2023-04-21 13:25:09 +00:00
{
2023-06-14 17:31:25 +00:00
"type" : "bundle" ,
"id" : "bundle--5720669e-55ac-42ef-bc40-4b78950d210f" ,
"objects" : [
{
"type" : "identity" ,
"spec_version" : "2.1" ,
"id" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:25:21.000Z" ,
"modified" : "2016-04-27T07:25:21.000Z" ,
"name" : "CIRCL" ,
"identity_class" : "organization"
} ,
{
"type" : "report" ,
"spec_version" : "2.1" ,
"id" : "report--5720669e-55ac-42ef-bc40-4b78950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:25:21.000Z" ,
"modified" : "2016-04-27T07:25:21.000Z" ,
"name" : "OSINT - New Poison Ivy Activity Targeting Myanmar, Asian Countries" ,
"published" : "2016-04-27T07:26:12Z" ,
"object_refs" : [
"indicator--5720672e-e3ec-4191-bec0-475a950d210f" ,
"indicator--5720672e-28d4-4158-b7ff-4cde950d210f" ,
"indicator--5720672e-d8ac-43c2-b401-47c9950d210f" ,
"indicator--5720672f-5cc0-45f3-8335-45ba950d210f" ,
"indicator--5720672f-64ac-42fa-8431-4f09950d210f" ,
"indicator--57206839-7adc-45ad-b90c-4393950d210f" ,
"indicator--57206839-2274-4fa4-91a2-4aee950d210f" ,
"indicator--5720683a-a1dc-4777-9b22-40e3950d210f" ,
"indicator--5720683a-de00-499a-9963-4a6b950d210f" ,
"indicator--5720683a-70c4-4d63-a8f0-460f950d210f" ,
"indicator--5720683b-c4a4-4f2f-91d6-42d5950d210f" ,
"indicator--5720683b-f100-4756-a65f-489c950d210f" ,
"indicator--5720683c-6890-438f-b766-4576950d210f" ,
"indicator--57206879-b23c-4749-95c9-433902de0b81" ,
"indicator--5720687a-4cfc-4c96-913d-4feb02de0b81" ,
"observed-data--5720687a-9bd0-46be-bf8f-42b402de0b81" ,
"url--5720687a-9bd0-46be-bf8f-42b402de0b81" ,
"indicator--5720687b-2e58-467a-b6c5-4a1a02de0b81" ,
"indicator--5720687b-b328-4db6-8d52-473a02de0b81" ,
"observed-data--5720687b-3670-4619-9690-4b7502de0b81" ,
"url--5720687b-3670-4619-9690-4b7502de0b81" ,
"indicator--5720687c-a6d0-4a40-81da-462102de0b81" ,
"indicator--5720687c-d4b0-4045-9f80-473602de0b81" ,
"observed-data--5720687d-c874-4e64-b207-48ba02de0b81" ,
"url--5720687d-c874-4e64-b207-48ba02de0b81" ,
"indicator--5720687d-9bd4-45c1-ae92-4a7402de0b81" ,
"indicator--5720687d-a41c-47f7-999b-48b002de0b81" ,
"observed-data--5720687e-b544-490f-9475-47b402de0b81" ,
"url--5720687e-b544-490f-9475-47b402de0b81" ,
"indicator--5720687e-58ac-4dda-b11d-4d5f02de0b81" ,
"indicator--5720687e-69f0-4e06-bfb6-497602de0b81" ,
"observed-data--5720687f-da04-4f1c-b759-499b02de0b81" ,
"url--5720687f-da04-4f1c-b759-499b02de0b81" ,
"indicator--5720687f-8180-47c8-8cda-46fb02de0b81" ,
"indicator--5720687f-16bc-45d0-be6a-467f02de0b81" ,
"observed-data--57206880-44e4-47a5-97c7-4b4802de0b81" ,
"url--57206880-44e4-47a5-97c7-4b4802de0b81" ,
"indicator--57206880-7a7c-425b-9987-4f9302de0b81" ,
"indicator--57206881-a5c4-44cd-a3a5-49e302de0b81" ,
"observed-data--57206881-88f4-44b5-942d-4dc102de0b81" ,
"url--57206881-88f4-44b5-942d-4dc102de0b81" ,
"x-misp-attribute--57206961-530c-481e-a074-4466950d210f"
] ,
"labels" : [
"Threat-Report" ,
"misp:tool=\"MISP-STIX-Converter\"" ,
"type:OSINT"
] ,
"object_marking_refs" : [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5720672e-e3ec-4191-bec0-475a950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:15:58.000Z" ,
"modified" : "2016-04-27T07:15:58.000Z" ,
"description" : "Unique C2 Hostnames" ,
"pattern" : "[domain-name:value = 'news.tibetgroupworks.com']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-04-27T07:15:58Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"hostname\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5720672e-28d4-4158-b7ff-4cde950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:15:58.000Z" ,
"modified" : "2016-04-27T07:15:58.000Z" ,
"description" : "Unique C2 Hostnames" ,
"pattern" : "[domain-name:value = 'web.microsoftdefence.com']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-04-27T07:15:58Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"hostname\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5720672e-d8ac-43c2-b401-47c9950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:15:58.000Z" ,
"modified" : "2016-04-27T07:15:58.000Z" ,
"description" : "Unique C2 Hostnames" ,
"pattern" : "[domain-name:value = 'admin.nslookupdns.com']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-04-27T07:15:58Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"hostname\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5720672f-5cc0-45f3-8335-45ba950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:15:59.000Z" ,
"modified" : "2016-04-27T07:15:59.000Z" ,
"description" : "Unique C2 Hostnames" ,
"pattern" : "[domain-name:value = 'jackhex.md5c.net']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-04-27T07:15:59Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"hostname\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5720672f-64ac-42fa-8431-4f09950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:15:59.000Z" ,
"modified" : "2016-04-27T07:15:59.000Z" ,
"description" : "Unique C2 Hostnames" ,
"pattern" : "[domain-name:value = 'webserver.servehttp.com']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-04-27T07:15:59Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"hostname\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57206839-7adc-45ad-b90c-4393950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:20:25.000Z" ,
"modified" : "2016-04-27T07:20:25.000Z" ,
"description" : "Malware sample" ,
"pattern" : "[file:hashes.SHA1 = '63e00dbf45961ad11bd1eb55dff9c2771c2916a6']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-04-27T07:20:25Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57206839-2274-4fa4-91a2-4aee950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:20:25.000Z" ,
"modified" : "2016-04-27T07:20:25.000Z" ,
"description" : "Malware sample" ,
"pattern" : "[file:hashes.SHA1 = '675a3247f4c0e1105a41c685f4c2fb606e5b1eac']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-04-27T07:20:25Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5720683a-a1dc-4777-9b22-40e3950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:20:26.000Z" ,
"modified" : "2016-04-27T07:20:26.000Z" ,
"description" : "Malware sample" ,
"pattern" : "[file:hashes.SHA1 = '49e36de6d757ca44c43d5670d497bd8738c1d2a4']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-04-27T07:20:26Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5720683a-de00-499a-9963-4a6b950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:20:26.000Z" ,
"modified" : "2016-04-27T07:20:26.000Z" ,
"description" : "Malware sample" ,
"pattern" : "[file:hashes.SHA1 = 'cbbfc3b5ff08de14fdb2316f3b14886dfe5504ef']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-04-27T07:20:26Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5720683a-70c4-4d63-a8f0-460f950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:20:26.000Z" ,
"modified" : "2016-04-27T07:20:26.000Z" ,
"description" : "Malware sample" ,
"pattern" : "[file:hashes.SHA1 = 'a7d206791b1cdec616e9b18ae6fa1548ca96a321']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-04-27T07:20:26Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5720683b-c4a4-4f2f-91d6-42d5950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:20:27.000Z" ,
"modified" : "2016-04-27T07:20:27.000Z" ,
"description" : "Malware sample" ,
"pattern" : "[file:hashes.SHA1 = 'ec646c57f9ac5e56230a17aeca6523a4532ff472']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-04-27T07:20:27Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5720683b-f100-4756-a65f-489c950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:20:27.000Z" ,
"modified" : "2016-04-27T07:20:27.000Z" ,
"description" : "Malware sample" ,
"pattern" : "[file:hashes.SHA1 = 'ef2618d58bd50fa232a19f9bcf3983d1e2dff266']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-04-27T07:20:27Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5720683c-6890-438f-b766-4576950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:20:28.000Z" ,
"modified" : "2016-04-27T07:20:28.000Z" ,
"description" : "Malware sample" ,
"pattern" : "[file:hashes.SHA1 = 'f389e1c970b2ca28112a30a8cfef1f3973fa82ea']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-04-27T07:20:28Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha1\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57206879-b23c-4749-95c9-433902de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:21:29.000Z" ,
"modified" : "2016-04-27T07:21:29.000Z" ,
"description" : "Malware sample - Xchecked via VT: ef2618d58bd50fa232a19f9bcf3983d1e2dff266" ,
"pattern" : "[file:hashes.SHA256 = '02362ac6b456d3538b4a7ddd48690cabfaa466d346c72401a1286d28ddc6b04c']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-04-27T07:21:29Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5720687a-4cfc-4c96-913d-4feb02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:21:30.000Z" ,
"modified" : "2016-04-27T07:21:30.000Z" ,
"description" : "Malware sample - Xchecked via VT: ef2618d58bd50fa232a19f9bcf3983d1e2dff266" ,
"pattern" : "[file:hashes.MD5 = '277f3ada5fc43284b84b3b0e0e10a413']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-04-27T07:21:30Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--5720687a-9bd0-46be-bf8f-42b402de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:21:30.000Z" ,
"modified" : "2016-04-27T07:21:30.000Z" ,
"first_observed" : "2016-04-27T07:21:30Z" ,
"last_observed" : "2016-04-27T07:21:30Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--5720687a-9bd0-46be-bf8f-42b402de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--5720687a-9bd0-46be-bf8f-42b402de0b81" ,
"value" : "https://www.virustotal.com/file/02362ac6b456d3538b4a7ddd48690cabfaa466d346c72401a1286d28ddc6b04c/analysis/1457540291/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5720687b-2e58-467a-b6c5-4a1a02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:21:31.000Z" ,
"modified" : "2016-04-27T07:21:31.000Z" ,
"description" : "Malware sample - Xchecked via VT: ec646c57f9ac5e56230a17aeca6523a4532ff472" ,
"pattern" : "[file:hashes.SHA256 = '3a9ab623c8a0a9f6c65e108e83c90da7620d2d6b22192c857556117587d0d038']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-04-27T07:21:31Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5720687b-b328-4db6-8d52-473a02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:21:31.000Z" ,
"modified" : "2016-04-27T07:21:31.000Z" ,
"description" : "Malware sample - Xchecked via VT: ec646c57f9ac5e56230a17aeca6523a4532ff472" ,
"pattern" : "[file:hashes.MD5 = '11eccf2c247dd4f9df730354b3e0947d']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-04-27T07:21:31Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--5720687b-3670-4619-9690-4b7502de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:21:31.000Z" ,
"modified" : "2016-04-27T07:21:31.000Z" ,
"first_observed" : "2016-04-27T07:21:31Z" ,
"last_observed" : "2016-04-27T07:21:31Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--5720687b-3670-4619-9690-4b7502de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--5720687b-3670-4619-9690-4b7502de0b81" ,
"value" : "https://www.virustotal.com/file/3a9ab623c8a0a9f6c65e108e83c90da7620d2d6b22192c857556117587d0d038/analysis/1459493835/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5720687c-a6d0-4a40-81da-462102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:21:32.000Z" ,
"modified" : "2016-04-27T07:21:32.000Z" ,
"description" : "Malware sample - Xchecked via VT: a7d206791b1cdec616e9b18ae6fa1548ca96a321" ,
"pattern" : "[file:hashes.SHA256 = '81c07c15dd725f02f48859b6d493cd4b08f0a0939a57a7b2a869a8d71a3a1950']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-04-27T07:21:32Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5720687c-d4b0-4045-9f80-473602de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:21:32.000Z" ,
"modified" : "2016-04-27T07:21:32.000Z" ,
"description" : "Malware sample - Xchecked via VT: a7d206791b1cdec616e9b18ae6fa1548ca96a321" ,
"pattern" : "[file:hashes.MD5 = 'd2a4c1f91b2535cfe20c486fcdad907b']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-04-27T07:21:32Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--5720687d-c874-4e64-b207-48ba02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:21:33.000Z" ,
"modified" : "2016-04-27T07:21:33.000Z" ,
"first_observed" : "2016-04-27T07:21:33Z" ,
"last_observed" : "2016-04-27T07:21:33Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--5720687d-c874-4e64-b207-48ba02de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--5720687d-c874-4e64-b207-48ba02de0b81" ,
"value" : "https://www.virustotal.com/file/81c07c15dd725f02f48859b6d493cd4b08f0a0939a57a7b2a869a8d71a3a1950/analysis/1451297533/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5720687d-9bd4-45c1-ae92-4a7402de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:21:33.000Z" ,
"modified" : "2016-04-27T07:21:33.000Z" ,
"description" : "Malware sample - Xchecked via VT: cbbfc3b5ff08de14fdb2316f3b14886dfe5504ef" ,
"pattern" : "[file:hashes.SHA256 = 'f7e667bc5d7d7e961f6afd880f979f4dfe52585e3379c5746a384d2a23b9fdf5']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-04-27T07:21:33Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5720687d-a41c-47f7-999b-48b002de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:21:33.000Z" ,
"modified" : "2016-04-27T07:21:33.000Z" ,
"description" : "Malware sample - Xchecked via VT: cbbfc3b5ff08de14fdb2316f3b14886dfe5504ef" ,
"pattern" : "[file:hashes.MD5 = '241e30dd81588222c7f1ff92a53cc312']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-04-27T07:21:33Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--5720687e-b544-490f-9475-47b402de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:21:34.000Z" ,
"modified" : "2016-04-27T07:21:34.000Z" ,
"first_observed" : "2016-04-27T07:21:34Z" ,
"last_observed" : "2016-04-27T07:21:34Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--5720687e-b544-490f-9475-47b402de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--5720687e-b544-490f-9475-47b402de0b81" ,
"value" : "https://www.virustotal.com/file/f7e667bc5d7d7e961f6afd880f979f4dfe52585e3379c5746a384d2a23b9fdf5/analysis/1460040916/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5720687e-58ac-4dda-b11d-4d5f02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:21:34.000Z" ,
"modified" : "2016-04-27T07:21:34.000Z" ,
"description" : "Malware sample - Xchecked via VT: 49e36de6d757ca44c43d5670d497bd8738c1d2a4" ,
"pattern" : "[file:hashes.SHA256 = '8a013fad26ea7c6a710c1646716c8e09d044598d25683470775b0da6048542a8']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-04-27T07:21:34Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5720687e-69f0-4e06-bfb6-497602de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:21:34.000Z" ,
"modified" : "2016-04-27T07:21:34.000Z" ,
"description" : "Malware sample - Xchecked via VT: 49e36de6d757ca44c43d5670d497bd8738c1d2a4" ,
"pattern" : "[file:hashes.MD5 = '96bff6ef607bbe07c49357d0c58714a5']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-04-27T07:21:34Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--5720687f-da04-4f1c-b759-499b02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:21:35.000Z" ,
"modified" : "2016-04-27T07:21:35.000Z" ,
"first_observed" : "2016-04-27T07:21:35Z" ,
"last_observed" : "2016-04-27T07:21:35Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--5720687f-da04-4f1c-b759-499b02de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--5720687f-da04-4f1c-b759-499b02de0b81" ,
"value" : "https://www.virustotal.com/file/8a013fad26ea7c6a710c1646716c8e09d044598d25683470775b0da6048542a8/analysis/1459494481/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5720687f-8180-47c8-8cda-46fb02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:21:35.000Z" ,
"modified" : "2016-04-27T07:21:35.000Z" ,
"description" : "Malware sample - Xchecked via VT: 675a3247f4c0e1105a41c685f4c2fb606e5b1eac" ,
"pattern" : "[file:hashes.SHA256 = '1e2543e364217d9f48bf963709299fa54c381c6d583a419171d12e30d6e078e9']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-04-27T07:21:35Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5720687f-16bc-45d0-be6a-467f02de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:21:35.000Z" ,
"modified" : "2016-04-27T07:21:35.000Z" ,
"description" : "Malware sample - Xchecked via VT: 675a3247f4c0e1105a41c685f4c2fb606e5b1eac" ,
"pattern" : "[file:hashes.MD5 = 'be06e2f28143abdbaf61819e1746dfbe']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-04-27T07:21:35Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--57206880-44e4-47a5-97c7-4b4802de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:21:36.000Z" ,
"modified" : "2016-04-27T07:21:36.000Z" ,
"first_observed" : "2016-04-27T07:21:36Z" ,
"last_observed" : "2016-04-27T07:21:36Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--57206880-44e4-47a5-97c7-4b4802de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--57206880-44e4-47a5-97c7-4b4802de0b81" ,
"value" : "https://www.virustotal.com/file/1e2543e364217d9f48bf963709299fa54c381c6d583a419171d12e30d6e078e9/analysis/1460373004/"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57206880-7a7c-425b-9987-4f9302de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:21:36.000Z" ,
"modified" : "2016-04-27T07:21:36.000Z" ,
"description" : "Malware sample - Xchecked via VT: 63e00dbf45961ad11bd1eb55dff9c2771c2916a6" ,
"pattern" : "[file:hashes.SHA256 = 'ac8fc264c7ec3cf70836e1bb21f9a20174b04ad49731b8797d7d8bb95cb353e2']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-04-27T07:21:36Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"sha256\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--57206881-a5c4-44cd-a3a5-49e302de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:21:37.000Z" ,
"modified" : "2016-04-27T07:21:37.000Z" ,
"description" : "Malware sample - Xchecked via VT: 63e00dbf45961ad11bd1eb55dff9c2771c2916a6" ,
"pattern" : "[file:hashes.MD5 = '9dd6fb40a7ace992bedc283dee79f50b']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2016-04-27T07:21:37Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"md5\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--57206881-88f4-44b5-942d-4dc102de0b81" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:21:37.000Z" ,
"modified" : "2016-04-27T07:21:37.000Z" ,
"first_observed" : "2016-04-27T07:21:37Z" ,
"last_observed" : "2016-04-27T07:21:37Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--57206881-88f4-44b5-942d-4dc102de0b81"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--57206881-88f4-44b5-942d-4dc102de0b81" ,
"value" : "https://www.virustotal.com/file/ac8fc264c7ec3cf70836e1bb21f9a20174b04ad49731b8797d7d8bb95cb353e2/analysis/1461585828/"
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--57206961-530c-481e-a074-4466950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2016-04-27T07:25:21.000Z" ,
"modified" : "2016-04-27T07:25:21.000Z" ,
"labels" : [
"misp:type=\"comment\"" ,
"misp:category=\"External analysis\""
] ,
"x_misp_category" : "External analysis" ,
"x_misp_type" : "comment" ,
"x_misp_value" : "The infamous Remote Access Trojan (RAT) Poison Ivy (hereafter referred to as PIVY) has resurfaced recently, and exhibits some new behaviors. PIVY has been observed targeting a number of Asian countries for various purposes over the past year. Palo Alto Networks\u00e2\u20ac\u2122 Unit 42 recently blogged about a new Poison Ivy variant targeting Hong Kong activists dubbed SPIVY that uses DLL sideloading and operates quite differently from a variant recently observed by ASERT that has been active for at least the past 12 months."
} ,
{
"type" : "marking-definition" ,
"spec_version" : "2.1" ,
"id" : "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ,
"created" : "2017-01-20T00:00:00.000Z" ,
"definition_type" : "tlp" ,
"name" : "TLP:WHITE" ,
"definition" : {
"tlp" : "white"
}
}
2023-04-21 13:25:09 +00:00
]
}