2023-04-21 14:44:17 +00:00
{
"type" : "bundle" ,
"id" : "bundle--5a38ca48-6680-437d-9e0f-483c950d210f" ,
"objects" : [
{
"type" : "identity" ,
"spec_version" : "2.1" ,
"id" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-12-20T03:00:57.000Z" ,
"modified" : "2017-12-20T03:00:57.000Z" ,
"name" : "CIRCL" ,
"identity_class" : "organization"
} ,
{
"type" : "report" ,
"spec_version" : "2.1" ,
"id" : "report--5a38ca48-6680-437d-9e0f-483c950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-12-20T03:00:57.000Z" ,
"modified" : "2017-12-20T03:00:57.000Z" ,
"name" : "OSINT - Still stealing" ,
"published" : "2017-12-28T13:32:38Z" ,
"object_refs" : [
"observed-data--5a38cb63-68d8-4fd2-97c3-40f9950d210f" ,
"url--5a38cb63-68d8-4fd2-97c3-40f9950d210f" ,
"x-misp-attribute--5a38cc0e-52b4-4946-ba9c-486a950d210f" ,
"indicator--5a38cd0d-037c-4b00-9381-4e4d950d210f" ,
"indicator--5a38cfed-baac-45bb-81c8-4bd3950d210f" ,
"indicator--5a38d001-0a3c-4a8c-b855-4c46950d210f" ,
"indicator--5a38d018-4444-41b0-b9c1-40ea950d210f" ,
"indicator--5a38d02d-f844-4b81-8f7c-41e2950d210f" ,
"indicator--5a38d053-0424-4550-b8ed-453c950d210f" ,
"indicator--5a38d069-6740-4cdf-9c24-4f87950d210f" ,
"indicator--5a38d09a-ed18-4fac-83d1-46e9950d210f" ,
"indicator--5a38d0ad-7428-4f3f-ad5b-4c2a950d210f" ,
"indicator--5a38d0c5-3f94-40e2-b1f6-4349950d210f" ,
"indicator--5a38d0d8-5718-4156-bcd7-47d5950d210f" ,
"indicator--6fe67d92-616f-40d3-9109-b4f83e2a0741" ,
"x-misp-object--8f183339-e8ab-4853-be97-99f409fc08d2" ,
"indicator--e9e3b8bd-a618-4358-b8d3-1d5ce9c415db" ,
"x-misp-object--b5aa1a71-dd17-424e-bb32-0826f1ff7358" ,
"indicator--269f5f40-7ac3-45a1-b4a6-54fc9f1f2e4d" ,
"x-misp-object--da8a4ed3-8361-4adc-8860-8416174b521f" ,
"indicator--40d9fe4a-ccfe-41d8-8126-9db4703bb82b" ,
"x-misp-object--0822200d-0114-42d4-b6bf-1830450707cd" ,
"indicator--8a35b400-e6ca-4d87-8a83-af19c77757b4" ,
"x-misp-object--09d35a23-a69a-48df-b407-be295d123fbf" ,
2024-04-05 12:15:17 +00:00
"relationship--f42b726c-9089-4b62-92fa-3580e30b24e5" ,
"relationship--432ce11b-a0e9-48cc-a1ee-406b779752e7" ,
"relationship--14e48184-8be5-44f0-ab3d-5a26a24ebe37" ,
"relationship--6eb01291-9e41-4e38-9f49-68d26193a638" ,
"relationship--88ea06f7-bc3a-4308-9d2c-cf7cf7233c38"
2023-04-21 14:44:17 +00:00
] ,
"labels" : [
"Threat-Report" ,
"misp:tool=\"MISP-STIX-Converter\"" ,
"type:OSINT" ,
"osint:source-type=\"blog-post\"" ,
"ms-caro-malware:malware-platform=\"AndroidOS\"" ,
"Android Malware" ,
"ms-caro-malware-full:malware-platform=\"AndroidOS\""
] ,
"object_marking_refs" : [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
} ,
{
"type" : "observed-data" ,
"spec_version" : "2.1" ,
"id" : "observed-data--5a38cb63-68d8-4fd2-97c3-40f9950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-12-19T09:36:42.000Z" ,
"modified" : "2017-12-19T09:36:42.000Z" ,
"first_observed" : "2017-12-19T09:36:42Z" ,
"last_observed" : "2017-12-19T09:36:42Z" ,
"number_observed" : 1 ,
"object_refs" : [
"url--5a38cb63-68d8-4fd2-97c3-40f9950d210f"
] ,
"labels" : [
"misp:type=\"link\"" ,
"misp:category=\"External analysis\"" ,
"osint:source-type=\"blog-post\""
]
} ,
{
"type" : "url" ,
"spec_version" : "2.1" ,
"id" : "url--5a38cb63-68d8-4fd2-97c3-40f9950d210f" ,
"value" : "https://securelist.com/still-stealing/83343/"
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--5a38cc0e-52b4-4946-ba9c-486a950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-12-19T09:36:42.000Z" ,
"modified" : "2017-12-19T09:36:42.000Z" ,
"labels" : [
"misp:type=\"comment\"" ,
"misp:category=\"External analysis\"" ,
"osint:source-type=\"blog-post\""
] ,
"x_misp_category" : "External analysis" ,
"x_misp_type" : "comment" ,
"x_misp_value" : "Two years ago in October 2015 we published a blogpost about a popular malware that was being distributed from the Google Play Store. Over the next two years we detected several similar apps on Google Play, but in October and November 2017 we found 85 new malicious apps on Google Play that are stealing credentials for VK.com. All of them have been detected by Kaspersky Lab products as Trojan-PSW.AndroidOS.MyVk.o. We reported 72 of them to Google and they deleted these malicious apps from Google Play Store, 13 other apps were already deleted. Furthermore, we reported these apps with technical details to VK.com. One of these apps was masquerading as a game and was installed more than a million times according to Google Play Store."
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5a38cd0d-037c-4b00-9381-4e4d950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-12-19T09:36:42.000Z" ,
"modified" : "2017-12-19T09:36:42.000Z" ,
"description" : "CNC" ,
"pattern" : "[domain-name:value = 'guest-stat.com']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-12-19T09:36:42Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"domain\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5a38cfed-baac-45bb-81c8-4bd3950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-12-19T08:38:05.000Z" ,
"modified" : "2017-12-19T08:38:05.000Z" ,
"pattern" : "[file:hashes.MD5 = 'f5f8df1f35a942f9092bde9f277b7120' AND file:name = 'com.parmrp.rump' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-12-19T08:38:05Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5a38d001-0a3c-4a8c-b855-4c46950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-12-19T08:38:25.000Z" ,
"modified" : "2017-12-19T08:38:25.000Z" ,
"pattern" : "[file:hashes.MD5 = '6b55af8c4fb6968082ca2c88745043a1' AND file:name = 'com.weeclient.clientold' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-12-19T08:38:25Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5a38d018-4444-41b0-b9c1-40ea950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-12-19T08:38:48.000Z" ,
"modified" : "2017-12-19T08:38:48.000Z" ,
"pattern" : "[file:hashes.MD5 = 'c70dcf9f0441e3230f2f338467cd9cb7' AND file:name = 'com.anocat.stelth' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-12-19T08:38:48Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5a38d02d-f844-4b81-8f7c-41e2950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-12-19T08:39:09.000Z" ,
"modified" : "2017-12-19T08:39:09.000Z" ,
"pattern" : "[file:hashes.MD5 = '6d6b0b97facaa2e6d4e985fa5e3332a1' AND file:name = 'com.xclient.old' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-12-19T08:39:09Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5a38d053-0424-4550-b8ed-453c950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-12-19T08:39:47.000Z" ,
"modified" : "2017-12-19T08:39:47.000Z" ,
"pattern" : "[file:hashes.MD5 = '1a623b3784256105333962ddca50785f' AND file:name = 'com.yourmusicoff.yourmusickoff' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-12-19T08:39:47Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5a38d069-6740-4cdf-9c24-4f87950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-12-19T08:40:09.000Z" ,
"modified" : "2017-12-19T08:40:09.000Z" ,
"pattern" : "[file:hashes.MD5 = '1a7b22616c3b8223116b542d5afd5c05' AND file:name = 'com.sharp.playerru' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-12-19T08:40:09Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5a38d09a-ed18-4fac-83d1-46e9950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-12-19T08:40:58.000Z" ,
"modified" : "2017-12-19T08:40:58.000Z" ,
"pattern" : "[file:hashes.MD5 = '053e2cf49a5d818663d9010344aa3329' AND file:name = 'com.musicould.close' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-12-19T08:40:58Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5a38d0ad-7428-4f3f-ad5b-4c2a950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-12-19T08:41:17.000Z" ,
"modified" : "2017-12-19T08:41:17.000Z" ,
"pattern" : "[file:hashes.MD5 = '2b39b22ef2384f0aa529705af68b1192' AND file:name = 'com.prostie.dvijenija' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-12-19T08:41:17Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5a38d0c5-3f94-40e2-b1f6-4349950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-12-19T08:41:41.000Z" ,
"modified" : "2017-12-19T08:41:41.000Z" ,
"pattern" : "[file:hashes.MD5 = '6974770565c5f0ffdd52fc74f1bca732' AND file:name = 'com.appoffline.musicplayer' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-12-19T08:41:41Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5a38d0d8-5718-4156-bcd7-47d5950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-12-19T08:42:00.000Z" ,
"modified" : "2017-12-19T08:42:00.000Z" ,
"pattern" : "[file:hashes.MD5 = '6cbc63cbe753b2e4cb6b9a8505775389' AND file:name = 'com.planeplane.paperplane' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-12-19T08:42:00Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--6fe67d92-616f-40d3-9109-b4f83e2a0741" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-12-19T09:36:45.000Z" ,
"modified" : "2017-12-19T09:36:45.000Z" ,
"pattern" : "[file:hashes.MD5 = '2b39b22ef2384f0aa529705af68b1192' AND file:hashes.SHA1 = 'e6a359421d85dbe4a76d6f8ecbabd9342b32c3d7' AND file:hashes.SHA256 = '05d2ac540006db560136980bcf2a2e35e64b96fd5b05667e889d9d1bf9d40f3e']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-12-19T09:36:45Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--8f183339-e8ab-4853-be97-99f409fc08d2" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-12-19T09:36:42.000Z" ,
"modified" : "2017-12-19T09:36:42.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/05d2ac540006db560136980bcf2a2e35e64b96fd5b05667e889d9d1bf9d40f3e/analysis/1513412569/" ,
"category" : "External analysis" ,
"uuid" : "5a38ddaa-2dd4-473c-8e43-bfc302de0b81"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "17/62" ,
"category" : "Other" ,
"uuid" : "5a38ddaa-3f1c-4be6-90ef-bfc302de0b81"
} ,
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2017-12-16T08:22:49" ,
"category" : "Other" ,
"uuid" : "5a38ddaa-d4b4-4fe3-a251-bfc302de0b81"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--e9e3b8bd-a618-4358-b8d3-1d5ce9c415db" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-12-19T09:36:45.000Z" ,
"modified" : "2017-12-19T09:36:45.000Z" ,
"pattern" : "[file:hashes.MD5 = 'f5f8df1f35a942f9092bde9f277b7120' AND file:hashes.SHA1 = '57e780a86937f4da1f600c4f6aec143a84b15e73' AND file:hashes.SHA256 = '76fabb56d9d69031b7fefcdd365c4a4d866d3c417976121a63e8336d29b6128d']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-12-19T09:36:45Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--b5aa1a71-dd17-424e-bb32-0826f1ff7358" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-12-19T09:36:43.000Z" ,
"modified" : "2017-12-19T09:36:43.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/76fabb56d9d69031b7fefcdd365c4a4d866d3c417976121a63e8336d29b6128d/analysis/1513234491/" ,
"category" : "External analysis" ,
"uuid" : "5a38ddab-6c08-46ea-b034-bfc302de0b81"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "11/63" ,
"category" : "Other" ,
"uuid" : "5a38ddab-e6ec-48c8-95da-bfc302de0b81"
} ,
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2017-12-14T06:54:51" ,
"category" : "Other" ,
"uuid" : "5a38ddab-8b54-4e39-8197-bfc302de0b81"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--269f5f40-7ac3-45a1-b4a6-54fc9f1f2e4d" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-12-19T09:36:46.000Z" ,
"modified" : "2017-12-19T09:36:46.000Z" ,
"pattern" : "[file:hashes.MD5 = '6974770565c5f0ffdd52fc74f1bca732' AND file:hashes.SHA1 = '9647ded84a636970cdfc5b309f7b1885e7c0f15b' AND file:hashes.SHA256 = '3834596ab1de92836c539a475b7035df8e038de9eede848bdfc266ebffae9a49']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-12-19T09:36:46Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--da8a4ed3-8361-4adc-8860-8416174b521f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-12-19T09:36:43.000Z" ,
"modified" : "2017-12-19T09:36:43.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/3834596ab1de92836c539a475b7035df8e038de9eede848bdfc266ebffae9a49/analysis/1513243224/" ,
"category" : "External analysis" ,
"uuid" : "5a38ddab-c1a8-4d8b-91c8-bfc302de0b81"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "12/61" ,
"category" : "Other" ,
"uuid" : "5a38ddab-eb20-4c36-bd73-bfc302de0b81"
} ,
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2017-12-14T09:20:24" ,
"category" : "Other" ,
"uuid" : "5a38ddab-0fb0-408a-8be7-bfc302de0b81"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--40d9fe4a-ccfe-41d8-8126-9db4703bb82b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-12-19T09:36:46.000Z" ,
"modified" : "2017-12-19T09:36:46.000Z" ,
"pattern" : "[file:hashes.MD5 = '6cbc63cbe753b2e4cb6b9a8505775389' AND file:hashes.SHA1 = '107cd146af97cd0659eacaacb10cda054622a572' AND file:hashes.SHA256 = 'e82d7b592bc5b1c8f239dfa1c98af7669e80752f81440d78387ba1feba52cd9f']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-12-19T09:36:46Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--0822200d-0114-42d4-b6bf-1830450707cd" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-12-19T09:36:43.000Z" ,
"modified" : "2017-12-19T09:36:43.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/e82d7b592bc5b1c8f239dfa1c98af7669e80752f81440d78387ba1feba52cd9f/analysis/1513596988/" ,
"category" : "External analysis" ,
"uuid" : "5a38ddab-7ac0-4228-98ca-bfc302de0b81"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "5/62" ,
"category" : "Other" ,
"uuid" : "5a38ddab-5eb8-42db-9fb2-bfc302de0b81"
} ,
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2017-12-18T11:36:28" ,
"category" : "Other" ,
"uuid" : "5a38ddab-245c-44f0-984a-bfc302de0b81"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--8a35b400-e6ca-4d87-8a83-af19c77757b4" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-12-19T09:36:46.000Z" ,
"modified" : "2017-12-19T09:36:46.000Z" ,
"pattern" : "[file:hashes.MD5 = '1a7b22616c3b8223116b542d5afd5c05' AND file:hashes.SHA1 = '0dd50c4c97c3525be94cecb30cf4488760abbb25' AND file:hashes.SHA256 = 'd96840ea4eba1115b545324ac2df85078a9dced6d855fd94341a3aba97822d31']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2017-12-19T09:36:46Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--09d35a23-a69a-48df-b407-be295d123fbf" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2017-12-19T09:36:43.000Z" ,
"modified" : "2017-12-19T09:36:43.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/d96840ea4eba1115b545324ac2df85078a9dced6d855fd94341a3aba97822d31/analysis/1513240457/" ,
"category" : "External analysis" ,
"uuid" : "5a38ddab-e384-4904-95dd-bfc302de0b81"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "3/61" ,
"category" : "Other" ,
"uuid" : "5a38ddab-0598-45f5-8112-bfc302de0b81"
} ,
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2017-12-14T08:34:17" ,
"category" : "Other" ,
"uuid" : "5a38ddab-5e80-4ab5-9939-bfc302de0b81"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-04-05 12:15:17 +00:00
"id" : "relationship--f42b726c-9089-4b62-92fa-3580e30b24e5" ,
2023-04-21 14:44:17 +00:00
"created" : "2017-12-28T13:32:38.000Z" ,
"modified" : "2017-12-28T13:32:38.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--6fe67d92-616f-40d3-9109-b4f83e2a0741" ,
"target_ref" : "x-misp-object--8f183339-e8ab-4853-be97-99f409fc08d2"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-04-05 12:15:17 +00:00
"id" : "relationship--432ce11b-a0e9-48cc-a1ee-406b779752e7" ,
2023-04-21 14:44:17 +00:00
"created" : "2017-12-28T13:32:38.000Z" ,
"modified" : "2017-12-28T13:32:38.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--e9e3b8bd-a618-4358-b8d3-1d5ce9c415db" ,
"target_ref" : "x-misp-object--b5aa1a71-dd17-424e-bb32-0826f1ff7358"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-04-05 12:15:17 +00:00
"id" : "relationship--14e48184-8be5-44f0-ab3d-5a26a24ebe37" ,
2023-04-21 14:44:17 +00:00
"created" : "2017-12-28T13:32:38.000Z" ,
"modified" : "2017-12-28T13:32:38.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--269f5f40-7ac3-45a1-b4a6-54fc9f1f2e4d" ,
"target_ref" : "x-misp-object--da8a4ed3-8361-4adc-8860-8416174b521f"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-04-05 12:15:17 +00:00
"id" : "relationship--6eb01291-9e41-4e38-9f49-68d26193a638" ,
2023-04-21 14:44:17 +00:00
"created" : "2017-12-28T13:32:38.000Z" ,
"modified" : "2017-12-28T13:32:38.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--40d9fe4a-ccfe-41d8-8126-9db4703bb82b" ,
"target_ref" : "x-misp-object--0822200d-0114-42d4-b6bf-1830450707cd"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-04-05 12:15:17 +00:00
"id" : "relationship--88ea06f7-bc3a-4308-9d2c-cf7cf7233c38" ,
2023-04-21 14:44:17 +00:00
"created" : "2017-12-28T13:32:38.000Z" ,
"modified" : "2017-12-28T13:32:38.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--8a35b400-e6ca-4d87-8a83-af19c77757b4" ,
"target_ref" : "x-misp-object--09d35a23-a69a-48df-b407-be295d123fbf"
} ,
{
"type" : "marking-definition" ,
"spec_version" : "2.1" ,
"id" : "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ,
"created" : "2017-01-20T00:00:00.000Z" ,
"definition_type" : "tlp" ,
"name" : "TLP:WHITE" ,
"definition" : {
"tlp" : "white"
}
}
]
}