misp-circl-feed/feeds/circl/stix-2.1/5aeffb23-79e0-4d58-acf9-4b28950d210f.json

492 lines
128 KiB
JSON
Raw Normal View History

2023-04-21 14:44:17 +00:00
{
"type": "bundle",
"id": "bundle--5aeffb23-79e0-4d58-acf9-4b28950d210f",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-08T06:54:45.000Z",
"modified": "2018-05-08T06:54:45.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--5aeffb23-79e0-4d58-acf9-4b28950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-08T06:54:45.000Z",
"modified": "2018-05-08T06:54:45.000Z",
"name": "OSINT - GandCrab Version 3 Released With Autorun Feature and Desktop Background",
"published": "2018-05-08T06:55:46Z",
"object_refs": [
"observed-data--5aeffb57-5a94-478d-b076-48f9950d210f",
"url--5aeffb57-5a94-478d-b076-48f9950d210f",
"x-misp-attribute--5aeffb7a-362c-4b9e-94f9-4f07950d210f",
"observed-data--5aeffcbb-bd20-483f-bf46-4144950d210f",
"file--5aeffcbb-bd20-483f-bf46-4144950d210f",
"artifact--5aeffcbb-bd20-483f-bf46-4144950d210f",
"indicator--5af0006f-34a0-4125-b2be-4fb1950d210f",
"indicator--5af0009e-19a8-4735-af74-4d84950d210f",
"indicator--5af0009f-d418-498e-bcde-46cc950d210f",
"observed-data--5af0009f-44cc-4b48-9e3e-48d2950d210f",
"windows-registry-key--5af0009f-44cc-4b48-9e3e-48d2950d210f",
"indicator--5af000c5-b464-41aa-b3e0-40c0950d210f",
"indicator--5af000c5-a024-4abf-b493-4656950d210f",
"indicator--5af000e3-1050-49ac-961b-4672950d210f",
"indicator--5af000e3-0b68-46fa-972a-40c2950d210f",
"indicator--5af000e4-b490-40e4-8606-4826950d210f",
"indicator--5af000e4-1ed0-408c-838c-4a9f950d210f",
"indicator--5af000e5-7ecc-434b-ae09-4919950d210f",
"indicator--5af000e5-3744-425d-9479-49a2950d210f",
"indicator--50fcb2ed-e6a7-44c3-bb3e-9692652102ca",
"x-misp-object--ea3856a4-0979-4f6f-8dd2-a8e8c4db47ed",
2024-04-05 12:15:17 +00:00
"relationship--7aee53fb-b5e3-466e-93c5-123f34847447"
2023-04-21 14:44:17 +00:00
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"misp-galaxy:ransomware=\"GandCrab\"",
"malware_classification:malware-category=\"Ransomware\"",
"circl:incident-classification=\"malware\"",
"osint:source-type=\"blog-post\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5aeffb57-5a94-478d-b076-48f9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-08T06:54:33.000Z",
"modified": "2018-05-08T06:54:33.000Z",
"first_observed": "2018-05-08T06:54:33Z",
"last_observed": "2018-05-08T06:54:33Z",
"number_observed": 1,
"object_refs": [
"url--5aeffb57-5a94-478d-b076-48f9950d210f"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\"",
"osint:source-type=\"blog-post\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--5aeffb57-5a94-478d-b076-48f9950d210f",
"value": "https://www.bleepingcomputer.com/news/security/gandcrab-version-3-released-with-autorun-feature-and-desktop-background/"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--5aeffb7a-362c-4b9e-94f9-4f07950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-08T06:54:33.000Z",
"modified": "2018-05-08T06:54:33.000Z",
"labels": [
"misp:type=\"text\"",
"misp:category=\"External analysis\"",
"osint:source-type=\"blog-post\""
],
"x_misp_category": "External analysis",
"x_misp_type": "text",
"x_misp_value": "GandCrab version 3 was released earlier this week with a few noticeable changes. The most noticeable change is the addition of a desktop background.\r\n\r\nUnfortunately, at this time GandCrab 3 cannot be decrypted for free."
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5aeffcbb-bd20-483f-bf46-4144950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-08T06:54:34.000Z",
"modified": "2018-05-08T06:54:34.000Z",
"first_observed": "2018-05-08T06:54:34Z",
"last_observed": "2018-05-08T06:54:34Z",
"number_observed": 1,
"object_refs": [
"file--5aeffcbb-bd20-483f-bf46-4144950d210f",
"artifact--5aeffcbb-bd20-483f-bf46-4144950d210f"
],
"labels": [
"misp:type=\"attachment\"",
"misp:category=\"External analysis\""
]
},
{
"type": "file",
"spec_version": "2.1",
"id": "file--5aeffcbb-bd20-483f-bf46-4144950d210f",
"name": "gandcrabv3mail.png",
"content_ref": "artifact--5aeffcbb-bd20-483f-bf46-4144950d210f"
},
{
"type": "artifact",
"spec_version": "2.1",
"id": "artifact--5aeffcbb-bd20-483f-bf46-4144950d210f",
"payload_bin": "iVBORw0KGgoAAAANSUhEUgAAA6wAAAIdCAYAAAA52vAgAACAAElEQVR42uy9a7BuVXnnmy+nT3Wdr6eqP6Q/aJ9zUqeqO93nwzmp6u4PeqoTUxU1fbTVTqUN6TI2bdHRJlai2McgKZTSxFsQbJREEAWMBxOIFy7aCdrs7CBBYKNswS2owN7AZrO5iKAC86zfZP1enjX2mLf3sta71n5m1X/Nd73vvIw5xphzjt94nvGMn/kf/97fa9ZFP/uz/zCVSm2zXvSiF6dSqdSeUz5LU9tRd2r7/9zP/dye0M///D/dFWlc53Sue/p2Ol+4X1i/8pW/2rz19N9pzjzzXc2HPvTh5uMX/knz6Usvba644nPNl66+tvmZIYCMB0BnvP2MUXL7Lp1zznu26I/e/4EtIrGlzj333FQqNaDavdOnzLNUKpXPzMWVeXly1oly3/POP/8E/dcLPrbWKtPKmrb863/99W2bvXZNQ9qOdMMLMAoi79ctX6kfb/5Pv9288bfeOIOweRWPO2abdVNMJ+VG3UKWIbz50pe8pF2TZyW0VoEV2v2FX/jn7YGodNd/7YbmwO3fam6+9UDzdzd/Y1C33nb7CWL/Ow4ebPXtu77THLr7nuae7/2g+f699zf33X+4OXzkgebBh442Rx8+1hx/9NFWjz/x5ExP/uipLXrq6acHVe6TSk1RrH+7SY899vhMi2zTtX0qlUrtJdnm6FLm0bR8rOXp2P36ttmOcj/2yPEtOnpsUxtt0xN07IXtTF9sr9IO/clPftLqmWeeeUHPPrd+CuljIc1f+euvtgYl2u8s5XY7qo20sMANV/7lF1oLHHnfpnON0nf8+NHm8x/541aPPXxPWyee+eGxk1sb+QMHvu/3T29hlXsHdqSuvea1r2te9ku/3EIrkM93QOvFF198IrACqvSq8CMa6jUa6lnxREhKtnJxM+zbt7+58cabWhi+/VvPwywgW0IsD4RaA3sINPIlsl4v/lWrfNksotmLqk+1l1jQ4Yce2SK+o07X5DZdvx954KE9Le73VCqVWkS0HRYRneilFj3molrWtaX6y5u2ZxSGlbsO3d2KtmmU30fjC2Wk0cX26QxWN8FwXZcIr/5P+xxgwNBU267cZycW8humgCfI73VbaBd/4VMXtsD6wKGvNz86emvz9O03nNR69vFDzd233tACK1ZUO3a4h+BB2BFghUeBVqAWrvyZGqwClUiXAM3ZNfFbnzTV6yas+y/HjqZeIRZrLgnWUqtl1geEDwcfEOXLpHzosH1qPvlAjhqzzSpVe2F0/b6o7vj2XQuLThjXi4p7oUvfOHDHTH3b1VQef5np2i2qeYWsu/ZCvqdSq7wv6QjfSa3z82PetK4yn+bJyynp7zp29BCk/akANkS7tJS/aXRh37a9uvG+t51aGl6iwaX0GCyNLouup3ph+T+d9YI2bXLa7VwfC9t1Wbq325NMOCWPHeNIOugc2In01KQFGFi96n1ntJAGsB258tODeurKS2br3aaY/prIgzuv+/Pm3W8+pWVCyisu3DNCq+7BbPcz0Q2YiknBs6GgCmyW8FlT7fdyPOsQrEaL6xY34o0HwBhY7QPX1DiZx33rdQLoVQLxTsPuskC31JZzHDzYe/7tus5UKpWaWwcX61QbAh07A7s6iiY9fw/2a9HjrOKdsZdVqwMRYiPAdonthVXaETVYjVbXviFu2zXcqQa2eslp8RJYyQesqOwjDJbrdQLWoX29vnndfdmXY4xJ3zKAdTeAa1ea5wFWyxUWxT0YwZQ/E62ruO0Cj8LqGFDtUi0A01hg1brqQ1lrWgSrMcCa0DoMpqs87k5D77qB7LzW2bGW21mjZeJ5utK77p0CqVQq1fd8nQdio7dKzWtlUofgHM/dRfbPzovFOjpKeO2yvsbvtO46pI22h+7BcUhbCaxj4rAsMz5LPHcNVKOVtQasLBFYy/2XZRmesh4C1qFjzDv0rJaXXembF1h3C7TGdA1ZVqcAKwv3GmNa4VPWP2M0YAIsAZHA5CKgupuB1e3nXY851m4C2bHwORVUtwtiFwGq2noKbN1x191Lb0xESI2Nsdl3BbB2NZ760j0mf9bVOp5KpU4ujYa+DuvjvMMnxkLqPM/a7HzYoU6OCrx2gaugKqzqDej7cdnAGt2G5wHWErDiuuYWLLBe/eXrX7CwboJgn0uwnwmsE39b9v8CMlZfgRWOIG2kuwbiXi/bUN4wxwWfuGwucS7KW2t0l8VZ99YIrN8/cFVz9NILWnCbshYK4+cusQ3nvOiMM7aINLh/3za3XHLewm7AXeDKeccCK3nH71hYiR7cAiv/GJobwOxy8Z0KqjsFrH2D6Hda6wyuXVbX8vsx1tkhWN1N7sIRXHfCslprEHU1kuZpPC0DSFOpVGodhoksYnUtIXaqNXVKB2B27q1Xh0cXvA65jFtP4uwXtEMJJBjdgSM0LWJdXZblVegrYTMCK21ygVUQnBJFOx532Z9ZA9G0qeUIOgZIZ1d6uC62v+wzn21+9x3vWUgcg2OZL7XzAdQRWIE0BLQhwNDPi6gEWc5HuZVphtGA0vvPP6dND3wWfz/r7A+237FNDZKXkVZEHnztLz49CKyUF0wIjzJvawusBE8CGJ0vaBHLatf41Qis+CXXogY7kH0LsG6+BLrGrw5FCKxF/BujuO+ix1pngF43YF5HN+ESWKfCa9mgmeKu1GVdHYLTedx9a/mV9TKVSu2Gd8YYS+UyYgQMPWeX5ZWS2t72QLWeHKy7CpcdGjHOim3G0roqIPYBa/mbU+I4ZnKM9XUegI3W1hJYabfjmikIek3tTAqbsyEMTQm1jM+134wsG4GVtHelg98oL8AM/dV///oWa/mQdAuHY9ifOmCQp9o5n37mRGDVyiislutlCOCEv666+q+a2+441A5r2HfTgTbdMN4Fpz3vRQukXnv9/vZ3trvxlm+21wXDAbXLhNR4jRwXYP29f/fqNlJwF7Aa6As2nQErF0Yh8KWRf5fhCtxlYR0DrFOiA08JaT82TH1XuPwSPpflLtwFt8t0U14Xq+1YV+FVug2v49jMRV2G53E/mwKmq+icWVY977vP9rrG5vduG56w3Xk1lC/z1O1VdlxuVydo+T6K5xxzfWPzYOr+XTMCxM9Tra/zPm+HwHRMfSvzNTsktr+TvLOe1AJcFfWgjAxcwmppXY0w2qcueO0C2S4g7oPUOBazC1jZpp2qL7SJu6bgE2T9vOi6/M7PpJM8x9oJR/A919CVJn4DPAE1XHvnmQYHQGVfjkG+kIau6QqfePqZtj4AqxFYgUEEwMV1+VkBeUOf4/+cCx6D6aijLjxX8G6F8QBTANUpicibz1zx+ZbZANq+43d9X6rr+sgD1mOAlYU0bwFWIBGX4AisYyIDd01j0xclWGClkjlYGl/5GrDGqGu6WAiOfRZWfr/9rvtO0L4DR7boy/u/M1psP0/DvQtA4/d9L7chsO0715SG0rIgZKplrg9Ix263E0GYxkAq56U+ku5VB8kYAtVanlCmPGwfeezJdl5Z09pXH7zHfAG4X61zaMx62fPptWk79nxDgWfGMjwjluGp0ff7PGtkg2joOmMDimfostJQW5fifM6RTDpWdd6hNXlUS0dMp/Mvl+nkOxt4bDOmXG08lY1EyqGsr1PX1m/fh6vKMxul5J3XFN/BPgPi9cXf+7Yp8z5uw7VZBpy7Fl3VBjb7+syyrmnx8LcxHYyLeKnwLG3vsc25uYeAnHSZxlpd3K0a00Exsz5u5JX1yjpSBvKxnnhc71Gfd2M6W9jW+7pvnz54tR3q8Uqg4vhxWpgh62oNPMcCa9/nvjGvfeBajsGsAWu8t7sMPMuaU72dl774rjyuzwzKKgIr6e86JmUBXwisghLXwDVicXWqIj9rhWV/3VQjsJovtXMCrNQtABKrp8B623v/31YAnOsaqM4rjsn5nMMUCyrpZqEuk34srn5375GHW1iF4d77ujfN0rTM9MT1VGCFGQeBdaw1dSjYkrCKIH7GsJYW1i5gLd2BvTn6LKHornvubwHz859/slcfv+B4p878g7u
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5af0006f-34a0-4125-b2be-4fb1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-08T06:54:34.000Z",
"modified": "2018-05-08T06:54:34.000Z",
"description": "Ransomnote",
"pattern": "[file:name = 'CRAB-DECRYPT.txt']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-08T06:54:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"filename\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5af0009e-19a8-4735-af74-4d84950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-07T07:30:38.000Z",
"modified": "2018-05-07T07:30:38.000Z",
"pattern": "[file:hashes.SHA256 = '0b193494ffbbc5396886715253582aea075f97f5c5e79b58de9a4c0c62ed9b02']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-07T07:30:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5af0009f-d418-498e-bcde-46cc950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-08T06:54:35.000Z",
"modified": "2018-05-08T06:54:35.000Z",
"pattern": "[file:name = '\\\\%AppData\\\\%\\\\Microsoft\\\\[random].exe']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-08T06:54:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"filename\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5af0009f-44cc-4b48-9e3e-48d2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-08T06:54:35.000Z",
"modified": "2018-05-08T06:54:35.000Z",
"first_observed": "2018-05-08T06:54:35Z",
"last_observed": "2018-05-08T06:54:35Z",
"number_observed": 1,
"object_refs": [
"windows-registry-key--5af0009f-44cc-4b48-9e3e-48d2950d210f"
],
"labels": [
"misp:type=\"regkey\"",
"misp:category=\"Persistence mechanism\""
]
},
{
"type": "windows-registry-key",
"spec_version": "2.1",
"id": "windows-registry-key--5af0009f-44cc-4b48-9e3e-48d2950d210f",
"key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce \"[random]\" = \"%AppData%\\Microsoft\\[random].exe\""
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5af000c5-b464-41aa-b3e0-40c0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-08T06:54:36.000Z",
"modified": "2018-05-08T06:54:36.000Z",
"pattern": "[domain-name:value = 'ns1.wowservers.ru']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-08T06:54:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5af000c5-a024-4abf-b493-4656950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-08T06:54:36.000Z",
"modified": "2018-05-08T06:54:36.000Z",
"pattern": "[domain-name:value = 'carder.bit']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-08T06:54:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5af000e3-1050-49ac-961b-4672950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-08T06:54:36.000Z",
"modified": "2018-05-08T06:54:36.000Z",
"pattern": "[url:value = 'https://www.torproject.org/']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-08T06:54:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5af000e3-0b68-46fa-972a-40c2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-08T06:54:37.000Z",
"modified": "2018-05-08T06:54:37.000Z",
"pattern": "[url:value = 'http://gandcrab2pie73et.onion/[id]']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-08T06:54:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5af000e4-b490-40e4-8606-4826950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-08T06:54:37.000Z",
"modified": "2018-05-08T06:54:37.000Z",
"pattern": "[url:value = 'https://psi-im.org/download/']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-08T06:54:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5af000e4-1ed0-408c-838c-4a9f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-08T06:54:38.000Z",
"modified": "2018-05-08T06:54:38.000Z",
"pattern": "[url:value = 'http://sj.ms/register.php']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-08T06:54:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5af000e5-7ecc-434b-ae09-4919950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-08T06:54:38.000Z",
"modified": "2018-05-08T06:54:38.000Z",
"pattern": "[email-message:from_ref.value = 'ransomware@sj.ms']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-08T06:54:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"email-src\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5af000e5-3744-425d-9479-49a2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-08T06:54:38.000Z",
"modified": "2018-05-08T06:54:38.000Z",
"pattern": "[url:value = 'http://www.sfu.ca/jabber/Psi_Jabber_PC.pdf']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-08T06:54:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--50fcb2ed-e6a7-44c3-bb3e-9692652102ca",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-08T06:54:42.000Z",
"modified": "2018-05-08T06:54:42.000Z",
"pattern": "[file:hashes.MD5 = 'f7c072a322cb0b4ce491307ddad466da' AND file:hashes.SHA1 = '2cac2760211ee91015ac22470ca59be7bf3ad685' AND file:hashes.SHA256 = '0b193494ffbbc5396886715253582aea075f97f5c5e79b58de9a4c0c62ed9b02']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-08T06:54:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--ea3856a4-0979-4f6f-8dd2-a8e8c4db47ed",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-08T06:54:40.000Z",
"modified": "2018-05-08T06:54:40.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-05-07T14:08:34",
"category": "Other",
"uuid": "5af149b0-da14-4404-b41d-44e402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "55/65",
"category": "Other",
"uuid": "5af149b1-cde8-4570-ab33-409302de0b81"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/0b193494ffbbc5396886715253582aea075f97f5c5e79b58de9a4c0c62ed9b02/analysis/1525702114/",
"category": "External analysis",
"uuid": "5af149b1-adf0-433f-ad5d-40ae02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "relationship",
"spec_version": "2.1",
2024-04-05 12:15:17 +00:00
"id": "relationship--7aee53fb-b5e3-466e-93c5-123f34847447",
2023-04-21 14:44:17 +00:00
"created": "2018-05-08T06:54:41.000Z",
"modified": "2018-05-08T06:54:41.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--50fcb2ed-e6a7-44c3-bb3e-9692652102ca",
"target_ref": "x-misp-object--ea3856a4-0979-4f6f-8dd2-a8e8c4db47ed"
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}