2023-04-21 13:25:09 +00:00
{
2023-06-14 17:31:25 +00:00
"type" : "bundle" ,
"id" : "bundle--59cd5d0e-8280-4acd-a27e-427302de0b81" ,
"objects" : [
{
"type" : "identity" ,
"spec_version" : "2.1" ,
"id" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:39:08.000Z" ,
"modified" : "2017-09-28T20:39:08.000Z" ,
"name" : "CIRCL" ,
"identity_class" : "organization"
} ,
{
"type" : "report" ,
"spec_version" : "2.1" ,
"id" : "report--59cd5d0e-8280-4acd-a27e-427302de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:39:08.000Z" ,
"modified" : "2017-09-28T20:39:08.000Z" ,
"name" : "OSINT - Banking Trojan Attempts To Steal Brazillion$" ,
"published" : "2017-09-28T20:39:40Z" ,
"object_refs" : [
"observed-data--59cd5d1b-82a8-44f8-84bd-48c702de0b81" ,
"url--59cd5d1b-82a8-44f8-84bd-48c702de0b81" ,
"x-misp-attribute--59cd5d2a-c288-49c6-90c3-445302de0b81" ,
"indicator--59cd5d89-592c-4e51-9d5c-471302de0b81" ,
"indicator--59cd5d89-0120-47f5-bb38-48e002de0b81" ,
"indicator--59cd5d89-c20c-4052-8022-440002de0b81" ,
"indicator--59cd5d89-e00c-478a-8b99-4f7b02de0b81" ,
"indicator--59cd5d89-9d94-4dc4-95cd-4cf802de0b81" ,
"indicator--59cd5d89-6954-4479-9a61-4b2402de0b81" ,
"indicator--59cd5d89-1fd0-4aa1-a172-4eaa02de0b81" ,
"indicator--59cd5d89-8d68-4081-b19f-4beb02de0b81" ,
"indicator--59cd5d89-7e4c-4191-974f-48c702de0b81" ,
"indicator--59cd5dba-761c-4b2b-9fda-4cb002de0b81" ,
"indicator--59cd5dba-c394-4a70-a032-471a02de0b81" ,
"observed-data--59cd5dba-a558-4fae-8a03-43c202de0b81" ,
"url--59cd5dba-a558-4fae-8a03-43c202de0b81" ,
"indicator--59cd5dba-049c-4005-a327-4e7902de0b81" ,
"indicator--59cd5dba-6124-42b4-8061-438c02de0b81" ,
"observed-data--59cd5dba-4944-43a2-a0dc-48ba02de0b81" ,
"url--59cd5dba-4944-43a2-a0dc-48ba02de0b81" ,
"indicator--59cd5dba-fca8-4d0f-9318-4c4102de0b81" ,
"indicator--59cd5dba-21b8-40f2-86b2-4a8202de0b81" ,
"observed-data--59cd5dba-3830-4107-9293-46c902de0b81" ,
"url--59cd5dba-3830-4107-9293-46c902de0b81" ,
"indicator--59cd5dba-99cc-4c15-aa93-43b802de0b81" ,
"indicator--59cd5dba-1274-4eb7-8170-4b9402de0b81" ,
"observed-data--59cd5dba-63b0-4cfd-801a-4e6802de0b81" ,
"url--59cd5dba-63b0-4cfd-801a-4e6802de0b81" ,
"indicator--59cd5dba-7218-4880-8d58-40cb02de0b81" ,
"indicator--59cd5dba-24d8-4408-a7d7-499b02de0b81" ,
"observed-data--59cd5dba-bc5c-456b-8a47-43b302de0b81" ,
"url--59cd5dba-bc5c-456b-8a47-43b302de0b81" ,
"indicator--59cd5dba-13ac-44ae-8366-4ab702de0b81" ,
"indicator--59cd5dba-69d0-4624-a6e6-4ba602de0b81" ,
"observed-data--59cd5dba-2990-4468-9ca1-40c902de0b81" ,
"url--59cd5dba-2990-4468-9ca1-40c902de0b81" ,
"indicator--59cd5dba-76a4-4d4d-8197-490802de0b81" ,
"indicator--59cd5dba-c750-4b2c-90a9-420b02de0b81" ,
"observed-data--59cd5dba-bfb4-44d5-9d15-4f3102de0b81" ,
"url--59cd5dba-bfb4-44d5-9d15-4f3102de0b81" ,
"indicator--59cd5dba-fea8-4cea-ae18-420a02de0b81" ,
"indicator--59cd5dba-3778-4f06-8f19-4caa02de0b81" ,
"observed-data--59cd5dba-4f9c-4ca4-b121-4d4b02de0b81" ,
"url--59cd5dba-4f9c-4ca4-b121-4d4b02de0b81" ,
"indicator--59cd5dba-bdf8-420a-a454-413d02de0b81" ,
"indicator--59cd5dba-e644-4409-bc70-405b02de0b81" ,
"observed-data--59cd5dba-3c68-4d2e-9862-478c02de0b81" ,
"url--59cd5dba-3c68-4d2e-9862-478c02de0b81"
] ,
"labels" : [
"Threat-Report" ,
"misp:tool=\"MISP-STIX-Converter\"" ,
"circl:topic=\"finance\""
] ,
"object_marking_refs" : [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--59cd5d1b-82a8-44f8-84bd-48c702de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"first_observed" : "2017-09-28T20:38:18Z" ,
"last_observed" : "2017-09-28T20:38:18Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--59cd5d1b-82a8-44f8-84bd-48c702de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--59cd5d1b-82a8-44f8-84bd-48c702de0b81" ,
"value" : "http://blog.talosintelligence.com/2017/09/brazilbanking.html"
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--59cd5d2a-c288-49c6-90c3-445302de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"labels" : [
"misp:type=\"text\"" ,
"misp:category=\"External analysis\""
] ,
"x_misp_category" : "External analysis" ,
"x_misp_type" : "text" ,
"x_misp_value" : "Banking trojans are among some of the biggest threats to everyday users as they directly impact the user in terms of financial loss. Talos recently observed a new campaign specific to South America, namely Brazil. This campaign was focused on various South American banks in an attempt to steal credentials from the user to allow for illicit financial gain for the malicious actors. The campaign Talos analysed focused on Brazilian users and also attempted to remain stealthy by using multiple methods of re-direction in an attempt to infect the victim machine. It also used multiple anti-analysis techniques and the final payload was written in Delphi which is quite unique to the banking trojan landscape."
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59cd5d89-592c-4e51-9d5c-471302de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"description" : "HTML attachment" ,
"pattern" : "[file:hashes.SHA256 = '927d914f46715a9ed29810ed73f9464e4dadfe822ee09d945a04623fa3f4bc10']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-09-28T20:38:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59cd5d89-0120-47f5-bb38-48e002de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"description" : "RAR archive" ,
"pattern" : "[file:hashes.SHA256 = '5730b4e0dd520caba11f9224de8cfd1a8c52e0cc2ee98b2dac79e40088fe681c']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-09-28T20:38:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59cd5d89-c20c-4052-8022-440002de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"description" : "BOLETO_09848378974093798043.jar" ,
"pattern" : "[file:hashes.SHA256 = 'b76344ba438520a19fff51a1217e3c6898858f4d07cfe89f7b1fe35e30a6ece9']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-09-28T20:38:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59cd5d89-e00c-478a-8b99-4f7b02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"description" : "gbs.png" ,
"pattern" : "[file:hashes.SHA256 = '0ce1eac877cdd87fea25050b0780e354fe3b7d6ca96c505b2cd36ca319dc6cab']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-09-28T20:38:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59cd5d89-9d94-4dc4-95cd-4cf802de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"description" : "i.dk" ,
"pattern" : "[file:hashes.SHA256 = '6d8c7760ac76af40b7f9cc4af31da8931cef0d9b4ad02aba0816fa2c24f76f10']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-09-28T20:38:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59cd5d89-6954-4479-9a61-4b2402de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"description" : "prs.png" ,
"pattern" : "[file:hashes.SHA256 = '56664ec3cbb228e8fa21ec44224d68902d1fbe20687fd88922816464ea5d4cdf']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-09-28T20:38:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59cd5d89-1fd0-4aa1-a172-4eaa02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"description" : "pz.zip" ,
"pattern" : "[file:hashes.SHA256 = '641a58b667248fc1aec80a0d0e9a515ba43e6ca9a8bdd162edd66e58703f8f98']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-09-28T20:38:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59cd5d89-8d68-4081-b19f-4beb02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"description" : "vm.png" ,
"pattern" : "[file:hashes.SHA256 = '79a68c59004e3444dfd64794c68528187e3415b3da58f953b8cc7967475884c2']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-09-28T20:38:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59cd5d89-7e4c-4191-974f-48c702de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"description" : "vmwarebase.dll" ,
"pattern" : "[file:hashes.SHA256 = '969a5dcf8f42574e5b0c0adda0ff28ce310e0b72d94a92b70f23d06ca5b438be']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-09-28T20:38:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59cd5dba-761c-4b2b-9fda-4cb002de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"description" : "vmwarebase.dll - Xchecked via VT: 969a5dcf8f42574e5b0c0adda0ff28ce310e0b72d94a92b70f23d06ca5b438be" ,
"pattern" : "[file:hashes.SHA1 = '215864580545fe063ef7e11502aee333e2b5b985']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-09-28T20:38:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59cd5dba-c394-4a70-a032-471a02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"description" : "vmwarebase.dll - Xchecked via VT: 969a5dcf8f42574e5b0c0adda0ff28ce310e0b72d94a92b70f23d06ca5b438be" ,
"pattern" : "[file:hashes.MD5 = '22f826ba98c8a8478881bdfe73e6b86b']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-09-28T20:38:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--59cd5dba-a558-4fae-8a03-43c202de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"first_observed" : "2017-09-28T20:38:18Z" ,
"last_observed" : "2017-09-28T20:38:18Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--59cd5dba-a558-4fae-8a03-43c202de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--59cd5dba-a558-4fae-8a03-43c202de0b81" ,
"value" : "https://www.virustotal.com/file/969a5dcf8f42574e5b0c0adda0ff28ce310e0b72d94a92b70f23d06ca5b438be/analysis/1506627369/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59cd5dba-049c-4005-a327-4e7902de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"description" : "vm.png - Xchecked via VT: 79a68c59004e3444dfd64794c68528187e3415b3da58f953b8cc7967475884c2" ,
"pattern" : "[file:hashes.SHA1 = 'b87c2ceadd200b1bf7f9eeef3c5137620cf991b7']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-09-28T20:38:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59cd5dba-6124-42b4-8061-438c02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"description" : "vm.png - Xchecked via VT: 79a68c59004e3444dfd64794c68528187e3415b3da58f953b8cc7967475884c2" ,
"pattern" : "[file:hashes.MD5 = '217c29852569b3f21ff588a038a27423']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-09-28T20:38:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--59cd5dba-4944-43a2-a0dc-48ba02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"first_observed" : "2017-09-28T20:38:18Z" ,
"last_observed" : "2017-09-28T20:38:18Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--59cd5dba-4944-43a2-a0dc-48ba02de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--59cd5dba-4944-43a2-a0dc-48ba02de0b81" ,
"value" : "https://www.virustotal.com/file/79a68c59004e3444dfd64794c68528187e3415b3da58f953b8cc7967475884c2/analysis/1506627368/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59cd5dba-fca8-4d0f-9318-4c4102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"description" : "pz.zip - Xchecked via VT: 641a58b667248fc1aec80a0d0e9a515ba43e6ca9a8bdd162edd66e58703f8f98" ,
"pattern" : "[file:hashes.SHA1 = '8e48a22aba894d0fc81501b88c5fc9c53a7671c0']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-09-28T20:38:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59cd5dba-21b8-40f2-86b2-4a8202de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"description" : "pz.zip - Xchecked via VT: 641a58b667248fc1aec80a0d0e9a515ba43e6ca9a8bdd162edd66e58703f8f98" ,
"pattern" : "[file:hashes.MD5 = '910050bc1fcea33836fa2e9978bbea10']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-09-28T20:38:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--59cd5dba-3830-4107-9293-46c902de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"first_observed" : "2017-09-28T20:38:18Z" ,
"last_observed" : "2017-09-28T20:38:18Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--59cd5dba-3830-4107-9293-46c902de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--59cd5dba-3830-4107-9293-46c902de0b81" ,
"value" : "https://www.virustotal.com/file/641a58b667248fc1aec80a0d0e9a515ba43e6ca9a8bdd162edd66e58703f8f98/analysis/1506627368/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59cd5dba-99cc-4c15-aa93-43b802de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"description" : "prs.png - Xchecked via VT: 56664ec3cbb228e8fa21ec44224d68902d1fbe20687fd88922816464ea5d4cdf" ,
"pattern" : "[file:hashes.SHA1 = '840db25ff4e601891ef7b87378edbafa88b1b89a']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-09-28T20:38:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59cd5dba-1274-4eb7-8170-4b9402de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"description" : "prs.png - Xchecked via VT: 56664ec3cbb228e8fa21ec44224d68902d1fbe20687fd88922816464ea5d4cdf" ,
"pattern" : "[file:hashes.MD5 = '9500ef3e0efb0253e67092733c6171fb']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-09-28T20:38:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--59cd5dba-63b0-4cfd-801a-4e6802de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"first_observed" : "2017-09-28T20:38:18Z" ,
"last_observed" : "2017-09-28T20:38:18Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--59cd5dba-63b0-4cfd-801a-4e6802de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--59cd5dba-63b0-4cfd-801a-4e6802de0b81" ,
"value" : "https://www.virustotal.com/file/56664ec3cbb228e8fa21ec44224d68902d1fbe20687fd88922816464ea5d4cdf/analysis/1506627367/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59cd5dba-7218-4880-8d58-40cb02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"description" : "i.dk - Xchecked via VT: 6d8c7760ac76af40b7f9cc4af31da8931cef0d9b4ad02aba0816fa2c24f76f10" ,
"pattern" : "[file:hashes.SHA1 = 'd4f4b6ae16132f0f3dbf229261b8c9c0e0f6dacb']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-09-28T20:38:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59cd5dba-24d8-4408-a7d7-499b02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"description" : "i.dk - Xchecked via VT: 6d8c7760ac76af40b7f9cc4af31da8931cef0d9b4ad02aba0816fa2c24f76f10" ,
"pattern" : "[file:hashes.MD5 = '07bac99d36fd5bae4d600356398c7a1b']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-09-28T20:38:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--59cd5dba-bc5c-456b-8a47-43b302de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"first_observed" : "2017-09-28T20:38:18Z" ,
"last_observed" : "2017-09-28T20:38:18Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--59cd5dba-bc5c-456b-8a47-43b302de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--59cd5dba-bc5c-456b-8a47-43b302de0b81" ,
"value" : "https://www.virustotal.com/file/6d8c7760ac76af40b7f9cc4af31da8931cef0d9b4ad02aba0816fa2c24f76f10/analysis/1506627367/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59cd5dba-13ac-44ae-8366-4ab702de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"description" : "gbs.png - Xchecked via VT: 0ce1eac877cdd87fea25050b0780e354fe3b7d6ca96c505b2cd36ca319dc6cab" ,
"pattern" : "[file:hashes.SHA1 = '369daf3580d3bb3c82c2232998b041718755414f']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-09-28T20:38:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59cd5dba-69d0-4624-a6e6-4ba602de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"description" : "gbs.png - Xchecked via VT: 0ce1eac877cdd87fea25050b0780e354fe3b7d6ca96c505b2cd36ca319dc6cab" ,
"pattern" : "[file:hashes.MD5 = '5cce471463f3f2a9fd14f92787ab90a8']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-09-28T20:38:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--59cd5dba-2990-4468-9ca1-40c902de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"first_observed" : "2017-09-28T20:38:18Z" ,
"last_observed" : "2017-09-28T20:38:18Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--59cd5dba-2990-4468-9ca1-40c902de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--59cd5dba-2990-4468-9ca1-40c902de0b81" ,
"value" : "https://www.virustotal.com/file/0ce1eac877cdd87fea25050b0780e354fe3b7d6ca96c505b2cd36ca319dc6cab/analysis/1506627367/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59cd5dba-76a4-4d4d-8197-490802de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"description" : "BOLETO_09848378974093798043.jar - Xchecked via VT: b76344ba438520a19fff51a1217e3c6898858f4d07cfe89f7b1fe35e30a6ece9" ,
"pattern" : "[file:hashes.SHA1 = 'c6b649e402b97ad971609837b6c79812d568f322']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-09-28T20:38:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59cd5dba-c750-4b2c-90a9-420b02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"description" : "BOLETO_09848378974093798043.jar - Xchecked via VT: b76344ba438520a19fff51a1217e3c6898858f4d07cfe89f7b1fe35e30a6ece9" ,
"pattern" : "[file:hashes.MD5 = 'c80f7dc56e5a2e301a450b5a96af1c23']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-09-28T20:38:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--59cd5dba-bfb4-44d5-9d15-4f3102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"first_observed" : "2017-09-28T20:38:18Z" ,
"last_observed" : "2017-09-28T20:38:18Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--59cd5dba-bfb4-44d5-9d15-4f3102de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--59cd5dba-bfb4-44d5-9d15-4f3102de0b81" ,
"value" : "https://www.virustotal.com/file/b76344ba438520a19fff51a1217e3c6898858f4d07cfe89f7b1fe35e30a6ece9/analysis/1506045471/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59cd5dba-fea8-4cea-ae18-420a02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"description" : "RAR archive - Xchecked via VT: 5730b4e0dd520caba11f9224de8cfd1a8c52e0cc2ee98b2dac79e40088fe681c" ,
"pattern" : "[file:hashes.SHA1 = '2f2cac51734e2d4c123e9b857aeef5abbf56e47d']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-09-28T20:38:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59cd5dba-3778-4f06-8f19-4caa02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"description" : "RAR archive - Xchecked via VT: 5730b4e0dd520caba11f9224de8cfd1a8c52e0cc2ee98b2dac79e40088fe681c" ,
"pattern" : "[file:hashes.MD5 = '90fca6fff9e677184329fc1f7a9fa632']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-09-28T20:38:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--59cd5dba-4f9c-4ca4-b121-4d4b02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"first_observed" : "2017-09-28T20:38:18Z" ,
"last_observed" : "2017-09-28T20:38:18Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--59cd5dba-4f9c-4ca4-b121-4d4b02de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--59cd5dba-4f9c-4ca4-b121-4d4b02de0b81" ,
"value" : "https://www.virustotal.com/file/5730b4e0dd520caba11f9224de8cfd1a8c52e0cc2ee98b2dac79e40088fe681c/analysis/1506627366/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59cd5dba-bdf8-420a-a454-413d02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"description" : "HTML attachment - Xchecked via VT: 927d914f46715a9ed29810ed73f9464e4dadfe822ee09d945a04623fa3f4bc10" ,
"pattern" : "[file:hashes.SHA1 = '1ed0f239e26bc011b248784dff55d25e5ada732c']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-09-28T20:38:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--59cd5dba-e644-4409-bc70-405b02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"description" : "HTML attachment - Xchecked via VT: 927d914f46715a9ed29810ed73f9464e4dadfe822ee09d945a04623fa3f4bc10" ,
"pattern" : "[file:hashes.MD5 = 'c77397555decc0f026a84897a324a448']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-09-28T20:38:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--59cd5dba-3c68-4d2e-9862-478c02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-09-28T20:38:18.000Z" ,
"modified" : "2017-09-28T20:38:18.000Z" ,
"first_observed" : "2017-09-28T20:38:18Z" ,
"last_observed" : "2017-09-28T20:38:18Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--59cd5dba-3c68-4d2e-9862-478c02de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--59cd5dba-3c68-4d2e-9862-478c02de0b81" ,
"value" : "https://www.virustotal.com/file/927d914f46715a9ed29810ed73f9464e4dadfe822ee09d945a04623fa3f4bc10/analysis/1506628022/"
} ,
{
"type" : "marking-definition" ,
"spec_version" : "2.1" ,
"id" : "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ,
"created" : "2017-01-20T00:00:00.000Z" ,
"definition_type" : "tlp" ,
"name" : "TLP:WHITE" ,
"definition" : {
"tlp" : "white"
}
}
2023-04-21 13:25:09 +00:00
]
}