2023-04-21 13:25:09 +00:00
{
2023-06-14 17:31:25 +00:00
"type" : "bundle" ,
"id" : "bundle--551427fe-47ac-4247-93f0-c906950d210b" ,
"objects" : [
{
"type" : "identity" ,
"spec_version" : "2.1" ,
"id" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:36.000Z" ,
"modified" : "2015-08-19T13:06:36.000Z" ,
"name" : "CIRCL" ,
"identity_class" : "organization"
} ,
{
"type" : "report" ,
"spec_version" : "2.1" ,
"id" : "report--551427fe-47ac-4247-93f0-c906950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:36.000Z" ,
"modified" : "2015-08-19T13:06:36.000Z" ,
"name" : "OSINT - PlugX goes to the registry (and India)" ,
"published" : "2015-03-26T15:54:57Z" ,
"object_refs" : [
"observed-data--5514281c-0d28-49da-b97e-cac2950d210b" ,
"url--5514281c-0d28-49da-b97e-cac2950d210b" ,
"x-misp-attribute--55142838-f558-43f8-9a55-0988950d210b" ,
"observed-data--55142850-c100-4215-a3aa-c2b7950d210b" ,
"file--55142850-c100-4215-a3aa-c2b7950d210b" ,
"indicator--5514286b-63ac-4c17-8c3f-4ceb950d210b" ,
"indicator--55142881-d534-4df9-b4c9-c2b7950d210b" ,
"indicator--55142893-e034-4995-873c-d140950d210b" ,
"indicator--551428b4-efc4-419a-affa-c941950d210b" ,
"indicator--551428c2-858c-4fe1-99e6-c2d9950d210b" ,
"indicator--551428d5-05ec-4c11-ad75-0988950d210b" ,
"indicator--551428f5-e528-4919-a060-c2d9950d210b" ,
"indicator--55142900-be34-46d4-afc2-463a950d210b" ,
"indicator--55142918-8be4-4f90-b698-c941950d210b" ,
"indicator--55142935-0734-41c4-b46e-4d9d950d210b" ,
"indicator--55142944-0010-4e16-ac95-c2b7950d210b" ,
"indicator--55142951-d724-48cb-9bdc-c2d9950d210b" ,
"indicator--55142961-cb80-43f6-ada1-c906950d210b" ,
"indicator--5514296f-c200-4084-bda1-d140950d210b" ,
"indicator--55142980-5538-4b73-9b14-0988950d210b" ,
"indicator--551429a4-5b40-4546-adfd-0988950d210b" ,
"indicator--551429b9-c6e8-4a70-b37f-c2d9950d210b" ,
"observed-data--551429d3-5ee8-444b-b241-c2b7950d210b" ,
"file--551429d3-5ee8-444b-b241-c2b7950d210b" ,
"indicator--551429e8-6fcc-4190-ae4b-4b0b950d210b" ,
"indicator--55142a0e-8c8c-45ba-8798-cac2950d210b" ,
"indicator--55142a1d-ac64-4456-a442-0988950d210b" ,
"indicator--55142a2e-71c0-42b3-b1c1-c2d9950d210b" ,
"indicator--55142a43-226c-40a7-bb80-4930950d210b" ,
"indicator--55142a52-c084-4607-a8e8-c906950d210b" ,
"indicator--55142a60-7d28-4e38-b873-48ce950d210b" ,
"indicator--55142a74-5f38-42e6-b2a1-c2b7950d210b" ,
"indicator--55142aa5-4630-4a46-94dd-d140950d210b" ,
"indicator--55142ab5-7cd4-4304-bb9c-c942950d210b" ,
"indicator--55142af0-2450-4c8b-967b-0988950d210b" ,
"indicator--55142b06-3d98-4782-9976-c2b7950d210b" ,
"indicator--55142b15-3858-41ed-b77c-0988950d210b" ,
"indicator--55142b25-e2e0-4728-9930-410b950d210b" ,
"indicator--55142b51-fe90-4efd-9378-c906950d210b" ,
"indicator--55142b64-4edc-45f6-b021-c942950d210b" ,
"indicator--55142b77-9914-4a2d-9ad6-d140950d210b" ,
"indicator--55142b86-ead0-4ab3-991f-c941950d210b" ,
"indicator--55142b9b-2814-449c-b369-d140950d210b" ,
"indicator--55142baf-33e8-4cb9-a585-c941950d210b" ,
"indicator--55d47f5d-411c-49cc-8b4e-4a05950d210b" ,
"indicator--55d47f5d-2ea0-4537-b56c-4a75950d210b" ,
"observed-data--55d47f5d-5260-4c37-a024-4c22950d210b" ,
"url--55d47f5d-5260-4c37-a024-4c22950d210b" ,
"indicator--55d47f5d-4ef8-4993-84dd-48ef950d210b" ,
"indicator--55d47f5d-baa8-46f5-965b-4b86950d210b" ,
"observed-data--55d47f5e-cec4-4589-b62d-439a950d210b" ,
"url--55d47f5e-cec4-4589-b62d-439a950d210b" ,
"indicator--55d47f5e-0df8-460b-80cd-42b8950d210b" ,
"indicator--55d47f5e-3d0c-45d9-94e9-4576950d210b" ,
"observed-data--55d47f5e-bee0-47d5-bcb9-46e7950d210b" ,
"url--55d47f5e-bee0-47d5-bcb9-46e7950d210b" ,
"indicator--55d47f5f-7930-4084-9379-421e950d210b" ,
"indicator--55d47f5f-78f0-4668-8d40-4955950d210b" ,
"observed-data--55d47f5f-a5e4-4025-bc8b-418f950d210b" ,
"url--55d47f5f-a5e4-4025-bc8b-418f950d210b" ,
"indicator--55d47f5f-af58-46b3-ad3a-4f94950d210b" ,
"indicator--55d47f5f-12fc-4cf4-8d45-43f3950d210b" ,
"observed-data--55d47f60-8bdc-4bd2-8518-4623950d210b" ,
"url--55d47f60-8bdc-4bd2-8518-4623950d210b" ,
"indicator--55d47f60-6160-42d5-9242-4ccd950d210b" ,
"indicator--55d47f60-2b98-4005-a170-4409950d210b" ,
"observed-data--55d47f60-596c-4c4c-99cc-4d12950d210b" ,
"url--55d47f60-596c-4c4c-99cc-4d12950d210b" ,
"indicator--55d47f60-53e0-4220-bec3-407a950d210b" ,
"indicator--55d47f61-0d7c-4a61-8e48-4e19950d210b" ,
"observed-data--55d47f61-a6b4-41f0-8afa-4e77950d210b" ,
"url--55d47f61-a6b4-41f0-8afa-4e77950d210b" ,
"indicator--55d47f61-60a0-4529-ad61-4c75950d210b" ,
"indicator--55d47f61-341c-41e6-b4f6-492f950d210b" ,
"observed-data--55d47f61-c380-4311-a946-4ab6950d210b" ,
"url--55d47f61-c380-4311-a946-4ab6950d210b" ,
"indicator--55d47f62-617c-4760-b0e5-490f950d210b" ,
"indicator--55d47f62-fd14-4aa8-8359-4691950d210b" ,
"observed-data--55d47f62-4890-43b3-bc78-4d25950d210b" ,
"url--55d47f62-4890-43b3-bc78-4d25950d210b" ,
"indicator--55d47f62-8994-40df-aa97-4c27950d210b" ,
"indicator--55d47f62-23e4-4fdd-87b2-4dfd950d210b" ,
"observed-data--55d47f62-7704-471f-863b-40ee950d210b" ,
"url--55d47f62-7704-471f-863b-40ee950d210b" ,
"indicator--55d47f63-6118-4d47-8c9f-4381950d210b" ,
"indicator--55d47f63-c840-4b95-abea-4dc2950d210b" ,
"observed-data--55d47f63-5c80-4c71-8495-45bc950d210b" ,
"url--55d47f63-5c80-4c71-8495-45bc950d210b" ,
"indicator--55d47f63-a864-450a-bb1d-41a5950d210b" ,
"indicator--55d47f63-4c20-4f2a-9b78-4f99950d210b" ,
"observed-data--55d47f64-468c-4563-8019-4c5b950d210b" ,
"url--55d47f64-468c-4563-8019-4c5b950d210b" ,
"indicator--55d47f64-625c-45d3-8384-45a7950d210b" ,
"indicator--55d47f64-9ebc-4586-bb3b-4fec950d210b" ,
"observed-data--55d47f64-6208-45ee-83f0-4cf9950d210b" ,
"url--55d47f64-6208-45ee-83f0-4cf9950d210b" ,
"indicator--55d47f64-5688-42a9-b84b-4bc2950d210b" ,
"indicator--55d47f65-84b0-4147-9245-4deb950d210b" ,
"observed-data--55d47f65-d564-447e-bb14-4945950d210b" ,
"url--55d47f65-d564-447e-bb14-4945950d210b" ,
"indicator--55d47f65-2208-4e14-b2c0-4dbe950d210b" ,
"indicator--55d47f65-af80-48f6-8e57-4351950d210b" ,
"observed-data--55d47f65-86dc-4142-9daf-4f54950d210b" ,
"url--55d47f65-86dc-4142-9daf-4f54950d210b"
] ,
"labels" : [
"Threat-Report" ,
"misp:tool=\"MISP-STIX-Converter\"" ,
"type:OSINT"
] ,
"object_marking_refs" : [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--5514281c-0d28-49da-b97e-cac2950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:39:08.000Z" ,
"modified" : "2015-03-26T15:39:08.000Z" ,
"first_observed" : "2015-03-26T15:39:08Z" ,
"last_observed" : "2015-03-26T15:39:08Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--5514281c-0d28-49da-b97e-cac2950d210b"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--5514281c-0d28-49da-b97e-cac2950d210b" ,
"value" : "https://www.sophos.com/en-us/medialibrary/PDFs/technical%20papers/plugx-goes-to-the-registry-and-india.pdf"
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--55142838-f558-43f8-9a55-0988950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:39:36.000Z" ,
"modified" : "2015-03-26T15:39:36.000Z" ,
"labels" : [
"misp:type=\"text\"" ,
"misp:category=\"Other\""
] ,
"x_misp_category" : "Other" ,
"x_misp_type" : "text" ,
"x_misp_value" : "PlugX"
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--55142850-c100-4215-a3aa-c2b7950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:40:00.000Z" ,
"modified" : "2015-03-26T15:40:00.000Z" ,
"first_observed" : "2015-03-26T15:40:00Z" ,
"last_observed" : "2015-03-26T15:40:00Z" ,
"number_observed" : 1 ,
"object_refs" : [
"file--55142850-c100-4215-a3aa-c2b7950d210b"
] ,
"labels" : [
"misp:type=\"filename\"" ,
"misp:category=\"Payload delivery\""
]
} ,
{
"type" : "file" ,
"spec_version" : "2.1" ,
"id" : "file--55142850-c100-4215-a3aa-c2b7950d210b" ,
"name" : "ghozaresh amniyati.doc"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5514286b-63ac-4c17-8c3f-4ceb950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:40:27.000Z" ,
"modified" : "2015-03-26T15:40:27.000Z" ,
"pattern" : "[file:name = 'ghozaresh amniyati.doc' AND file:hashes.SHA1 = '19e9dfabdb9b10a90b62c12f205ff0d1eeef3f14']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:40:27Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"filename|sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55142881-d534-4df9-b4c9-c2b7950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:40:49.000Z" ,
"modified" : "2015-03-26T15:40:49.000Z" ,
"pattern" : "[file:name = '\\\\%PROFILE\\\\%\\\\Application Data\\\\Erease.vbe']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:40:49Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Artifacts dropped"
}
] ,
"labels" : [
"misp:type=\"filename\"" ,
"misp:category=\"Artifacts dropped\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55142893-e034-4995-873c-d140950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:41:07.000Z" ,
"modified" : "2015-03-26T15:41:07.000Z" ,
"pattern" : "[domain-name:value = 'www.freetimes.dns05.com']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:41:07Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"hostname\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--551428b4-efc4-419a-affa-c941950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:41:40.000Z" ,
"modified" : "2015-03-26T15:41:40.000Z" ,
"pattern" : "[file:name = '\u00d0\u0178\u00d1\u20ac\u00d0\u00be\u00d0\u00b5\u00d0\u00ba\u00d1\u201a\u00d1\u2039.doc' AND file:hashes.SHA1 = 'd746ca9b74fb04782e0e783980f7702a9356f1c7']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:41:40Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"filename|sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--551428c2-858c-4fe1-99e6-c2d9950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:41:54.000Z" ,
"modified" : "2015-03-26T15:41:54.000Z" ,
"pattern" : "[domain-name:value = 'lucas1.dnset.com']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:41:54Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"hostname\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--551428d5-05ec-4c11-ad75-0988950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:42:13.000Z" ,
"modified" : "2015-03-26T15:42:13.000Z" ,
"pattern" : "[file:name = '\u00d1\u201a\u00d0\u00b5\u00d0\u00bb\u00d0\u00b5\u00d1\u201e\u00d0\u00be\u00d0\u00bd\u00d0\u00bd\u00d0\u00b0\u00d1\u008f \u00d0\u00ba\u00d0\u00bd\u00d0\u00b8\u00d0\u00b3\u00d0\u00b0 \u00d0\u00b8 \u00d0\u00bf\u00d0\u00be\u00d1\u2021\u00d1\u201a\u00d0\u00be\u00d0\u00b2\u00d1\u2039\u00d0\u00b9 \u00d0\u00b0\u00d0\u00b4\u00d1\u20ac\u00d0\u00b5\u00d1\u0081(2014.10).doc']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:42:13Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"filename\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--551428f5-e528-4919-a060-c2d9950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:42:45.000Z" ,
"modified" : "2015-03-26T15:42:45.000Z" ,
"pattern" : "[domain-name:value = 'supercat.strangled.net']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:42:45Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"hostname\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55142900-be34-46d4-afc2-463a950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:42:56.000Z" ,
"modified" : "2015-03-26T15:42:56.000Z" ,
"pattern" : "[file:hashes.SHA1 = 'a97827aef54e7969b9cbbec64d9ee81a835f2240']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:42:56Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55142918-8be4-4f90-b698-c941950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:43:20.000Z" ,
"modified" : "2015-03-26T15:43:20.000Z" ,
"pattern" : "[file:hashes.SHA1 = '6f845ef154a0b456afcf8b562a0387dabf4f5f85']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:43:20Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55142935-0734-41c4-b46e-4d9d950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:43:49.000Z" ,
"modified" : "2015-03-26T15:43:49.000Z" ,
"pattern" : "[file:name = 'Calling Off India-Pak Talks.doc']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:43:49Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"filename\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55142944-0010-4e16-ac95-c2b7950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:44:04.000Z" ,
"modified" : "2015-03-26T15:44:04.000Z" ,
"pattern" : "[domain-name:value = 'nusteachers.no-ip.org']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:44:04Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"hostname\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55142951-d724-48cb-9bdc-c2d9950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:44:17.000Z" ,
"modified" : "2015-03-26T15:44:17.000Z" ,
"pattern" : "[file:hashes.SHA1 = 'e8a29bb90422fa6116563073725fa54169998325']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:44:17Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55142961-cb80-43f6-ada1-c906950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:44:33.000Z" ,
"modified" : "2015-03-26T15:44:33.000Z" ,
"pattern" : "[file:name = 'Human Rights Violations of Tibet.doc']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:44:33Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"filename\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5514296f-c200-4084-bda1-d140950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:44:47.000Z" ,
"modified" : "2015-03-26T15:44:47.000Z" ,
"pattern" : "[domain-name:value = 'ruchi.mysq1.net']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:44:47Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"hostname\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55142980-5538-4b73-9b14-0988950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:45:04.000Z" ,
"modified" : "2015-03-26T15:45:04.000Z" ,
"pattern" : "[file:hashes.SHA1 = 'a7e52cb429ac22cc20be77158f97d6f9dd887e1f']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:45:04Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--551429a4-5b40-4546-adfd-0988950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:45:40.000Z" ,
"modified" : "2015-03-26T15:45:40.000Z" ,
"pattern" : "[domain-name:value = 'lucas1.freetcp.com']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:45:40Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"hostname\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--551429b9-c6e8-4a70-b37f-c2d9950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:46:01.000Z" ,
"modified" : "2015-03-26T15:46:01.000Z" ,
"pattern" : "[file:hashes.SHA1 = '147fbdfeed9f0825026b3b3ce558c3ad00410b11']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:46:01Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--551429d3-5ee8-444b-b241-c2b7950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:46:27.000Z" ,
"modified" : "2015-03-26T15:46:27.000Z" ,
"first_observed" : "2015-03-26T15:46:27Z" ,
"last_observed" : "2015-03-26T15:46:27Z" ,
"number_observed" : 1 ,
"object_refs" : [
"file--551429d3-5ee8-444b-b241-c2b7950d210b"
] ,
"labels" : [
"misp:type=\"filename\"" ,
"misp:category=\"Payload delivery\""
]
} ,
{
"type" : "file" ,
"spec_version" : "2.1" ,
"id" : "file--551429d3-5ee8-444b-b241-c2b7950d210b" ,
"name" : "Minutes of meeting.doc"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--551429e8-6fcc-4190-ae4b-4b0b950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:46:48.000Z" ,
"modified" : "2015-03-26T15:46:48.000Z" ,
"pattern" : "[file:hashes.SHA1 = '8ee8ab984cb01762dfc6d341278b87a7c83906cf']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:46:48Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55142a0e-8c8c-45ba-8798-cac2950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:47:26.000Z" ,
"modified" : "2015-03-26T15:47:26.000Z" ,
"pattern" : "[file:name = 'U.S.,_India_to_formulate_smart_city_action_plans_in_three_months.doc']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:47:26Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"filename\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55142a1d-ac64-4456-a442-0988950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:47:41.000Z" ,
"modified" : "2015-03-26T15:47:41.000Z" ,
"pattern" : "[domain-name:value = 'unisers.com']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:47:41Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"domain\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55142a2e-71c0-42b3-b1c1-c2d9950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:47:58.000Z" ,
"modified" : "2015-03-26T15:47:58.000Z" ,
"pattern" : "[file:hashes.SHA1 = 'a4602a357360b0ed8e9b0814b1322146156fb7f6']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:47:58Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55142a43-226c-40a7-bb80-4930950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:48:19.000Z" ,
"modified" : "2015-03-26T15:48:19.000Z" ,
"pattern" : "[file:name = 'CHINA NEWS BRIEF 09 of 2015.doc']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:48:19Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"filename\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55142a52-c084-4607-a8e8-c906950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:48:34.000Z" ,
"modified" : "2015-03-26T15:48:34.000Z" ,
"pattern" : "[domain-name:value = 'freemoney.ignorelist.com']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:48:34Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"hostname\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55142a60-7d28-4e38-b873-48ce950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:48:48.000Z" ,
"modified" : "2015-03-26T15:48:48.000Z" ,
"pattern" : "[file:hashes.SHA1 = '03b2a660d68004444a5189173e3b8001f4a7cd0b']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:48:48Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55142a74-5f38-42e6-b2a1-c2b7950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:49:08.000Z" ,
"modified" : "2015-03-26T15:49:08.000Z" ,
"pattern" : "[file:name = 'Draft contract CMS Trg System.doc']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:49:08Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"filename\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55142aa5-4630-4a46-94dd-d140950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:49:57.000Z" ,
"modified" : "2015-03-26T15:49:57.000Z" ,
"description" : "The underlying shellcode is multi-stage andhas already been observed in an earlier sample dropping a PlugX v2 variant (SHA1: 9b90d6608ba6167619b5991fd70319dfcd1fa881, date constant 0x20140613), but in that case without the top level cryptor" ,
"pattern" : "[file:hashes.SHA1 = '9b90d6608ba6167619b5991fd70319dfcd1fa881']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:49:57Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload installation"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload installation\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55142ab5-7cd4-4304-bb9c-c942950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:50:25.000Z" ,
"modified" : "2015-03-26T15:50:25.000Z" ,
"pattern" : "[file:hashes.SHA1 = 'dea6525b696df4643b10eb91381d95eec51479d7']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:50:25Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55142af0-2450-4c8b-967b-0988950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:51:12.000Z" ,
"modified" : "2015-03-26T15:51:12.000Z" ,
"pattern" : "[file:name = 'paris_declaration january_final.doc']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:51:12Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"filename\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55142b06-3d98-4782-9976-c2b7950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:51:34.000Z" ,
"modified" : "2015-03-26T15:51:34.000Z" ,
"pattern" : "[domain-name:value = 'sumy2012.jkub.com']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:51:34Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"hostname\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55142b15-3858-41ed-b77c-0988950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:51:49.000Z" ,
"modified" : "2015-03-26T15:51:49.000Z" ,
"pattern" : "[file:hashes.SHA1 = '6340a7916db67c1b6dc1731014bb440435578c66']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:51:49Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55142b25-e2e0-4728-9930-410b950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:52:05.000Z" ,
"modified" : "2015-03-26T15:52:05.000Z" ,
"pattern" : "[file:name = 'Obama against IS.doc']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:52:05Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"filename\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55142b51-fe90-4efd-9378-c906950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:52:49.000Z" ,
"modified" : "2015-03-26T15:52:49.000Z" ,
"description" : "Origin contains underscore (but not RFC valid)" ,
"pattern" : "[domain-name:value = 'dheeraj-gaurav.mooo.com']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:52:49Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"hostname\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55142b64-4edc-45f6-b021-c942950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:53:08.000Z" ,
"modified" : "2015-03-26T15:53:08.000Z" ,
"pattern" : "[file:hashes.SHA1 = '739405cad3650ed0447a475f50f814f7c9787ff4']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:53:08Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55142b77-9914-4a2d-9ad6-d140950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:53:27.000Z" ,
"modified" : "2015-03-26T15:53:27.000Z" ,
"pattern" : "[domain-name:value = 'www.notebookhk.net']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:53:27Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"hostname\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55142b86-ead0-4ab3-991f-c941950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:53:42.000Z" ,
"modified" : "2015-03-26T15:53:42.000Z" ,
"pattern" : "[file:hashes.SHA1 = '56b3f0f03ae12b56c000df67c1153d518c8a66fc']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:53:42Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55142b9b-2814-449c-b369-d140950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:54:03.000Z" ,
"modified" : "2015-03-26T15:54:03.000Z" ,
"pattern" : "[file:name = 'United Nations Security Council Committee Pursuant to Resolutions1267.doc']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:54:03Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"filename\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55142baf-33e8-4cb9-a585-c941950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-03-26T15:54:23.000Z" ,
"modified" : "2015-03-26T15:54:23.000Z" ,
"pattern" : "[domain-name:value = 'www.togolaga.com']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-03-26T15:54:23Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"hostname\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f5d-411c-49cc-8b4e-4a05950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:37.000Z" ,
"modified" : "2015-08-19T13:06:37.000Z" ,
"description" : "- Xchecked via VT: 6f845ef154a0b456afcf8b562a0387dabf4f5f85" ,
"pattern" : "[file:hashes.MD5 = 'b81879328ef8e954f94fdc9c1e8cbdf7']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:37Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f5d-2ea0-4537-b56c-4a75950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:37.000Z" ,
"modified" : "2015-08-19T13:06:37.000Z" ,
"description" : "- Xchecked via VT: 6f845ef154a0b456afcf8b562a0387dabf4f5f85" ,
"pattern" : "[file:hashes.SHA256 = 'a7f4a24c028d52543e5b62bc3369dff33dd39996c76d1d9c0437fd2e2d9c84dd']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:37Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--55d47f5d-5260-4c37-a024-4c22950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:37.000Z" ,
"modified" : "2015-08-19T13:06:37.000Z" ,
"first_observed" : "2015-08-19T13:06:37Z" ,
"last_observed" : "2015-08-19T13:06:37Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--55d47f5d-5260-4c37-a024-4c22950d210b"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--55d47f5d-5260-4c37-a024-4c22950d210b" ,
"value" : "https://www.virustotal.com/file/a7f4a24c028d52543e5b62bc3369dff33dd39996c76d1d9c0437fd2e2d9c84dd/analysis/1438951622/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f5d-4ef8-4993-84dd-48ef950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:37.000Z" ,
"modified" : "2015-08-19T13:06:37.000Z" ,
"description" : "- Xchecked via VT: dea6525b696df4643b10eb91381d95eec51479d7" ,
"pattern" : "[file:hashes.MD5 = 'db65cf057815a6fd7111f2f690b872b4']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:37Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f5d-baa8-46f5-965b-4b86950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:37.000Z" ,
"modified" : "2015-08-19T13:06:37.000Z" ,
"description" : "- Xchecked via VT: dea6525b696df4643b10eb91381d95eec51479d7" ,
"pattern" : "[file:hashes.SHA256 = '847f01049fefea4877249ee72e1757ded4445fa61b45a352f7c9101169dbe2fa']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:37Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--55d47f5e-cec4-4589-b62d-439a950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:38.000Z" ,
"modified" : "2015-08-19T13:06:38.000Z" ,
"first_observed" : "2015-08-19T13:06:38Z" ,
"last_observed" : "2015-08-19T13:06:38Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--55d47f5e-cec4-4589-b62d-439a950d210b"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--55d47f5e-cec4-4589-b62d-439a950d210b" ,
"value" : "https://www.virustotal.com/file/847f01049fefea4877249ee72e1757ded4445fa61b45a352f7c9101169dbe2fa/analysis/1427410306/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f5e-0df8-460b-80cd-42b8950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:38.000Z" ,
"modified" : "2015-08-19T13:06:38.000Z" ,
"description" : "- Xchecked via VT: 8ee8ab984cb01762dfc6d341278b87a7c83906cf" ,
"pattern" : "[file:hashes.MD5 = 'b0ae36bcf725d53ed73126ed56e55951']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:38Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f5e-3d0c-45d9-94e9-4576950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:38.000Z" ,
"modified" : "2015-08-19T13:06:38.000Z" ,
"description" : "- Xchecked via VT: 8ee8ab984cb01762dfc6d341278b87a7c83906cf" ,
"pattern" : "[file:hashes.SHA256 = '7bd0ecace68819b7f4038084d380a4e698b94dc6381965567fbd4910b55ae53a']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:38Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--55d47f5e-bee0-47d5-bcb9-46e7950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:38.000Z" ,
"modified" : "2015-08-19T13:06:38.000Z" ,
"first_observed" : "2015-08-19T13:06:38Z" ,
"last_observed" : "2015-08-19T13:06:38Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--55d47f5e-bee0-47d5-bcb9-46e7950d210b"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--55d47f5e-bee0-47d5-bcb9-46e7950d210b" ,
"value" : "https://www.virustotal.com/file/7bd0ecace68819b7f4038084d380a4e698b94dc6381965567fbd4910b55ae53a/analysis/1427409129/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f5f-7930-4084-9379-421e950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:39.000Z" ,
"modified" : "2015-08-19T13:06:39.000Z" ,
"description" : "- Xchecked via VT: 739405cad3650ed0447a475f50f814f7c9787ff4" ,
"pattern" : "[file:hashes.MD5 = '52248e78413d8f2bfb22677bc0b3b1ee']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:39Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f5f-78f0-4668-8d40-4955950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:39.000Z" ,
"modified" : "2015-08-19T13:06:39.000Z" ,
"description" : "- Xchecked via VT: 739405cad3650ed0447a475f50f814f7c9787ff4" ,
"pattern" : "[file:hashes.SHA256 = 'eac9ce7e475226bb30def1e652f6952dcd1461419af005b10a87aa6b11226b6f']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:39Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--55d47f5f-a5e4-4025-bc8b-418f950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:39.000Z" ,
"modified" : "2015-08-19T13:06:39.000Z" ,
"first_observed" : "2015-08-19T13:06:39Z" ,
"last_observed" : "2015-08-19T13:06:39Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--55d47f5f-a5e4-4025-bc8b-418f950d210b"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--55d47f5f-a5e4-4025-bc8b-418f950d210b" ,
"value" : "https://www.virustotal.com/file/eac9ce7e475226bb30def1e652f6952dcd1461419af005b10a87aa6b11226b6f/analysis/1430987211/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f5f-af58-46b3-ad3a-4f94950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:39.000Z" ,
"modified" : "2015-08-19T13:06:39.000Z" ,
"description" : "- Xchecked via VT: a97827aef54e7969b9cbbec64d9ee81a835f2240" ,
"pattern" : "[file:hashes.MD5 = 'a4c31191657992a4ae0ed1490f5497ed']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:39Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f5f-12fc-4cf4-8d45-43f3950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:39.000Z" ,
"modified" : "2015-08-19T13:06:39.000Z" ,
"description" : "- Xchecked via VT: a97827aef54e7969b9cbbec64d9ee81a835f2240" ,
"pattern" : "[file:hashes.SHA256 = 'e298b31c186c7e9d1585cce10321f200aed5da7b2b9bf2f465d22b980378a287']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:39Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--55d47f60-8bdc-4bd2-8518-4623950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:40.000Z" ,
"modified" : "2015-08-19T13:06:40.000Z" ,
"first_observed" : "2015-08-19T13:06:40Z" ,
"last_observed" : "2015-08-19T13:06:40Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--55d47f60-8bdc-4bd2-8518-4623950d210b"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--55d47f60-8bdc-4bd2-8518-4623950d210b" ,
"value" : "https://www.virustotal.com/file/e298b31c186c7e9d1585cce10321f200aed5da7b2b9bf2f465d22b980378a287/analysis/1424874254/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f60-6160-42d5-9242-4ccd950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:40.000Z" ,
"modified" : "2015-08-19T13:06:40.000Z" ,
"description" : "- Xchecked via VT: 6340a7916db67c1b6dc1731014bb440435578c66" ,
"pattern" : "[file:hashes.MD5 = '9eca81dd6953e4ff691d8a534280a8f2']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:40Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f60-2b98-4005-a170-4409950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:40.000Z" ,
"modified" : "2015-08-19T13:06:40.000Z" ,
"description" : "- Xchecked via VT: 6340a7916db67c1b6dc1731014bb440435578c66" ,
"pattern" : "[file:hashes.SHA256 = 'd474eec649cb1825c487df07a1ef2a0c9767949bdcadf60ab996f71fd143a214']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:40Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--55d47f60-596c-4c4c-99cc-4d12950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:40.000Z" ,
"modified" : "2015-08-19T13:06:40.000Z" ,
"first_observed" : "2015-08-19T13:06:40Z" ,
"last_observed" : "2015-08-19T13:06:40Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--55d47f60-596c-4c4c-99cc-4d12950d210b"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--55d47f60-596c-4c4c-99cc-4d12950d210b" ,
"value" : "https://www.virustotal.com/file/d474eec649cb1825c487df07a1ef2a0c9767949bdcadf60ab996f71fd143a214/analysis/1427410305/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f60-53e0-4220-bec3-407a950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:40.000Z" ,
"modified" : "2015-08-19T13:06:40.000Z" ,
"description" : "- Xchecked via VT: 03b2a660d68004444a5189173e3b8001f4a7cd0b" ,
"pattern" : "[file:hashes.MD5 = '5bb6be7fcddcd1cc51957ebc17ed872a']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:40Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f61-0d7c-4a61-8e48-4e19950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:41.000Z" ,
"modified" : "2015-08-19T13:06:41.000Z" ,
"description" : "- Xchecked via VT: 03b2a660d68004444a5189173e3b8001f4a7cd0b" ,
"pattern" : "[file:hashes.SHA256 = 'add84116acee953f6606a2240059a05fb4658cfacdee6dd75be752e183c5cab7']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:41Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--55d47f61-a6b4-41f0-8afa-4e77950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:41.000Z" ,
"modified" : "2015-08-19T13:06:41.000Z" ,
"first_observed" : "2015-08-19T13:06:41Z" ,
"last_observed" : "2015-08-19T13:06:41Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--55d47f61-a6b4-41f0-8afa-4e77950d210b"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--55d47f61-a6b4-41f0-8afa-4e77950d210b" ,
"value" : "https://www.virustotal.com/file/add84116acee953f6606a2240059a05fb4658cfacdee6dd75be752e183c5cab7/analysis/1427409131/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f61-60a0-4529-ad61-4c75950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:41.000Z" ,
"modified" : "2015-08-19T13:06:41.000Z" ,
"description" : "The underlying shellcode is multi-stage andhas already been observed in an earlier sample dropping a PlugX v2 variant (SHA1: 9b90d6608ba6167619b5991fd70319dfcd1fa881, date constant 0x20140613), but in that case without the top level cryptor - Xchecked via VT: 9b90d6608ba6167619b5991fd70319dfcd1fa881" ,
"pattern" : "[file:hashes.MD5 = '0f0c9e1dfc278687d00cffeef7d3f942']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:41Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload installation"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload installation\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f61-341c-41e6-b4f6-492f950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:41.000Z" ,
"modified" : "2015-08-19T13:06:41.000Z" ,
"description" : "The underlying shellcode is multi-stage andhas already been observed in an earlier sample dropping a PlugX v2 variant (SHA1: 9b90d6608ba6167619b5991fd70319dfcd1fa881, date constant 0x20140613), but in that case without the top level cryptor - Xchecked via VT: 9b90d6608ba6167619b5991fd70319dfcd1fa881" ,
"pattern" : "[file:hashes.SHA256 = '9691a0c0407bee4df7ded82650aa8b9a52d2194523b604b8d1bfb09ac39b3a75']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:41Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload installation"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload installation\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--55d47f61-c380-4311-a946-4ab6950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:41.000Z" ,
"modified" : "2015-08-19T13:06:41.000Z" ,
"first_observed" : "2015-08-19T13:06:41Z" ,
"last_observed" : "2015-08-19T13:06:41Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--55d47f61-c380-4311-a946-4ab6950d210b"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--55d47f61-c380-4311-a946-4ab6950d210b" ,
"value" : "https://www.virustotal.com/file/9691a0c0407bee4df7ded82650aa8b9a52d2194523b604b8d1bfb09ac39b3a75/analysis/1427410306/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f62-617c-4760-b0e5-490f950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:41.000Z" ,
"modified" : "2015-08-19T13:06:41.000Z" ,
"description" : "- Xchecked via VT: 147fbdfeed9f0825026b3b3ce558c3ad00410b11" ,
"pattern" : "[file:hashes.MD5 = '80e420a8e3895cd2c059777cea60c256']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:41Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f62-fd14-4aa8-8359-4691950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:42.000Z" ,
"modified" : "2015-08-19T13:06:42.000Z" ,
"description" : "- Xchecked via VT: 147fbdfeed9f0825026b3b3ce558c3ad00410b11" ,
"pattern" : "[file:hashes.SHA256 = 'b7268e28be84a705b3076e4c3fa9e591a88fe320698e92b1470cf31e1932ca6c']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:42Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--55d47f62-4890-43b3-bc78-4d25950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:42.000Z" ,
"modified" : "2015-08-19T13:06:42.000Z" ,
"first_observed" : "2015-08-19T13:06:42Z" ,
"last_observed" : "2015-08-19T13:06:42Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--55d47f62-4890-43b3-bc78-4d25950d210b"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--55d47f62-4890-43b3-bc78-4d25950d210b" ,
"value" : "https://www.virustotal.com/file/b7268e28be84a705b3076e4c3fa9e591a88fe320698e92b1470cf31e1932ca6c/analysis/1426784898/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f62-8994-40df-aa97-4c27950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:42.000Z" ,
"modified" : "2015-08-19T13:06:42.000Z" ,
"description" : "- Xchecked via VT: 56b3f0f03ae12b56c000df67c1153d518c8a66fc" ,
"pattern" : "[file:hashes.MD5 = '1bfa72cc55fb5c4f9a388959590caea5']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:42Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f62-23e4-4fdd-87b2-4dfd950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:42.000Z" ,
"modified" : "2015-08-19T13:06:42.000Z" ,
"description" : "- Xchecked via VT: 56b3f0f03ae12b56c000df67c1153d518c8a66fc" ,
"pattern" : "[file:hashes.SHA256 = '00b51d18a00bc6a257d81ed67374d06ef006eb4db02840cefc94f314f3e05ad7']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:42Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--55d47f62-7704-471f-863b-40ee950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:42.000Z" ,
"modified" : "2015-08-19T13:06:42.000Z" ,
"first_observed" : "2015-08-19T13:06:42Z" ,
"last_observed" : "2015-08-19T13:06:42Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--55d47f62-7704-471f-863b-40ee950d210b"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--55d47f62-7704-471f-863b-40ee950d210b" ,
"value" : "https://www.virustotal.com/file/00b51d18a00bc6a257d81ed67374d06ef006eb4db02840cefc94f314f3e05ad7/analysis/1429525184/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f63-6118-4d47-8c9f-4381950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:43.000Z" ,
"modified" : "2015-08-19T13:06:43.000Z" ,
"description" : "- Xchecked via VT: e8a29bb90422fa6116563073725fa54169998325" ,
"pattern" : "[file:hashes.MD5 = 'b57c06d70beeb3897d57a5864cd332ca']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:43Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f63-c840-4b95-abea-4dc2950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:43.000Z" ,
"modified" : "2015-08-19T13:06:43.000Z" ,
"description" : "- Xchecked via VT: e8a29bb90422fa6116563073725fa54169998325" ,
"pattern" : "[file:hashes.SHA256 = '38f44746c0ee83f9e82fd6a6b1859a711919edec0e414c1da025e999f48f7ae5']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:43Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--55d47f63-5c80-4c71-8495-45bc950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:43.000Z" ,
"modified" : "2015-08-19T13:06:43.000Z" ,
"first_observed" : "2015-08-19T13:06:43Z" ,
"last_observed" : "2015-08-19T13:06:43Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--55d47f63-5c80-4c71-8495-45bc950d210b"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--55d47f63-5c80-4c71-8495-45bc950d210b" ,
"value" : "https://www.virustotal.com/file/38f44746c0ee83f9e82fd6a6b1859a711919edec0e414c1da025e999f48f7ae5/analysis/1424874013/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f63-a864-450a-bb1d-41a5950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:43.000Z" ,
"modified" : "2015-08-19T13:06:43.000Z" ,
"description" : "- Xchecked via VT: a7e52cb429ac22cc20be77158f97d6f9dd887e1f" ,
"pattern" : "[file:hashes.MD5 = 'ceda8f6c88caf95def0c280505860f54']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:43Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f63-4c20-4f2a-9b78-4f99950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:43.000Z" ,
"modified" : "2015-08-19T13:06:43.000Z" ,
"description" : "- Xchecked via VT: a7e52cb429ac22cc20be77158f97d6f9dd887e1f" ,
"pattern" : "[file:hashes.SHA256 = '387b687cddaf993d06320a05f4d73433a6d31f712c8a34c8a76e991ae54a9998']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:43Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--55d47f64-468c-4563-8019-4c5b950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:44.000Z" ,
"modified" : "2015-08-19T13:06:44.000Z" ,
"first_observed" : "2015-08-19T13:06:44Z" ,
"last_observed" : "2015-08-19T13:06:44Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--55d47f64-468c-4563-8019-4c5b950d210b"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--55d47f64-468c-4563-8019-4c5b950d210b" ,
"value" : "https://www.virustotal.com/file/387b687cddaf993d06320a05f4d73433a6d31f712c8a34c8a76e991ae54a9998/analysis/1422689777/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f64-625c-45d3-8384-45a7950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:44.000Z" ,
"modified" : "2015-08-19T13:06:44.000Z" ,
"description" : "- Xchecked via VT: 19e9dfabdb9b10a90b62c12f205ff0d1eeef3f14" ,
"pattern" : "[file:hashes.MD5 = 'ce002e76ce3038070934fd6b883a2033']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:44Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f64-9ebc-4586-bb3b-4fec950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:44.000Z" ,
"modified" : "2015-08-19T13:06:44.000Z" ,
"description" : "- Xchecked via VT: 19e9dfabdb9b10a90b62c12f205ff0d1eeef3f14" ,
"pattern" : "[file:hashes.SHA256 = 'f24b873fa61d48d5436099a79ccc5524b276fd0626a6e915dd3c5e5d231a9600']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:44Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--55d47f64-6208-45ee-83f0-4cf9950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:44.000Z" ,
"modified" : "2015-08-19T13:06:44.000Z" ,
"first_observed" : "2015-08-19T13:06:44Z" ,
"last_observed" : "2015-08-19T13:06:44Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--55d47f64-6208-45ee-83f0-4cf9950d210b"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--55d47f64-6208-45ee-83f0-4cf9950d210b" ,
"value" : "https://www.virustotal.com/file/f24b873fa61d48d5436099a79ccc5524b276fd0626a6e915dd3c5e5d231a9600/analysis/1427409128/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f64-5688-42a9-b84b-4bc2950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:44.000Z" ,
"modified" : "2015-08-19T13:06:44.000Z" ,
"description" : "- Xchecked via VT: a4602a357360b0ed8e9b0814b1322146156fb7f6" ,
"pattern" : "[file:hashes.MD5 = '9d0388251cbaf3648aba463f66a8fee8']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:44Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f65-84b0-4147-9245-4deb950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:45.000Z" ,
"modified" : "2015-08-19T13:06:45.000Z" ,
"description" : "- Xchecked via VT: a4602a357360b0ed8e9b0814b1322146156fb7f6" ,
"pattern" : "[file:hashes.SHA256 = '89ab2d9643bdefd6d46618b2f11fb1357bb555a0e33d5d8fc8bb33eba3fe7cc3']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:45Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--55d47f65-d564-447e-bb14-4945950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:45.000Z" ,
"modified" : "2015-08-19T13:06:45.000Z" ,
"first_observed" : "2015-08-19T13:06:45Z" ,
"last_observed" : "2015-08-19T13:06:45Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--55d47f65-d564-447e-bb14-4945950d210b"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--55d47f65-d564-447e-bb14-4945950d210b" ,
"value" : "https://www.virustotal.com/file/89ab2d9643bdefd6d46618b2f11fb1357bb555a0e33d5d8fc8bb33eba3fe7cc3/analysis/1427409129/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f65-2208-4e14-b2c0-4dbe950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:45.000Z" ,
"modified" : "2015-08-19T13:06:45.000Z" ,
"description" : "- Xchecked via VT: d746ca9b74fb04782e0e783980f7702a9356f1c7" ,
"pattern" : "[file:hashes.MD5 = '0064b8f850f36d2043892230c8c50e68']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:45Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--55d47f65-af80-48f6-8e57-4351950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:45.000Z" ,
"modified" : "2015-08-19T13:06:45.000Z" ,
"description" : "- Xchecked via VT: d746ca9b74fb04782e0e783980f7702a9356f1c7" ,
"pattern" : "[file:hashes.SHA256 = '68c5516e00166721acb775522cc033e1ccee6428e8d64eb9d7582b26b50c73f2']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2015-08-19T13:06:45Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--55d47f65-86dc-4142-9daf-4f54950d210b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2015-08-19T13:06:45.000Z" ,
"modified" : "2015-08-19T13:06:45.000Z" ,
"first_observed" : "2015-08-19T13:06:45Z" ,
"last_observed" : "2015-08-19T13:06:45Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--55d47f65-86dc-4142-9daf-4f54950d210b"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--55d47f65-86dc-4142-9daf-4f54950d210b" ,
"value" : "https://www.virustotal.com/file/68c5516e00166721acb775522cc033e1ccee6428e8d64eb9d7582b26b50c73f2/analysis/1427409128/"
} ,
{
"type" : "marking-definition" ,
"spec_version" : "2.1" ,
"id" : "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ,
"created" : "2017-01-20T00:00:00.000Z" ,
"definition_type" : "tlp" ,
"name" : "TLP:WHITE" ,
"definition" : {
"tlp" : "white"
}
}
2023-04-21 13:25:09 +00:00
]
}