0e60-42b7-a43f-4814950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:43:56.000Z",
"modified": "2017-02-07T06:43:56.000Z",
"description": "payload",
"pattern": "[file:hashes.SHA256 = 'c7ef89222d760fc915690e6394c61c84176e618f7c9508beca30aa9a0f1b1991']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-02-07T06:43:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58996cf8-bc7c-4413-bff0-4a1d02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:45:12.000Z",
"modified": "2017-02-07T06:45:12.000Z",
"description": "payload - Xchecked via VT: c7ef89222d760fc915690e6394c61c84176e618f7c9508beca30aa9a0f1b1991",
"pattern": "[file:hashes.SHA1 = 'b7e499be525b14b6801db2795ed631fbea7ca0bd']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-02-07T06:45:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58996cf9-51d4-4ad8-bc37-45d102de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:45:13.000Z",
"modified": "2017-02-07T06:45:13.000Z",
"description": "payload - Xchecked via VT: c7ef89222d760fc915690e6394c61c84176e618f7c9508beca30aa9a0f1b1991",
"pattern": "[file:hashes.MD5 = '05c6208f08108266ab20eedd464fb05f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-02-07T06:45:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58996cf9-9a7c-40df-b751-444202de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-24T09:16:37.000Z",
"modified": "2017-02-24T09:16:37.000Z",
"first_observed": "2017-02-24T09:16:37Z",
"last_observed": "2017-02-24T09:16:37Z",
"number_observed": 1,
"object_refs": [
"url--58996cf9-9a7c-40df-b751-444202de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58996cf9-9a7c-40df-b751-444202de0b81",
"value": "https://www.virustotal.com/file/c7ef89222d760fc915690e6394c61c84176e618f7c9508beca30aa9a0f1b1991/analysis/1486387683/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58996cfa-64d4-402e-9ce3-4b7c02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:45:14.000Z",
"modified": "2017-02-07T06:45:14.000Z",
"description": "payload - Xchecked via VT: d214c89af1929af1171ac40999b14a4f6fbcfd13b88cade392853a2c61057122",
"pattern": "[file:hashes.SHA1 = 'a76b850aa336dfb5c83c50e83f24a9c844641684']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-02-07T06:45:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58996cfb-6388-411b-a740-41a302de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:45:15.000Z",
"modified": "2017-02-07T06:45:15.000Z",
"description": "payload - Xchecked via VT: d214c89af1929af1171ac40999b14a4f6fbcfd13b88cade392853a2c61057122",
"pattern": "[file:hashes.MD5 = '9da66a7cf195036cb90606ef106e2234']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-02-07T06:45:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58996cfc-d058-4024-a0de-47cb02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:45:16.000Z",
"modified": "2017-02-07T06:45:16.000Z",
"first_observed": "2017-02-07T06:45:16Z",
"last_observed": "2017-02-07T06:45:16Z",
"number_observed": 1,
"object_refs": [
"url--58996cfc-d058-4024-a0de-47cb02de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58996cfc-d058-4024-a0de-47cb02de0b81",
"value": "https://www.virustotal.com/file/d214c89af1929af1171ac40999b14a4f6fbcfd13b88cade392853a2c61057122/analysis/1486116167/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58996cfc-e528-414d-b766-44ec02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:45:16.000Z",
"modified": "2017-02-07T06:45:16.000Z",
"description": "skbmt_faxreport34.pub - Xchecked via VT: 36baccd2a4fc4f683c839283123a75de61b01ce93205f4a34975263e9c66aaed",
"pattern": "[file:hashes.SHA1 = '9eb47a9bd943afe83c8bbc29669702dfa6db8e18']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-02-07T06:45:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58996cfd-1d94-41fd-9cca-41e102de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:45:17.000Z",
"modified": "2017-02-07T06:45:17.000Z",
"description": "skbmt_faxreport34.pub - Xchecked via VT: 36baccd2a4fc4f683c839283123a75de61b01ce93205f4a34975263e9c66aaed",
"pattern": "[file:hashes.MD5 = '05b8b570dcc6c78f26ede9f6f650097e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-02-07T06:45:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58996cfe-2598-4470-b1cf-4c8702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:45:18.000Z",
"modified": "2017-02-07T06:45:18.000Z",
"first_observed": "2017-02-07T06:45:18Z",
"last_observed": "2017-02-07T06:45:18Z",
"number_observed": 1,
"object_refs": [
"url--58996cfe-2598-4470-b1cf-4c8702de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58996cfe-2598-4470-b1cf-4c8702de0b81",
"value": "https://www.virustotal.com/file/36baccd2a4fc4f683c839283123a75de61b01ce93205f4a34975263e9c66aaed/analysis/1486424559/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58996cff-b21c-4734-8788-41d702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:45:19.000Z",
"modified": "2017-02-07T06:45:19.000Z",
"description": "skbmt_fax45.pub - Xchecked via VT: 3cfd8919f095e048e0f24a41c2f132328f0d0efe19581b308d9d2d3ffad40c29",
"pattern": "[file:hashes.SHA1 = '73a9c0054b193703960828808249a77840311bdf']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-02-07T06:45:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58996d00-f794-49a3-98ac-481c02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:45:20.000Z",
"modified": "2017-02-07T06:45:20.000Z",
"description": "skbmt_fax45.pub - Xchecked via VT: 3cfd8919f095e048e0f24a41c2f132328f0d0efe19581b308d9d2d3ffad40c29",
"pattern": "[file:hashes.MD5 = '6208d08cfb09bae085f2eaeb53c17707']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-02-07T06:45:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58996d00-630c-4917-a08e-4b8e02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-07T06:45:20.000Z",
"modified": "2017-02-07T06:45:20.000Z",
"first_observed": "2017-02-07T06:45:20Z",
"last_observed": "2017-02-07T06:45:20Z",
"number_observed": 1,
"object_refs": [
"url--58996d00-630c-4917-a08e-4b8e02de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58996d00-630c-4917-a08e-4b8e02de0b81",
"value": "https://www.virustotal.com/file/3cfd8919f095e048e0f24a41c2f132328f0d0efe19581b308d9d2d3ffad40c29/analysis/1486365572/"
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
2023-04-21 13:25:09 +00:00
]
}