misp-circl-feed/feeds/circl/misp/588a6de9-e2f4-4fbc-b09d-427f02de0b81.json

1341 lines
57 KiB
JSON
Raw Normal View History

2023-04-21 13:25:09 +00:00
{
2023-06-14 17:31:25 +00:00
"type": "bundle",
"id": "bundle--588a6de9-e2f4-4fbc-b09d-427f02de0b81",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:54:25.000Z",
"modified": "2017-01-26T21:54:25.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--588a6de9-e2f4-4fbc-b09d-427f02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:54:25.000Z",
"modified": "2017-01-26T21:54:25.000Z",
"name": "OSINT - EITest Nabbing Chrome Users with a \u00e2\u20ac\u0153Chrome Font\u00e2\u20ac\u009d Social Engineering Scheme",
"published": "2017-01-26T21:57:34Z",
"object_refs": [
"x-misp-attribute--588a6dfd-19b8-44c8-b297-4f2002de0b81",
"observed-data--588a6e0b-3338-442b-8f7f-4c5802de0b81",
"url--588a6e0b-3338-442b-8f7f-4c5802de0b81",
"indicator--588a6e2f-3b0c-4d91-a1fe-4e9002de0b81",
"indicator--588a6e30-685c-41ed-9ec3-454802de0b81",
"indicator--588a6e31-83cc-43f7-8097-4dc702de0b81",
"indicator--588a6e31-fff8-407a-bc77-448e02de0b81",
"indicator--588a6e3c-f8cc-4b96-97e0-4dd802de0b81",
"indicator--588a6e74-1650-4d05-9d6c-425502de0b81",
"indicator--588a6e8d-6b48-4294-9a19-43b202de0b81",
"indicator--588a6e9a-75e8-4fbf-bd55-427202de0b81",
"indicator--588a6ebb-28e4-481f-9e5b-496602de0b81",
"indicator--588a6ebc-2270-4929-9c16-42d102de0b81",
"indicator--588a6ebc-9c9c-4d54-b445-40d702de0b81",
"indicator--588a6ebd-1900-4657-8b7a-481802de0b81",
"indicator--588a6edb-e2ec-49c0-8ea7-215902de0b81",
"indicator--588a6edc-657c-46f4-90de-215902de0b81",
"indicator--588a6edd-0234-472b-b99e-215902de0b81",
"indicator--588a6edd-d158-4416-98c6-215902de0b81",
"observed-data--588a6f1c-3404-4dc5-afc0-6dcc02de0b81",
"domain-name--588a6f1c-3404-4dc5-afc0-6dcc02de0b81",
"observed-data--588a6f1d-ccfc-4512-aa8a-6dcc02de0b81",
"network-traffic--588a6f1d-ccfc-4512-aa8a-6dcc02de0b81",
"ipv4-addr--588a6f1d-ccfc-4512-aa8a-6dcc02de0b81",
"observed-data--588a6f1e-0260-4424-b74c-6dcc02de0b81",
"domain-name--588a6f1e-0260-4424-b74c-6dcc02de0b81",
"observed-data--588a6f1f-b9e0-4c96-9721-6dcc02de0b81",
"network-traffic--588a6f1f-b9e0-4c96-9721-6dcc02de0b81",
"ipv4-addr--588a6f1f-b9e0-4c96-9721-6dcc02de0b81",
"observed-data--588a6f20-1df4-4b3b-90a8-6dcc02de0b81",
"domain-name--588a6f20-1df4-4b3b-90a8-6dcc02de0b81",
"observed-data--588a6f20-1810-4702-a053-6dcc02de0b81",
"network-traffic--588a6f20-1810-4702-a053-6dcc02de0b81",
"ipv4-addr--588a6f20-1810-4702-a053-6dcc02de0b81",
"observed-data--588a6f21-37d4-481d-b427-6dcc02de0b81",
"domain-name--588a6f21-37d4-481d-b427-6dcc02de0b81",
"observed-data--588a6f22-11d0-4190-ae0a-6dcc02de0b81",
"network-traffic--588a6f22-11d0-4190-ae0a-6dcc02de0b81",
"ipv4-addr--588a6f22-11d0-4190-ae0a-6dcc02de0b81",
"observed-data--588a6f23-4e18-48b4-abd1-6dcc02de0b81",
"domain-name--588a6f23-4e18-48b4-abd1-6dcc02de0b81",
"observed-data--588a6f23-05c4-4c29-a4b4-6dcc02de0b81",
"network-traffic--588a6f23-05c4-4c29-a4b4-6dcc02de0b81",
"ipv4-addr--588a6f23-05c4-4c29-a4b4-6dcc02de0b81",
"indicator--588a6f39-4c88-464d-8774-471002de0b81",
"indicator--588a6f3a-a320-4e32-9621-46c102de0b81",
"indicator--588a6f3b-45c4-40ae-b38e-428502de0b81",
"indicator--588a6f3b-7134-464a-861f-450902de0b81",
"indicator--588a6f3c-9764-4977-8e02-456f02de0b81",
"indicator--588a6f3d-8528-42b0-9af6-450802de0b81",
"indicator--588a7011-c36c-48ed-9abc-40e502de0b81",
"indicator--588a7011-31fc-4d7b-a442-473702de0b81",
"observed-data--588a7012-f1e8-4f25-a7c8-455602de0b81",
"url--588a7012-f1e8-4f25-a7c8-455602de0b81",
"indicator--588a7013-f6b4-487c-a1ae-4fc602de0b81",
"indicator--588a7013-e0d0-431e-ace0-4fc002de0b81",
"observed-data--588a7014-6648-4d5b-ae8e-4b7b02de0b81",
"url--588a7014-6648-4d5b-ae8e-4b7b02de0b81",
"indicator--588a7015-72d4-4d87-b1f3-4c9b02de0b81",
"indicator--588a7016-1130-4783-8732-421502de0b81",
"observed-data--588a7016-1bdc-4229-a0fa-414c02de0b81",
"url--588a7016-1bdc-4229-a0fa-414c02de0b81",
"indicator--588a7017-ae5c-4778-8d55-422702de0b81",
"indicator--588a7018-94e0-438b-bf8f-4b3d02de0b81",
"observed-data--588a7018-60ec-4202-a54f-4a9e02de0b81",
"url--588a7018-60ec-4202-a54f-4a9e02de0b81",
"indicator--588a7019-96d0-4507-81b2-4fbf02de0b81",
"indicator--588a701a-9664-423c-85d8-435102de0b81",
"observed-data--588a701a-9ff8-4e32-bea2-4bdf02de0b81",
"url--588a701a-9ff8-4e32-bea2-4bdf02de0b81"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"estimative-language:likelihood-probability=\"very-likely\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--588a6dfd-19b8-44c8-b297-4f2002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:52:12.000Z",
"modified": "2017-01-26T21:52:12.000Z",
"labels": [
"misp:type=\"text\"",
"misp:category=\"External analysis\"",
"osint:source-type=\"blog-post\""
],
"x_misp_category": "External analysis",
"x_misp_type": "text",
"x_misp_value": "\u00e2\u20ac\u0153EITest\u00e2\u20ac\u009d is a well-documented infection chain that generally relies on compromised websites to direct users to exploit kit (EK) landing pages. EITest has been involved in the delivery of a variety of ransomware, information stealers, and other malware, with clear evidence of its use dating back to 2014. Elements of EITest may be much older, though, with hints pointing to EITest being an evolution of the \u00e2\u20ac\u0153Glazunov\u00e2\u20ac\u009d infection chain from 2011 [1]. The first server side documentation of this evolution came from Sucuri in July 2014 [2] associated with waves of Wordpress exploitation via the MailPoet plugin vulnerability. KahuSecurity recently analyzed the server side script in October 2016 [3]."
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--588a6e0b-3338-442b-8f7f-4c5802de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:52:03.000Z",
"modified": "2017-01-26T21:52:03.000Z",
"first_observed": "2017-01-26T21:52:03Z",
"last_observed": "2017-01-26T21:52:03Z",
"number_observed": 1,
"object_refs": [
"url--588a6e0b-3338-442b-8f7f-4c5802de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\"",
"osint:source-type=\"blog-post\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--588a6e0b-3338-442b-8f7f-4c5802de0b81",
"value": "https://www.proofpoint.com/us/threat-insight/post/EITest-Nabbing-Chrome-Users-Chrome-Font-Social-Engineering-Scheme"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a6e2f-3b0c-4d91-a1fe-4e9002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:46:23.000Z",
"modified": "2017-01-26T21:46:23.000Z",
"description": "Fleercivet C&C",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '198.37.112.248']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:46:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a6e30-685c-41ed-9ec3-454802de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:46:24.000Z",
"modified": "2017-01-26T21:46:24.000Z",
"description": "Server initiating Fleercivet Fraud Scheme (potentially legitimate)",
"pattern": "[file:name = 'searchtopresults.com|209.126.122.139']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:46:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"filename\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a6e31-83cc-43f7-8097-4dc702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:46:25.000Z",
"modified": "2017-01-26T21:46:25.000Z",
"description": "Initial Call before Fleercivet clickfraud",
"pattern": "[url:value = 'searchtopresults.com/search.php?aff=8320']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:46:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a6e31-fff8-407a-bc77-448e02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:46:25.000Z",
"modified": "2017-01-26T21:46:25.000Z",
"description": "Later Call tied to Fleercivet activity",
"pattern": "[url:value = 'searchtopresults.com/search.php?aff=8170&saff=1203']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:46:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a6e3c-f8cc-4b96-97e0-4dd802de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:46:36.000Z",
"modified": "2017-01-26T21:46:36.000Z",
"description": "Fiddler capture (index and post)",
"pattern": "[file:hashes.SHA256 = '7a444891c642ec17459471be40bcc1ea9eef6aeb478318a679908f94bf1e7e74']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:46:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a6e74-1650-4d05-9d6c-425502de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:47:32.000Z",
"modified": "2017-01-26T21:47:32.000Z",
"description": "2014-07-14 - Early \u00e2\u20ac\u0153flash redirecting\u00e2\u20ac\u009d EITest Domain",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '48.251.102.176']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:47:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a6e8d-6b48-4294-9a19-43b202de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:47:57.000Z",
"modified": "2017-01-26T21:47:57.000Z",
"description": "2014-07-14 - Early \u00e2\u20ac\u0153flash redirecting\u00e2\u20ac\u009d EITest Domain",
"pattern": "[domain-name:value = 'vidvi.cf']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:47:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a6e9a-75e8-4fbf-bd55-427202de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:48:10.000Z",
"modified": "2017-01-26T21:48:10.000Z",
"description": "EITest node replying to Compromised Server",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '31.184.192.163']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:48:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a6ebb-28e4-481f-9e5b-496602de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:48:43.000Z",
"modified": "2017-01-26T21:48:43.000Z",
"description": "EITest node replying to Compromised Server",
"pattern": "[domain-name:value = '54dfa1cb.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:48:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a6ebc-2270-4929-9c16-42d102de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:48:44.000Z",
"modified": "2017-01-26T21:48:44.000Z",
"description": "EITest node replying to Compromised Server",
"pattern": "[domain-name:value = 'e5b57288.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:48:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a6ebc-9c9c-4d54-b445-40d702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:48:44.000Z",
"modified": "2017-01-26T21:48:44.000Z",
"description": "EITest node replying to Compromised Server",
"pattern": "[domain-name:value = '33db9538.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:48:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a6ebd-1900-4657-8b7a-481802de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:48:45.000Z",
"modified": "2017-01-26T21:48:45.000Z",
"description": "EITest node replying to Compromised Server",
"pattern": "[domain-name:value = '9507c4e8.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:48:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a6edb-e2ec-49c0-8ea7-215902de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:49:15.000Z",
"modified": "2017-01-26T21:49:15.000Z",
"description": "FleerCivet 2017-01-15",
"pattern": "[file:hashes.SHA256 = '7fc9721cc648de138a61ec3452d63a83fc76ef527d41f4a7aba78f52df13338a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:49:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a6edc-657c-46f4-90de-215902de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:49:16.000Z",
"modified": "2017-01-26T21:49:16.000Z",
"description": "FleerCivet 2017-01-15",
"pattern": "[file:hashes.SHA256 = '7bb7848270e76aa1fcb9d11acb46c8421b86c7d528c108d8f179ec829ff977fc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:49:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a6edd-0234-472b-b99e-215902de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:49:17.000Z",
"modified": "2017-01-26T21:49:17.000Z",
"description": "FleerCivet 2017-01-16",
"pattern": "[file:hashes.SHA256 = '9190c865c214cf2b1c602edcfe4ab8858806298ca4b6de16bfbd0377385ffe63']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:49:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a6edd-d158-4416-98c6-215902de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:49:17.000Z",
"modified": "2017-01-26T21:49:17.000Z",
"description": "FleerCivet 2017-01-17",
"pattern": "[file:hashes.SHA256 = 'ebeaaef3323331e7ea0e47eac6437dcf5548d9fd759943d2e5c1f3d1fb786167']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:49:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--588a6f1c-3404-4dc5-afc0-6dcc02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:50:20.000Z",
"modified": "2017-01-26T21:50:20.000Z",
"first_observed": "2017-01-26T21:50:20Z",
"last_observed": "2017-01-26T21:50:20Z",
"number_observed": 1,
"object_refs": [
"domain-name--588a6f1c-3404-4dc5-afc0-6dcc02de0b81"
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\""
]
},
{
"type": "domain-name",
"spec_version": "2.1",
"id": "domain-name--588a6f1c-3404-4dc5-afc0-6dcc02de0b81",
"value": "starrer.com"
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--588a6f1d-ccfc-4512-aa8a-6dcc02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:50:21.000Z",
"modified": "2017-01-26T21:50:21.000Z",
"first_observed": "2017-01-26T21:50:21Z",
"last_observed": "2017-01-26T21:50:21Z",
"number_observed": 1,
"object_refs": [
"network-traffic--588a6f1d-ccfc-4512-aa8a-6dcc02de0b81",
"ipv4-addr--588a6f1d-ccfc-4512-aa8a-6dcc02de0b81"
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\""
]
},
{
"type": "network-traffic",
"spec_version": "2.1",
"id": "network-traffic--588a6f1d-ccfc-4512-aa8a-6dcc02de0b81",
"dst_ref": "ipv4-addr--588a6f1d-ccfc-4512-aa8a-6dcc02de0b81",
"protocols": [
"tcp"
]
},
{
"type": "ipv4-addr",
"spec_version": "2.1",
"id": "ipv4-addr--588a6f1d-ccfc-4512-aa8a-6dcc02de0b81",
"value": "209.126.118.146"
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--588a6f1e-0260-4424-b74c-6dcc02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:50:22.000Z",
"modified": "2017-01-26T21:50:22.000Z",
"first_observed": "2017-01-26T21:50:22Z",
"last_observed": "2017-01-26T21:50:22Z",
"number_observed": 1,
"object_refs": [
"domain-name--588a6f1e-0260-4424-b74c-6dcc02de0b81"
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\""
]
},
{
"type": "domain-name",
"spec_version": "2.1",
"id": "domain-name--588a6f1e-0260-4424-b74c-6dcc02de0b81",
"value": "askcom.me"
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--588a6f1f-b9e0-4c96-9721-6dcc02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:50:23.000Z",
"modified": "2017-01-26T21:50:23.000Z",
"first_observed": "2017-01-26T21:50:23Z",
"last_observed": "2017-01-26T21:50:23Z",
"number_observed": 1,
"object_refs": [
"network-traffic--588a6f1f-b9e0-4c96-9721-6dcc02de0b81",
"ipv4-addr--588a6f1f-b9e0-4c96-9721-6dcc02de0b81"
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\""
]
},
{
"type": "network-traffic",
"spec_version": "2.1",
"id": "network-traffic--588a6f1f-b9e0-4c96-9721-6dcc02de0b81",
"dst_ref": "ipv4-addr--588a6f1f-b9e0-4c96-9721-6dcc02de0b81",
"protocols": [
"tcp"
]
},
{
"type": "ipv4-addr",
"spec_version": "2.1",
"id": "ipv4-addr--588a6f1f-b9e0-4c96-9721-6dcc02de0b81",
"value": "209.126.123.39"
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--588a6f20-1df4-4b3b-90a8-6dcc02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:50:24.000Z",
"modified": "2017-01-26T21:50:24.000Z",
"first_observed": "2017-01-26T21:50:24Z",
"last_observed": "2017-01-26T21:50:24Z",
"number_observed": 1,
"object_refs": [
"domain-name--588a6f20-1df4-4b3b-90a8-6dcc02de0b81"
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\""
]
},
{
"type": "domain-name",
"spec_version": "2.1",
"id": "domain-name--588a6f20-1df4-4b3b-90a8-6dcc02de0b81",
"value": "twittertravels.com"
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--588a6f20-1810-4702-a053-6dcc02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:50:24.000Z",
"modified": "2017-01-26T21:50:24.000Z",
"first_observed": "2017-01-26T21:50:24Z",
"last_observed": "2017-01-26T21:50:24Z",
"number_observed": 1,
"object_refs": [
"network-traffic--588a6f20-1810-4702-a053-6dcc02de0b81",
"ipv4-addr--588a6f20-1810-4702-a053-6dcc02de0b81"
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\""
]
},
{
"type": "network-traffic",
"spec_version": "2.1",
"id": "network-traffic--588a6f20-1810-4702-a053-6dcc02de0b81",
"dst_ref": "ipv4-addr--588a6f20-1810-4702-a053-6dcc02de0b81",
"protocols": [
"tcp"
]
},
{
"type": "ipv4-addr",
"spec_version": "2.1",
"id": "ipv4-addr--588a6f20-1810-4702-a053-6dcc02de0b81",
"value": "173.224.124.110"
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--588a6f21-37d4-481d-b427-6dcc02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:50:25.000Z",
"modified": "2017-01-26T21:50:25.000Z",
"first_observed": "2017-01-26T21:50:25Z",
"last_observed": "2017-01-26T21:50:25Z",
"number_observed": 1,
"object_refs": [
"domain-name--588a6f21-37d4-481d-b427-6dcc02de0b81"
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\""
]
},
{
"type": "domain-name",
"spec_version": "2.1",
"id": "domain-name--588a6f21-37d4-481d-b427-6dcc02de0b81",
"value": "shareyourfashion.net"
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--588a6f22-11d0-4190-ae0a-6dcc02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:50:26.000Z",
"modified": "2017-01-26T21:50:26.000Z",
"first_observed": "2017-01-26T21:50:26Z",
"last_observed": "2017-01-26T21:50:26Z",
"number_observed": 1,
"object_refs": [
"network-traffic--588a6f22-11d0-4190-ae0a-6dcc02de0b81",
"ipv4-addr--588a6f22-11d0-4190-ae0a-6dcc02de0b81"
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\""
]
},
{
"type": "network-traffic",
"spec_version": "2.1",
"id": "network-traffic--588a6f22-11d0-4190-ae0a-6dcc02de0b81",
"dst_ref": "ipv4-addr--588a6f22-11d0-4190-ae0a-6dcc02de0b81",
"protocols": [
"tcp"
]
},
{
"type": "ipv4-addr",
"spec_version": "2.1",
"id": "ipv4-addr--588a6f22-11d0-4190-ae0a-6dcc02de0b81",
"value": "209.126.103.104"
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--588a6f23-4e18-48b4-abd1-6dcc02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:50:27.000Z",
"modified": "2017-01-26T21:50:27.000Z",
"first_observed": "2017-01-26T21:50:27Z",
"last_observed": "2017-01-26T21:50:27Z",
"number_observed": 1,
"object_refs": [
"domain-name--588a6f23-4e18-48b4-abd1-6dcc02de0b81"
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\""
]
},
{
"type": "domain-name",
"spec_version": "2.1",
"id": "domain-name--588a6f23-4e18-48b4-abd1-6dcc02de0b81",
"value": "techgnews.com"
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--588a6f23-05c4-4c29-a4b4-6dcc02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:50:27.000Z",
"modified": "2017-01-26T21:50:27.000Z",
"first_observed": "2017-01-26T21:50:27Z",
"last_observed": "2017-01-26T21:50:27Z",
"number_observed": 1,
"object_refs": [
"network-traffic--588a6f23-05c4-4c29-a4b4-6dcc02de0b81",
"ipv4-addr--588a6f23-05c4-4c29-a4b4-6dcc02de0b81"
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\""
]
},
{
"type": "network-traffic",
"spec_version": "2.1",
"id": "network-traffic--588a6f23-05c4-4c29-a4b4-6dcc02de0b81",
"dst_ref": "ipv4-addr--588a6f23-05c4-4c29-a4b4-6dcc02de0b81",
"protocols": [
"tcp"
]
},
{
"type": "ipv4-addr",
"spec_version": "2.1",
"id": "ipv4-addr--588a6f23-05c4-4c29-a4b4-6dcc02de0b81",
"value": "209.239.115.50"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a6f39-4c88-464d-8774-471002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:52:30.000Z",
"modified": "2017-01-26T21:52:30.000Z",
"description": "Exemple of EITest compromised Website acting as download server (POST request with MZ as reply)",
"pattern": "[url:value = 'kyle.dark7.org/download.php']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:52:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"adversary:infrastructure-status=\"compromised\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a6f3a-a320-4e32-9621-46c102de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:52:41.000Z",
"modified": "2017-01-26T21:52:41.000Z",
"description": "Exemple of EITest compromised Website acting as download server (POST request with MZ as reply)",
"pattern": "[url:value = 'oblubienica.odnowa.org/download.php']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:52:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"adversary:infrastructure-status=\"compromised\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a6f3b-45c4-40ae-b38e-428502de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:53:00.000Z",
"modified": "2017-01-26T21:53:00.000Z",
"description": "Exemple of EITest compromised Website acting as download server (POST request with MZ as reply)",
"pattern": "[url:value = 'sriswamidikshananda.org/download.php']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:53:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"adversary:infrastructure-status=\"compromised\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a6f3b-7134-464a-861f-450902de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:53:13.000Z",
"modified": "2017-01-26T21:53:13.000Z",
"description": "Exemple of EITest compromised Website acting as download server (POST request with MZ as reply)",
"pattern": "[url:value = 'demo.signgo.com/help.php']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:53:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"adversary:infrastructure-status=\"compromised\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a6f3c-9764-4977-8e02-456f02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:53:23.000Z",
"modified": "2017-01-26T21:53:23.000Z",
"description": "Exemple of EITest compromised Website acting as download server (POST request with MZ as reply)",
"pattern": "[url:value = 'retail.uvapoint.com/help.php']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:53:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"adversary:infrastructure-status=\"compromised\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a6f3d-8528-42b0-9af6-450802de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:53:37.000Z",
"modified": "2017-01-26T21:53:37.000Z",
"description": "Exemple of EITest compromised Website acting as download server (POST request with MZ as reply)",
"pattern": "[url:value = 'chovek5.lozenetz.org/download.php']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:53:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\"",
"adversary:infrastructure-status=\"compromised\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a7011-c36c-48ed-9abc-40e502de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:54:25.000Z",
"modified": "2017-01-26T21:54:25.000Z",
"description": "FleerCivet 2017-01-17 - Xchecked via VT: ebeaaef3323331e7ea0e47eac6437dcf5548d9fd759943d2e5c1f3d1fb786167",
"pattern": "[file:hashes.SHA1 = '35c7f51fcf445ac0a2be0dfc81ec653e3eec6068']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:54:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a7011-31fc-4d7b-a442-473702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:54:25.000Z",
"modified": "2017-01-26T21:54:25.000Z",
"description": "FleerCivet 2017-01-17 - Xchecked via VT: ebeaaef3323331e7ea0e47eac6437dcf5548d9fd759943d2e5c1f3d1fb786167",
"pattern": "[file:hashes.MD5 = '62cfd5f9a600809c9e53ea089920d988']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:54:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--588a7012-f1e8-4f25-a7c8-455602de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:54:26.000Z",
"modified": "2017-01-26T21:54:26.000Z",
"first_observed": "2017-01-26T21:54:26Z",
"last_observed": "2017-01-26T21:54:26Z",
"number_observed": 1,
"object_refs": [
"url--588a7012-f1e8-4f25-a7c8-455602de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--588a7012-f1e8-4f25-a7c8-455602de0b81",
"value": "https://www.virustotal.com/file/ebeaaef3323331e7ea0e47eac6437dcf5548d9fd759943d2e5c1f3d1fb786167/analysis/1484834402/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a7013-f6b4-487c-a1ae-4fc602de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:54:27.000Z",
"modified": "2017-01-26T21:54:27.000Z",
"description": "FleerCivet 2017-01-16 - Xchecked via VT: 9190c865c214cf2b1c602edcfe4ab8858806298ca4b6de16bfbd0377385ffe63",
"pattern": "[file:hashes.SHA1 = '0779fa9caa48b4fd978bf732f8450668eea13f39']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:54:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a7013-e0d0-431e-ace0-4fc002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:54:27.000Z",
"modified": "2017-01-26T21:54:27.000Z",
"description": "FleerCivet 2017-01-16 - Xchecked via VT: 9190c865c214cf2b1c602edcfe4ab8858806298ca4b6de16bfbd0377385ffe63",
"pattern": "[file:hashes.MD5 = '7b9aae9a506fc9e19cc127b5c74bfba1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:54:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--588a7014-6648-4d5b-ae8e-4b7b02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:54:28.000Z",
"modified": "2017-01-26T21:54:28.000Z",
"first_observed": "2017-01-26T21:54:28Z",
"last_observed": "2017-01-26T21:54:28Z",
"number_observed": 1,
"object_refs": [
"url--588a7014-6648-4d5b-ae8e-4b7b02de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--588a7014-6648-4d5b-ae8e-4b7b02de0b81",
"value": "https://www.virustotal.com/file/9190c865c214cf2b1c602edcfe4ab8858806298ca4b6de16bfbd0377385ffe63/analysis/1484886904/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a7015-72d4-4d87-b1f3-4c9b02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:54:29.000Z",
"modified": "2017-01-26T21:54:29.000Z",
"description": "FleerCivet 2017-01-15 - Xchecked via VT: 7bb7848270e76aa1fcb9d11acb46c8421b86c7d528c108d8f179ec829ff977fc",
"pattern": "[file:hashes.SHA1 = '5a95dc982879b78fc44ca6e3d473aab2eafa5012']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:54:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a7016-1130-4783-8732-421502de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:54:30.000Z",
"modified": "2017-01-26T21:54:30.000Z",
"description": "FleerCivet 2017-01-15 - Xchecked via VT: 7bb7848270e76aa1fcb9d11acb46c8421b86c7d528c108d8f179ec829ff977fc",
"pattern": "[file:hashes.MD5 = 'f9e1f0083e0e42833c5dfa7faa4a0281']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:54:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--588a7016-1bdc-4229-a0fa-414c02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:54:30.000Z",
"modified": "2017-01-26T21:54:30.000Z",
"first_observed": "2017-01-26T21:54:30Z",
"last_observed": "2017-01-26T21:54:30Z",
"number_observed": 1,
"object_refs": [
"url--588a7016-1bdc-4229-a0fa-414c02de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--588a7016-1bdc-4229-a0fa-414c02de0b81",
"value": "https://www.virustotal.com/file/7bb7848270e76aa1fcb9d11acb46c8421b86c7d528c108d8f179ec829ff977fc/analysis/1484541299/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a7017-ae5c-4778-8d55-422702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:54:31.000Z",
"modified": "2017-01-26T21:54:31.000Z",
"description": "FleerCivet 2017-01-15 - Xchecked via VT: 7fc9721cc648de138a61ec3452d63a83fc76ef527d41f4a7aba78f52df13338a",
"pattern": "[file:hashes.SHA1 = 'a13b63b53ffd8bf90665f6109b7f6294f6219dd7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:54:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a7018-94e0-438b-bf8f-4b3d02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:54:32.000Z",
"modified": "2017-01-26T21:54:32.000Z",
"description": "FleerCivet 2017-01-15 - Xchecked via VT: 7fc9721cc648de138a61ec3452d63a83fc76ef527d41f4a7aba78f52df13338a",
"pattern": "[file:hashes.MD5 = 'b9ec73f2406d87f69a6c8dfc46ed3a28']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:54:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--588a7018-60ec-4202-a54f-4a9e02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:54:32.000Z",
"modified": "2017-01-26T21:54:32.000Z",
"first_observed": "2017-01-26T21:54:32Z",
"last_observed": "2017-01-26T21:54:32Z",
"number_observed": 1,
"object_refs": [
"url--588a7018-60ec-4202-a54f-4a9e02de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--588a7018-60ec-4202-a54f-4a9e02de0b81",
"value": "https://www.virustotal.com/file/7fc9721cc648de138a61ec3452d63a83fc76ef527d41f4a7aba78f52df13338a/analysis/1485239703/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a7019-96d0-4507-81b2-4fbf02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:54:33.000Z",
"modified": "2017-01-26T21:54:33.000Z",
"description": "Fiddler capture (index and post) - Xchecked via VT: 7a444891c642ec17459471be40bcc1ea9eef6aeb478318a679908f94bf1e7e74",
"pattern": "[file:hashes.SHA1 = 'b38e12e5346fb02d41e18574d10fbf96f085a7c0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:54:33Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--588a701a-9664-423c-85d8-435102de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:54:34.000Z",
"modified": "2017-01-26T21:54:34.000Z",
"description": "Fiddler capture (index and post) - Xchecked via VT: 7a444891c642ec17459471be40bcc1ea9eef6aeb478318a679908f94bf1e7e74",
"pattern": "[file:hashes.MD5 = 'e8a36364b057d2ca6ea79061188591c0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-01-26T21:54:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--588a701a-9ff8-4e32-bea2-4bdf02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-01-26T21:54:34.000Z",
"modified": "2017-01-26T21:54:34.000Z",
"first_observed": "2017-01-26T21:54:34Z",
"last_observed": "2017-01-26T21:54:34Z",
"number_observed": 1,
"object_refs": [
"url--588a701a-9ff8-4e32-bea2-4bdf02de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--588a701a-9ff8-4e32-bea2-4bdf02de0b81",
"value": "https://www.virustotal.com/file/7a444891c642ec17459471be40bcc1ea9eef6aeb478318a679908f94bf1e7e74/analysis/1484822761/"
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
2023-04-21 13:25:09 +00:00
]
}