misp-circl-feed/feeds/circl/stix-2.1/5b58330e-b924-4828-b3a5-4986950d210f.json

1574 lines
68 KiB
JSON
Raw Normal View History

2023-04-21 14:44:17 +00:00
{
"type": "bundle",
"id": "bundle--5b58330e-b924-4828-b3a5-4986950d210f",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-26T07:17:17.000Z",
"modified": "2018-07-26T07:17:17.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "grouping",
"spec_version": "2.1",
"id": "grouping--5b58330e-b924-4828-b3a5-4986950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-26T07:17:17.000Z",
"modified": "2018-07-26T07:17:17.000Z",
"name": "OSINT - Kronos Banking Trojan Used to Deliver New Point-of-Sale Malware",
"context": "suspicious-activity",
"object_refs": [
"observed-data--5b58331e-7b14-4ec5-bf29-42e7950d210f",
"url--5b58331e-7b14-4ec5-bf29-42e7950d210f",
"indicator--5b583b7d-41d0-4051-8331-4746950d210f",
"indicator--5b583b7e-9420-4436-9201-4f93950d210f",
"indicator--5b583b7e-ac24-421f-83f7-48d7950d210f",
"indicator--5b583b7e-3b34-4162-970f-4b59950d210f",
"indicator--5b583b7f-80e8-4230-a77e-4453950d210f",
"indicator--5b583b7f-aba8-44df-bee9-4880950d210f",
"indicator--5b583b80-8898-45cc-a722-4932950d210f",
"indicator--5b583b80-50c4-483b-a57b-4b34950d210f",
"indicator--5b583b81-666c-47cc-82d7-418c950d210f",
"indicator--5b583b81-0354-4c37-9f23-4699950d210f",
"indicator--5b583b82-b2a0-4c3e-a7f6-4f40950d210f",
"indicator--5b583b82-7384-4bc0-ad26-4fa1950d210f",
"indicator--5b583b82-8e54-4390-b12a-42c1950d210f",
"indicator--5b583b83-a568-4200-8c7a-48c2950d210f",
"indicator--5b583b83-8390-470a-ae42-4e22950d210f",
"indicator--5b5842d8-8e0c-45c9-ae13-451b950d210f",
"x-misp-attribute--5b587469-3e60-43ba-91fb-9146950d210f",
"indicator--5b583628-807c-4168-843b-43eb950d210f",
"indicator--5b58365c-aa24-4e3d-a908-49e6950d210f",
"indicator--5b583698-e9f8-428f-8754-4eed950d210f",
"indicator--5b583727-3fe0-4c85-81b7-41a1950d210f",
"indicator--5b58374c-d1a8-4736-8cea-42e9950d210f",
"observed-data--5b58375c-ae60-4530-8186-425b950d210f",
"file--5b58375c-ae60-4530-8186-425b950d210f",
"indicator--5b58389b-2f00-49cc-b0ac-4454950d210f",
"indicator--5b5838b0-acf8-4d3e-8b64-4fa7950d210f",
"indicator--5b5838c7-ae6c-4367-903a-4975950d210f",
"indicator--5b5838da-60ac-4477-be0d-41d4950d210f",
"indicator--5b5838e9-b540-4e30-ad63-44aa950d210f",
"indicator--a9d88727-e3a0-4095-b1d0-2b156670a502",
"x-misp-object--edb2ae54-a660-4d51-ab66-8f27d9223543",
"indicator--98a247a0-d160-4eee-be67-362795be9206",
"x-misp-object--0d28ddad-c7aa-4a6b-a448-c253efd98a2f",
"indicator--b0fd87a7-f7be-4f96-8ebc-90044b6c09ab",
"x-misp-object--e548da40-21e0-44e7-8878-30051f1ffa04",
"indicator--ef42d127-90f8-425a-8866-83310e33e640",
"x-misp-object--6709cf8f-3627-407e-8485-e6218167d3c0",
"indicator--f734d0d6-468b-4c5d-8883-d137f6140100",
"x-misp-object--71d925d6-48ee-413d-bb73-c729eedd03f1",
"indicator--31d38205-0b87-4063-a326-2e4f1a2459db",
"x-misp-object--4ed5377e-7638-45ba-9377-a1aa31e4a4ae",
"indicator--b6d5fe7e-b69f-4e54-942e-360486c7bfcb",
"x-misp-object--776e2aba-176a-48be-895a-c6d665ffcd02",
"indicator--d7634bbe-3e21-4bcf-b1ae-8d7625dfeea4",
"x-misp-object--3acaf083-3b2a-4b5f-9451-7c1ea9b39768",
"indicator--16984ff8-41a2-42d9-a859-87df65432e94",
"x-misp-object--8df7db4c-c0a1-495d-a400-6e134bf827a6",
"indicator--18574ddd-6a89-41b7-924b-d9a1388d4fc0",
"x-misp-object--77f014cd-c354-4167-86fa-78e315ba907b",
"indicator--0d95e126-39c8-4048-be62-5470568b0f0f",
"x-misp-object--11e88643-99a3-4053-b9bf-73f53056ebae",
2023-05-19 09:05:37 +00:00
"relationship--3c48fa7c-7270-45d9-8ea9-e9b0a7bfba16",
"relationship--02ac47d7-4fe4-4a28-a8fb-e2bee6149b9f",
"relationship--946c3a1c-a607-48e7-aa22-3227af80b07f",
"relationship--1847ebb5-4877-4097-9b0c-1302cd564d81",
"relationship--06d3037e-3679-434e-b76f-4411b2f5a33c",
"relationship--ecbef569-a18e-4e46-8f3f-abd2b84c3882",
"relationship--41128f4e-8cbe-46a8-b945-469f201dadaa",
"relationship--e86057cd-677d-4995-9056-bdf2976fbda1",
"relationship--c0782fe5-f5fa-4538-991c-d52eb9e6c0b7",
"relationship--07986b5c-a7a1-47b8-a42d-cc0faeee7b97",
"relationship--9e00af72-de8d-43f8-af39-4c41908e7013"
2023-04-21 14:44:17 +00:00
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"malware_classification:malware-category=\"Trojan\"",
"ms-caro-malware-full:malware-family=\"Banker\"",
"misp-galaxy:banker=\"Kronos\"",
"osint:source-type=\"blog-post\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5b58331e-7b14-4ec5-bf29-42e7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-26T07:17:06.000Z",
"modified": "2018-07-26T07:17:06.000Z",
"first_observed": "2018-07-26T07:17:06Z",
"last_observed": "2018-07-26T07:17:06Z",
"number_observed": 1,
"object_refs": [
"url--5b58331e-7b14-4ec5-bf29-42e7950d210f"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\"",
"osint:source-type=\"blog-post\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--5b58331e-7b14-4ec5-bf29-42e7950d210f",
"value": "https://www.proofpoint.com/us/threat-insight/post/kronos-banking-trojan-used-to-deliver-new-point-of-sale-malware"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b583b7d-41d0-4051-8331-4746950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T10:13:57.000Z",
"modified": "2018-07-25T10:13:57.000Z",
"description": "Phishing link on Nov 8",
"pattern": "[url:value = 'http://invoice.docs-sharepoint.com/profile/profile.php?id=[base64 e-mail address]']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T10:13:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b583b7e-9420-4436-9201-4f93950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T08:57:34.000Z",
"modified": "2018-07-25T08:57:34.000Z",
"description": "Redirect from phishing link on Nov 8",
"pattern": "[url:value = 'http://invoice.docs-sharepoint.com/profile/download.php']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T08:57:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b583b7e-ac24-421f-83f7-48d7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T08:57:34.000Z",
"modified": "2018-07-25T08:57:34.000Z",
"description": "ZeuS C&C on Nov 8",
"pattern": "[url:value = 'https://feed.networksupdates.com/feed/webfeed.xml']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T08:57:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b583b7e-3b34-4162-970f-4b59950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T08:57:34.000Z",
"modified": "2018-07-25T08:57:34.000Z",
"description": "EmployeeID-847267.doc downloading payload (Kronos) on Nov 10",
"pattern": "[url:value = 'http://info.docs-sharepoint.com/officeup.exe']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T08:57:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b583b7f-80e8-4230-a77e-4453950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T08:57:35.000Z",
"modified": "2018-07-25T08:57:35.000Z",
"pattern": "[file:name = 'EmployeeID-847267.doc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T08:57:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"filename\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b583b7f-aba8-44df-bee9-4880950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T08:57:35.000Z",
"modified": "2018-07-25T08:57:35.000Z",
"description": "Kronos C&C on Nov 10",
"pattern": "[url:value = 'http://www.networkupdate.club/kbps/connect.php']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T08:57:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b583b80-8898-45cc-a722-4932950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T08:57:36.000Z",
"modified": "2018-07-25T08:57:36.000Z",
"description": "Payload DL by Kronos on Nov 10",
"pattern": "[url:value = 'http://networkupdate.online/kbps/upload/c1c06f7d.exe']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T08:57:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b583b80-50c4-483b-a57b-4b34950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T08:57:36.000Z",
"modified": "2018-07-25T08:57:36.000Z",
"description": "Payload DL by Kronos on Nov 10",
"pattern": "[url:value = 'http://networkupdate.online/kbps/upload/1f80ff71.exe']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T08:57:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b583b81-666c-47cc-82d7-418c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T08:57:37.000Z",
"modified": "2018-07-25T08:57:37.000Z",
"description": "Payload DL by Kronos on Nov 10",
"pattern": "[url:value = 'http://networkupdate.online/kbps/upload/a8b05325.exe']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T08:57:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b583b81-0354-4c37-9f23-4699950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T10:13:53.000Z",
"modified": "2018-07-25T10:13:53.000Z",
"description": "Phishing link on Nov 10",
"pattern": "[url:value = 'http://intranet.excelsharepoint.com/profile/Employee.php?id=[base64 e-mail address]']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T10:13:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b583b82-b2a0-4c3e-a7f6-4f40950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T08:57:38.000Z",
"modified": "2018-07-25T08:57:38.000Z",
"description": "SmokeLoader C&C",
"pattern": "[url:value = 'http://webfeed.updatesnetwork.com/feedweb/feed.php']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T08:57:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b583b82-7384-4bc0-ad26-4fa1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T08:57:38.000Z",
"modified": "2018-07-25T08:57:38.000Z",
"description": "ScanPOS C&C",
"pattern": "[url:value = 'http://invoicesharepoint.com/gateway.php']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T08:57:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b583b82-8e54-4390-b12a-42c1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T10:13:34.000Z",
"modified": "2018-07-25T10:13:34.000Z",
"description": "Phishing link on Nov 14",
"pattern": "[url:value = 'http://intranet.excel-sharepoint.com/doc/employee.php?id=[base64 e-mail address]']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T10:13:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b583b83-a568-4200-8c7a-48c2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T08:57:39.000Z",
"modified": "2018-07-25T08:57:39.000Z",
"description": "EmployeeID-6283.doc downloading payload (Kronos) on Nov 14",
"pattern": "[url:value = 'http://profile.excel-sharepoint.com/doc/office.exe']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T08:57:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b583b83-8390-470a-ae42-4e22950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T08:57:39.000Z",
"modified": "2018-07-25T08:57:39.000Z",
"pattern": "[file:name = 'EmployeeID-6283.doc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T08:57:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"filename\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b5842d8-8e0c-45c9-ae13-451b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T09:28:56.000Z",
"modified": "2018-07-25T09:28:56.000Z",
"description": "RIG-v domain on Nov 8",
"pattern": "[domain-name:value = 'add.souloventure.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T09:28:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--5b587469-3e60-43ba-91fb-9146950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-26T07:17:14.000Z",
"modified": "2018-07-26T07:17:14.000Z",
"labels": [
"misp:type=\"text\"",
"misp:category=\"External analysis\"",
"osint:source-type=\"blog-post\""
],
"x_misp_category": "External analysis",
"x_misp_type": "text",
"x_misp_value": "Banking Trojans continue to evolve and threat actors are using them in new ways, even as the massive Dridex campaigns of 2015 have given way to ransomware and other payloads. Most recently, we observed several relatively large email campaigns distributing the Kronos banking Trojan. In these campaigns, though, Kronos acted as a loader with a new Point-of-Sale (POS) malware dubbed ScanPOS as the secondary payload."
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b583628-807c-4168-843b-43eb950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T08:34:48.000Z",
"modified": "2018-07-25T08:34:48.000Z",
"description": "containing SmokeLoader from /download.php on Nov 8",
"pattern": "[file:hashes.SHA256 = '4b5f4dbd93100bb7b87920f2f3066782a8449eb9e236efc02afe570c1ce70cf5' AND file:name = 'EmployeeID-47267.zip' AND file:x_misp_state = 'Malicious']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T08:34:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b58365c-aa24-4e3d-a908-49e6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T08:35:40.000Z",
"modified": "2018-07-25T08:35:40.000Z",
"description": "containing ZeuS from /download.php on Nov 8",
"pattern": "[file:hashes.SHA256 = '711431204071b1e6f5b5644e0f0b23464c6ef5c254d7a40c4e6fe7c8782cd55c' AND file:name = 'EmployeeID-47267.zip' AND file:x_misp_state = 'Malicious']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T08:35:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b583698-e9f8-428f-8754-4eed950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T08:36:40.000Z",
"modified": "2018-07-25T08:36:40.000Z",
"description": "SmokeLoader",
"pattern": "[file:hashes.SHA256 = '90063c40cb94277f39ca1b3818b36b4fa41b3a3091d42dfc21586ad1c461daa0' AND file:name = 'EmployeeID-47267.pif' AND file:x_misp_state = 'Malicious']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T08:36:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b583727-3fe0-4c85-81b7-41a1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T08:39:03.000Z",
"modified": "2018-07-25T08:39:03.000Z",
"description": "ZeuS",
"pattern": "[file:hashes.SHA256 = '4ba3913d945a16c099f5796fdeef2fda5c6c2e60cb53d46a1bfae82808075d74' AND file:name = 'EmployeeID-47267.pif' AND file:x_misp_state = 'Malicious']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T08:39:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b58374c-d1a8-4736-8cea-42e9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T08:39:40.000Z",
"modified": "2018-07-25T08:39:40.000Z",
"description": "downloaded from phishing links on Nov 10",
"pattern": "[file:hashes.SHA256 = 'a78b93a11ce649be3ca91812769f95a40de9d78e97a627366917c4fcd747f156' AND file:name = 'EmployeeID-847267.doc' AND file:x_misp_state = 'Malicious']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T08:39:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5b58375c-ae60-4530-8186-425b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T21:02:40.000Z",
"modified": "2018-07-25T21:02:40.000Z",
"first_observed": "2018-07-25T21:02:40Z",
"last_observed": "2018-07-25T21:02:40Z",
"number_observed": 1,
"object_refs": [
"file--5b58375c-ae60-4530-8186-425b950d210f"
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"False\""
]
},
{
"type": "file",
"spec_version": "2.1",
"id": "file--5b58375c-ae60-4530-8186-425b950d210f",
"hashes": {
"SHA-256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855"
},
"x_misp_state": "Malicious"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b58389b-2f00-49cc-b0ac-4454950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T08:45:15.000Z",
"modified": "2018-07-25T08:45:15.000Z",
"description": "SmokeLoader",
"pattern": "[file:hashes.SHA256 = 'd0caf097ea0350dc92277aed73b0f44986d7d85b06d1d17b424dc172ce35a984' AND file:name = 'c1c06f7d.exe' AND file:x_misp_state = 'Malicious']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T08:45:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b5838b0-acf8-4d3e-8b64-4fa7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T08:45:36.000Z",
"modified": "2018-07-25T08:45:36.000Z",
"description": "SmokeLoader",
"pattern": "[file:hashes.SHA256 = 'd9d1f02c8c4beee49f81093ea8162ce6adf405640ccacd5f03ce6c45e700ee98' AND file:name = '1f80ff71.exe' AND file:x_misp_state = 'Malicious']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T08:45:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b5838c7-ae6c-4367-903a-4975950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T08:45:59.000Z",
"modified": "2018-07-25T08:45:59.000Z",
"description": "ScanPOS",
"pattern": "[file:hashes.SHA256 = '093c81f0b234c2aa0363129fdaaaf57551f161915da3d23f43a792b5f3024c1e' AND file:name = 'a8b05325.exe' AND file:x_misp_state = 'Malicious']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T08:45:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b5838da-60ac-4477-be0d-41d4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T08:46:18.000Z",
"modified": "2018-07-25T08:46:18.000Z",
"description": "downloaded from phishing links on Nov 14",
"pattern": "[file:hashes.SHA256 = 'fd5412a7c71958ecdffa7064bf03c5f1931e561a1e71bc939551d5afb8bf7462' AND file:x_misp_state = 'Malicious']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T08:46:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b5838e9-b540-4e30-ad63-44aa950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T08:46:33.000Z",
"modified": "2018-07-25T08:46:33.000Z",
"description": "Kronos on Nov 14 (same C&C as previous)",
"pattern": "[file:hashes.SHA256 = '269f88cfa9e9e26f3761aedee5d0836b5b82f346128fe03da28a331f80a5fba3' AND file:x_misp_state = 'Malicious']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T08:46:33Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a9d88727-e3a0-4095-b1d0-2b156670a502",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T21:02:24.000Z",
"modified": "2018-07-25T21:02:24.000Z",
"pattern": "[file:hashes.MD5 = 'f99d1571ce9be023cc897522f82ec6cc' AND file:hashes.SHA1 = '9b931700d85a5fb986575f89c7c29d03dc5f4c1e' AND file:hashes.SHA256 = 'd0caf097ea0350dc92277aed73b0f44986d7d85b06d1d17b424dc172ce35a984']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T21:02:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--edb2ae54-a660-4d51-ab66-8f27d9223543",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T21:02:25.000Z",
"modified": "2018-07-25T21:02:25.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-07-23 10:53:44",
"category": "Other",
"uuid": "87767aea-51ec-4953-993c-f4a3db01bf9a"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/d0caf097ea0350dc92277aed73b0f44986d7d85b06d1d17b424dc172ce35a984/analysis/1532343224/",
"category": "External analysis",
"uuid": "b5192082-ba75-490e-abe7-4244a424182a"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "51/68",
"category": "Other",
"uuid": "7fc96d39-bd29-47e8-be21-3bab9cd4738e"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--98a247a0-d160-4eee-be67-362795be9206",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T21:02:31.000Z",
"modified": "2018-07-25T21:02:31.000Z",
"pattern": "[file:hashes.MD5 = '73871970ccf1b551a29f255605d05f61' AND file:hashes.SHA1 = 'f74b2c624c6cffccec2680679a26fd863040828f' AND file:hashes.SHA256 = 'd9d1f02c8c4beee49f81093ea8162ce6adf405640ccacd5f03ce6c45e700ee98']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T21:02:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--0d28ddad-c7aa-4a6b-a448-c253efd98a2f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T21:02:32.000Z",
"modified": "2018-07-25T21:02:32.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-07-23 10:55:04",
"category": "Other",
"uuid": "5e3f9c64-39c9-4b35-b4e4-a8435f37c780"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/d9d1f02c8c4beee49f81093ea8162ce6adf405640ccacd5f03ce6c45e700ee98/analysis/1532343304/",
"category": "External analysis",
"uuid": "a96cf4aa-68b4-4c69-b511-928a17309792"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "53/68",
"category": "Other",
"uuid": "ddfade3b-fda0-4c64-b533-d1c78daf7927"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b0fd87a7-f7be-4f96-8ebc-90044b6c09ab",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T21:02:38.000Z",
"modified": "2018-07-25T21:02:38.000Z",
"pattern": "[file:hashes.MD5 = '4a03b999b87cfe3c44e617ac911a2018' AND file:hashes.SHA1 = 'b1a62023dc97668ce5ad0ed78788c79f797753c3' AND file:hashes.SHA256 = '4ba3913d945a16c099f5796fdeef2fda5c6c2e60cb53d46a1bfae82808075d74']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T21:02:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e548da40-21e0-44e7-8878-30051f1ffa04",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T21:02:38.000Z",
"modified": "2018-07-25T21:02:38.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-09-27 17:35:43",
"category": "Other",
"uuid": "0d79d2bd-bd94-4ac7-983d-9d804def7917"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/4ba3913d945a16c099f5796fdeef2fda5c6c2e60cb53d46a1bfae82808075d74/analysis/1506533743/",
"category": "External analysis",
"uuid": "e76cf28d-af73-426f-bdfe-0d795cc4ac0b"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "43/65",
"category": "Other",
"uuid": "0e1d278b-6aa8-49d3-afe9-d32dd68d13cf"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ef42d127-90f8-425a-8866-83310e33e640",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T21:02:44.000Z",
"modified": "2018-07-25T21:02:44.000Z",
"pattern": "[file:hashes.MD5 = '5cac0a88767a301d7df64cfc84ccc951' AND file:hashes.SHA1 = '1e207f9cfadd92bf56a827cb6b7765abe0fa3bac' AND file:hashes.SHA256 = '4b5f4dbd93100bb7b87920f2f3066782a8449eb9e236efc02afe570c1ce70cf5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T21:02:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--6709cf8f-3627-407e-8485-e6218167d3c0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T21:02:46.000Z",
"modified": "2018-07-25T21:02:46.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2016-11-17 19:05:53",
"category": "Other",
"uuid": "58be0aad-494f-48dc-a412-02bd982d577a"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/4b5f4dbd93100bb7b87920f2f3066782a8449eb9e236efc02afe570c1ce70cf5/analysis/1479409553/",
"category": "External analysis",
"uuid": "8f5efb1a-9343-4079-a3fe-3d8d9994f4eb"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/57",
"category": "Other",
"uuid": "f93324bc-edc7-4330-9ec3-8c50d17168ab"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f734d0d6-468b-4c5d-8883-d137f6140100",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T21:02:51.000Z",
"modified": "2018-07-25T21:02:51.000Z",
"pattern": "[file:hashes.MD5 = 'dfef3c6bf91ddbc2784bda187670983b' AND file:hashes.SHA1 = 'd97139b60ec56ddf87d5a1798ca840fa872a580f' AND file:hashes.SHA256 = 'fd5412a7c71958ecdffa7064bf03c5f1931e561a1e71bc939551d5afb8bf7462']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T21:02:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--71d925d6-48ee-413d-bb73-c729eedd03f1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T21:02:52.000Z",
"modified": "2018-07-25T21:02:52.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-07-18 21:20:03",
"category": "Other",
"uuid": "31088d4b-45b8-4012-8414-4d6c62cf9959"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/fd5412a7c71958ecdffa7064bf03c5f1931e561a1e71bc939551d5afb8bf7462/analysis/1500412803/",
"category": "External analysis",
"uuid": "a7973cf8-6939-41d7-8745-ada586d7accc"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "17/58",
"category": "Other",
"uuid": "c7fa26cf-cf90-4317-95d6-e7cb733aae80"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--31d38205-0b87-4063-a326-2e4f1a2459db",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T21:02:58.000Z",
"modified": "2018-07-25T21:02:58.000Z",
"pattern": "[file:hashes.MD5 = '11180b265b010fbfa05c08681261ac57' AND file:hashes.SHA1 = '0eed43d63b6f3e5e696e7b99cfa538c12a13321d' AND file:hashes.SHA256 = '269f88cfa9e9e26f3761aedee5d0836b5b82f346128fe03da28a331f80a5fba3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T21:02:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--4ed5377e-7638-45ba-9377-a1aa31e4a4ae",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T21:02:59.000Z",
"modified": "2018-07-25T21:02:59.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-03-15 10:30:38",
"category": "Other",
"uuid": "bb0f567b-3154-4c7a-9f5d-478efc6fa6b8"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/269f88cfa9e9e26f3761aedee5d0836b5b82f346128fe03da28a331f80a5fba3/analysis/1489573838/",
"category": "External analysis",
"uuid": "bff87e3b-7d19-4641-94ca-2d92f7683cde"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "52/60",
"category": "Other",
"uuid": "44855b6c-b687-4d04-8cd0-a297a0f47c32"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b6d5fe7e-b69f-4e54-942e-360486c7bfcb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T21:03:05.000Z",
"modified": "2018-07-25T21:03:05.000Z",
"pattern": "[file:hashes.MD5 = 'dc31516a473d8b9cb634bf1f48a7065f' AND file:hashes.SHA1 = '10301bf7f1202c57df484ebcc125b84d8d427014' AND file:hashes.SHA256 = '711431204071b1e6f5b5644e0f0b23464c6ef5c254d7a40c4e6fe7c8782cd55c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T21:03:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--776e2aba-176a-48be-895a-c6d665ffcd02",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T21:03:06.000Z",
"modified": "2018-07-25T21:03:06.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2016-11-10 15:50:58",
"category": "Other",
"uuid": "58e7f184-7092-463f-a342-2b475e53aec4"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/711431204071b1e6f5b5644e0f0b23464c6ef5c254d7a40c4e6fe7c8782cd55c/analysis/1478793058/",
"category": "External analysis",
"uuid": "e18d6539-c159-47bf-91be-068da68abe71"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "26/54",
"category": "Other",
"uuid": "884a8c07-14d5-4574-aaa4-7aac53dde5c8"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d7634bbe-3e21-4bcf-b1ae-8d7625dfeea4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T21:03:12.000Z",
"modified": "2018-07-25T21:03:12.000Z",
"pattern": "[file:hashes.MD5 = 'd41d8cd98f00b204e9800998ecf8427e' AND file:hashes.SHA1 = 'da39a3ee5e6b4b0d3255bfef95601890afd80709' AND file:hashes.SHA256 = 'e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T21:03:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--3acaf083-3b2a-4b5f-9451-7c1ea9b39768",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T21:03:13.000Z",
"modified": "2018-07-25T21:03:13.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-07-25 20:49:30",
"category": "Other",
"uuid": "d5580362-b4ad-4ee2-9c38-7bb05878a591"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855/analysis/1532551770/",
"category": "External analysis",
"uuid": "887aea02-9162-47a8-9684-0cb42bda0520"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "0/61",
"category": "Other",
"uuid": "6d26efdf-e637-4a26-a036-b21a524e663a"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--16984ff8-41a2-42d9-a859-87df65432e94",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T21:03:19.000Z",
"modified": "2018-07-25T21:03:19.000Z",
"pattern": "[file:hashes.MD5 = '6fcc13563aad936c7d0f3165351cb453' AND file:hashes.SHA1 = '8b1757b95b7b7f9c4dfa09b52b0d3c6451b269fc' AND file:hashes.SHA256 = '093c81f0b234c2aa0363129fdaaaf57551f161915da3d23f43a792b5f3024c1e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T21:03:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--8df7db4c-c0a1-495d-a400-6e134bf827a6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T21:03:20.000Z",
"modified": "2018-07-25T21:03:20.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-12-19 00:26:19",
"category": "Other",
"uuid": "520c34d4-ed53-4cf2-be8d-0d6dbcc95604"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/093c81f0b234c2aa0363129fdaaaf57551f161915da3d23f43a792b5f3024c1e/analysis/1513643179/",
"category": "External analysis",
"uuid": "1c2745c4-6d74-407c-aef0-dc86e8edce38"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "44/67",
"category": "Other",
"uuid": "473e0959-9f52-4d7c-82d1-1540cb995bb3"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--18574ddd-6a89-41b7-924b-d9a1388d4fc0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T21:03:26.000Z",
"modified": "2018-07-25T21:03:26.000Z",
"pattern": "[file:hashes.MD5 = '83d21d808f7408ebcb3947cb88366172' AND file:hashes.SHA1 = 'ef12b3c274c02a68f678b618828ee4c92a297e59' AND file:hashes.SHA256 = 'a78b93a11ce649be3ca91812769f95a40de9d78e97a627366917c4fcd747f156']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T21:03:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--77f014cd-c354-4167-86fa-78e315ba907b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T21:03:27.000Z",
"modified": "2018-07-25T21:03:27.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-07-18 20:58:26",
"category": "Other",
"uuid": "e01b2c15-aa53-4020-82d3-0f1f7ce840e2"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/a78b93a11ce649be3ca91812769f95a40de9d78e97a627366917c4fcd747f156/analysis/1500411506/",
"category": "External analysis",
"uuid": "684f43f7-25ca-47f6-be6d-5739d4f57d72"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "36/58",
"category": "Other",
"uuid": "8a2f71fb-df0f-41c0-9950-db186f88f8f4"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0d95e126-39c8-4048-be62-5470568b0f0f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T21:03:33.000Z",
"modified": "2018-07-25T21:03:33.000Z",
"pattern": "[file:hashes.MD5 = '8758b7984fa2f20ada64e95cf9d5d192' AND file:hashes.SHA1 = 'd35ee56d673fa44a72cf43e6c16f9270dea33f2d' AND file:hashes.SHA256 = '90063c40cb94277f39ca1b3818b36b4fa41b3a3091d42dfc21586ad1c461daa0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-07-25T21:03:33Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--11e88643-99a3-4053-b9bf-73f53056ebae",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-07-25T21:03:34.000Z",
"modified": "2018-07-25T21:03:34.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2016-12-13 19:02:03",
"category": "Other",
"uuid": "2aed675b-f09b-4b27-aa4e-d8cef860ee81"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/90063c40cb94277f39ca1b3818b36b4fa41b3a3091d42dfc21586ad1c461daa0/analysis/1481655723/",
"category": "External analysis",
"uuid": "57b62add-1e94-406b-9081-eac88b655b27"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "40/55",
"category": "Other",
"uuid": "3208bb65-c286-4c9b-958f-f1d7488b957c"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "relationship",
"spec_version": "2.1",
2023-05-19 09:05:37 +00:00
"id": "relationship--3c48fa7c-7270-45d9-8ea9-e9b0a7bfba16",
2023-04-21 14:44:17 +00:00
"created": "2018-07-25T21:03:36.000Z",
"modified": "2018-07-25T21:03:36.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--a9d88727-e3a0-4095-b1d0-2b156670a502",
"target_ref": "x-misp-object--edb2ae54-a660-4d51-ab66-8f27d9223543"
},
{
"type": "relationship",
"spec_version": "2.1",
2023-05-19 09:05:37 +00:00
"id": "relationship--02ac47d7-4fe4-4a28-a8fb-e2bee6149b9f",
2023-04-21 14:44:17 +00:00
"created": "2018-07-25T21:03:37.000Z",
"modified": "2018-07-25T21:03:37.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--98a247a0-d160-4eee-be67-362795be9206",
"target_ref": "x-misp-object--0d28ddad-c7aa-4a6b-a448-c253efd98a2f"
},
{
"type": "relationship",
"spec_version": "2.1",
2023-05-19 09:05:37 +00:00
"id": "relationship--946c3a1c-a607-48e7-aa22-3227af80b07f",
2023-04-21 14:44:17 +00:00
"created": "2018-07-25T21:03:37.000Z",
"modified": "2018-07-25T21:03:37.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b0fd87a7-f7be-4f96-8ebc-90044b6c09ab",
"target_ref": "x-misp-object--e548da40-21e0-44e7-8878-30051f1ffa04"
},
{
"type": "relationship",
"spec_version": "2.1",
2023-05-19 09:05:37 +00:00
"id": "relationship--1847ebb5-4877-4097-9b0c-1302cd564d81",
2023-04-21 14:44:17 +00:00
"created": "2018-07-25T21:03:37.000Z",
"modified": "2018-07-25T21:03:37.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ef42d127-90f8-425a-8866-83310e33e640",
"target_ref": "x-misp-object--6709cf8f-3627-407e-8485-e6218167d3c0"
},
{
"type": "relationship",
"spec_version": "2.1",
2023-05-19 09:05:37 +00:00
"id": "relationship--06d3037e-3679-434e-b76f-4411b2f5a33c",
2023-04-21 14:44:17 +00:00
"created": "2018-07-25T21:03:37.000Z",
"modified": "2018-07-25T21:03:37.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--f734d0d6-468b-4c5d-8883-d137f6140100",
"target_ref": "x-misp-object--71d925d6-48ee-413d-bb73-c729eedd03f1"
},
{
"type": "relationship",
"spec_version": "2.1",
2023-05-19 09:05:37 +00:00
"id": "relationship--ecbef569-a18e-4e46-8f3f-abd2b84c3882",
2023-04-21 14:44:17 +00:00
"created": "2018-07-25T21:03:37.000Z",
"modified": "2018-07-25T21:03:37.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--31d38205-0b87-4063-a326-2e4f1a2459db",
"target_ref": "x-misp-object--4ed5377e-7638-45ba-9377-a1aa31e4a4ae"
},
{
"type": "relationship",
"spec_version": "2.1",
2023-05-19 09:05:37 +00:00
"id": "relationship--41128f4e-8cbe-46a8-b945-469f201dadaa",
2023-04-21 14:44:17 +00:00
"created": "2018-07-25T21:03:37.000Z",
"modified": "2018-07-25T21:03:37.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b6d5fe7e-b69f-4e54-942e-360486c7bfcb",
"target_ref": "x-misp-object--776e2aba-176a-48be-895a-c6d665ffcd02"
},
{
"type": "relationship",
"spec_version": "2.1",
2023-05-19 09:05:37 +00:00
"id": "relationship--e86057cd-677d-4995-9056-bdf2976fbda1",
2023-04-21 14:44:17 +00:00
"created": "2018-07-25T21:03:37.000Z",
"modified": "2018-07-25T21:03:37.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d7634bbe-3e21-4bcf-b1ae-8d7625dfeea4",
"target_ref": "x-misp-object--3acaf083-3b2a-4b5f-9451-7c1ea9b39768"
},
{
"type": "relationship",
"spec_version": "2.1",
2023-05-19 09:05:37 +00:00
"id": "relationship--c0782fe5-f5fa-4538-991c-d52eb9e6c0b7",
2023-04-21 14:44:17 +00:00
"created": "2018-07-25T21:03:37.000Z",
"modified": "2018-07-25T21:03:37.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--16984ff8-41a2-42d9-a859-87df65432e94",
"target_ref": "x-misp-object--8df7db4c-c0a1-495d-a400-6e134bf827a6"
},
{
"type": "relationship",
"spec_version": "2.1",
2023-05-19 09:05:37 +00:00
"id": "relationship--07986b5c-a7a1-47b8-a42d-cc0faeee7b97",
2023-04-21 14:44:17 +00:00
"created": "2018-07-25T21:03:37.000Z",
"modified": "2018-07-25T21:03:37.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--18574ddd-6a89-41b7-924b-d9a1388d4fc0",
"target_ref": "x-misp-object--77f014cd-c354-4167-86fa-78e315ba907b"
},
{
"type": "relationship",
"spec_version": "2.1",
2023-05-19 09:05:37 +00:00
"id": "relationship--9e00af72-de8d-43f8-af39-4c41908e7013",
2023-04-21 14:44:17 +00:00
"created": "2018-07-25T21:03:37.000Z",
"modified": "2018-07-25T21:03:37.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--0d95e126-39c8-4048-be62-5470568b0f0f",
"target_ref": "x-misp-object--11e88643-99a3-4053-b9bf-73f53056ebae"
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}