misp-circl-feed/feeds/circl/misp/58e8a3b2-b0fc-41a9-b89a-4a8b02de0b81.json

3591 lines
153 KiB
JSON
Raw Normal View History

2023-04-21 13:25:09 +00:00
{
2023-06-14 17:31:25 +00:00
"type": "bundle",
"id": "bundle--58e8a3b2-b0fc-41a9-b89a-4a8b02de0b81",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--58e8a3b2-b0fc-41a9-b89a-4a8b02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"name": "OSINT - The Blockbuster Sequel",
"published": "2017-04-08T09:02:14Z",
"object_refs": [
"observed-data--58e8a3c0-5b8c-4de6-8ee1-4fdd02de0b81",
"url--58e8a3c0-5b8c-4de6-8ee1-4fdd02de0b81",
"x-misp-attribute--58e8a3d4-01f8-405a-9ea5-478c02de0b81",
"indicator--58e8a3ef-149c-4d92-8ae0-4e8a02de0b81",
"indicator--58e8a3f0-0444-4f4b-b28b-4f9502de0b81",
"indicator--58e8a3f1-72b0-4dc1-a42f-410f02de0b81",
"indicator--58e8a3f2-ff8c-4d45-af1d-414102de0b81",
"indicator--58e8a3f4-31c8-4111-84a5-4f3002de0b81",
"indicator--58e8a3f5-c270-40be-b7d1-46ba02de0b81",
"indicator--58e8a3f6-5e2c-4807-a344-4d1802de0b81",
"indicator--58e8a3f7-5f08-4120-8087-447902de0b81",
"indicator--58e8a3f8-1f3c-437d-b6d8-4d9c02de0b81",
"indicator--58e8a3f9-9098-48ce-9326-4d7a02de0b81",
"indicator--58e8a3fa-9d24-421f-9147-446802de0b81",
"indicator--58e8a3fb-9458-4e66-8137-4f1102de0b81",
"indicator--58e8a3fc-af2c-4168-9c2a-478802de0b81",
"indicator--58e8a3fd-3e98-44ce-b36e-4af902de0b81",
"indicator--58e8a3fe-97a0-4a64-8df7-481e02de0b81",
"indicator--58e8a3ff-99a4-4450-9d5b-4d2002de0b81",
"indicator--58e8a400-427c-4e8b-96a4-474002de0b81",
"indicator--58e8a419-731c-4891-997d-4edf02de0b81",
"indicator--58e8a41a-a160-4bb0-9c0f-447802de0b81",
"indicator--58e8a41b-c444-4b90-b083-4aa802de0b81",
"indicator--58e8a41c-9aa8-4537-9994-4f6102de0b81",
"indicator--58e8a41d-d544-4557-8083-47b902de0b81",
"indicator--58e8a43b-4d6c-407b-b1f2-401e02de0b81",
"indicator--58e8a43c-d3bc-4afd-a297-4f1702de0b81",
"indicator--58e8a43d-1f6c-4981-93e7-4ce502de0b81",
"indicator--58e8a43e-146c-4457-851c-4a3802de0b81",
"indicator--58e8a43f-cbfc-4957-99d7-497902de0b81",
"indicator--58e8a440-109c-40c8-ac6b-4fc002de0b81",
"indicator--58e8a441-10d8-433b-b0cb-494302de0b81",
"indicator--58e8a442-2258-4664-9280-463702de0b81",
"indicator--58e8a443-d940-43f7-9898-424e02de0b81",
"indicator--58e8a444-d478-4d26-b59e-41b902de0b81",
"indicator--58e8a445-848c-48a3-adcd-4bfa02de0b81",
"indicator--58e8a446-ad54-44e8-a039-442602de0b81",
"indicator--58e8a447-5550-4384-8ad5-425302de0b81",
"indicator--58e8a449-b570-4ad5-92da-474202de0b81",
"indicator--58e8a44a-06f0-4489-a35b-450302de0b81",
"indicator--58e8a44b-55d0-4a1e-9da5-433d02de0b81",
"indicator--58e8a44c-8714-424e-b043-427002de0b81",
"indicator--58e8a44d-c534-4680-9706-46d602de0b81",
"indicator--58e8a44e-fbb0-49dc-9067-425702de0b81",
"indicator--58e8a44f-a4c4-47ed-8cd9-4f9e02de0b81",
"indicator--58e8a450-bbf8-448b-a034-459302de0b81",
"indicator--58e8a452-9ad0-4ce8-9f13-452f02de0b81",
"indicator--58e8a453-082c-45f2-8f30-4b5402de0b81",
"indicator--58e8a454-4858-49f4-ae93-4f0f02de0b81",
"indicator--58e8a455-ec38-4c59-b1ec-44fe02de0b81",
"indicator--58e8a47d-dff0-486f-bb29-4f9402de0b81",
"indicator--58e8a47e-16ac-4f37-910e-4cbc02de0b81",
"indicator--58e8a47f-1334-4e58-8b8b-418402de0b81",
"indicator--58e8a480-f058-4880-b65c-45fa02de0b81",
"indicator--58e8a481-da18-411d-b544-469002de0b81",
"indicator--58e8a482-365c-4e28-a273-448002de0b81",
"indicator--58e8a483-c8c0-42e8-978b-4fcd02de0b81",
"indicator--58e8a485-49d0-412e-b3c0-44ce02de0b81",
"indicator--58e8a486-aab4-42cc-a208-457802de0b81",
"indicator--58e8a487-d8ec-4f43-8abd-481202de0b81",
"indicator--58e8a488-3518-4276-a7db-4a5102de0b81",
"indicator--58e8a489-a968-4b90-8d52-4d8002de0b81",
"indicator--58e8a48a-83a0-40fb-97dc-4f2102de0b81",
"indicator--58e8a4b1-d3e8-4539-b80e-40d702de0b81",
"indicator--58e8a4b2-f458-4a32-a84a-4c6c02de0b81",
"indicator--58e8a4c2-e7a0-4e01-af46-4cb002de0b81",
"indicator--58e8a4c3-f544-4f85-9e78-45eb02de0b81",
"indicator--58e8a643-f524-4272-a28c-489f02de0b81",
"indicator--58e8a644-789c-428e-b441-497402de0b81",
"observed-data--58e8a645-f25c-4eb6-bdb9-484802de0b81",
"url--58e8a645-f25c-4eb6-bdb9-484802de0b81",
"indicator--58e8a646-a0a4-43b7-a83b-47c302de0b81",
"indicator--58e8a647-d688-4027-adff-446402de0b81",
"observed-data--58e8a647-c168-4120-a612-4acb02de0b81",
"url--58e8a647-c168-4120-a612-4acb02de0b81",
"indicator--58e8a648-27c4-4143-92d2-4b0e02de0b81",
"indicator--58e8a649-2834-4857-ace8-416202de0b81",
"observed-data--58e8a64b-3a84-4702-add8-457e02de0b81",
"url--58e8a64b-3a84-4702-add8-457e02de0b81",
"indicator--58e8a64c-aa1c-4670-874e-47ff02de0b81",
"indicator--58e8a64d-d290-4125-bf79-4d6f02de0b81",
"observed-data--58e8a64d-75b4-479c-8e15-4fcb02de0b81",
"url--58e8a64d-75b4-479c-8e15-4fcb02de0b81",
"indicator--58e8a64e-3f70-44a5-9007-48ad02de0b81",
"indicator--58e8a64f-408c-4fec-810a-459a02de0b81",
"observed-data--58e8a650-75f8-4c90-aaf0-423402de0b81",
"url--58e8a650-75f8-4c90-aaf0-423402de0b81",
"indicator--58e8a651-e038-4dc3-ba0a-446202de0b81",
"indicator--58e8a652-1174-4f93-96a3-4ddb02de0b81",
"observed-data--58e8a654-1388-40a7-ac90-418502de0b81",
"url--58e8a654-1388-40a7-ac90-418502de0b81",
"indicator--58e8a655-d5e4-4e1f-b292-411702de0b81",
"indicator--58e8a656-a36c-4b49-8037-40c802de0b81",
"observed-data--58e8a657-7fbc-4c5b-b2cb-460e02de0b81",
"url--58e8a657-7fbc-4c5b-b2cb-460e02de0b81",
"indicator--58e8a657-7d24-43c1-9123-49d102de0b81",
"indicator--58e8a658-fa98-4155-8038-405802de0b81",
"observed-data--58e8a659-d434-44c3-bc37-44ab02de0b81",
"url--58e8a659-d434-44c3-bc37-44ab02de0b81",
"indicator--58e8a65a-8b60-4d7c-a227-4fcc02de0b81",
"indicator--58e8a65b-da3c-4f1a-9996-471802de0b81",
"observed-data--58e8a65c-2284-4a2d-a471-404c02de0b81",
"url--58e8a65c-2284-4a2d-a471-404c02de0b81",
"indicator--58e8a65d-42b0-416b-82c5-4f6902de0b81",
"indicator--58e8a65e-62f0-467d-bb96-457c02de0b81",
"observed-data--58e8a65f-6c90-4021-bfdb-4d3d02de0b81",
"url--58e8a65f-6c90-4021-bfdb-4d3d02de0b81",
"indicator--58e8a660-8994-43e6-a244-417802de0b81",
"indicator--58e8a660-c848-42c7-a6b7-4a7d02de0b81",
"observed-data--58e8a661-332c-45c1-bbca-4f1f02de0b81",
"url--58e8a661-332c-45c1-bbca-4f1f02de0b81",
"indicator--58e8a662-c00c-46f4-8757-4f6802de0b81",
"indicator--58e8a663-67b8-4a9a-baf6-40be02de0b81",
"observed-data--58e8a664-5c30-4bcc-9fec-4ad602de0b81",
"url--58e8a664-5c30-4bcc-9fec-4ad602de0b81",
"indicator--58e8a665-1c3c-4769-8d91-493e02de0b81",
"indicator--58e8a666-fe80-4f90-ac1d-41e302de0b81",
"observed-data--58e8a667-d238-4e5e-9dc3-478902de0b81",
"url--58e8a667-d238-4e5e-9dc3-478902de0b81",
"indicator--58e8a668-3714-4a9a-b80c-437c02de0b81",
"indicator--58e8a668-8b7c-4175-bff3-44ed02de0b81",
"observed-data--58e8a669-1514-4f75-99d7-4b2002de0b81",
"url--58e8a669-1514-4f75-99d7-4b2002de0b81",
"indicator--58e8a66a-3638-47ed-bf3b-4e4a02de0b81",
"indicator--58e8a66c-d324-4686-b3e9-4f3c02de0b81",
"observed-data--58e8a66d-d284-4960-92ec-4c6c02de0b81",
"url--58e8a66d-d284-4960-92ec-4c6c02de0b81",
"indicator--58e8a66e-9178-481f-918f-40b902de0b81",
"indicator--58e8a66f-3cfc-47da-aef1-422302de0b81",
"observed-data--58e8a670-99a8-4f91-af1a-463602de0b81",
"url--58e8a670-99a8-4f91-af1a-463602de0b81",
"indicator--58e8a671-0934-4ab3-8f65-485602de0b81",
"indicator--58e8a673-1040-4a62-8c51-4ee902de0b81",
"observed-data--58e8a674-72b8-4f8a-8eec-4a4202de0b81",
"url--58e8a674-72b8-4f8a-8eec-4a4202de0b81",
"indicator--58e8a675-7ab8-425a-af39-4d7002de0b81",
"indicator--58e8a676-2334-4ff5-aab0-443302de0b81",
"observed-data--58e8a677-ef6c-43bf-8f1a-452602de0b81",
"url--58e8a677-ef6c-43bf-8f1a-452602de0b81",
"indicator--58e8a678-e1e4-42c9-9e85-4fef02de0b81",
"indicator--58e8a679-ee78-47d8-8644-408f02de0b81",
"observed-data--58e8a67b-38a4-49fe-99bc-49b402de0b81",
"url--58e8a67b-38a4-49fe-99bc-49b402de0b81",
"indicator--58e8a67c-b7b4-465e-bf98-4a6902de0b81",
"indicator--58e8a67d-4410-48d2-85ae-479102de0b81",
"observed-data--58e8a67e-70e8-483c-a4a7-43d302de0b81",
"url--58e8a67e-70e8-483c-a4a7-43d302de0b81",
"indicator--58e8a67f-50a0-4ead-85b5-40b802de0b81",
"indicator--58e8a680-5310-4552-8cbb-4f6c02de0b81",
"observed-data--58e8a681-dde8-4f18-8afc-4bee02de0b81",
"url--58e8a681-dde8-4f18-8afc-4bee02de0b81",
"indicator--58e8a682-4a9c-4018-a50a-46b802de0b81",
"indicator--58e8a683-75b4-427a-8d12-4e4e02de0b81",
"observed-data--58e8a684-4aa8-404c-9e45-46be02de0b81",
"url--58e8a684-4aa8-404c-9e45-46be02de0b81",
"indicator--58e8a685-3564-435b-8a5d-483b02de0b81",
"indicator--58e8a685-8c10-4689-9e64-4b3502de0b81",
"observed-data--58e8a686-5770-4612-989f-44f902de0b81",
"url--58e8a686-5770-4612-989f-44f902de0b81",
"indicator--58e8a687-5dcc-42da-a16a-43a102de0b81",
"indicator--58e8a688-393c-4996-8eec-4c4202de0b81",
"observed-data--58e8a689-5ad4-4909-9e7e-461a02de0b81",
"url--58e8a689-5ad4-4909-9e7e-461a02de0b81",
"indicator--58e8a68a-582c-45bd-a0c5-404c02de0b81",
"indicator--58e8a68b-5564-43eb-bd9d-4ef502de0b81",
"observed-data--58e8a68c-4040-4022-b5ee-4f4002de0b81",
"url--58e8a68c-4040-4022-b5ee-4f4002de0b81"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"osint:source-type=\"blog-post\"",
"misp-galaxy:threat-actor=\"Lazarus Group\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e8a3c0-5b8c-4de6-8ee1-4fdd02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"first_observed": "2017-04-08T08:57:40Z",
"last_observed": "2017-04-08T08:57:40Z",
"number_observed": 1,
"object_refs": [
"url--58e8a3c0-5b8c-4de6-8ee1-4fdd02de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\"",
"osint:source-type=\"blog-post\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e8a3c0-5b8c-4de6-8ee1-4fdd02de0b81",
"value": "http://researchcenter.paloaltonetworks.com/2017/04/unit42-the-blockbuster-sequel/"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--58e8a3d4-01f8-405a-9ea5-478c02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"labels": [
"misp:type=\"text\"",
"misp:category=\"External analysis\"",
"osint:source-type=\"blog-post\""
],
"x_misp_category": "External analysis",
"x_misp_type": "text",
"x_misp_value": "Unit 42 has identified malware with recent compilation and distribution timestamps that has code, infrastructure, and themes overlapping with threats described previously in the Operation Blockbuster report, written by researchers at Novetta. This report details the activities from a group they named Lazarus, their tools, and the techniques they use to infiltrate computer networks. The Lazarus group is tied to the 2014 attack on Sony Pictures Entertainment and the 2013 DarkSeoul attacks.\r\n\r\nThis recently identified activity is targeting Korean speaking individuals, while the threat actors behind the attack likely speak both Korean and English. This blog will detail the recently discovered samples, their functionality, and their ties to the threat group behind Operation Blockbuster."
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a3ef-149c-4d92-8ae0-4e8a02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "C2 IPv4 Address",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '103.224.82.154']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a3f0-0444-4f4b-b28b-4f9502de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "C2 IPv4 Address",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '180.67.205.101']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a3f1-72b0-4dc1-a42f-410f02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "C2 IPv4 Address",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '182.70.113.138']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a3f2-ff8c-4d45-af1d-414102de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "C2 IPv4 Address",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '193.189.144.145']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a3f4-31c8-4111-84a5-4f3002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "C2 IPv4 Address",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '199.26.11.17']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a3f5-c270-40be-b7d1-46ba02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "C2 IPv4 Address",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '209.105.242.64']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a3f6-5e2c-4807-a344-4d1802de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "C2 IPv4 Address",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '211.233.13.11']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a3f7-5f08-4120-8087-447902de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "C2 IPv4 Address",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '211.233.13.62']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a3f8-1f3c-437d-b6d8-4d9c02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "C2 IPv4 Address",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '211.236.42.52']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a3f9-9098-48ce-9326-4d7a02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "C2 IPv4 Address",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '211.49.171.243']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a3fa-9d24-421f-9147-446802de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "C2 IPv4 Address",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '218.103.37.22']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a3fb-9458-4e66-8137-4f1102de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "C2 IPv4 Address",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '221.138.17.152']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a3fc-af2c-4168-9c2a-478802de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "C2 IPv4 Address",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '221.161.82.208']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a3fd-3e98-44ce-b36e-4af902de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "C2 IPv4 Address",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '23.115.75.188']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a3fe-97a0-4a64-8df7-481e02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "C2 IPv4 Address",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '61.100.180.9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a3ff-99a4-4450-9d5b-4d2002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "C2 IPv4 Address",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '61.78.63.95']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a400-427c-4e8b-96a4-474002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "C2 IPv4 Address",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '80.153.49.82']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a419-731c-4891-997d-4edf02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "C2 Domain",
"pattern": "[domain-name:value = 'daedong.or.kr']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a41a-a160-4bb0-9c0f-447802de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "C2 Domain",
"pattern": "[domain-name:value = 'kcnp.or.kr']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a41b-c444-4b90-b083-4aa802de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "C2 Domain",
"pattern": "[domain-name:value = 'kosic.or.kr']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a41c-9aa8-4537-9994-4f6102de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "C2 Domain",
"pattern": "[domain-name:value = 'wstore.lt']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a41d-d544-4557-8083-47b902de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "C2 Domain",
"pattern": "[domain-name:value = 'xkclub.hk']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a43b-4d6c-407b-b1f2-401e02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Additional Related Samples",
"pattern": "[file:hashes.SHA256 = '02d74124957b6de4b087a7d12efa01c43558bf6bdaccef9926a022bcffcdcfea']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a43c-d3bc-4afd-a297-4f1702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Additional Related Samples",
"pattern": "[file:hashes.SHA256 = '0c5cdbf6f043780dc5fff4b7a977a1874457cc125b4d1da70808bfa720022477']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a43d-1f6c-4981-93e7-4ce502de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Additional Related Samples",
"pattern": "[file:hashes.SHA256 = '18579d1cc9810ca0b5230e8671a16f9e65b9c9cdd268db6c3535940c30b12f9e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a43e-146c-4457-851c-4a3802de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Additional Related Samples",
"pattern": "[file:hashes.SHA256 = '19b23f169606bd390581afe1b27c2c8659d736cbfa4c3e58ed83a287049522f6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a43f-cbfc-4957-99d7-497902de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Additional Related Samples",
"pattern": "[file:hashes.SHA256 = '1efffd64f2215e2b574b9f8892bbb3ab6e0f98cf0684e479f1a67f0f521ec0fe']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a440-109c-40c8-ac6b-4fc002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Additional Related Samples",
"pattern": "[file:hashes.SHA256 = '440dd79e8e5906f0a73b80bf0dc58f186cb289b4edb9e5bc4922d4e197bce10c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a441-10d8-433b-b0cb-494302de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Additional Related Samples",
"pattern": "[file:hashes.SHA256 = '446ce29f6df3ac2692773e0a9b2a973d0013e059543c858554ac8200ba1d09cf']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a442-2258-4664-9280-463702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Additional Related Samples",
"pattern": "[file:hashes.SHA256 = '557c63737bf6752eba32bd688eb046c174e53140950e0d91ea609e7f42c80062']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a443-d940-43f7-9898-424e02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Additional Related Samples",
"pattern": "[file:hashes.SHA256 = '5c10b34e99b0f0681f79eaba39e3fe60e1a03ec43faf14b28850be80830722cb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a444-d478-4d26-b59e-41b902de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Additional Related Samples",
"pattern": "[file:hashes.SHA256 = '644c01322628adf8574d69afe25c4eb2cdc0bfa400e689645c2ab80becbacc33']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a445-848c-48a3-adcd-4bfa02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Additional Related Samples",
"pattern": "[file:hashes.SHA256 = '6a34f4ce012e52f5f94c1a163111df8b1c5b96c8dc0836ba600c2da84059c6ad']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a446-ad54-44e8-a039-442602de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Additional Related Samples",
"pattern": "[file:hashes.SHA256 = '77a32726af6205d27999b9a564dd7b020dc0a8f697a81a8f597b971140e28976']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a447-5550-4384-8ad5-425302de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Additional Related Samples",
"pattern": "[file:hashes.SHA256 = '79fe6576d0a26bd41f1f3a3a7bfeff6b5b7c867d624b004b21fadfdd49e6cb18']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a449-b570-4ad5-92da-474202de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Additional Related Samples",
"pattern": "[file:hashes.SHA256 = '8085dae410e54bc0e9f962edc92fa8245a8a65d27b0d06292739458ce59c6ba1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a44a-06f0-4489-a35b-450302de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Additional Related Samples",
"pattern": "[file:hashes.SHA256 = '8b21e36aa81ace60c797ac8299c8a80f366cb0f3c703465a2b9a6dbf3e65861e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a44b-55d0-4a1e-9da5-433d02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Additional Related Samples",
"pattern": "[file:hashes.SHA256 = '9c6a23e6662659b3dee96234e51f711dd493aaba93ce132111c56164ad02cf5e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a44c-8714-424e-b043-427002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Additional Related Samples",
"pattern": "[file:hashes.SHA256 = 'd843f31a1fb62ee49939940bf5a998472a9f92b23336affa7bccfa836fe299f5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a44d-c534-4680-9706-46d602de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Additional Related Samples",
"pattern": "[file:hashes.SHA256 = 'dcea917093643bc536191ff70013cb27a0519c07952fbf626b4cc5f3feee2212']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a44e-fbb0-49dc-9067-425702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Additional Related Samples",
"pattern": "[file:hashes.SHA256 = 'dd8c3824c8ffdbf1e16da8cee43da01d43f91ee3cc90a38f50a6cc8d6a778b57']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a44f-a4c4-47ed-8cd9-4f9e02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Additional Related Samples",
"pattern": "[file:hashes.SHA256 = 'efa2a0bbb69e60337b783db326b62c820b81325d39fb4761c9b575668411e12c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a450-bbf8-448b-a034-459302de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Additional Related Samples",
"pattern": "[file:hashes.SHA256 = 'f365a042fbf57ed2fe3fd75b588c46ae358c14441905df1446e67d348bd902bf']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a452-9ad0-4ce8-9f13-452f02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Additional Related Samples",
"pattern": "[file:hashes.SHA256 = 'f618245e69695f6e985168f5e307fd6dc7e848832bf01c529818cbcfa4089e4a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a453-082c-45f2-8f30-4b5402de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Additional Related Samples",
"pattern": "[file:hashes.SHA256 = 'fa45603334dae86cc72e356df9aa5e21151bb09ffabf86b8dbf5bf42bd2bbadf']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a454-4858-49f4-ae93-4f0f02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Additional Related Samples",
"pattern": "[file:hashes.SHA256 = 'fc19a42c423aefb5fdb19b50db52f84e1cbd20af6530e7c7b39435c4c7248cc7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a455-ec38-4c59-b1ec-44fe02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Additional Related Samples",
"pattern": "[file:hashes.SHA256 = 'ff4581d0c73bd526efdd6384bc1fb44b856120bc6bbf0098a1fa0de3efff900d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a47d-dff0-486f-bb29-4f9402de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Testing Malicious Document",
"pattern": "[file:hashes.SHA256 = '90e74b5d762fa00fff851d2f3fad8dc3266bfca81d307eeb749cce66a7dcf3e1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a47e-16ac-4f37-910e-4cbc02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Testing Malicious Document",
"pattern": "[file:hashes.SHA256 = '09fc4219169ce7aac5e408c7f5c7bfde10df6e48868d7b470dc7ce41ee360723']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a47f-1334-4e58-8b8b-418402de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Testing Malicious Document",
"pattern": "[file:hashes.SHA256 = 'd1e4d51024b0e25cfac56b1268e1de2f98f86225bbad913345806ff089508080']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a480-f058-4880-b65c-45fa02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Testing Malicious Document",
"pattern": "[file:hashes.SHA256 = '040d20357cbb9e950a3dd0b0e5c3260b96b7d3a9dfe15ad3331c98835caa8c63']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a481-da18-411d-b544-469002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Testing Malicious Document",
"pattern": "[file:hashes.SHA256 = 'dfc420190ef535cbabf63436e905954d6d3a9ddb65e57665ae8e99fa3e767316']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a482-365c-4e28-a273-448002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Testing Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f21290968b51b11516e7a86e301148e3b4af7bc2a8b3afe36bc5021086d1fab2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a483-c8c0-42e8-978b-4fcd02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Testing Malicious Document",
"pattern": "[file:hashes.SHA256 = '1491896d42eb975400958b2c575522d2d73ffa3eb8bdd3eb5af1c666a66aeb08']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a485-49d0-412e-b3c0-44ce02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Testing Malicious Document",
"pattern": "[file:hashes.SHA256 = '31e8a920822ee2a273eb91ec59f5e93ac024d3d7ee794fa6e0e68137734e0443']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a486-aab4-42cc-a208-457802de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Testing Malicious Document",
"pattern": "[file:hashes.SHA256 = '49ecead98ebc750cf0e1c48fccf5c4b07fadef653be034cdcdcd7ba654f713af']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a487-d8ec-4f43-8abd-481202de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Testing Malicious Document",
"pattern": "[file:hashes.SHA256 = '600ddacdf16559135f6e581d41b30d0867aae313fbaf66eb4d18345b2136cdd7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a488-3518-4276-a7db-4a5102de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Testing Malicious Document",
"pattern": "[file:hashes.SHA256 = '6ccb8a10e253cddd8d4c4b85d19bbb288b56b8174a3f1f2fe1f9151732e1a7da']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a489-a968-4b90-8d52-4d8002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Testing Malicious Document",
"pattern": "[file:hashes.SHA256 = '8b2c44c4b4dc3d7cf1b71bd6fcc37898dcd9573fcf3cb8159add6cb9cfc9651b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a48a-83a0-40fb-97dc-4f2102de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Testing Malicious Document",
"pattern": "[file:hashes.SHA256 = '9e71d0fdb9874049f310a6ab118ba2559fc1c491ed93c3fd6f250c780e61b6ff']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a4b1-d3e8-4539-b80e-40d702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Initial Payload",
"pattern": "[file:hashes.SHA256 = '1322b5642e19586383e663613188b0cead91f30a0ab1004bf06f10d8b15daf65']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a4b2-f458-4a32-a84a-4c6c02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Initial Payload (unpacked)",
"pattern": "[file:hashes.SHA256 = '032ccd6ae0a6e49ac93b7bd10c7d249f853fff3f5771a1fe3797f733f09db5a0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a4c2-e7a0-4e01-af46-4cb002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Initial Malicious Document",
"pattern": "[file:hashes.SHA256 = 'cec26d8629c5f223a120677a5c7fbd8d477f9a1b963f19d3f1195a7f94bc194b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a4c3-f544-4f85-9e78-45eb02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:57:40.000Z",
"modified": "2017-04-08T08:57:40.000Z",
"description": "Initial Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ff58189452668d8c2829a0e9ba8a98a34482c4f2c5c363dc0671700ba58b7bee']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:57:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a643-f524-4272-a28c-489f02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:58:43.000Z",
"modified": "2017-04-08T08:58:43.000Z",
"description": "Initial Malicious Document - Xchecked via VT: cec26d8629c5f223a120677a5c7fbd8d477f9a1b963f19d3f1195a7f94bc194b",
"pattern": "[file:hashes.SHA1 = 'b2204bb750842e3d9f4da914ad527a33efca7532']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:58:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a644-789c-428e-b441-497402de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:58:44.000Z",
"modified": "2017-04-08T08:58:44.000Z",
"description": "Initial Malicious Document - Xchecked via VT: cec26d8629c5f223a120677a5c7fbd8d477f9a1b963f19d3f1195a7f94bc194b",
"pattern": "[file:hashes.MD5 = 'e656e1e46e3ad644f9701378490880e2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:58:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e8a645-f25c-4eb6-bdb9-484802de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:58:45.000Z",
"modified": "2017-04-08T08:58:45.000Z",
"first_observed": "2017-04-08T08:58:45Z",
"last_observed": "2017-04-08T08:58:45Z",
"number_observed": 1,
"object_refs": [
"url--58e8a645-f25c-4eb6-bdb9-484802de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e8a645-f25c-4eb6-bdb9-484802de0b81",
"value": "https://www.virustotal.com/file/cec26d8629c5f223a120677a5c7fbd8d477f9a1b963f19d3f1195a7f94bc194b/analysis/1491597656/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a646-a0a4-43b7-a83b-47c302de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:58:46.000Z",
"modified": "2017-04-08T08:58:46.000Z",
"description": "Initial Payload (unpacked) - Xchecked via VT: 032ccd6ae0a6e49ac93b7bd10c7d249f853fff3f5771a1fe3797f733f09db5a0",
"pattern": "[file:hashes.SHA1 = '55f56b74a65521a3524be9fe3ea8d30505704ab5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:58:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a647-d688-4027-adff-446402de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:58:47.000Z",
"modified": "2017-04-08T08:58:47.000Z",
"description": "Initial Payload (unpacked) - Xchecked via VT: 032ccd6ae0a6e49ac93b7bd10c7d249f853fff3f5771a1fe3797f733f09db5a0",
"pattern": "[file:hashes.MD5 = 'cab10f19ae0a6deeb7be7bd0b46a0f5f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:58:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e8a647-c168-4120-a612-4acb02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:58:47.000Z",
"modified": "2017-04-08T08:58:47.000Z",
"first_observed": "2017-04-08T08:58:47Z",
"last_observed": "2017-04-08T08:58:47Z",
"number_observed": 1,
"object_refs": [
"url--58e8a647-c168-4120-a612-4acb02de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e8a647-c168-4120-a612-4acb02de0b81",
"value": "https://www.virustotal.com/file/032ccd6ae0a6e49ac93b7bd10c7d249f853fff3f5771a1fe3797f733f09db5a0/analysis/1491640686/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a648-27c4-4143-92d2-4b0e02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:58:48.000Z",
"modified": "2017-04-08T08:58:48.000Z",
"description": "Initial Payload - Xchecked via VT: 1322b5642e19586383e663613188b0cead91f30a0ab1004bf06f10d8b15daf65",
"pattern": "[file:hashes.SHA1 = 'dcc4e51730c0114f110405e3e42e721384969add']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:58:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a649-2834-4857-ace8-416202de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:58:49.000Z",
"modified": "2017-04-08T08:58:49.000Z",
"description": "Initial Payload - Xchecked via VT: 1322b5642e19586383e663613188b0cead91f30a0ab1004bf06f10d8b15daf65",
"pattern": "[file:hashes.MD5 = 'a4b3404fffc581ab06d50f3f2243cb56']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:58:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e8a64b-3a84-4702-add8-457e02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:58:51.000Z",
"modified": "2017-04-08T08:58:51.000Z",
"first_observed": "2017-04-08T08:58:51Z",
"last_observed": "2017-04-08T08:58:51Z",
"number_observed": 1,
"object_refs": [
"url--58e8a64b-3a84-4702-add8-457e02de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e8a64b-3a84-4702-add8-457e02de0b81",
"value": "https://www.virustotal.com/file/1322b5642e19586383e663613188b0cead91f30a0ab1004bf06f10d8b15daf65/analysis/1491597476/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a64c-aa1c-4670-874e-47ff02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:58:52.000Z",
"modified": "2017-04-08T08:58:52.000Z",
"description": "Testing Malicious Document - Xchecked via VT: 9e71d0fdb9874049f310a6ab118ba2559fc1c491ed93c3fd6f250c780e61b6ff",
"pattern": "[file:hashes.SHA1 = '6f23666a209c80d3aa475f1382a065a818346339']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:58:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a64d-d290-4125-bf79-4d6f02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:58:53.000Z",
"modified": "2017-04-08T08:58:53.000Z",
"description": "Testing Malicious Document - Xchecked via VT: 9e71d0fdb9874049f310a6ab118ba2559fc1c491ed93c3fd6f250c780e61b6ff",
"pattern": "[file:hashes.MD5 = '01a07e5a28e53a5bc541d178fe229599']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:58:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e8a64d-75b4-479c-8e15-4fcb02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:58:53.000Z",
"modified": "2017-04-08T08:58:53.000Z",
"first_observed": "2017-04-08T08:58:53Z",
"last_observed": "2017-04-08T08:58:53Z",
"number_observed": 1,
"object_refs": [
"url--58e8a64d-75b4-479c-8e15-4fcb02de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e8a64d-75b4-479c-8e15-4fcb02de0b81",
"value": "https://www.virustotal.com/file/9e71d0fdb9874049f310a6ab118ba2559fc1c491ed93c3fd6f250c780e61b6ff/analysis/1490008053/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a64e-3f70-44a5-9007-48ad02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:58:54.000Z",
"modified": "2017-04-08T08:58:54.000Z",
"description": "Testing Malicious Document - Xchecked via VT: 8b2c44c4b4dc3d7cf1b71bd6fcc37898dcd9573fcf3cb8159add6cb9cfc9651b",
"pattern": "[file:hashes.SHA1 = '033bf940b65c1a5247f22be6c8f9c4144ab9ef8c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:58:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a64f-408c-4fec-810a-459a02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:58:55.000Z",
"modified": "2017-04-08T08:58:55.000Z",
"description": "Testing Malicious Document - Xchecked via VT: 8b2c44c4b4dc3d7cf1b71bd6fcc37898dcd9573fcf3cb8159add6cb9cfc9651b",
"pattern": "[file:hashes.MD5 = '2b78a7f0cd2efb69bdacff9b9c59f9cc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:58:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e8a650-75f8-4c90-aaf0-423402de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:58:56.000Z",
"modified": "2017-04-08T08:58:56.000Z",
"first_observed": "2017-04-08T08:58:56Z",
"last_observed": "2017-04-08T08:58:56Z",
"number_observed": 1,
"object_refs": [
"url--58e8a650-75f8-4c90-aaf0-423402de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e8a650-75f8-4c90-aaf0-423402de0b81",
"value": "https://www.virustotal.com/file/8b2c44c4b4dc3d7cf1b71bd6fcc37898dcd9573fcf3cb8159add6cb9cfc9651b/analysis/1490007705/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a651-e038-4dc3-ba0a-446202de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:58:57.000Z",
"modified": "2017-04-08T08:58:57.000Z",
"description": "Testing Malicious Document - Xchecked via VT: 600ddacdf16559135f6e581d41b30d0867aae313fbaf66eb4d18345b2136cdd7",
"pattern": "[file:hashes.SHA1 = '770f800510bde5c8b051052e43f13fb0d0432883']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:58:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a652-1174-4f93-96a3-4ddb02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:58:58.000Z",
"modified": "2017-04-08T08:58:58.000Z",
"description": "Testing Malicious Document - Xchecked via VT: 600ddacdf16559135f6e581d41b30d0867aae313fbaf66eb4d18345b2136cdd7",
"pattern": "[file:hashes.MD5 = 'f450e6c90e9a3a907690fb66f08c8b49']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:58:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e8a654-1388-40a7-ac90-418502de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:00.000Z",
"modified": "2017-04-08T08:59:00.000Z",
"first_observed": "2017-04-08T08:59:00Z",
"last_observed": "2017-04-08T08:59:00Z",
"number_observed": 1,
"object_refs": [
"url--58e8a654-1388-40a7-ac90-418502de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e8a654-1388-40a7-ac90-418502de0b81",
"value": "https://www.virustotal.com/file/600ddacdf16559135f6e581d41b30d0867aae313fbaf66eb4d18345b2136cdd7/analysis/1490009323/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a655-d5e4-4e1f-b292-411702de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:01.000Z",
"modified": "2017-04-08T08:59:01.000Z",
"description": "Testing Malicious Document - Xchecked via VT: 49ecead98ebc750cf0e1c48fccf5c4b07fadef653be034cdcdcd7ba654f713af",
"pattern": "[file:hashes.SHA1 = '387887243c1436f37bcecb9671de375813e57fd2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a656-a36c-4b49-8037-40c802de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:02.000Z",
"modified": "2017-04-08T08:59:02.000Z",
"description": "Testing Malicious Document - Xchecked via VT: 49ecead98ebc750cf0e1c48fccf5c4b07fadef653be034cdcdcd7ba654f713af",
"pattern": "[file:hashes.MD5 = '39b32e5fcec968631b6badeaf9bd517c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e8a657-7fbc-4c5b-b2cb-460e02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:03.000Z",
"modified": "2017-04-08T08:59:03.000Z",
"first_observed": "2017-04-08T08:59:03Z",
"last_observed": "2017-04-08T08:59:03Z",
"number_observed": 1,
"object_refs": [
"url--58e8a657-7fbc-4c5b-b2cb-460e02de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e8a657-7fbc-4c5b-b2cb-460e02de0b81",
"value": "https://www.virustotal.com/file/49ecead98ebc750cf0e1c48fccf5c4b07fadef653be034cdcdcd7ba654f713af/analysis/1490007820/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a657-7d24-43c1-9123-49d102de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:03.000Z",
"modified": "2017-04-08T08:59:03.000Z",
"description": "Testing Malicious Document - Xchecked via VT: 31e8a920822ee2a273eb91ec59f5e93ac024d3d7ee794fa6e0e68137734e0443",
"pattern": "[file:hashes.SHA1 = '2437d58cbef0ea77e64b12529f8386c93563867e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a658-fa98-4155-8038-405802de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:04.000Z",
"modified": "2017-04-08T08:59:04.000Z",
"description": "Testing Malicious Document - Xchecked via VT: 31e8a920822ee2a273eb91ec59f5e93ac024d3d7ee794fa6e0e68137734e0443",
"pattern": "[file:hashes.MD5 = '853017d8231acf6aa912fb4a146ffd46']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e8a659-d434-44c3-bc37-44ab02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:05.000Z",
"modified": "2017-04-08T08:59:05.000Z",
"first_observed": "2017-04-08T08:59:05Z",
"last_observed": "2017-04-08T08:59:05Z",
"number_observed": 1,
"object_refs": [
"url--58e8a659-d434-44c3-bc37-44ab02de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e8a659-d434-44c3-bc37-44ab02de0b81",
"value": "https://www.virustotal.com/file/31e8a920822ee2a273eb91ec59f5e93ac024d3d7ee794fa6e0e68137734e0443/analysis/1490875689/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a65a-8b60-4d7c-a227-4fcc02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:06.000Z",
"modified": "2017-04-08T08:59:06.000Z",
"description": "Testing Malicious Document - Xchecked via VT: 1491896d42eb975400958b2c575522d2d73ffa3eb8bdd3eb5af1c666a66aeb08",
"pattern": "[file:hashes.SHA1 = '60fb33e965efb986f3549da6366fd4e27adb9ca5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a65b-da3c-4f1a-9996-471802de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:07.000Z",
"modified": "2017-04-08T08:59:07.000Z",
"description": "Testing Malicious Document - Xchecked via VT: 1491896d42eb975400958b2c575522d2d73ffa3eb8bdd3eb5af1c666a66aeb08",
"pattern": "[file:hashes.MD5 = '2f9353046222a49317c9db3be4cd1e12']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e8a65c-2284-4a2d-a471-404c02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:08.000Z",
"modified": "2017-04-08T08:59:08.000Z",
"first_observed": "2017-04-08T08:59:08Z",
"last_observed": "2017-04-08T08:59:08Z",
"number_observed": 1,
"object_refs": [
"url--58e8a65c-2284-4a2d-a471-404c02de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e8a65c-2284-4a2d-a471-404c02de0b81",
"value": "https://www.virustotal.com/file/1491896d42eb975400958b2c575522d2d73ffa3eb8bdd3eb5af1c666a66aeb08/analysis/1490007908/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a65d-42b0-416b-82c5-4f6902de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:09.000Z",
"modified": "2017-04-08T08:59:09.000Z",
"description": "Testing Malicious Document - Xchecked via VT: f21290968b51b11516e7a86e301148e3b4af7bc2a8b3afe36bc5021086d1fab2",
"pattern": "[file:hashes.SHA1 = '32198a872923cd003ab11c75ed5369c979a7cb64']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:09Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a65e-62f0-467d-bb96-457c02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:10.000Z",
"modified": "2017-04-08T08:59:10.000Z",
"description": "Testing Malicious Document - Xchecked via VT: f21290968b51b11516e7a86e301148e3b4af7bc2a8b3afe36bc5021086d1fab2",
"pattern": "[file:hashes.MD5 = '8f47377f880cef626c30bcd3a68bfed0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e8a65f-6c90-4021-bfdb-4d3d02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:11.000Z",
"modified": "2017-04-08T08:59:11.000Z",
"first_observed": "2017-04-08T08:59:11Z",
"last_observed": "2017-04-08T08:59:11Z",
"number_observed": 1,
"object_refs": [
"url--58e8a65f-6c90-4021-bfdb-4d3d02de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e8a65f-6c90-4021-bfdb-4d3d02de0b81",
"value": "https://www.virustotal.com/file/f21290968b51b11516e7a86e301148e3b4af7bc2a8b3afe36bc5021086d1fab2/analysis/1489993311/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a660-8994-43e6-a244-417802de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:11.000Z",
"modified": "2017-04-08T08:59:11.000Z",
"description": "Testing Malicious Document - Xchecked via VT: dfc420190ef535cbabf63436e905954d6d3a9ddb65e57665ae8e99fa3e767316",
"pattern": "[file:hashes.SHA1 = '637bfa81f697cf24aca57523fc28891b5376605d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a660-c848-42c7-a6b7-4a7d02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:12.000Z",
"modified": "2017-04-08T08:59:12.000Z",
"description": "Testing Malicious Document - Xchecked via VT: dfc420190ef535cbabf63436e905954d6d3a9ddb65e57665ae8e99fa3e767316",
"pattern": "[file:hashes.MD5 = '4ae49bc0ddffcf1ab5fa33faae966e98']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e8a661-332c-45c1-bbca-4f1f02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:13.000Z",
"modified": "2017-04-08T08:59:13.000Z",
"first_observed": "2017-04-08T08:59:13Z",
"last_observed": "2017-04-08T08:59:13Z",
"number_observed": 1,
"object_refs": [
"url--58e8a661-332c-45c1-bbca-4f1f02de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e8a661-332c-45c1-bbca-4f1f02de0b81",
"value": "https://www.virustotal.com/file/dfc420190ef535cbabf63436e905954d6d3a9ddb65e57665ae8e99fa3e767316/analysis/1489976038/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a662-c00c-46f4-8757-4f6802de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:14.000Z",
"modified": "2017-04-08T08:59:14.000Z",
"description": "Testing Malicious Document - Xchecked via VT: 040d20357cbb9e950a3dd0b0e5c3260b96b7d3a9dfe15ad3331c98835caa8c63",
"pattern": "[file:hashes.SHA1 = '71786e3d42c7cc8059336f9c50f489fba3c443c9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a663-67b8-4a9a-baf6-40be02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:15.000Z",
"modified": "2017-04-08T08:59:15.000Z",
"description": "Testing Malicious Document - Xchecked via VT: 040d20357cbb9e950a3dd0b0e5c3260b96b7d3a9dfe15ad3331c98835caa8c63",
"pattern": "[file:hashes.MD5 = 'c01a91a26dd90363f0ab90d5163a3c5f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e8a664-5c30-4bcc-9fec-4ad602de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:16.000Z",
"modified": "2017-04-08T08:59:16.000Z",
"first_observed": "2017-04-08T08:59:16Z",
"last_observed": "2017-04-08T08:59:16Z",
"number_observed": 1,
"object_refs": [
"url--58e8a664-5c30-4bcc-9fec-4ad602de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e8a664-5c30-4bcc-9fec-4ad602de0b81",
"value": "https://www.virustotal.com/file/040d20357cbb9e950a3dd0b0e5c3260b96b7d3a9dfe15ad3331c98835caa8c63/analysis/1490945842/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a665-1c3c-4769-8d91-493e02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:17.000Z",
"modified": "2017-04-08T08:59:17.000Z",
"description": "Testing Malicious Document - Xchecked via VT: d1e4d51024b0e25cfac56b1268e1de2f98f86225bbad913345806ff089508080",
"pattern": "[file:hashes.SHA1 = 'cf403afb93440c56532323e87e40d895b67ef6cc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a666-fe80-4f90-ac1d-41e302de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:18.000Z",
"modified": "2017-04-08T08:59:18.000Z",
"description": "Testing Malicious Document - Xchecked via VT: d1e4d51024b0e25cfac56b1268e1de2f98f86225bbad913345806ff089508080",
"pattern": "[file:hashes.MD5 = 'a16dad1248433bbad204ab4705afc47a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e8a667-d238-4e5e-9dc3-478902de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:19.000Z",
"modified": "2017-04-08T08:59:19.000Z",
"first_observed": "2017-04-08T08:59:19Z",
"last_observed": "2017-04-08T08:59:19Z",
"number_observed": 1,
"object_refs": [
"url--58e8a667-d238-4e5e-9dc3-478902de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e8a667-d238-4e5e-9dc3-478902de0b81",
"value": "https://www.virustotal.com/file/d1e4d51024b0e25cfac56b1268e1de2f98f86225bbad913345806ff089508080/analysis/1491562208/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a668-3714-4a9a-b80c-437c02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:20.000Z",
"modified": "2017-04-08T08:59:20.000Z",
"description": "Testing Malicious Document - Xchecked via VT: 09fc4219169ce7aac5e408c7f5c7bfde10df6e48868d7b470dc7ce41ee360723",
"pattern": "[file:hashes.SHA1 = '8e06f968126ea7ff4ef1123c07c7452256c2e8fc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a668-8b7c-4175-bff3-44ed02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:20.000Z",
"modified": "2017-04-08T08:59:20.000Z",
"description": "Testing Malicious Document - Xchecked via VT: 09fc4219169ce7aac5e408c7f5c7bfde10df6e48868d7b470dc7ce41ee360723",
"pattern": "[file:hashes.MD5 = 'cefa6225208e4fd18e326c860398b0ac']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e8a669-1514-4f75-99d7-4b2002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:21.000Z",
"modified": "2017-04-08T08:59:21.000Z",
"first_observed": "2017-04-08T08:59:21Z",
"last_observed": "2017-04-08T08:59:21Z",
"number_observed": 1,
"object_refs": [
"url--58e8a669-1514-4f75-99d7-4b2002de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e8a669-1514-4f75-99d7-4b2002de0b81",
"value": "https://www.virustotal.com/file/09fc4219169ce7aac5e408c7f5c7bfde10df6e48868d7b470dc7ce41ee360723/analysis/1490007093/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a66a-3638-47ed-bf3b-4e4a02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:22.000Z",
"modified": "2017-04-08T08:59:22.000Z",
"description": "Testing Malicious Document - Xchecked via VT: 90e74b5d762fa00fff851d2f3fad8dc3266bfca81d307eeb749cce66a7dcf3e1",
"pattern": "[file:hashes.SHA1 = '786aad5a9df111dbc29d08b068894c17e663ff2f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a66c-d324-4686-b3e9-4f3c02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:24.000Z",
"modified": "2017-04-08T08:59:24.000Z",
"description": "Testing Malicious Document - Xchecked via VT: 90e74b5d762fa00fff851d2f3fad8dc3266bfca81d307eeb749cce66a7dcf3e1",
"pattern": "[file:hashes.MD5 = 'a24582e2a9162f32d09349953fac52b1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e8a66d-d284-4960-92ec-4c6c02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:25.000Z",
"modified": "2017-04-08T08:59:25.000Z",
"first_observed": "2017-04-08T08:59:25Z",
"last_observed": "2017-04-08T08:59:25Z",
"number_observed": 1,
"object_refs": [
"url--58e8a66d-d284-4960-92ec-4c6c02de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e8a66d-d284-4960-92ec-4c6c02de0b81",
"value": "https://www.virustotal.com/file/90e74b5d762fa00fff851d2f3fad8dc3266bfca81d307eeb749cce66a7dcf3e1/analysis/1489993815/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a66e-9178-481f-918f-40b902de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:26.000Z",
"modified": "2017-04-08T08:59:26.000Z",
"description": "Additional Related Samples - Xchecked via VT: efa2a0bbb69e60337b783db326b62c820b81325d39fb4761c9b575668411e12c",
"pattern": "[file:hashes.SHA1 = 'd0da8357705856e3527add4f5a8e6ccc6de35d9a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a66f-3cfc-47da-aef1-422302de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:27.000Z",
"modified": "2017-04-08T08:59:27.000Z",
"description": "Additional Related Samples - Xchecked via VT: efa2a0bbb69e60337b783db326b62c820b81325d39fb4761c9b575668411e12c",
"pattern": "[file:hashes.MD5 = 'da6f533bdeea3232d40245a1ded451c3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e8a670-99a8-4f91-af1a-463602de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:28.000Z",
"modified": "2017-04-08T08:59:28.000Z",
"first_observed": "2017-04-08T08:59:28Z",
"last_observed": "2017-04-08T08:59:28Z",
"number_observed": 1,
"object_refs": [
"url--58e8a670-99a8-4f91-af1a-463602de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e8a670-99a8-4f91-af1a-463602de0b81",
"value": "https://www.virustotal.com/file/efa2a0bbb69e60337b783db326b62c820b81325d39fb4761c9b575668411e12c/analysis/1488193010/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a671-0934-4ab3-8f65-485602de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:29.000Z",
"modified": "2017-04-08T08:59:29.000Z",
"description": "Additional Related Samples - Xchecked via VT: dd8c3824c8ffdbf1e16da8cee43da01d43f91ee3cc90a38f50a6cc8d6a778b57",
"pattern": "[file:hashes.SHA1 = '74f4470f1c7705eee57dad4f4f31a0677497f4eb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a673-1040-4a62-8c51-4ee902de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:31.000Z",
"modified": "2017-04-08T08:59:31.000Z",
"description": "Additional Related Samples - Xchecked via VT: dd8c3824c8ffdbf1e16da8cee43da01d43f91ee3cc90a38f50a6cc8d6a778b57",
"pattern": "[file:hashes.MD5 = 'c272af488ff4c4af2941fd83b1484f33']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e8a674-72b8-4f8a-8eec-4a4202de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:32.000Z",
"modified": "2017-04-08T08:59:32.000Z",
"first_observed": "2017-04-08T08:59:32Z",
"last_observed": "2017-04-08T08:59:32Z",
"number_observed": 1,
"object_refs": [
"url--58e8a674-72b8-4f8a-8eec-4a4202de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e8a674-72b8-4f8a-8eec-4a4202de0b81",
"value": "https://www.virustotal.com/file/dd8c3824c8ffdbf1e16da8cee43da01d43f91ee3cc90a38f50a6cc8d6a778b57/analysis/1491479445/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a675-7ab8-425a-af39-4d7002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:33.000Z",
"modified": "2017-04-08T08:59:33.000Z",
"description": "Additional Related Samples - Xchecked via VT: dcea917093643bc536191ff70013cb27a0519c07952fbf626b4cc5f3feee2212",
"pattern": "[file:hashes.SHA1 = '64dd3293e0273b2054a232afc9e7fcdda572e19c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:33Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a676-2334-4ff5-aab0-443302de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:34.000Z",
"modified": "2017-04-08T08:59:34.000Z",
"description": "Additional Related Samples - Xchecked via VT: dcea917093643bc536191ff70013cb27a0519c07952fbf626b4cc5f3feee2212",
"pattern": "[file:hashes.MD5 = '35e32397ff614e894d41496670909f9c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e8a677-ef6c-43bf-8f1a-452602de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:35.000Z",
"modified": "2017-04-08T08:59:35.000Z",
"first_observed": "2017-04-08T08:59:35Z",
"last_observed": "2017-04-08T08:59:35Z",
"number_observed": 1,
"object_refs": [
"url--58e8a677-ef6c-43bf-8f1a-452602de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e8a677-ef6c-43bf-8f1a-452602de0b81",
"value": "https://www.virustotal.com/file/dcea917093643bc536191ff70013cb27a0519c07952fbf626b4cc5f3feee2212/analysis/1490951539/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a678-e1e4-42c9-9e85-4fef02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:36.000Z",
"modified": "2017-04-08T08:59:36.000Z",
"description": "Additional Related Samples - Xchecked via VT: 9c6a23e6662659b3dee96234e51f711dd493aaba93ce132111c56164ad02cf5e",
"pattern": "[file:hashes.SHA1 = 'fd3991e274f2d8889b749c39f9f85e1f1b998790']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a679-ee78-47d8-8644-408f02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:37.000Z",
"modified": "2017-04-08T08:59:37.000Z",
"description": "Additional Related Samples - Xchecked via VT: 9c6a23e6662659b3dee96234e51f711dd493aaba93ce132111c56164ad02cf5e",
"pattern": "[file:hashes.MD5 = '75f2972cc953e26f8fc43eb0456fdc7a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e8a67b-38a4-49fe-99bc-49b402de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:39.000Z",
"modified": "2017-04-08T08:59:39.000Z",
"first_observed": "2017-04-08T08:59:39Z",
"last_observed": "2017-04-08T08:59:39Z",
"number_observed": 1,
"object_refs": [
"url--58e8a67b-38a4-49fe-99bc-49b402de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e8a67b-38a4-49fe-99bc-49b402de0b81",
"value": "https://www.virustotal.com/file/9c6a23e6662659b3dee96234e51f711dd493aaba93ce132111c56164ad02cf5e/analysis/1490411201/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a67c-b7b4-465e-bf98-4a6902de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:40.000Z",
"modified": "2017-04-08T08:59:40.000Z",
"description": "Additional Related Samples - Xchecked via VT: 8085dae410e54bc0e9f962edc92fa8245a8a65d27b0d06292739458ce59c6ba1",
"pattern": "[file:hashes.SHA1 = '596cf05e9a3a7c0b3f279bf6964b353067390c82']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a67d-4410-48d2-85ae-479102de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:41.000Z",
"modified": "2017-04-08T08:59:41.000Z",
"description": "Additional Related Samples - Xchecked via VT: 8085dae410e54bc0e9f962edc92fa8245a8a65d27b0d06292739458ce59c6ba1",
"pattern": "[file:hashes.MD5 = 'f0e1b26444f21647f25b821d2c46bec4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e8a67e-70e8-483c-a4a7-43d302de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:42.000Z",
"modified": "2017-04-08T08:59:42.000Z",
"first_observed": "2017-04-08T08:59:42Z",
"last_observed": "2017-04-08T08:59:42Z",
"number_observed": 1,
"object_refs": [
"url--58e8a67e-70e8-483c-a4a7-43d302de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e8a67e-70e8-483c-a4a7-43d302de0b81",
"value": "https://www.virustotal.com/file/8085dae410e54bc0e9f962edc92fa8245a8a65d27b0d06292739458ce59c6ba1/analysis/1490271298/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a67f-50a0-4ead-85b5-40b802de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:43.000Z",
"modified": "2017-04-08T08:59:43.000Z",
"description": "Additional Related Samples - Xchecked via VT: 77a32726af6205d27999b9a564dd7b020dc0a8f697a81a8f597b971140e28976",
"pattern": "[file:hashes.SHA1 = '9bd3283af048363d270fceae0bc4292dc50e5309']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a680-5310-4552-8cbb-4f6c02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:44.000Z",
"modified": "2017-04-08T08:59:44.000Z",
"description": "Additional Related Samples - Xchecked via VT: 77a32726af6205d27999b9a564dd7b020dc0a8f697a81a8f597b971140e28976",
"pattern": "[file:hashes.MD5 = '5426af0a8bce2fcc61fcf189e6119fe1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e8a681-dde8-4f18-8afc-4bee02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:45.000Z",
"modified": "2017-04-08T08:59:45.000Z",
"first_observed": "2017-04-08T08:59:45Z",
"last_observed": "2017-04-08T08:59:45Z",
"number_observed": 1,
"object_refs": [
"url--58e8a681-dde8-4f18-8afc-4bee02de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e8a681-dde8-4f18-8afc-4bee02de0b81",
"value": "https://www.virustotal.com/file/77a32726af6205d27999b9a564dd7b020dc0a8f697a81a8f597b971140e28976/analysis/1488792086/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a682-4a9c-4018-a50a-46b802de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:46.000Z",
"modified": "2017-04-08T08:59:46.000Z",
"description": "Additional Related Samples - Xchecked via VT: 6a34f4ce012e52f5f94c1a163111df8b1c5b96c8dc0836ba600c2da84059c6ad",
"pattern": "[file:hashes.SHA1 = '606caa1b754113bb064e015b2bffb3659e373ea8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a683-75b4-427a-8d12-4e4e02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:47.000Z",
"modified": "2017-04-08T08:59:47.000Z",
"description": "Additional Related Samples - Xchecked via VT: 6a34f4ce012e52f5f94c1a163111df8b1c5b96c8dc0836ba600c2da84059c6ad",
"pattern": "[file:hashes.MD5 = 'd511fa33bb3c9a238e4b4eae7bae6e84']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e8a684-4aa8-404c-9e45-46be02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:48.000Z",
"modified": "2017-04-08T08:59:48.000Z",
"first_observed": "2017-04-08T08:59:48Z",
"last_observed": "2017-04-08T08:59:48Z",
"number_observed": 1,
"object_refs": [
"url--58e8a684-4aa8-404c-9e45-46be02de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e8a684-4aa8-404c-9e45-46be02de0b81",
"value": "https://www.virustotal.com/file/6a34f4ce012e52f5f94c1a163111df8b1c5b96c8dc0836ba600c2da84059c6ad/analysis/1484198463/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a685-3564-435b-8a5d-483b02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:49.000Z",
"modified": "2017-04-08T08:59:49.000Z",
"description": "Additional Related Samples - Xchecked via VT: 557c63737bf6752eba32bd688eb046c174e53140950e0d91ea609e7f42c80062",
"pattern": "[file:hashes.SHA1 = '4b5efb3708096ab7aa1dd6d747cd6f53873991b6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a685-8c10-4689-9e64-4b3502de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:49.000Z",
"modified": "2017-04-08T08:59:49.000Z",
"description": "Additional Related Samples - Xchecked via VT: 557c63737bf6752eba32bd688eb046c174e53140950e0d91ea609e7f42c80062",
"pattern": "[file:hashes.MD5 = '7717f90967ad67016c8229c2271000ed']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e8a686-5770-4612-989f-44f902de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:50.000Z",
"modified": "2017-04-08T08:59:50.000Z",
"first_observed": "2017-04-08T08:59:50Z",
"last_observed": "2017-04-08T08:59:50Z",
"number_observed": 1,
"object_refs": [
"url--58e8a686-5770-4612-989f-44f902de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e8a686-5770-4612-989f-44f902de0b81",
"value": "https://www.virustotal.com/file/557c63737bf6752eba32bd688eb046c174e53140950e0d91ea609e7f42c80062/analysis/1490951394/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a687-5dcc-42da-a16a-43a102de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:51.000Z",
"modified": "2017-04-08T08:59:51.000Z",
"description": "Additional Related Samples - Xchecked via VT: 1efffd64f2215e2b574b9f8892bbb3ab6e0f98cf0684e479f1a67f0f521ec0fe",
"pattern": "[file:hashes.SHA1 = '44a2d2e9b5d79a047470c4e61c1c4926cac8b656']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a688-393c-4996-8eec-4c4202de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:52.000Z",
"modified": "2017-04-08T08:59:52.000Z",
"description": "Additional Related Samples - Xchecked via VT: 1efffd64f2215e2b574b9f8892bbb3ab6e0f98cf0684e479f1a67f0f521ec0fe",
"pattern": "[file:hashes.MD5 = '3a6b48de605ac9e58ffd83d87db650eb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e8a689-5ad4-4909-9e7e-461a02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:53.000Z",
"modified": "2017-04-08T08:59:53.000Z",
"first_observed": "2017-04-08T08:59:53Z",
"last_observed": "2017-04-08T08:59:53Z",
"number_observed": 1,
"object_refs": [
"url--58e8a689-5ad4-4909-9e7e-461a02de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e8a689-5ad4-4909-9e7e-461a02de0b81",
"value": "https://www.virustotal.com/file/1efffd64f2215e2b574b9f8892bbb3ab6e0f98cf0684e479f1a67f0f521ec0fe/analysis/1490007460/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a68a-582c-45bd-a0c5-404c02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:54.000Z",
"modified": "2017-04-08T08:59:54.000Z",
"description": "Additional Related Samples - Xchecked via VT: 0c5cdbf6f043780dc5fff4b7a977a1874457cc125b4d1da70808bfa720022477",
"pattern": "[file:hashes.SHA1 = '6993457347d2bcb3f606bf59eeb58a7bfe375577']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58e8a68b-5564-43eb-bd9d-4ef502de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:55.000Z",
"modified": "2017-04-08T08:59:55.000Z",
"description": "Additional Related Samples - Xchecked via VT: 0c5cdbf6f043780dc5fff4b7a977a1874457cc125b4d1da70808bfa720022477",
"pattern": "[file:hashes.MD5 = '1261323be950dcd97c9cf011f2407220']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2017-04-08T08:59:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58e8a68c-4040-4022-b5ee-4f4002de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-04-08T08:59:56.000Z",
"modified": "2017-04-08T08:59:56.000Z",
"first_observed": "2017-04-08T08:59:56Z",
"last_observed": "2017-04-08T08:59:56Z",
"number_observed": 1,
"object_refs": [
"url--58e8a68c-4040-4022-b5ee-4f4002de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58e8a68c-4040-4022-b5ee-4f4002de0b81",
"value": "https://www.virustotal.com/file/0c5cdbf6f043780dc5fff4b7a977a1874457cc125b4d1da70808bfa720022477/analysis/1485414087/"
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
2023-04-21 13:25:09 +00:00
]
}