2023-04-21 14:44:17 +00:00
{
"type" : "bundle" ,
"id" : "bundle--5c9b46dc-f354-4e45-b44a-4966950d210f" ,
"objects" : [
{
"type" : "identity" ,
"spec_version" : "2.1" ,
"id" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:49.000Z" ,
"modified" : "2019-04-04T10:59:49.000Z" ,
"name" : "CIRCL" ,
"identity_class" : "organization"
} ,
{
"type" : "report" ,
"spec_version" : "2.1" ,
"id" : "report--5c9b46dc-f354-4e45-b44a-4966950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:49.000Z" ,
"modified" : "2019-04-04T10:59:49.000Z" ,
"name" : "OSINT- WinRAR Zero-day (CVE-2018-20250) Abused in Multiple Campaigns" ,
"published" : "2019-04-04T11:00:18Z" ,
"object_refs" : [
"x-misp-attribute--5ca334cd-3c38-4206-b4bd-44f8950d210f" ,
"indicator--5ca34188-a4c0-4be1-a512-4809950d210f" ,
"indicator--5ca34486-c174-4835-a726-43cf950d210f" ,
"indicator--5ca35e81-e368-425f-9334-4c26950d210f" ,
"indicator--5ca36ae4-99c8-4929-8075-472a950d210f" ,
"indicator--5ca47533-79f4-4c4a-b7a3-4c9e950d210f" ,
"indicator--5ca47536-ecbc-43b5-9e7c-474a950d210f" ,
"indicator--5ca47536-1d78-46c4-bcea-491c950d210f" ,
"indicator--5ca47536-e118-4430-a1bc-4eba950d210f" ,
"indicator--5ca486cf-f20c-40e1-acd4-4be7950d210f" ,
"indicator--5ca486cf-e3c4-4378-a2bf-4429950d210f" ,
"indicator--5ca5ba6d-a63c-4e1b-8207-4c96950d210f" ,
"indicator--5ca5ba6e-c3d4-4e66-bc47-4b73950d210f" ,
"indicator--5ca5ba6e-0b24-4a20-a5d8-4cb3950d210f" ,
"indicator--5ca5ba6e-35a8-484e-b044-4986950d210f" ,
"indicator--5ca5ba6e-01fc-4117-8ff6-4d6f950d210f" ,
"indicator--5ca5ba6e-be44-4314-b8e5-4c12950d210f" ,
"x-misp-object--5c9b8bf4-11d4-4450-882b-4d83950d210f" ,
"indicator--5ca3352d-5220-47a1-acbf-4da1950d210f" ,
"indicator--5ca33543-c790-4983-b1bb-4663950d210f" ,
"indicator--5ca3355c-383c-4caa-be6c-4c46950d210f" ,
"indicator--5ca35df4-911c-46d0-a997-43f9950d210f" ,
"indicator--5ca36c3a-433c-4a6f-a46e-4084950d210f" ,
"indicator--5ca36f41-1ccc-4fd2-82b8-4062950d210f" ,
"indicator--5ca46a07-81c0-4819-91b2-d709950d210f" ,
"indicator--5ca46dd0-955c-47b9-9511-ced9950d210f" ,
"indicator--5ca474c5-95f8-435f-aff2-8a88950d210f" ,
"indicator--5ca484d5-7b60-46fe-851d-41f7950d210f" ,
"indicator--5ca4866f-f878-4e2d-84dc-4095950d210f" ,
"indicator--5ca490a8-46c0-4464-8d48-456d950d210f" ,
"indicator--5ca4a4b1-b8cc-40d3-95a9-4090950d210f" ,
"indicator--5ca4a60b-9d04-4f5c-93f2-4d91950d210f" ,
"indicator--5ca4a7ec-7f2c-437a-a124-4b84950d210f" ,
"indicator--5ca4a80c-2170-4c49-b18e-4018950d210f" ,
"indicator--5ca4a82d-0f6c-4877-b8a4-4073950d210f" ,
"indicator--5ca4aef5-a100-4a27-bc1d-43b1950d210f" ,
"indicator--5ca4bd25-7734-4740-bac3-4cab950d210f" ,
"indicator--5ca4bd3d-3320-411a-86ce-48fc950d210f" ,
"indicator--5ca4bd58-9274-4fc3-9eae-424e950d210f" ,
"indicator--5ca4bd74-949c-45b2-9290-4e09950d210f" ,
"indicator--5ca4bd8f-6bac-4726-87b5-49ef950d210f" ,
"indicator--5ca4c5dc-542c-48e1-91be-4b39950d210f" ,
"indicator--5ca5c948-d538-4f46-850c-4867950d210f" ,
"indicator--93cde704-eb81-46a1-bf16-412a7c6abbdf" ,
"x-misp-object--bb78d9ea-99dd-4557-8135-d577734bdace" ,
"indicator--e6a06d80-1a38-4b89-8be3-0242f4f284be" ,
"x-misp-object--382da157-8d8e-479d-8449-2a7a7c54b674" ,
"indicator--f6d2b694-c79b-465e-979a-cb05135b5a97" ,
"x-misp-object--ecd4d490-5fe8-46c8-8434-ecdaf383d422" ,
"indicator--b6cdc62f-aae9-4a50-a4cc-4ce3a17cd2f7" ,
"x-misp-object--54777b78-ec4c-4356-8e7e-47c9bf4cdcda" ,
"indicator--c945a6c0-c445-4c44-be12-83436bcfd415" ,
"x-misp-object--94d10499-0534-45c0-8ecf-770f73b5db6c" ,
"indicator--9328597f-c9b9-417d-8c35-0a3a6c45d73b" ,
"x-misp-object--36ac2225-5a1d-4974-b50b-0867497073fc" ,
"indicator--550a0ca7-ccf5-4143-96dd-b372c9d532f3" ,
"x-misp-object--99a75d1e-e23b-4c36-a2e8-9ff4fcf7ec5a" ,
"indicator--ff40c2e7-d34c-4542-a26c-17e782a6fafb" ,
"x-misp-object--947c136b-e247-4529-849b-09ddeea124f0" ,
"indicator--6d055204-92e1-440c-9a0b-6e0fd09d72e9" ,
"x-misp-object--f517121e-0639-45a7-a0ce-7d7e1826730a" ,
"indicator--eb0a6c2c-53fb-4aef-a7fd-da6c154281e9" ,
"x-misp-object--ef1af813-b308-4fb3-89ad-b57491d76acb" ,
"indicator--dd29a4a3-c07e-4a56-9f27-410b1e070559" ,
"x-misp-object--2681a029-e095-4a15-a60e-5b39bb9cf743" ,
"indicator--996e8502-42f2-46ce-a819-264bd1c0374e" ,
"x-misp-object--5508860a-3775-4c49-a97c-234666b38510" ,
"indicator--ffebb241-ef81-48b2-91e3-fe715182f904" ,
"x-misp-object--ace2107f-3ab5-4b01-a221-521235ac2753" ,
"indicator--5565b852-a761-4c28-b520-91f0eac10203" ,
"x-misp-object--0c6ca9fc-6775-4329-819b-0af00f86b722" ,
"indicator--4226488e-3eca-40fe-b7cd-7cd72eac36ed" ,
"x-misp-object--f42cd377-f5d2-4495-a22b-e072af84b53d" ,
"indicator--b218ae1a-0d6c-4a65-8fca-502b578fe1b7" ,
"x-misp-object--e846f5c4-79f6-4e64-b744-222508aad1f8" ,
"indicator--1d235ad4-9ff2-465f-b0c3-59401db6a1ba" ,
"x-misp-object--67497812-2875-4d21-b39b-84c4814b8589" ,
"indicator--e540d071-510e-4aa4-a9b2-9bc49249b5d9" ,
"x-misp-object--99640379-c5b4-4f87-9607-87df8a39953c" ,
"indicator--2f03f8ef-703c-4570-9f50-3a5819b28a8f" ,
"x-misp-object--41e4fe85-b192-4277-b98a-00b4a08132bc" ,
"indicator--a5e8c39c-fb23-4ef1-9eb8-437d87e73067" ,
"x-misp-object--2af039b9-991a-4586-8fda-41e7098a1803" ,
"indicator--adc64a31-03f0-414f-9a20-51da35e8f47d" ,
"x-misp-object--23fa7a2f-f0b6-4dd1-91d5-64fd38f60409" ,
"indicator--631d6673-b540-4d35-891c-0583af76d3cc" ,
"x-misp-object--86d59c0c-a662-4aa5-8dcb-34823bc70f44" ,
2024-08-07 08:13:15 +00:00
"relationship--0da840d6-9a7a-47e0-8c0e-2c504befefdd" ,
"relationship--7ef764c9-9e5a-4d18-9e42-d6653a4996a2" ,
"relationship--235a2af4-590e-460d-bb0e-ee67e4a055d2" ,
"relationship--5cb5f92b-6ec8-4f1e-ab1e-f4ceb8466ee1" ,
"relationship--76a83d9e-bd1f-4569-8570-dee307c9a210" ,
"relationship--6e2a4d36-99cc-4d87-99a8-f04a75f913a5" ,
"relationship--220c5d8d-c180-4082-bb88-30f87c79e80c" ,
"relationship--e1914b5c-005e-41fd-8f1f-5c3a4eaf4803" ,
"relationship--93771152-2a41-4eaa-8785-0d9790e8f7e0" ,
"relationship--6cd417c3-c608-4029-ac05-283238aae2bd" ,
"relationship--faf4e898-9064-43ab-8d89-45ef06dae779" ,
"relationship--6fd168d9-5758-4f86-b1c6-5e1ed38c5446" ,
"relationship--ad5b1ce8-7f0b-47e3-b4f6-1d61316b9917" ,
"relationship--d0b86381-2987-432f-9e48-696ef175393b" ,
"relationship--7c5cb146-32d9-4ce9-9ba1-9b3c3e540285" ,
"relationship--6084ef56-ae00-42ef-a878-fc1786997349" ,
"relationship--66b2a89c-56e4-4b7c-85ba-a4dda82d2342" ,
"relationship--6a332dab-cee0-46a4-aeb5-a70a07d9ac94" ,
"relationship--8283eb3b-8937-4331-90cf-43e3807809c2" ,
"relationship--bb7c6057-3efa-45e4-8a45-5bd160d24e8e" ,
"relationship--9e4343a3-9107-4d0e-a9ea-3cf1bdd70b18" ,
"relationship--d1e489a0-b5ea-496a-b260-8a9599237cb2"
2023-04-21 14:44:17 +00:00
] ,
"labels" : [
"Threat-Report" ,
"misp:tool=\"MISP-STIX-Converter\"" ,
"misp-galaxy:malpedia=\"Azorult\"" ,
"misp-galaxy:malpedia=\"Quasar RAT\"" ,
"misp-galaxy:mitre-enterprise-attack-malware=\"NETWIRE - S0198\"" ,
"misp-galaxy:mitre-malware=\"NETWIRE - S0198\"" ,
"misp-galaxy:mitre-tool=\"QuasarRAT - S0262\"" ,
"misp-galaxy:ransomware=\"Razy\"" ,
"misp-galaxy:rat=\"Netwire\"" ,
"misp-galaxy:rat=\"Quasar RAT\"" ,
"misp-galaxy:stealer=\"AZORult\"" ,
"type:OSINT" ,
"osint:lifetime=\"perpetual\"" ,
"osint:certainty=\"50\""
] ,
"object_marking_refs" : [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
} ,
{
"type" : "x-misp-attribute" ,
"spec_version" : "2.1" ,
"id" : "x-misp-attribute--5ca334cd-3c38-4206-b4bd-44f8950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-02T10:09:36.000Z" ,
"modified" : "2019-04-02T10:09:36.000Z" ,
"labels" : [
"misp:type=\"text\"" ,
"misp:category=\"External analysis\"" ,
"osint:source-type=\"blog-post\""
] ,
"x_misp_category" : "External analysis" ,
"x_misp_type" : "text" ,
"x_misp_value" : "WinRAR, an over 20-year-old file archival utility used by over 500 million users worldwide, recently acknowledged a long-standing vulnerability in its code-base. A recently published path traversal zero-day vulnerability, disclosed in CVE-2018-20250 by Check Point Research, enables attackers to specify arbitrary destinations during file extraction of \u00e2\u20ac\u02dcACE\u00e2\u20ac\u2122 formatted files, regardless of user input. Attackers can easily achieve persistence and code execution by creating malicious archives that extract files to sensitive locations, like the Windows \u00e2\u20ac\u0153Startup\u00e2\u20ac\u009d Start Menu folder. While this vulnerability has been fixed in the latest version of WinRAR (5.70), WinRAR itself does not contain auto-update features, increasing the likelihood that many existing users remain running out-of-date versions."
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca34188-a4c0-4be1-a512-4809950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-02T13:06:43.000Z" ,
"modified" : "2019-04-02T13:06:43.000Z" ,
"description" : "C2" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '185.162.131.92']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-02T13:06:43Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca34486-c174-4835-a726-43cf950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-02T11:16:22.000Z" ,
"modified" : "2019-04-02T11:16:22.000Z" ,
"description" : "Payload download" ,
"pattern" : "[url:value = 'http://185.49.71.101/i/pwi_crs.exe']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-02T11:16:22Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca35e81-e368-425f-9334-4c26950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-02T13:07:13.000Z" ,
"modified" : "2019-04-02T13:07:13.000Z" ,
"description" : "Netwire C2" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.34.111.113']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-02T13:07:13Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca36ae4-99c8-4929-8075-472a950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-02T14:00:04.000Z" ,
"modified" : "2019-04-02T14:00:04.000Z" ,
"pattern" : "[file:name = '\\\\%USERPROFILE\\\\%\\\\Desktop\\\\100m.bat']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-02T14:00:04Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Payload delivery"
}
] ,
"labels" : [
"misp:type=\"filename\"" ,
"misp:category=\"Payload delivery\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca47533-79f4-4c4a-b7a3-4c9e950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-03T08:56:19.000Z" ,
"modified" : "2019-04-03T08:56:19.000Z" ,
"pattern" : "[url:value = 'www.alahbabgroup.com/bakala/verify.php']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-03T08:56:19Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca47536-ecbc-43b5-9e7c-474a950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-03T08:56:22.000Z" ,
"modified" : "2019-04-03T08:56:22.000Z" ,
"pattern" : "[url:value = '103.225.168.159/admin/verify.php']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-03T08:56:22Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca47536-1d78-46c4-bcea-491c950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-03T08:56:22.000Z" ,
"modified" : "2019-04-03T08:56:22.000Z" ,
"pattern" : "[url:value = 'www.khuyay.org/odin_backup/public/loggoff.php']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-03T08:56:22Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca47536-e118-4430-a1bc-4eba950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-03T08:56:22.000Z" ,
"modified" : "2019-04-03T08:56:22.000Z" ,
"pattern" : "[url:value = '47.91.56.21/verify.php']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-03T08:56:22Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca486cf-f20c-40e1-acd4-4be7950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-03T10:11:27.000Z" ,
"modified" : "2019-04-03T10:11:27.000Z" ,
"description" : "C2" ,
"pattern" : "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '31.148.220.53']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-03T10:11:27Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"ip-dst\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca486cf-e3c4-4378-a2bf-4429950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-03T10:11:27.000Z" ,
"modified" : "2019-04-03T10:11:27.000Z" ,
"pattern" : "[url:value = 'http://tiny-share.com/direct/7dae2d144dae4447a152bef586520ef8']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-03T10:11:27Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca5ba6d-a63c-4e1b-8207-4c96950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T08:03:57.000Z" ,
"modified" : "2019-04-04T08:03:57.000Z" ,
"pattern" : "[url:value = 'http://103.225.168.159/admin/verify.php']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T08:03:57Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca5ba6e-c3d4-4e66-bc47-4b73950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T08:03:58.000Z" ,
"modified" : "2019-04-04T08:03:58.000Z" ,
"pattern" : "[url:value = 'http://185.162.131.92']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T08:03:58Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca5ba6e-0b24-4a20-a5d8-4cb3950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T08:03:58.000Z" ,
"modified" : "2019-04-04T08:03:58.000Z" ,
"pattern" : "[url:value = 'http://47.91.56.21/verify.php']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T08:03:58Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca5ba6e-35a8-484e-b044-4986950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T08:03:58.000Z" ,
"modified" : "2019-04-04T08:03:58.000Z" ,
"pattern" : "[url:value = 'http://tiny-share.com/direct/7dae2d144dae4447a152bef586520ef8/']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T08:03:58Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca5ba6e-01fc-4117-8ff6-4d6f950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T08:03:58.000Z" ,
"modified" : "2019-04-04T08:03:58.000Z" ,
"pattern" : "[url:value = 'http://www.alahbabgroup.com/bakala/verify.php']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T08:03:58Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca5ba6e-be44-4314-b8e5-4c12950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T08:03:58.000Z" ,
"modified" : "2019-04-04T08:03:58.000Z" ,
"pattern" : "[url:value = 'http://www.khuyay.org/odin_backup/public/loggoff.php']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T08:03:58Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "Network activity"
}
] ,
"labels" : [
"misp:type=\"url\"" ,
"misp:category=\"Network activity\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--5c9b8bf4-11d4-4450-882b-4d83950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-03-27T14:43:00.000Z" ,
"modified" : "2019-03-27T14:43:00.000Z" ,
"labels" : [
"misp:name=\"microblog\"" ,
"misp:meta-category=\"misc\"" ,
"type:OSINT" ,
2024-04-05 12:15:17 +00:00
"osint:certainty=\"50\"" ,
"osint:lifetime=\"perpetual\""
2023-04-21 14:44:17 +00:00
] ,
"object_marking_refs" : [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
] ,
"x_misp_attributes" : [
{
"type" : "text" ,
"object_relation" : "post" ,
"value" : "\u00e2\u0161\u00a0\r\n WARNING \r\n\u00e2\u0161\u00a0\r\n\r\nWinRAR Zero-day (CVE-2018-20250) Abused in Multiple Campaigns\r\n(link: https://www.fireeye.com/blog/threat-research/2019/03/winrar-zero-day-abused-in-multiple-campaigns.html) fireeye.com/blog/threat-re\u00e2\u20ac\u00a6\r\nAll IOCs:\r\n(link: https://otx.alienvault.com/pulse/5c9a4ff3504d5b0affbd3d3a) otx.alienvault.com/pulse/5c9a4ff3\u00e2\u20ac\u00a6\r\nExploit Details:\r\n(link: https://research.checkpoint.com/extracting-code-execution-from-winrar/) research.checkpoint.com/extracting-cod\u00e2\u20ac\u00a6" ,
"category" : "Other" ,
"uuid" : "5c9b8bf4-81a0-484a-94aa-4524950d210f"
} ,
{
"type" : "text" ,
"object_relation" : "type" ,
"value" : "Twitter" ,
"category" : "Other" ,
"uuid" : "5c9b8bf4-b480-4cf3-80c3-4e97950d210f"
} ,
{
"type" : "url" ,
"object_relation" : "url" ,
"value" : "https://mobile.twitter.com/Bank_Security/status/1110795166762307585" ,
"category" : "Network activity" ,
"to_ids" : true ,
"uuid" : "5c9b8bf4-0bfc-4d15-9eca-4640950d210f"
} ,
{
"type" : "link" ,
"object_relation" : "link" ,
"value" : "https://t.co/WXbZ8UEIUY?amp=1" ,
"category" : "External analysis" ,
"to_ids" : true ,
"uuid" : "5c9b8bf4-b578-4b65-ab12-4f46950d210f"
} ,
{
"type" : "link" ,
"object_relation" : "link" ,
"value" : "https://t.co/4QpF7PmDLH?amp=1" ,
"category" : "External analysis" ,
"to_ids" : true ,
"uuid" : "5c9b8bf4-daa4-45d3-949e-4814950d210f"
} ,
{
"type" : "link" ,
"object_relation" : "link" ,
"value" : "https://t.co/arJH9cqHID?amp=1" ,
"category" : "External analysis" ,
"to_ids" : true ,
"uuid" : "5c9b8bf4-da6c-4fd2-a520-4e67950d210f"
} ,
{
"type" : "link" ,
"object_relation" : "link" ,
"value" : "https://www.fireeye.com/blog/threat-research/2019/03/winrar-zero-day-abused-in-multiple-campaigns.html" ,
"category" : "External analysis" ,
"to_ids" : true ,
"uuid" : "5c9b8bf4-f79c-4eab-8203-4699950d210f"
} ,
{
"type" : "link" ,
"object_relation" : "link" ,
"value" : "https://otx.alienvault.com/pulse/5c9a4ff3504d5b0affbd3d3a" ,
"category" : "External analysis" ,
"to_ids" : true ,
"uuid" : "5c9b8bf4-a76c-4085-914a-4fa0950d210f"
} ,
{
"type" : "link" ,
"object_relation" : "link" ,
"value" : "https://research.checkpoint.com/extracting-code-execution-from-winrar/" ,
"category" : "External analysis" ,
"to_ids" : true ,
"uuid" : "5c9b8bf4-7c20-48fc-9447-4dd3950d210f"
} ,
{
"type" : "datetime" ,
"object_relation" : "creation-date" ,
"value" : "2019-03-27T07:46:00" ,
"category" : "Other" ,
"uuid" : "5c9b8bf4-aa90-4700-8335-43c2950d210f"
} ,
{
"type" : "text" ,
"object_relation" : "username" ,
"value" : "Bank_Security" ,
"category" : "Other" ,
"uuid" : "5c9b8bf4-f9d0-4d81-8a45-4059950d210f"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "microblog"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca3352d-5220-47a1-acbf-4da1950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-02T11:27:09.000Z" ,
"modified" : "2019-04-02T11:27:09.000Z" ,
"pattern" : "[file:hashes.MD5 = '8e067e4cda99299b0bf2481cc1fd8e12' AND file:name = 'Scan_Letter_of_Approval.rar' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-02T11:27:09Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca33543-c790-4983-b1bb-4663950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-02T12:16:03.000Z" ,
"modified" : "2019-04-02T12:16:03.000Z" ,
"pattern" : "[file:hashes.MD5 = '3aabc9767d02c75ef44df6305bc6a41f' AND file:name = 'winSrvHost.vbs' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-02T12:16:03Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca3355c-383c-4caa-be6c-4c46950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-02T12:39:50.000Z" ,
"modified" : "2019-04-02T12:39:50.000Z" ,
"description" : "decoy document" ,
"pattern" : "[file:hashes.MD5 = 'dc63d5affde0db95128dac52f9d19578' AND file:name = 'Letter of Approval.pdf' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-02T12:39:50Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca35df4-911c-46d0-a997-43f9950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-02T13:04:52.000Z" ,
"modified" : "2019-04-02T13:04:52.000Z" ,
"pattern" : "[file:hashes.MD5 = '12def981952667740eb06ee91168e643' AND file:name = 'pwi_crs.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-02T13:04:52Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca36c3a-433c-4a6f-a46e-4084950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-02T14:05:46.000Z" ,
"modified" : "2019-04-02T14:05:46.000Z" ,
"pattern" : "[file:hashes.MD5 = '062801f6fdbda4dd67b77834c62e82a4' AND file:name = 'SysAid-Documentation.rar' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-02T14:05:46Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca36f41-1ccc-4fd2-82b8-4062950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-02T14:18:41.000Z" ,
"modified" : "2019-04-02T14:18:41.000Z" ,
"pattern" : "[file:hashes.MD5 = '49419d84076b13e96540fdd911f1c2f0' AND file:name = 'SysAid-Documentation.rar' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-02T14:18:41Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca46a07-81c0-4819-91b2-d709950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-03T08:08:39.000Z" ,
"modified" : "2019-04-03T08:08:39.000Z" ,
"pattern" : "[file:hashes.MD5 = '96986b18a8470f4020ea78df0b3db7d4' AND file:name = 'ekrnview.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-03T08:08:39Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca46dd0-955c-47b9-9511-ced9950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-03T08:24:48.000Z" ,
"modified" : "2019-04-03T08:24:48.000Z" ,
"pattern" : "[file:hashes.MD5 = '31718d7b9b3261688688bdc4e026db99' AND file:name = 'Thumbs.db.lnk' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-03T08:24:48Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca474c5-95f8-435f-aff2-8a88950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-03T08:54:29.000Z" ,
"modified" : "2019-04-03T08:54:29.000Z" ,
"description" : "Email" ,
"pattern" : "[file:hashes.MD5 = '8c93e024fc194f520e4e72e761c0942d' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-03T08:54:29Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca484d5-7b60-46fe-851d-41f7950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-03T10:03:01.000Z" ,
"modified" : "2019-04-03T10:03:01.000Z" ,
"pattern" : "[file:hashes.MD5 = '9b19753369b6ed1187159b95fc8a81cd' AND file:name = 'zakon.rar' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-03T10:03:01Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca4866f-f878-4e2d-84dc-4095950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-03T10:09:51.000Z" ,
"modified" : "2019-04-03T10:09:51.000Z" ,
"pattern" : "[file:hashes.MD5 = '79b53b4555c1fb39ba3c7b8ce9a4287e' AND file:name = 'mssconf.bat' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-03T10:09:51Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca490a8-46c0-4464-8d48-456d950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-03T10:53:28.000Z" ,
"modified" : "2019-04-03T10:53:28.000Z" ,
"pattern" : "[file:hashes.MD5 = 'e9815dfb90776ab449539a2be7c16de5' AND file:name = 'leaks copy.rar' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-03T10:53:28Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca4a4b1-b8cc-40d3-95a9-4090950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-03T12:18:57.000Z" ,
"modified" : "2019-04-03T12:18:57.000Z" ,
"pattern" : "[file:hashes.MD5 = '9b81b3174c9b699f594d725cf89ffaa4' AND file:name = 'cc.rar' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-03T12:18:57Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca4a60b-9d04-4f5c-93f2-4d91950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-03T12:24:43.000Z" ,
"modified" : "2019-04-03T12:24:43.000Z" ,
"pattern" : "[file:hashes.MD5 = '914ac7ecf2557d5836f26a151c1b9b62' AND file:name = 'zabugor.rar' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-03T12:24:43Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca4a7ec-7f2c-437a-a124-4b84950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-03T12:32:44.000Z" ,
"modified" : "2019-04-03T12:32:44.000Z" ,
"pattern" : "[file:hashes.MD5 = 'eca09fe8dcbc9d1c097277f2b3ef1081' AND file:name = 'zabugorV.rar' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-03T12:32:44Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca4a80c-2170-4c49-b18e-4018950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-03T12:33:16.000Z" ,
"modified" : "2019-04-03T12:33:16.000Z" ,
"pattern" : "[file:hashes.MD5 = '1f5fa51ac9517d70f136e187d45f69de' AND file:name = 'Combolist.rar' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-03T12:33:16Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca4a82d-0f6c-4877-b8a4-4073950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-03T12:33:49.000Z" ,
"modified" : "2019-04-03T12:33:49.000Z" ,
"pattern" : "[file:hashes.MD5 = 'f36404fb24a640b40e2d43c72c18e66b' AND file:name = 'Nulled2019.rar' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-03T12:33:49Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca4aef5-a100-4a27-bc1d-43b1950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-03T13:02:45.000Z" ,
"modified" : "2019-04-03T13:02:45.000Z" ,
"pattern" : "[file:hashes.MD5 = '0f56b04a4e9a0df94c7f89c1bccf830c' AND file:name = 'IT.rar' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-03T13:02:45Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca4bd25-7734-4740-bac3-4cab950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-03T14:03:17.000Z" ,
"modified" : "2019-04-03T14:03:17.000Z" ,
"description" : "QuasarRAT" ,
"pattern" : "[file:hashes.MD5 = '1ba398b0a14328b9604eeb5ebf139b40' AND file:name = 'explorer.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-03T14:03:17Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca4bd3d-3320-411a-86ce-48fc950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-03T14:03:41.000Z" ,
"modified" : "2019-04-03T14:03:41.000Z" ,
"description" : "Azorult" ,
"pattern" : "[file:hashes.MD5 = 'aac00312a961e81c4af4664c49b4a2b2' AND file:name = 'explorer.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-03T14:03:41Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca4bd58-9274-4fc3-9eae-424e950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-03T14:04:08.000Z" ,
"modified" : "2019-04-03T14:04:08.000Z" ,
"description" : "Netwire" ,
"pattern" : "[file:hashes.MD5 = '2961c52f04b7fdf7ccf6c01ac259d767' AND file:name = 'IntelAudio.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-03T14:04:08Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca4bd74-949c-45b2-9290-4e09950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-03T14:04:36.000Z" ,
"modified" : "2019-04-03T14:04:36.000Z" ,
"description" : "Razy" ,
"pattern" : "[file:hashes.MD5 = '97d74671d0489071baa21f38f456eb74' AND file:name = 'Discord.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-03T14:04:36Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca4bd8f-6bac-4726-87b5-49ef950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-03T14:05:03.000Z" ,
"modified" : "2019-04-03T14:05:03.000Z" ,
"description" : "Buzy" ,
"pattern" : "[file:hashes.MD5 = 'bcc49643833a4d8545ed4145fb6fdfd2' AND file:name = 'Discord.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-03T14:05:03Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca4c5dc-542c-48e1-91be-4b39950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-03T14:40:28.000Z" ,
"modified" : "2019-04-03T14:40:28.000Z" ,
"description" : "Azorult" ,
"pattern" : "[file:hashes.MD5 = '119a0fd733bc1a013b0d4399112b8626' AND file:name = 'old.exe' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-03T14:40:28Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5ca5c948-d538-4f46-850c-4867950d210f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T09:07:20.000Z" ,
"modified" : "2019-04-04T09:07:20.000Z" ,
"pattern" : "[file:hashes.MD5 = '7dae2d144dae4447a152bef586520ef8' AND file:x_misp_state = 'Malicious']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T09:07:20Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--93cde704-eb81-46a1-bf16-412a7c6abbdf" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:18.000Z" ,
"modified" : "2019-04-04T10:59:18.000Z" ,
"pattern" : "[file:hashes.MD5 = '119a0fd733bc1a013b0d4399112b8626' AND file:hashes.SHA1 = '092e7d2aa0c518a499e8cc5aaf3e827ad3b66512' AND file:hashes.SHA256 = '87ee131d51929d19afba3bb8d2b2019a7be8782b1db0728f648902e8c8e6b2d0']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T10:59:18Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--bb78d9ea-99dd-4557-8135-d577734bdace" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:18.000Z" ,
"modified" : "2019-04-04T10:59:18.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2019-03-27T21:41:06" ,
"category" : "Other" ,
"uuid" : "9beab9c9-b030-42d5-963a-07948cc15406"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/87ee131d51929d19afba3bb8d2b2019a7be8782b1db0728f648902e8c8e6b2d0/analysis/1553722866/" ,
"category" : "Payload delivery" ,
"uuid" : "96552c73-8407-4a1b-b581-1d8a1f67e8bc"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "50/69" ,
"category" : "Payload delivery" ,
"uuid" : "6229267a-31f2-4c37-a98f-fcad7f56d641"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--e6a06d80-1a38-4b89-8be3-0242f4f284be" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:19.000Z" ,
"modified" : "2019-04-04T10:59:19.000Z" ,
"pattern" : "[file:hashes.MD5 = '1f5fa51ac9517d70f136e187d45f69de' AND file:hashes.SHA1 = 'fddc26459a6c6055a320f282a5ac51d1b74f2fd3' AND file:hashes.SHA256 = '6f81d88ea10e423034e2c25001640e7b54dc3984c1a8aef1b60c721f331d805f']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T10:59:19Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--382da157-8d8e-479d-8449-2a7a7c54b674" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:19.000Z" ,
"modified" : "2019-04-04T10:59:19.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2019-03-27T21:40:58" ,
"category" : "Other" ,
"uuid" : "fcc179d9-1bd5-410d-99fa-718daee19a8d"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/6f81d88ea10e423034e2c25001640e7b54dc3984c1a8aef1b60c721f331d805f/analysis/1553722858/" ,
"category" : "Payload delivery" ,
"uuid" : "f29a7f37-dd60-4a5d-8591-8b002722574c"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "31/56" ,
"category" : "Payload delivery" ,
"uuid" : "c6e43a6d-edf5-48a5-b634-1c79b8ff11b1"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--f6d2b694-c79b-465e-979a-cb05135b5a97" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:19.000Z" ,
"modified" : "2019-04-04T10:59:19.000Z" ,
"pattern" : "[file:hashes.MD5 = '12def981952667740eb06ee91168e643' AND file:hashes.SHA1 = '1df08806e39ed6f9f3a5cb228f3be744936e201e' AND file:hashes.SHA256 = 'c7c3d70337336fc183135038ce5d0a4bb83ab6d9f4cc1ad5cf600295e6a41e1b']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T10:59:19Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--ecd4d490-5fe8-46c8-8434-ecdaf383d422" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:19.000Z" ,
"modified" : "2019-04-04T10:59:19.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2019-04-04T06:32:35" ,
"category" : "Other" ,
"uuid" : "565b6568-d456-4e2e-acf6-5d67b8b522f5"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/c7c3d70337336fc183135038ce5d0a4bb83ab6d9f4cc1ad5cf600295e6a41e1b/analysis/1554359555/" ,
"category" : "Payload delivery" ,
"uuid" : "c4b3f8ec-089e-4ea0-8c3f-c9da23acd89e"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "43/67" ,
"category" : "Payload delivery" ,
"uuid" : "76664654-df97-4498-997b-dd21a0e35b7e"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--b6cdc62f-aae9-4a50-a4cc-4ce3a17cd2f7" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:19.000Z" ,
"modified" : "2019-04-04T10:59:19.000Z" ,
"pattern" : "[file:hashes.MD5 = 'eca09fe8dcbc9d1c097277f2b3ef1081' AND file:hashes.SHA1 = 'a4185a50ccac29056e2e56ad85b8d74adc8ec7ac' AND file:hashes.SHA256 = '83ca0fc98f247b674e7fd535a8483538ed73710d5ce24f5bf1ee483610e418ce']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T10:59:19Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--54777b78-ec4c-4356-8e7e-47c9bf4cdcda" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:19.000Z" ,
"modified" : "2019-04-04T10:59:19.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2019-03-27T21:41:05" ,
"category" : "Other" ,
"uuid" : "ca8a2227-5e14-449f-992f-103c90818e66"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/83ca0fc98f247b674e7fd535a8483538ed73710d5ce24f5bf1ee483610e418ce/analysis/1553722865/" ,
"category" : "Payload delivery" ,
"uuid" : "4bde1856-53a3-4a92-a62a-e087a5257d82"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "33/55" ,
"category" : "Payload delivery" ,
"uuid" : "cc548348-c570-441e-aacb-63ce091ad1a8"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--c945a6c0-c445-4c44-be12-83436bcfd415" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:19.000Z" ,
"modified" : "2019-04-04T10:59:19.000Z" ,
"pattern" : "[file:hashes.MD5 = '97d74671d0489071baa21f38f456eb74' AND file:hashes.SHA1 = '3bb63aa0b92cc1bde8d027112e5b037cc65ca9cb' AND file:hashes.SHA256 = '73b43e4aa99f795c29285cab5f7e2e54ce64c22e57b1301cea0125b7797e96c9']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T10:59:19Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--94d10499-0534-45c0-8ecf-770f73b5db6c" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:19.000Z" ,
"modified" : "2019-04-04T10:59:19.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2019-04-02T04:08:58" ,
"category" : "Other" ,
"uuid" : "bb8a1c29-37ad-4712-8597-af71d8026d8f"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/73b43e4aa99f795c29285cab5f7e2e54ce64c22e57b1301cea0125b7797e96c9/analysis/1554178138/" ,
"category" : "Payload delivery" ,
"uuid" : "f77ff9ca-1dbc-4c38-be3b-8825ba4b08e9"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "51/70" ,
"category" : "Payload delivery" ,
"uuid" : "dbe53327-a8b6-4672-b914-156659f88f9e"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--9328597f-c9b9-417d-8c35-0a3a6c45d73b" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:20.000Z" ,
"modified" : "2019-04-04T10:59:20.000Z" ,
"pattern" : "[file:hashes.MD5 = '8e067e4cda99299b0bf2481cc1fd8e12' AND file:hashes.SHA1 = '3a92a121201c209d3e091b795274c22a4ea71963' AND file:hashes.SHA256 = 'e1fe401b73fc449470290c34a26cbd6e6190fd7879fd414bea460fedd2168649']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T10:59:20Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--36ac2225-5a1d-4974-b50b-0867497073fc" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:20.000Z" ,
"modified" : "2019-04-04T10:59:20.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2019-03-29T05:20:01" ,
"category" : "Other" ,
"uuid" : "cda7e557-6ee3-4683-81fe-b8720b5b641b"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/e1fe401b73fc449470290c34a26cbd6e6190fd7879fd414bea460fedd2168649/analysis/1553836801/" ,
"category" : "Payload delivery" ,
"uuid" : "e24d4bfd-ae1d-4397-a389-8645acbf8d90"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "28/56" ,
"category" : "Payload delivery" ,
"uuid" : "942e32c4-826a-4e1c-b527-aed28d14a14f"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--550a0ca7-ccf5-4143-96dd-b372c9d532f3" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:20.000Z" ,
"modified" : "2019-04-04T10:59:20.000Z" ,
"pattern" : "[file:hashes.MD5 = 'e9815dfb90776ab449539a2be7c16de5' AND file:hashes.SHA1 = '178b02f21efd10a7c98f654fc68c88468738042e' AND file:hashes.SHA256 = 'c53bfd9dd25919643baccfcfe1e5f9101830e25b378eeb91f0f3f3573d013a6c']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T10:59:20Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--99a75d1e-e23b-4c36-a2e8-9ff4fcf7ec5a" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:20.000Z" ,
"modified" : "2019-04-04T10:59:20.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2019-03-27T21:41:31" ,
"category" : "Other" ,
"uuid" : "e7dec0a9-afee-44ae-823c-12179dc2ad7e"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/c53bfd9dd25919643baccfcfe1e5f9101830e25b378eeb91f0f3f3573d013a6c/analysis/1553722891/" ,
"category" : "Payload delivery" ,
"uuid" : "3e484ad3-5997-4ccf-b1a6-3a5d891365be"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "28/55" ,
"category" : "Payload delivery" ,
"uuid" : "e82b82e1-cc43-4eb8-bf51-b1158a1cc0ec"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--ff40c2e7-d34c-4542-a26c-17e782a6fafb" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:20.000Z" ,
"modified" : "2019-04-04T10:59:20.000Z" ,
"pattern" : "[file:hashes.MD5 = 'dc63d5affde0db95128dac52f9d19578' AND file:hashes.SHA1 = '539efdad458cf6563d1735632df1fb2c39acfedd' AND file:hashes.SHA256 = '17b872ba9b1a438e2acf8bdfad21e9c18febcdbd0e14c05bc7482277c98866c6']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T10:59:20Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--947c136b-e247-4529-849b-09ddeea124f0" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:20.000Z" ,
"modified" : "2019-04-04T10:59:20.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2019-03-29T12:43:20" ,
"category" : "Other" ,
"uuid" : "d4e3ba49-f61e-4e67-8187-7474cc86df81"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/17b872ba9b1a438e2acf8bdfad21e9c18febcdbd0e14c05bc7482277c98866c6/analysis/1553863400/" ,
"category" : "Payload delivery" ,
"uuid" : "0e086d43-d432-448f-b93f-a3b9837cba45"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "0/61" ,
"category" : "Payload delivery" ,
"uuid" : "712ff8c6-b9e0-4729-91fc-ff6ccab2a2a0"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--6d055204-92e1-440c-9a0b-6e0fd09d72e9" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:20.000Z" ,
"modified" : "2019-04-04T10:59:20.000Z" ,
"pattern" : "[file:hashes.MD5 = '8c93e024fc194f520e4e72e761c0942d' AND file:hashes.SHA1 = 'b7dd83d96a480e2f8c653f5339764dd3fe38ce81' AND file:hashes.SHA256 = '5b5d7d74db59c520b72be1e328563a1ee864e8931a0ae7487d753ee3e166de1c']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T10:59:20Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--f517121e-0639-45a7-a0ce-7d7e1826730a" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:20.000Z" ,
"modified" : "2019-04-04T10:59:20.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2019-03-29T05:29:07" ,
"category" : "Other" ,
"uuid" : "350bd5bd-90e5-4b64-b8f3-7c854166a4a2"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/5b5d7d74db59c520b72be1e328563a1ee864e8931a0ae7487d753ee3e166de1c/analysis/1553837347/" ,
"category" : "Payload delivery" ,
"uuid" : "05677bc0-97e1-4004-8169-6db4587a5b4e"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "29/59" ,
"category" : "Payload delivery" ,
"uuid" : "e6f88c2a-7758-4953-a88b-1ee84a1e99d4"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--eb0a6c2c-53fb-4aef-a7fd-da6c154281e9" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:20.000Z" ,
"modified" : "2019-04-04T10:59:20.000Z" ,
"pattern" : "[file:hashes.MD5 = '3aabc9767d02c75ef44df6305bc6a41f' AND file:hashes.SHA1 = '1210766d7137be26f84d1882357559841b698cef' AND file:hashes.SHA256 = 'e0f49bf08b44fb77bc4d305abb698ce8767904a7da7fabb8e3d127eca270b967']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T10:59:20Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--ef1af813-b308-4fb3-89ad-b57491d76acb" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:20.000Z" ,
"modified" : "2019-04-04T10:59:20.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2019-04-01T20:02:27" ,
"category" : "Other" ,
"uuid" : "109fdc32-8735-4b87-a3d2-503b63da577b"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/e0f49bf08b44fb77bc4d305abb698ce8767904a7da7fabb8e3d127eca270b967/analysis/1554148947/" ,
"category" : "Payload delivery" ,
"uuid" : "36eb457b-417a-44cd-a001-d228d29c6b6f"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "22/58" ,
"category" : "Payload delivery" ,
"uuid" : "2829ad9f-6b97-4d49-92e0-68243c3d4bd0"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--dd29a4a3-c07e-4a56-9f27-410b1e070559" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:21.000Z" ,
"modified" : "2019-04-04T10:59:21.000Z" ,
"pattern" : "[file:hashes.MD5 = '79b53b4555c1fb39ba3c7b8ce9a4287e' AND file:hashes.SHA1 = '90764c28ce62b6ea005dd7e616f7ada4fcd170ad' AND file:hashes.SHA256 = '08df98a999d6f03b46ffe9e030e1cd57469230647222451e438d5918fcda3ddf']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T10:59:21Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--2681a029-e095-4a15-a60e-5b39bb9cf743" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:21.000Z" ,
"modified" : "2019-04-04T10:59:21.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2019-03-29T05:35:29" ,
"category" : "Other" ,
"uuid" : "14e0668a-3a17-4bf4-b32d-3ba02a2049ac"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/08df98a999d6f03b46ffe9e030e1cd57469230647222451e438d5918fcda3ddf/analysis/1553837729/" ,
"category" : "Payload delivery" ,
"uuid" : "20e3fd93-1dd9-4456-9948-f99675ea9dd3"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "26/59" ,
"category" : "Payload delivery" ,
"uuid" : "dcd9fa6f-0f51-4a76-835c-be1653c74242"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--996e8502-42f2-46ce-a819-264bd1c0374e" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:21.000Z" ,
"modified" : "2019-04-04T10:59:21.000Z" ,
"pattern" : "[file:hashes.MD5 = 'f36404fb24a640b40e2d43c72c18e66b' AND file:hashes.SHA1 = 'ed6b9c876a8a4fe01623972e8733ec2a90177ad1' AND file:hashes.SHA256 = '6b8e114a7636d87b3de01c4303dfccd54a65f32bae7c964ba496257ec468cfc2']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T10:59:21Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--5508860a-3775-4c49-a97c-234666b38510" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:21.000Z" ,
"modified" : "2019-04-04T10:59:21.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2019-03-27T21:40:57" ,
"category" : "Other" ,
"uuid" : "192f5431-d8c0-430a-a04b-bb1afbb10f4d"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/6b8e114a7636d87b3de01c4303dfccd54a65f32bae7c964ba496257ec468cfc2/analysis/1553722857/" ,
"category" : "Payload delivery" ,
"uuid" : "494ad934-586f-49c7-9fe4-1cb4b357a506"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "34/57" ,
"category" : "Payload delivery" ,
"uuid" : "e0cce08c-a0d6-4eaf-aad6-7c377cc0e74f"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--ffebb241-ef81-48b2-91e3-fe715182f904" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:21.000Z" ,
"modified" : "2019-04-04T10:59:21.000Z" ,
"pattern" : "[file:hashes.MD5 = '96986b18a8470f4020ea78df0b3db7d4' AND file:hashes.SHA1 = '431c792fcc8ba9b58f0ffde5c8fe6fd93066ec45' AND file:hashes.SHA256 = '2eb447785e5b35c42d842706d593a907d0bdbc50ad9d0327c3591ac4ef17ce6e']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T10:59:21Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--ace2107f-3ab5-4b01-a221-521235ac2753" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:21.000Z" ,
"modified" : "2019-04-04T10:59:21.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2019-04-02T15:27:29" ,
"category" : "Other" ,
"uuid" : "cf481ea6-dd65-435c-8e37-e4554834e0e1"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/2eb447785e5b35c42d842706d593a907d0bdbc50ad9d0327c3591ac4ef17ce6e/analysis/1554218849/" ,
"category" : "Payload delivery" ,
"uuid" : "1c745f93-920c-44e0-9d4e-f226b5351a46"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "50/69" ,
"category" : "Payload delivery" ,
"uuid" : "026dd833-b81e-4428-8adc-145c79c1a7d2"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--5565b852-a761-4c28-b520-91f0eac10203" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:21.000Z" ,
"modified" : "2019-04-04T10:59:21.000Z" ,
"pattern" : "[file:hashes.MD5 = '2961c52f04b7fdf7ccf6c01ac259d767' AND file:hashes.SHA1 = '2c1ff2f2d463fd66bb630e02a4596e42f73f3ea9' AND file:hashes.SHA256 = 'bd89c287b180e04d315b19dc56509e06aca44a7f234c308510376a39f45fb283']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T10:59:21Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--0c6ca9fc-6775-4329-819b-0af00f86b722" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:21.000Z" ,
"modified" : "2019-04-04T10:59:21.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2019-04-01T15:09:35" ,
"category" : "Other" ,
"uuid" : "ae154983-4c39-4a58-aa86-95e0573452df"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/bd89c287b180e04d315b19dc56509e06aca44a7f234c308510376a39f45fb283/analysis/1554131375/" ,
"category" : "Payload delivery" ,
"uuid" : "9731d4df-bede-4c7b-a84f-e3409931ef31"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "33/67" ,
"category" : "Payload delivery" ,
"uuid" : "13d3e396-14a1-4642-9dea-e61e30a2c7bf"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--4226488e-3eca-40fe-b7cd-7cd72eac36ed" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:21.000Z" ,
"modified" : "2019-04-04T10:59:21.000Z" ,
"pattern" : "[file:hashes.MD5 = '0f56b04a4e9a0df94c7f89c1bccf830c' AND file:hashes.SHA1 = '73895da7b3f1780eeca9750172e1a9545fa63782' AND file:hashes.SHA256 = 'd5d2dfda3e61f26a5c6f173245131dd7c44515ea56a74fc075f614f62593586c']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T10:59:21Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--f42cd377-f5d2-4495-a22b-e072af84b53d" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:21.000Z" ,
"modified" : "2019-04-04T10:59:21.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2019-03-27T21:41:37" ,
"category" : "Other" ,
"uuid" : "9c7704c6-2d0d-44e5-9a55-f7a5459016dc"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/d5d2dfda3e61f26a5c6f173245131dd7c44515ea56a74fc075f614f62593586c/analysis/1553722897/" ,
"category" : "Payload delivery" ,
"uuid" : "6a2896ea-9cdf-4461-b8cc-b02fa1353e37"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "31/54" ,
"category" : "Payload delivery" ,
"uuid" : "f45ebe03-d435-4aef-a6ae-8b4a83142f23"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--b218ae1a-0d6c-4a65-8fca-502b578fe1b7" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:22.000Z" ,
"modified" : "2019-04-04T10:59:22.000Z" ,
"pattern" : "[file:hashes.MD5 = '914ac7ecf2557d5836f26a151c1b9b62' AND file:hashes.SHA1 = '49b7c035cead28573b793b3947621a330b216b2b' AND file:hashes.SHA256 = '245d0d8b02875720d39c24fe0278fc24bb87ffd97a7c62a1d1723dbfe5b72cdc']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T10:59:22Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--e846f5c4-79f6-4e64-b744-222508aad1f8" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:22.000Z" ,
"modified" : "2019-04-04T10:59:22.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2019-03-26T01:43:50" ,
"category" : "Other" ,
"uuid" : "f04f4c69-06c2-4ae6-b54c-103f2ea7b273"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/245d0d8b02875720d39c24fe0278fc24bb87ffd97a7c62a1d1723dbfe5b72cdc/analysis/1553564630/" ,
"category" : "Payload delivery" ,
"uuid" : "74ab99c3-0e96-43f9-b286-6058716bd1e5"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "35/59" ,
"category" : "Payload delivery" ,
"uuid" : "75cff71b-ee95-4f7a-aae1-06e70db035f8"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--1d235ad4-9ff2-465f-b0c3-59401db6a1ba" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:22.000Z" ,
"modified" : "2019-04-04T10:59:22.000Z" ,
"pattern" : "[file:hashes.MD5 = 'aac00312a961e81c4af4664c49b4a2b2' AND file:hashes.SHA1 = 'ab4fb9d8f917d2c45f3792c05c29799bf27cdd9f' AND file:hashes.SHA256 = 'a205c5cdc00e83ddb12470793b3eb2310425a06072d67f6f9617650fb55d6b14']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T10:59:22Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--67497812-2875-4d21-b39b-84c4814b8589" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:22.000Z" ,
"modified" : "2019-04-04T10:59:22.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2019-03-27T21:41:15" ,
"category" : "Other" ,
"uuid" : "f5b5ee0e-d5ea-48b9-bbd6-b7ca034d1926"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/a205c5cdc00e83ddb12470793b3eb2310425a06072d67f6f9617650fb55d6b14/analysis/1553722875/" ,
"category" : "Payload delivery" ,
"uuid" : "02fc2be9-9f6a-4e0f-bfde-4d104ce30909"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "53/68" ,
"category" : "Payload delivery" ,
"uuid" : "e13fd81b-0e00-4ede-83e3-d81894abf9e5"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--e540d071-510e-4aa4-a9b2-9bc49249b5d9" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:22.000Z" ,
"modified" : "2019-04-04T10:59:22.000Z" ,
"pattern" : "[file:hashes.MD5 = 'bcc49643833a4d8545ed4145fb6fdfd2' AND file:hashes.SHA1 = 'a88113c715c8ee254057bc7926d3535ab841e122' AND file:hashes.SHA256 = '98db913f5793f8c2df6bff01dc9fe7d37279116093e17c2d669ad359466766ad']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T10:59:22Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--99640379-c5b4-4f87-9607-87df8a39953c" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:22.000Z" ,
"modified" : "2019-04-04T10:59:22.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2019-04-02T03:51:02" ,
"category" : "Other" ,
"uuid" : "c84221c1-2109-44be-80bb-c2ba345a8982"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/98db913f5793f8c2df6bff01dc9fe7d37279116093e17c2d669ad359466766ad/analysis/1554177062/" ,
"category" : "Payload delivery" ,
"uuid" : "1bf2ee69-ee15-46ba-bdd4-50bd88c487c5"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "49/68" ,
"category" : "Payload delivery" ,
"uuid" : "96e1c7d8-951a-4d53-9c3d-3a63867a2545"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--2f03f8ef-703c-4570-9f50-3a5819b28a8f" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:22.000Z" ,
"modified" : "2019-04-04T10:59:22.000Z" ,
"pattern" : "[file:hashes.MD5 = '9b19753369b6ed1187159b95fc8a81cd' AND file:hashes.SHA1 = 'cafb67eeb2de076e7e6b0143dac87bb11f7134ac' AND file:hashes.SHA256 = '6f91222109c8556876612c82bfcb50d8a4ee66501e63dc392343e021dd7e563c']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T10:59:22Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--41e4fe85-b192-4277-b98a-00b4a08132bc" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:22.000Z" ,
"modified" : "2019-04-04T10:59:22.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2019-04-03T06:46:43" ,
"category" : "Other" ,
"uuid" : "3ece6471-807f-4c4d-b89c-79398038f291"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/6f91222109c8556876612c82bfcb50d8a4ee66501e63dc392343e021dd7e563c/analysis/1554274003/" ,
"category" : "Payload delivery" ,
"uuid" : "d09276c9-1ad3-45d7-8c11-ce53d55b1260"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "27/51" ,
"category" : "Payload delivery" ,
"uuid" : "85c82a65-c099-4c8b-925c-86dccbcb56c4"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--a5e8c39c-fb23-4ef1-9eb8-437d87e73067" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:23.000Z" ,
"modified" : "2019-04-04T10:59:23.000Z" ,
"pattern" : "[file:hashes.MD5 = '062801f6fdbda4dd67b77834c62e82a4' AND file:hashes.SHA1 = 'c02e298f63acb20246683c302f0a71bfd7081f88' AND file:hashes.SHA256 = 'eacc0ee88a0b0db7d89fdf5b76406fe1c4ea409f23a95e7230789b475cf4b0f0']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T10:59:23Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--2af039b9-991a-4586-8fda-41e7098a1803" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:23.000Z" ,
"modified" : "2019-04-04T10:59:23.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2019-04-04T01:15:33" ,
"category" : "Other" ,
"uuid" : "27d9d610-e0f2-4341-b907-c0c9f30cba10"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/eacc0ee88a0b0db7d89fdf5b76406fe1c4ea409f23a95e7230789b475cf4b0f0/analysis/1554340533/" ,
"category" : "Payload delivery" ,
"uuid" : "4720cca9-9ec5-4768-b5ae-212af40fe5e0"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "36/61" ,
"category" : "Payload delivery" ,
"uuid" : "4e900f7c-0a63-48f0-8b15-ad1f62b94084"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--adc64a31-03f0-414f-9a20-51da35e8f47d" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:23.000Z" ,
"modified" : "2019-04-04T10:59:23.000Z" ,
"pattern" : "[file:hashes.MD5 = '9b81b3174c9b699f594d725cf89ffaa4' AND file:hashes.SHA1 = 'c9967af445a3416d0ff3701555e83529ff482ff9' AND file:hashes.SHA256 = '4d524c271ae0e40e7526ecda9a28bc99e83f5b26d98737f0f8f6b585f05b6d22']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T10:59:23Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--23fa7a2f-f0b6-4dd1-91d5-64fd38f60409" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:23.000Z" ,
"modified" : "2019-04-04T10:59:23.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2019-03-29T05:33:11" ,
"category" : "Other" ,
"uuid" : "2ed2edb7-aaa6-4812-9244-fd3fc3919580"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/4d524c271ae0e40e7526ecda9a28bc99e83f5b26d98737f0f8f6b585f05b6d22/analysis/1553837591/" ,
"category" : "Payload delivery" ,
"uuid" : "a77aacfd-49a3-4eaf-8962-ff0fae0b7eea"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "33/59" ,
"category" : "Payload delivery" ,
"uuid" : "488706c1-fcfa-4db9-af64-9e79cc1748e8"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "indicator" ,
"spec_version" : "2.1" ,
"id" : "indicator--631d6673-b540-4d35-891c-0583af76d3cc" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:23.000Z" ,
"modified" : "2019-04-04T10:59:23.000Z" ,
"pattern" : "[file:hashes.MD5 = '49419d84076b13e96540fdd911f1c2f0' AND file:hashes.SHA1 = '35749e82cd605e07b4145b48ef677721a113ae20' AND file:hashes.SHA256 = 'e88fb2337594adbf00f0bc30af3f315056a892f2bad832247b383fe12797fb4b']" ,
"pattern_type" : "stix" ,
"pattern_version" : "2.1" ,
"valid_from" : "2019-04-04T10:59:23Z" ,
"kill_chain_phases" : [
{
"kill_chain_name" : "misp-category" ,
"phase_name" : "file"
}
] ,
"labels" : [
"misp:name=\"file\"" ,
"misp:meta-category=\"file\"" ,
"misp:to_ids=\"True\""
]
} ,
{
"type" : "x-misp-object" ,
"spec_version" : "2.1" ,
"id" : "x-misp-object--86d59c0c-a662-4aa5-8dcb-34823bc70f44" ,
"created_by_ref" : "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f" ,
"created" : "2019-04-04T10:59:24.000Z" ,
"modified" : "2019-04-04T10:59:24.000Z" ,
"labels" : [
"misp:name=\"virustotal-report\"" ,
"misp:meta-category=\"misc\""
] ,
"x_misp_attributes" : [
{
"type" : "datetime" ,
"object_relation" : "last-submission" ,
"value" : "2019-03-29T03:27:04" ,
"category" : "Other" ,
"uuid" : "e7fd965e-5fbe-4d19-8861-6bb7aecad60e"
} ,
{
"type" : "link" ,
"object_relation" : "permalink" ,
"value" : "https://www.virustotal.com/file/e88fb2337594adbf00f0bc30af3f315056a892f2bad832247b383fe12797fb4b/analysis/1553830024/" ,
"category" : "Payload delivery" ,
"uuid" : "b65b97c1-4007-41e6-a420-eb82e6db6754"
} ,
{
"type" : "text" ,
"object_relation" : "detection-ratio" ,
"value" : "29/58" ,
"category" : "Payload delivery" ,
"uuid" : "9eb24880-f920-444d-963e-624562a666d9"
}
] ,
"x_misp_meta_category" : "misc" ,
"x_misp_name" : "virustotal-report"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--0da840d6-9a7a-47e0-8c0e-2c504befefdd" ,
2023-04-21 14:44:17 +00:00
"created" : "2019-04-04T10:59:24.000Z" ,
"modified" : "2019-04-04T10:59:24.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--93cde704-eb81-46a1-bf16-412a7c6abbdf" ,
"target_ref" : "x-misp-object--bb78d9ea-99dd-4557-8135-d577734bdace"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--7ef764c9-9e5a-4d18-9e42-d6653a4996a2" ,
2023-04-21 14:44:17 +00:00
"created" : "2019-04-04T10:59:24.000Z" ,
"modified" : "2019-04-04T10:59:24.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--e6a06d80-1a38-4b89-8be3-0242f4f284be" ,
"target_ref" : "x-misp-object--382da157-8d8e-479d-8449-2a7a7c54b674"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--235a2af4-590e-460d-bb0e-ee67e4a055d2" ,
2023-04-21 14:44:17 +00:00
"created" : "2019-04-04T10:59:24.000Z" ,
"modified" : "2019-04-04T10:59:24.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--f6d2b694-c79b-465e-979a-cb05135b5a97" ,
"target_ref" : "x-misp-object--ecd4d490-5fe8-46c8-8434-ecdaf383d422"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--5cb5f92b-6ec8-4f1e-ab1e-f4ceb8466ee1" ,
2023-04-21 14:44:17 +00:00
"created" : "2019-04-04T10:59:24.000Z" ,
"modified" : "2019-04-04T10:59:24.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--b6cdc62f-aae9-4a50-a4cc-4ce3a17cd2f7" ,
"target_ref" : "x-misp-object--54777b78-ec4c-4356-8e7e-47c9bf4cdcda"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--76a83d9e-bd1f-4569-8570-dee307c9a210" ,
2023-04-21 14:44:17 +00:00
"created" : "2019-04-04T10:59:24.000Z" ,
"modified" : "2019-04-04T10:59:24.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--c945a6c0-c445-4c44-be12-83436bcfd415" ,
"target_ref" : "x-misp-object--94d10499-0534-45c0-8ecf-770f73b5db6c"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--6e2a4d36-99cc-4d87-99a8-f04a75f913a5" ,
2023-04-21 14:44:17 +00:00
"created" : "2019-04-04T10:59:24.000Z" ,
"modified" : "2019-04-04T10:59:24.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--9328597f-c9b9-417d-8c35-0a3a6c45d73b" ,
"target_ref" : "x-misp-object--36ac2225-5a1d-4974-b50b-0867497073fc"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--220c5d8d-c180-4082-bb88-30f87c79e80c" ,
2023-04-21 14:44:17 +00:00
"created" : "2019-04-04T10:59:24.000Z" ,
"modified" : "2019-04-04T10:59:24.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--550a0ca7-ccf5-4143-96dd-b372c9d532f3" ,
"target_ref" : "x-misp-object--99a75d1e-e23b-4c36-a2e8-9ff4fcf7ec5a"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--e1914b5c-005e-41fd-8f1f-5c3a4eaf4803" ,
2023-04-21 14:44:17 +00:00
"created" : "2019-04-04T10:59:25.000Z" ,
"modified" : "2019-04-04T10:59:25.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--ff40c2e7-d34c-4542-a26c-17e782a6fafb" ,
"target_ref" : "x-misp-object--947c136b-e247-4529-849b-09ddeea124f0"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--93771152-2a41-4eaa-8785-0d9790e8f7e0" ,
2023-04-21 14:44:17 +00:00
"created" : "2019-04-04T10:59:25.000Z" ,
"modified" : "2019-04-04T10:59:25.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--6d055204-92e1-440c-9a0b-6e0fd09d72e9" ,
"target_ref" : "x-misp-object--f517121e-0639-45a7-a0ce-7d7e1826730a"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--6cd417c3-c608-4029-ac05-283238aae2bd" ,
2023-04-21 14:44:17 +00:00
"created" : "2019-04-04T10:59:25.000Z" ,
"modified" : "2019-04-04T10:59:25.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--eb0a6c2c-53fb-4aef-a7fd-da6c154281e9" ,
"target_ref" : "x-misp-object--ef1af813-b308-4fb3-89ad-b57491d76acb"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--faf4e898-9064-43ab-8d89-45ef06dae779" ,
2023-04-21 14:44:17 +00:00
"created" : "2019-04-04T10:59:25.000Z" ,
"modified" : "2019-04-04T10:59:25.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--dd29a4a3-c07e-4a56-9f27-410b1e070559" ,
"target_ref" : "x-misp-object--2681a029-e095-4a15-a60e-5b39bb9cf743"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--6fd168d9-5758-4f86-b1c6-5e1ed38c5446" ,
2023-04-21 14:44:17 +00:00
"created" : "2019-04-04T10:59:25.000Z" ,
"modified" : "2019-04-04T10:59:25.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--996e8502-42f2-46ce-a819-264bd1c0374e" ,
"target_ref" : "x-misp-object--5508860a-3775-4c49-a97c-234666b38510"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--ad5b1ce8-7f0b-47e3-b4f6-1d61316b9917" ,
2023-04-21 14:44:17 +00:00
"created" : "2019-04-04T10:59:25.000Z" ,
"modified" : "2019-04-04T10:59:25.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--ffebb241-ef81-48b2-91e3-fe715182f904" ,
"target_ref" : "x-misp-object--ace2107f-3ab5-4b01-a221-521235ac2753"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--d0b86381-2987-432f-9e48-696ef175393b" ,
2023-04-21 14:44:17 +00:00
"created" : "2019-04-04T10:59:25.000Z" ,
"modified" : "2019-04-04T10:59:25.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--5565b852-a761-4c28-b520-91f0eac10203" ,
"target_ref" : "x-misp-object--0c6ca9fc-6775-4329-819b-0af00f86b722"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--7c5cb146-32d9-4ce9-9ba1-9b3c3e540285" ,
2023-04-21 14:44:17 +00:00
"created" : "2019-04-04T10:59:25.000Z" ,
"modified" : "2019-04-04T10:59:25.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--4226488e-3eca-40fe-b7cd-7cd72eac36ed" ,
"target_ref" : "x-misp-object--f42cd377-f5d2-4495-a22b-e072af84b53d"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--6084ef56-ae00-42ef-a878-fc1786997349" ,
2023-04-21 14:44:17 +00:00
"created" : "2019-04-04T10:59:25.000Z" ,
"modified" : "2019-04-04T10:59:25.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--b218ae1a-0d6c-4a65-8fca-502b578fe1b7" ,
"target_ref" : "x-misp-object--e846f5c4-79f6-4e64-b744-222508aad1f8"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--66b2a89c-56e4-4b7c-85ba-a4dda82d2342" ,
2023-04-21 14:44:17 +00:00
"created" : "2019-04-04T10:59:25.000Z" ,
"modified" : "2019-04-04T10:59:25.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--1d235ad4-9ff2-465f-b0c3-59401db6a1ba" ,
"target_ref" : "x-misp-object--67497812-2875-4d21-b39b-84c4814b8589"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--6a332dab-cee0-46a4-aeb5-a70a07d9ac94" ,
2023-04-21 14:44:17 +00:00
"created" : "2019-04-04T10:59:25.000Z" ,
"modified" : "2019-04-04T10:59:25.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--e540d071-510e-4aa4-a9b2-9bc49249b5d9" ,
"target_ref" : "x-misp-object--99640379-c5b4-4f87-9607-87df8a39953c"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--8283eb3b-8937-4331-90cf-43e3807809c2" ,
2023-04-21 14:44:17 +00:00
"created" : "2019-04-04T10:59:25.000Z" ,
"modified" : "2019-04-04T10:59:25.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--2f03f8ef-703c-4570-9f50-3a5819b28a8f" ,
"target_ref" : "x-misp-object--41e4fe85-b192-4277-b98a-00b4a08132bc"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--bb7c6057-3efa-45e4-8a45-5bd160d24e8e" ,
2023-04-21 14:44:17 +00:00
"created" : "2019-04-04T10:59:25.000Z" ,
"modified" : "2019-04-04T10:59:25.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--a5e8c39c-fb23-4ef1-9eb8-437d87e73067" ,
"target_ref" : "x-misp-object--2af039b9-991a-4586-8fda-41e7098a1803"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--9e4343a3-9107-4d0e-a9ea-3cf1bdd70b18" ,
2023-04-21 14:44:17 +00:00
"created" : "2019-04-04T10:59:25.000Z" ,
"modified" : "2019-04-04T10:59:25.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--adc64a31-03f0-414f-9a20-51da35e8f47d" ,
"target_ref" : "x-misp-object--23fa7a2f-f0b6-4dd1-91d5-64fd38f60409"
} ,
{
"type" : "relationship" ,
"spec_version" : "2.1" ,
2024-08-07 08:13:15 +00:00
"id" : "relationship--d1e489a0-b5ea-496a-b260-8a9599237cb2" ,
2023-04-21 14:44:17 +00:00
"created" : "2019-04-04T10:59:25.000Z" ,
"modified" : "2019-04-04T10:59:25.000Z" ,
"relationship_type" : "analysed-with" ,
"source_ref" : "indicator--631d6673-b540-4d35-891c-0583af76d3cc" ,
"target_ref" : "x-misp-object--86d59c0c-a662-4aa5-8dcb-34823bc70f44"
} ,
{
"type" : "marking-definition" ,
"spec_version" : "2.1" ,
"id" : "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ,
"created" : "2017-01-20T00:00:00.000Z" ,
"definition_type" : "tlp" ,
"name" : "TLP:WHITE" ,
"definition" : {
"tlp" : "white"
}
}
]
}