{ "type": "bundle", "id": "bundle--56af46bd-e4d0-4bf8-aa4a-4228950d210f", "objects": [ { "type": "identity", "spec_version": "2.1", "id": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T15:04:13.000Z", "modified": "2016-02-01T15:04:13.000Z", "name": "CthulhuSPRL.be", "identity_class": "organization" }, { "type": "report", "spec_version": "2.1", "id": "report--56af46bd-e4d0-4bf8-aa4a-4228950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T15:04:13.000Z", "modified": "2016-02-01T15:04:13.000Z", "name": "OSINT Threat Actors Use Sketchy Dating Website to Launch New Home Router Attacks by Damballa", "published": "2016-02-01T11:57:35Z", "object_refs": [ "observed-data--56af46e3-bdb4-465e-af63-4caf950d210f", "url--56af46e3-bdb4-465e-af63-4caf950d210f", "indicator--56af46ff-c5b8-49c1-8fc1-4148950d210f", "indicator--56af470d-7d54-4c2a-a1f7-4956950d210f", "indicator--56af4763-1e2c-4323-8edd-4841950d210f", "indicator--56af4763-3fe4-4cdb-ac7d-4301950d210f", "indicator--56af4763-0568-4df5-9e3c-4da1950d210f", "indicator--56af4764-0764-4ba6-bbe9-4b93950d210f", "x-misp-attribute--56af479a-41d4-4775-bb13-46fa950d210f", "indicator--56af47ff-5b08-42bf-98af-4312950d210f", "indicator--56af47ff-a02c-493a-be12-40b3950d210f", "indicator--56af47ff-c0bc-43aa-8408-41d8950d210f", "indicator--56af4800-58ec-4b70-bd88-417d950d210f", "indicator--56af4800-c3b8-4287-8d93-4e87950d210f", "indicator--56af4800-91ac-4bd5-b7c5-4b49950d210f", "indicator--56af4801-5fbc-42f2-b045-4276950d210f", "indicator--56af481a-d628-41a1-994d-4d5b950d210f", "indicator--56af73ee-88bc-466b-9a0c-450c02de0b81", "indicator--56af73ee-afc0-46a9-b817-4d0d02de0b81", "observed-data--56af73ee-2a38-4a8e-b1c4-460802de0b81", "url--56af73ee-2a38-4a8e-b1c4-460802de0b81", "indicator--56af73ee-2628-4579-8d87-424902de0b81", "indicator--56af73ef-9200-469e-ba8b-4d6202de0b81", "observed-data--56af73ef-9d38-47c6-80ee-498902de0b81", "url--56af73ef-9d38-47c6-80ee-498902de0b81", "indicator--56af73ef-95e0-4e21-894c-4b6a02de0b81", "indicator--56af73ef-4ac4-4873-b518-4ba402de0b81", "observed-data--56af73f0-9bf0-4865-a5c9-484402de0b81", "url--56af73f0-9bf0-4865-a5c9-484402de0b81", "indicator--56af73f0-91e8-4af7-bcc8-4cc002de0b81", "indicator--56af73f0-e09c-4b96-8611-464602de0b81", "observed-data--56af73f0-cb58-4238-9992-40f202de0b81", "url--56af73f0-cb58-4238-9992-40f202de0b81", "indicator--56af73f1-15e4-47b3-adb7-413402de0b81", "indicator--56af73f1-d60c-4da3-81dc-400a02de0b81", "observed-data--56af73f1-b738-4032-b703-414202de0b81", "url--56af73f1-b738-4032-b703-414202de0b81", "indicator--56af73f1-2400-4eac-847e-495702de0b81", "indicator--56af73f2-0e8c-40a6-9355-478802de0b81", "observed-data--56af73f2-a6ec-41a8-94ca-4ade02de0b81", "url--56af73f2-a6ec-41a8-94ca-4ade02de0b81" ], "labels": [ "Threat-Report", "misp:tool=\"MISP-STIX-Converter\"", "type:OSINT" ], "object_marking_refs": [ "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--56af46e3-bdb4-465e-af63-4caf950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T11:52:03.000Z", "modified": "2016-02-01T11:52:03.000Z", "first_observed": "2016-02-01T11:52:03Z", "last_observed": "2016-02-01T11:52:03Z", "number_observed": 1, "object_refs": [ "url--56af46e3-bdb4-465e-af63-4caf950d210f" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--56af46e3-bdb4-465e-af63-4caf950d210f", "value": "https://www.damballa.com/threat-actors-use-sketchy-dating-website-to-launch-new-home-router-attacks/" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56af46ff-c5b8-49c1-8fc1-4148950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T11:52:31.000Z", "modified": "2016-02-01T11:52:31.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.103.48.34']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-02-01T11:52:31Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56af470d-7d54-4c2a-a1f7-4956950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T11:52:45.000Z", "modified": "2016-02-01T11:52:45.000Z", "pattern": "[domain-name:value = 'sexyworldtouralliance.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-02-01T11:52:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56af4763-1e2c-4323-8edd-4841950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T11:54:11.000Z", "modified": "2016-02-01T11:54:11.000Z", "description": "Domains registered with same IP", "pattern": "[domain-name:value = 'allinceofsexuality.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-02-01T11:54:11Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56af4763-3fe4-4cdb-ac7d-4301950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T11:54:11.000Z", "modified": "2016-02-01T11:54:11.000Z", "description": "Domains registered with same IP", "pattern": "[domain-name:value = 'anniversaryaliancesex.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-02-01T11:54:11Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56af4763-0568-4df5-9e3c-4da1950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T11:54:11.000Z", "modified": "2016-02-01T11:54:11.000Z", "description": "Domains registered with same IP", "pattern": "[domain-name:value = 'superadultnat.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-02-01T11:54:11Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56af4764-0764-4ba6-bbe9-4b93950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T11:54:12.000Z", "modified": "2016-02-01T11:54:12.000Z", "description": "Domains registered with same IP", "pattern": "[domain-name:value = 'violationcyberatack.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-02-01T11:54:12Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-attribute", "spec_version": "2.1", "id": "x-misp-attribute--56af479a-41d4-4775-bb13-46fa950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T11:55:06.000Z", "modified": "2016-02-01T11:55:06.000Z", "labels": [ "misp:type=\"whois-registrant-email\"", "misp:category=\"Attribution\"" ], "x_misp_category": "Attribution", "x_misp_type": "whois-registrant-email", "x_misp_value": "gordon_polo@yahoo.com" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56af47ff-5b08-42bf-98af-4312950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T11:56:47.000Z", "modified": "2016-02-01T11:56:47.000Z", "pattern": "[file:hashes.SHA1 = '2b82c715c2f1480b57e59bd7c55ef32db312e008']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-02-01T11:56:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha1\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56af47ff-a02c-493a-be12-40b3950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T11:56:47.000Z", "modified": "2016-02-01T11:56:47.000Z", "pattern": "[file:hashes.SHA1 = 'c05bd53f91032f2c8cae509477d760537f014621']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-02-01T11:56:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha1\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56af47ff-c0bc-43aa-8408-41d8950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T11:56:47.000Z", "modified": "2016-02-01T11:56:47.000Z", "pattern": "[file:hashes.SHA1 = '9b22373e8cd7c6b087ca62d1b154faa04d684549']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-02-01T11:56:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha1\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56af4800-58ec-4b70-bd88-417d950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T11:56:48.000Z", "modified": "2016-02-01T11:56:48.000Z", "pattern": "[file:hashes.SHA1 = '7f168f8f17774feb5f3fe35d39c41564645afa24']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-02-01T11:56:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha1\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56af4800-c3b8-4287-8d93-4e87950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T11:56:48.000Z", "modified": "2016-02-01T11:56:48.000Z", "pattern": "[file:hashes.SHA1 = '92632bd26fb2828ddf5a86687c837ca734d0fbbf']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-02-01T11:56:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha1\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56af4800-91ac-4bd5-b7c5-4b49950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T11:56:48.000Z", "modified": "2016-02-01T11:56:48.000Z", "pattern": "[file:hashes.SHA1 = '9e61bb2da5e3b9760d992d052d824ffdd584e2ff']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-02-01T11:56:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha1\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56af4801-5fbc-42f2-b045-4276950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T11:56:49.000Z", "modified": "2016-02-01T11:56:49.000Z", "pattern": "[file:hashes.SHA1 = 'ea24cded99b27ff44d2ed2688dea93e3ca0214c2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-02-01T11:56:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha1\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56af481a-d628-41a1-994d-4d5b950d210f", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T11:57:14.000Z", "modified": "2016-02-01T11:57:14.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.103.49.34']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-02-01T11:57:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56af73ee-88bc-466b-9a0c-450c02de0b81", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T15:04:14.000Z", "modified": "2016-02-01T15:04:14.000Z", "description": "- Xchecked via VT: 9e61bb2da5e3b9760d992d052d824ffdd584e2ff", "pattern": "[file:hashes.SHA256 = 'c6a8c74711b1c6d38b7bb7b35772b80347f80cf16296e6439d21c877474ac2e6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-02-01T15:04:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56af73ee-afc0-46a9-b817-4d0d02de0b81", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T15:04:14.000Z", "modified": "2016-02-01T15:04:14.000Z", "description": "- Xchecked via VT: 9e61bb2da5e3b9760d992d052d824ffdd584e2ff", "pattern": "[file:hashes.MD5 = 'ec7378a79eb9ffd88098932a505f53cc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-02-01T15:04:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--56af73ee-2a38-4a8e-b1c4-460802de0b81", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T15:04:14.000Z", "modified": "2016-02-01T15:04:14.000Z", "first_observed": "2016-02-01T15:04:14Z", "last_observed": "2016-02-01T15:04:14Z", "number_observed": 1, "object_refs": [ "url--56af73ee-2a38-4a8e-b1c4-460802de0b81" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--56af73ee-2a38-4a8e-b1c4-460802de0b81", "value": "https://www.virustotal.com/file/c6a8c74711b1c6d38b7bb7b35772b80347f80cf16296e6439d21c877474ac2e6/analysis/1453383429/" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56af73ee-2628-4579-8d87-424902de0b81", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T15:04:14.000Z", "modified": "2016-02-01T15:04:14.000Z", "description": "- Xchecked via VT: 92632bd26fb2828ddf5a86687c837ca734d0fbbf", "pattern": "[file:hashes.SHA256 = 'a42786bec02b889675fdca7ebcc533dbc5f8d93609b6cf110d965b75dd22c971']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-02-01T15:04:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56af73ef-9200-469e-ba8b-4d6202de0b81", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T15:04:15.000Z", "modified": "2016-02-01T15:04:15.000Z", "description": "- Xchecked via VT: 92632bd26fb2828ddf5a86687c837ca734d0fbbf", "pattern": "[file:hashes.MD5 = 'd5c96a4f2e1e146a12f140f22b700333']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-02-01T15:04:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--56af73ef-9d38-47c6-80ee-498902de0b81", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T15:04:15.000Z", "modified": "2016-02-01T15:04:15.000Z", "first_observed": "2016-02-01T15:04:15Z", "last_observed": "2016-02-01T15:04:15Z", "number_observed": 1, "object_refs": [ "url--56af73ef-9d38-47c6-80ee-498902de0b81" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--56af73ef-9d38-47c6-80ee-498902de0b81", "value": "https://www.virustotal.com/file/a42786bec02b889675fdca7ebcc533dbc5f8d93609b6cf110d965b75dd22c971/analysis/1454058592/" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56af73ef-95e0-4e21-894c-4b6a02de0b81", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T15:04:15.000Z", "modified": "2016-02-01T15:04:15.000Z", "description": "- Xchecked via VT: 7f168f8f17774feb5f3fe35d39c41564645afa24", "pattern": "[file:hashes.SHA256 = '794d07497f5b96efeb9428ac0fecd755878eaf906da6ffce14e940055fa7f17c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-02-01T15:04:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56af73ef-4ac4-4873-b518-4ba402de0b81", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T15:04:15.000Z", "modified": "2016-02-01T15:04:15.000Z", "description": "- Xchecked via VT: 7f168f8f17774feb5f3fe35d39c41564645afa24", "pattern": "[file:hashes.MD5 = '7b8b829fd94f2a070543cc2c6bfc4040']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-02-01T15:04:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--56af73f0-9bf0-4865-a5c9-484402de0b81", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T15:04:16.000Z", "modified": "2016-02-01T15:04:16.000Z", "first_observed": "2016-02-01T15:04:16Z", "last_observed": "2016-02-01T15:04:16Z", "number_observed": 1, "object_refs": [ "url--56af73f0-9bf0-4865-a5c9-484402de0b81" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--56af73f0-9bf0-4865-a5c9-484402de0b81", "value": "https://www.virustotal.com/file/794d07497f5b96efeb9428ac0fecd755878eaf906da6ffce14e940055fa7f17c/analysis/1453383400/" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56af73f0-91e8-4af7-bcc8-4cc002de0b81", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T15:04:16.000Z", "modified": "2016-02-01T15:04:16.000Z", "description": "- Xchecked via VT: 9b22373e8cd7c6b087ca62d1b154faa04d684549", "pattern": "[file:hashes.SHA256 = 'fdb4fc6c833353ea0202fd751900f3ac498db5209e8ca2b8de8f8bfca1fe1fdd']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-02-01T15:04:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56af73f0-e09c-4b96-8611-464602de0b81", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T15:04:16.000Z", "modified": "2016-02-01T15:04:16.000Z", "description": "- Xchecked via VT: 9b22373e8cd7c6b087ca62d1b154faa04d684549", "pattern": "[file:hashes.MD5 = 'bbf1327c1a5213b41a4d22c4b4806f7c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-02-01T15:04:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--56af73f0-cb58-4238-9992-40f202de0b81", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T15:04:16.000Z", "modified": "2016-02-01T15:04:16.000Z", "first_observed": "2016-02-01T15:04:16Z", "last_observed": "2016-02-01T15:04:16Z", "number_observed": 1, "object_refs": [ "url--56af73f0-cb58-4238-9992-40f202de0b81" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--56af73f0-cb58-4238-9992-40f202de0b81", "value": "https://www.virustotal.com/file/fdb4fc6c833353ea0202fd751900f3ac498db5209e8ca2b8de8f8bfca1fe1fdd/analysis/1453383386/" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56af73f1-15e4-47b3-adb7-413402de0b81", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T15:04:17.000Z", "modified": "2016-02-01T15:04:17.000Z", "description": "- Xchecked via VT: c05bd53f91032f2c8cae509477d760537f014621", "pattern": "[file:hashes.SHA256 = 'f12b086eaf3a190e7882167638bfc418b438d0e95b846dc2c3c1e7a092b1596e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-02-01T15:04:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56af73f1-d60c-4da3-81dc-400a02de0b81", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T15:04:17.000Z", "modified": "2016-02-01T15:04:17.000Z", "description": "- Xchecked via VT: c05bd53f91032f2c8cae509477d760537f014621", "pattern": "[file:hashes.MD5 = '514b7da4b811da11fe7033aea155dba6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-02-01T15:04:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--56af73f1-b738-4032-b703-414202de0b81", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T15:04:17.000Z", "modified": "2016-02-01T15:04:17.000Z", "first_observed": "2016-02-01T15:04:17Z", "last_observed": "2016-02-01T15:04:17Z", "number_observed": 1, "object_refs": [ "url--56af73f1-b738-4032-b703-414202de0b81" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--56af73f1-b738-4032-b703-414202de0b81", "value": "https://www.virustotal.com/file/f12b086eaf3a190e7882167638bfc418b438d0e95b846dc2c3c1e7a092b1596e/analysis/1454330041/" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56af73f1-2400-4eac-847e-495702de0b81", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T15:04:17.000Z", "modified": "2016-02-01T15:04:17.000Z", "description": "- Xchecked via VT: 2b82c715c2f1480b57e59bd7c55ef32db312e008", "pattern": "[file:hashes.SHA256 = 'cf1bbcaf1e6902c09da35ffe6f9b93081575e7e6e2e4754684f88eb7bb8ec478']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-02-01T15:04:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56af73f2-0e8c-40a6-9355-478802de0b81", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T15:04:18.000Z", "modified": "2016-02-01T15:04:18.000Z", "description": "- Xchecked via VT: 2b82c715c2f1480b57e59bd7c55ef32db312e008", "pattern": "[file:hashes.MD5 = 'c44f2d8ad37c18ea84a99db584d6992d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2016-02-01T15:04:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"md5\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--56af73f2-a6ec-41a8-94ca-4ade02de0b81", "created_by_ref": "identity--55f6ea5f-fd34-43b8-ac1d-40cb950d210f", "created": "2016-02-01T15:04:18.000Z", "modified": "2016-02-01T15:04:18.000Z", "first_observed": "2016-02-01T15:04:18Z", "last_observed": "2016-02-01T15:04:18Z", "number_observed": 1, "object_refs": [ "url--56af73f2-a6ec-41a8-94ca-4ade02de0b81" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--56af73f2-a6ec-41a8-94ca-4ade02de0b81", "value": "https://www.virustotal.com/file/cf1bbcaf1e6902c09da35ffe6f9b93081575e7e6e2e4754684f88eb7bb8ec478/analysis/1453894645/" }, { "type": "marking-definition", "spec_version": "2.1", "id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9", "created": "2017-01-20T00:00:00.000Z", "definition_type": "tlp", "name": "TLP:WHITE", "definition": { "tlp": "white" } } ] }